Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

T

Picture of Yee Wei Law

Transport Layer Security

by Yee Wei Law - Sunday, 12 February 2023, 10:35 AM
 

TODO


Picture of Yee Wei Law

Trusted autonomy

by Yee Wei Law - Monday, 17 July 2023, 11:40 AM
 

Trusted Autonomy (TA) is a field of research that focuses on understanding and designing the interaction space between two entities each of which exhibits a level of autonomy [APM+16].

References

[APM+16] H. A. Abbass, E. Petraki, K. Merrick, J. Harvey, and M. Barlow, Trusted autonomy and cognitive cyber symbiosis: Open challenges, Cognitive Computation 8 no. 3 (2016), 385–408. https://doi.org/10.1007/s12559-015-9365-5.

Picture of Yee Wei Law

Type checking

by Yee Wei Law - Sunday, 14 May 2023, 5:08 PM
 

Type checking checks that program statements are well-formed with respect to a typing logic [vJ11, p. 1255].

For example, integers can be added and functions can be called, but integers cannot be called and functions cannot be added.

Type checking can be used to ensure programs are type-safe, meaning that at every step of the execution, all values have well-defined and appropriate types, and that there is a valid next step of execution.

References

[vJ11] H. C. van Tilborg and S. Jajodia (eds.), Encyclopedia of Cryptography and Security, Springer, Boston, MA, 2011. https://doi.org/10.1007/978-1-4419-5906-5.