메뉴 건너뛰기




Volumn 6, Issue 4, 2003, Pages 501-546

Flexible access control policy specification with constraint logic programming

Author keywords

Constraint logic programming; Role based access control

Indexed keywords

AUTHORIZATION; CONSTRAINT LOGIC PROGRAMMING; CONTROL POLICY; ROLE-BASED ACCESS CONTROL;

EID: 3042584122     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/950191.950194     Document Type: Article
Times cited : (97)

References (33)
  • 2
    • 84949747356 scopus 로고    scopus 로고
    • An authorization model for workflows
    • LNCS, Springer, Berlin
    • ATLURI, V. AND HUANG, W. 1996. An authorization model for workflows. In ESORICS'96. LNCS, vol. 1146. Springer, Berlin, 44-64.
    • (1996) ESORICS'96 , vol.1146 , pp. 44-64
    • Atluri, V.1    Huang, W.2
  • 4
    • 3042599493 scopus 로고    scopus 로고
    • Protecting deductive databases from unauthorized retrievals
    • Kluwer, Dordrecht, The Netherlands
    • BARKER, S. 2000b. Protecting deductive databases from unauthorized retrievals. In DBSec 2000. Kluwer, Dordrecht, The Netherlands, 301-311.
    • (2000) DBSec 2000 , pp. 301-311
    • Barker, S.1
  • 6
    • 3142582043 scopus 로고    scopus 로고
    • Flexible security policies in SQL
    • Kluwer, Dordrecht, The Netherlands
    • BARKER, S. AND ROSENTHAL, A. 2001. Flexible security policies in SQL. In DBSec 2001. Kluwer, Dordrecht, The Netherlands, 167-180.
    • (2001) DBSec 2001 , pp. 167-180
    • Barker, S.1    Rosenthal, A.2
  • 7
    • 0032153903 scopus 로고    scopus 로고
    • An access control model supporting periodicity constraints and temporal reasoning
    • BERTINO, E., BETTINI, C., FERRARI, E., AND SAMARATI, P. 1998. An access control model supporting periodicity constraints and temporal reasoning. ACM TODS 23, 3, 231-285.
    • (1998) ACM TODS , vol.23 , Issue.3 , pp. 231-285
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 9
    • 84893074859 scopus 로고    scopus 로고
    • A system to specify and manage multipolicy access control models
    • IEEE Computer Society Press, Los Alamitos, CA
    • BERTINO, E., CATANIA, B., FERRARI, E., AND PERLASCA, P. 2002. A system to specify and manage multipolicy access control models. In Proceedings of POLICY 2002. IEEE Computer Society Press, Los Alamitos, CA, 116-127.
    • (2002) Proceedings of POLICY 2002 , pp. 116-127
    • Bertino, E.1    Catania, B.2    Ferrari, E.3    Perlasca, P.4
  • 11
    • 0024772001 scopus 로고
    • A completeness theorem for SLDNF resolution
    • CAVEDON, L. AND LLOYD, J. 1989. A completeness theorem for SLDNF resolution. JLP 7, 3, 177-192.
    • (1989) JLP , vol.7 , Issue.3 , pp. 177-192
    • Cavedon, L.1    Lloyd, J.2
  • 15
    • 84937430803 scopus 로고    scopus 로고
    • Inferring termination conditions for logic programs using backwards analysis
    • R. Nieuwenhuis and A. Voronkov, Eds. Lecture Notes in Computer Science. Springer, Berlin
    • GENAIM, S. AND CODISH, M. 2001. Inferring termination conditions for logic programs using backwards analysis. In Proceedings of 8th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning. R. Nieuwenhuis and A. Voronkov, Eds. Lecture Notes in Computer Science, vol. 2250. Springer, Berlin, 685-694.
    • (2001) Proceedings of 8th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning , vol.2250 , pp. 685-694
    • Genaim, S.1    Codish, M.2
  • 16
    • 0026905476 scopus 로고
    • Complex: An object-oriented logic programming system
    • GRECO, S., LEONE, N., AND RULLO, P. 1992. Complex: An object-oriented logic programming system. IEEE TKDE 4, 4, 72-87.
    • (1992) EEE TKDE , vol.4 , Issue.4 , pp. 72-87
    • Greco, S.1    Leone, N.2    Rullo, P.3
  • 18
    • 0001619596 scopus 로고    scopus 로고
    • Flexible support for multiple access control policies
    • JAJODIA, S., SAMARATI, P., SAPINO, M., AND SUBRAHMANINAN, V. 2001. Flexible support for multiple access control policies. ACM TODS 26, 2, 214-260.
    • (2001) ACM TODS , vol.26 , Issue.2 , pp. 214-260
    • Jajodia, S.1    Samarati, P.2    Sapino, M.3    Subrahmaninan, V.4
  • 24
    • 0001599027 scopus 로고
    • On the declarative semantics of deductive databases and logic programming
    • J. Minker, Ed. Morgan-Kaufmann, San Mateo, CA
    • PRZYMUSINSKI, T. 1988. On the declarative semantics of deductive databases and logic programming. In Foundations of Deductive Databases and Logic Programming. J. Minker, Ed. Morgan-Kaufmann, San Mateo, CA, 193-216.
    • (1988) Foundations of Deductive Databases and Logic Programming , pp. 193-216
    • Przymusinski, T.1
  • 25
    • 49149147322 scopus 로고
    • A logic for default reasoning
    • REITER, R. 1980. A logic for default reasoning. Artificial Intelligence 13, 81-132.
    • (1980) Artificial Intelligence , vol.13 , pp. 81-132
    • Reiter, R.1
  • 30
    • 84890082647 scopus 로고    scopus 로고
    • Termination analysis for mercury
    • P. V. Hentenryck, Ed. Lecture Notes in Computer Science. Springer, Berlin
    • SPEIRS, C., SOMOGYI, Z., AND SØNDERGAARD, H. 1997. Termination analysis for mercury. In Proceedings of 4th International Symposium on Static Analysis. P. V. Hentenryck, Ed. Lecture Notes in Computer Science, vol. 1302. Springer, Berlin, 160-171.
    • (1997) Proceedings of 4th International Symposium on Static Analysis , vol.1302 , pp. 160-171
    • Speirs, C.1    Somogyi, Z.2    Søndergaard, H.3
  • 32
    • 0004685411 scopus 로고
    • Negation and constraint logic programming
    • STUCKEY, P. 1995. Negation and constraint logic programming. Information and Computation 118, 1, 12-33.
    • (1995) Information and Computation , vol.118 , Issue.1 , pp. 12-33
    • Stuckey, P.1
  • 33
    • 84974750564 scopus 로고
    • Authorizations in distributed systems: A new approach
    • Woo, T. AND LAM, S. 1993. Authorizations in distributed systems: A new approach. Journal of Computer Security 2, 2/3, 107-136.
    • (1993) Journal of Computer Security , vol.2 , Issue.2-3 , pp. 107-136
    • Woo, T.1    Lam, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.