C [0,1]. We denote the elements of Cc as ([x, y][z, v]).
Define the following orders on this set. Let ([x, y][z, v]),
([x1, y1][z1, v1]) be any two elements of Cc.
([x, y][z, v]) t ([x1, y1][z1, v1]) iff x x1, y y1 and z1 z, v1 v
([x, y][z, v]) f ([x1, y1][z1, v1]) iff x x1, y y1 and z z1, v v1
([x, y][z, v]) i ([x1, y1][z1, v1]) iff x x1, y1 y and z z1, v1 v
Definition 2. Let Cc, t, f, i be as defined in Definition
1. Then the meet and join corresponding to the truth,
falsity and knowledge (information) orders are defined
as follows. The symbols and denote meet and join,
and the subscripts t, f, and i represent truth, falsity, and
information (knowledge), respectively.
1. ([x, y][z, v]) t ([x1, y1][z1, v1]) =
([min{x, x1}, min{y, y1}], [max{z, z1}, max{v, v1}])
2. ([x, y][z, v]) t ([x1, y1][z1, v1]) =
([max{x, x1}, max{y, y1}], [min{z, z1}, min{v, v1}])
3. ([x, y][z, v]) f ([x1, y1][z1, v1]) =
([min{x, x1}, min{y, y1}], [min{z, z1}, min{v, v1}])
4. ([x, y][z, v]) f ([x1, y1][z1, v1]) =
([max{x, x1}, max{y, y1}], [max{z, z1}, max{v, v1}])
5. ([x, y][z, v]) i ([x1, y1][z1, v1]) =
([min{x, x1}, max{y, y1}], [min{z, z1}, max{v, v1}])
6. ([x, y][z, v]) i ([x1, y1][z1, v1]) =
([max{x, x1}, min{y, y1}], [max{z, z1}, min{v, v1}])
The top and bottom elements with respect to the various orders
are as follows.
Table 4. Bounds relative to the three partial orderings.
Тt corresponds to {T, t}, ⊥t corresponds to {F, f}.
Тf corresponds to {F, t}, ⊥f corresponds to {T, f}.
Тi corresponds to {TF, tf}, ⊥i corresponds to { }.
References
[1]. S. Older, Shiu-Kai Chin, IEEE Security & Privacy, 10(6),
74 (2012)
[2]. G. Bruns, M. Huth, 2008 21st IEEE Computer Security
Foundations Symposium(CSF), 163 (2008)
[3]. Y. Shramko, H. Wansing, JPL, 34, 121 (2005)
[4]. M.M. Kucherov, N.A. Bogulskaya, ACM International
Conference on Cryptography, Security and Privacy
(ICCSP ’17), 131 (2017)
[5]. L. V. S. Lakshmanan, N. Shiri, IEEE Trans. on
Knowledge and Data Engineering, 13(4), 554 (2001)
[6]. J. Łukasiewicz, On Three-Valued Logic. Ruch
Filozoficzny, 5, 170 (1920), English translation in
Borkowski, L. (ed.) 1970. Jan Łukasiewicz, Selected
Works (Amsterdam: North Holland,1920)
[7]. K.M. Sim, Artificial Intelligence Review, 15(3), 219
(2001)
[8]. S. Kleene, Introduction to Metamathematics (D. Van
Nostrand Co., Inc., New York, N. Y. 1952)
[9]. N.J. Belnap, In Contemporary Aspects of Philosophy
(Proceedings of the Oxford International Symposia,
Oxford, GB, 30, 1975)
[10]. Y. Shramko, J. M. Dunn and T. Takenaka, JLC, 11(6),
761 (2001)
[11]. G.Grätzer, Lattice Theory: Foundation (Springer Science
& Business Media, Berlin/Heidelberg, Germany, 1998)
[12]. J. Łukasiewicz and A. Tarski, Comptes rendus des séances
de la Société des Sciences et des Lettres de Varsovie,
Classe III, 23, 1 (1930)
[13]. L. Zadeh, Inf. Control, 8, 338 (1965)
[14]. P.Hájek, Metamathematics of fuzzy logic (Trends in
Logic, 4, Kluwer Academic Publishers, Dodrecht, 1998)
[15]. M.Zemankova and A.Kandel, Information Sciences, 37,
107 (1985)
[16]. D.Dubois and H.Prade, In Possibility Theory: An
Approach to Computerized Processing of Uncertainty
(New York and London: Plenum Press, 6, 217, 1989)
[17]. M.Kifer and A.Li, 2nd Intl. Conference on Database
Theory, Bruges, Belgium: Spinger Verlag, LNCS 326,
102 (1988)
[18]. R.T.Ng and V.S.Subrahmanian, Information and
Computation, 101(2), 150 (1992)
[19]. V.S.Lakshmanan, N.Leone, R.Ross, and V.S. Subrahman-
ian, ACM Trans. Database Systems, 419 (1997)
[20]. S.P. Odintsov, H.Wansing, Stud Logica, 103, 91 (2015)
[21]. D. E. Denning, CACM, 19(5), 236 (1976)
[22]. J. Crampton, M. Huth, NordSec'10 Proceedings of the
15th Nordic conference on Information Security
Technology for Applications, 155 (2010)
[23]. H. Wan, M. Kifer, LPNMR 2009, 316 (2010)
WSEAS TRANSACTIONS on COMPUTERS
DOI: 10.37394/23205.2023.22.12
M. Kucherov, Nina A. Bogulskaya
Contribution of Individual Authors to the
Creation of a Scientific Article (Ghostwriting
Policy)
The authors equally contributed in the present
research, at all stages from the formulation of the
problem to the final findings and solution.
Sources of Funding for Research Presented in a
Scientific Article or Scientific Article Itself
No funding was received for conducting this study.
Conflict of Interest
The authors have no conflicts of interest to declare
that are relevant to the content of this article.
Creative Commons Attribution License 4.0
(Attribution 4.0 International, CC BY 4.0)
This article is published under the terms of the
Creative Commons Attribution License 4.0
https://creativecommons.org/licenses/by/4.0/deed.en
_US