-
2
-
-
84949747356
-
An authorization model for workflows
-
LNCS, Springer, Berlin
-
ATLURI, V. AND HUANG, W. 1996. An authorization model for workflows. In ESORICS'96. LNCS, vol. 1146. Springer, Berlin, 44-64.
-
(1996)
ESORICS'96
, vol.1146
, pp. 44-64
-
-
Atluri, V.1
Huang, W.2
-
4
-
-
3042599493
-
Protecting deductive databases from unauthorized retrievals
-
Kluwer, Dordrecht, The Netherlands
-
BARKER, S. 2000b. Protecting deductive databases from unauthorized retrievals. In DBSec 2000. Kluwer, Dordrecht, The Netherlands, 301-311.
-
(2000)
DBSec 2000
, pp. 301-311
-
-
Barker, S.1
-
5
-
-
84955575094
-
N: A temporal authorization model
-
H. Gorodetski, V. Skormin, and L. Popyack, Eds. LNCS. Springer, Berlin
-
N: A temporal authorization model. In Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security. H. Gorodetski, V. Skormin, and L. Popyack, Eds. LNCS, vol. 2052. Springer, Berlin, 178-188.
-
(2001)
Information Assurance in Computer Networks. Methods, Models and Architectures for Network Security
, vol.2052
, pp. 178-188
-
-
Barker, S.1
-
6
-
-
3142582043
-
Flexible security policies in SQL
-
Kluwer, Dordrecht, The Netherlands
-
BARKER, S. AND ROSENTHAL, A. 2001. Flexible security policies in SQL. In DBSec 2001. Kluwer, Dordrecht, The Netherlands, 167-180.
-
(2001)
DBSec 2001
, pp. 167-180
-
-
Barker, S.1
Rosenthal, A.2
-
7
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
BERTINO, E., BETTINI, C., FERRARI, E., AND SAMARATI, P. 1998. An access control model supporting periodicity constraints and temporal reasoning. ACM TODS 23, 3, 231-285.
-
(1998)
ACM TODS
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
8
-
-
0033645572
-
TRBAC: A temporal role-based access control model
-
BERTINO, E., BONATTI, P., AND FERRARI, E. 2000. TRBAC: A temporal role-based access control model. In Proceedings of 5th ACM Workshop on Role-Based Access Control, 21-30.
-
(2000)
Proceedings of 5th ACM Workshop on Role-Based Access Control
, pp. 21-30
-
-
Bertino, E.1
Bonatti, P.2
Ferrari, E.3
-
9
-
-
84893074859
-
A system to specify and manage multipolicy access control models
-
IEEE Computer Society Press, Los Alamitos, CA
-
BERTINO, E., CATANIA, B., FERRARI, E., AND PERLASCA, P. 2002. A system to specify and manage multipolicy access control models. In Proceedings of POLICY 2002. IEEE Computer Society Press, Los Alamitos, CA, 116-127.
-
(2002)
Proceedings of POLICY 2002
, pp. 116-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
10
-
-
0004190705
-
-
Addison-Wesley, Reading, MA
-
CASTANO, S., FUGINI, M., MARTELLA, G., AND SAMARATI, P. 1995. Database Security. Addison-Wesley, Reading, MA.
-
(1995)
Database Security
-
-
Castano, S.1
Fugini, M.2
Martella, G.3
Samarati, P.4
-
11
-
-
0024772001
-
A completeness theorem for SLDNF resolution
-
CAVEDON, L. AND LLOYD, J. 1989. A completeness theorem for SLDNF resolution. JLP 7, 3, 177-192.
-
(1989)
JLP
, vol.7
, Issue.3
, pp. 177-192
-
-
Cavedon, L.1
Lloyd, J.2
-
13
-
-
0002262722
-
Role-based access control (RBAC): Features and motivations
-
FERRAIOLO, D., CUGINI, J., AND KUHN, R. 1995. Role-based access control (RBAC): Features and motivations. In Proceedings of the 11th Annual Computer Security Applications Conference, 241-248.
-
(1995)
Proceedings of the 11th Annual Computer Security Applications Conference
, pp. 241-248
-
-
Ferraiolo, D.1
Cugini, J.2
Kuhn, R.3
-
14
-
-
0001119421
-
The stable model semantics for logic programming
-
R. Kowalski and K. Bowen, Eds. MIT Press, Cambridge, MA
-
GELFOND, M. AND LIFSCHITZ, V. 1988. The stable model semantics for logic programming. In Proceedings of 5th International Conference and Symposium on Logic Programming. R. Kowalski and K. Bowen, Eds. MIT Press, Cambridge, MA, 1070-1080.
-
(1988)
Proceedings of 5th International Conference and Symposium on Logic Programming
, pp. 1070-1080
-
-
Gelfond, M.1
Lifschitz, V.2
-
15
-
-
84937430803
-
Inferring termination conditions for logic programs using backwards analysis
-
R. Nieuwenhuis and A. Voronkov, Eds. Lecture Notes in Computer Science. Springer, Berlin
-
GENAIM, S. AND CODISH, M. 2001. Inferring termination conditions for logic programs using backwards analysis. In Proceedings of 8th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning. R. Nieuwenhuis and A. Voronkov, Eds. Lecture Notes in Computer Science, vol. 2250. Springer, Berlin, 685-694.
-
(2001)
Proceedings of 8th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning
, vol.2250
, pp. 685-694
-
-
Genaim, S.1
Codish, M.2
-
16
-
-
0026905476
-
Complex: An object-oriented logic programming system
-
GRECO, S., LEONE, N., AND RULLO, P. 1992. Complex: An object-oriented logic programming system. IEEE TKDE 4, 4, 72-87.
-
(1992)
EEE TKDE
, vol.4
, Issue.4
, pp. 72-87
-
-
Greco, S.1
Leone, N.2
Rullo, P.3
-
17
-
-
0026884407
-
The CLP(ℛ) language and system
-
JAFFAR, J., MICHAYLOV, S., STUCKEY, P., AND YAP, R. 1992. The CLP(ℛ) language and system. ACM Trans. Program. Lang. Syst. 14, 3, 339-395.
-
(1992)
ACM Trans. Program. Lang. Syst.
, vol.14
, Issue.3
, pp. 339-395
-
-
Jaffar, J.1
Michaylov, S.2
Stuckey, P.3
Yap, R.4
-
18
-
-
0001619596
-
Flexible support for multiple access control policies
-
JAJODIA, S., SAMARATI, P., SAPINO, M., AND SUBRAHMANINAN, V. 2001. Flexible support for multiple access control policies. ACM TODS 26, 2, 214-260.
-
(2001)
ACM TODS
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmaninan, V.4
-
19
-
-
0032256524
-
Optimizing compilation for CLP(ℛ)
-
KELLY, A., MACDONALD, A., MARRIOTT, K., AND STUCKEY, P. 1998. Optimizing compilation for CLP(ℛ). ACM Trans. Program. Lang. Syst. 20, 6, 1223-1250.
-
(1998)
ACM Trans. Program. Lang. Syst.
, vol.20
, Issue.6
, pp. 1223-1250
-
-
Kelly, A.1
Macdonald, A.2
Marriott, K.3
Stuckey, P.4
-
22
-
-
0344634883
-
A characterization of non-floundering logic programs
-
MIT Press, Cambridge, MA
-
MARRIOTT, K., SONDERGAARD, H., AND DART, P. 1990. A characterization of non-floundering logic programs. In Proceedings of the 1990 North American Conference on Logic Programming. MIT Press, Cambridge, MA.
-
(1990)
Proceedings of the 1990 North American Conference on Logic Programming
-
-
Marriott, K.1
Sondergaard, H.2
Dart, P.3
-
24
-
-
0001599027
-
On the declarative semantics of deductive databases and logic programming
-
J. Minker, Ed. Morgan-Kaufmann, San Mateo, CA
-
PRZYMUSINSKI, T. 1988. On the declarative semantics of deductive databases and logic programming. In Foundations of Deductive Databases and Logic Programming. J. Minker, Ed. Morgan-Kaufmann, San Mateo, CA, 193-216.
-
(1988)
Foundations of Deductive Databases and Logic Programming
, pp. 193-216
-
-
Przymusinski, T.1
-
25
-
-
49149147322
-
A logic for default reasoning
-
REITER, R. 1980. A logic for default reasoning. Artificial Intelligence 13, 81-132.
-
(1980)
Artificial Intelligence
, vol.13
, pp. 81-132
-
-
Reiter, R.1
-
26
-
-
0031341651
-
The ARBAC97 model for role-based administration of roles: Preliminary description and outline
-
SANDHU, R., BHAMIDIPATI, V., COYNE, E., GANTA, S., AND YOUMAN, C. 1997. The ARBAC97 model for role-based administration of roles: Preliminary description and outline. In Proceedings 2nd ACM Workshop on Role-Based Access Control, 41-49.
-
(1997)
Proceedings 2nd ACM Workshop on Role-based Access Control
, pp. 41-49
-
-
Sandhu, R.1
Bhamidipati, V.2
Coyne, E.3
Ganta, S.4
Youman, C.5
-
27
-
-
0030086382
-
Role-based access control models
-
SANDHU, R., COYNE, E., FEINSTEIN, H., AND YOUMAN, C. 1996. Role-based access control models. IEEE Computer 29, 2, 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
28
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
SANDHU, R., FERRAIOLO, D., AND KUHN, R. 2000. The NIST model for role-based access control: Towards a unified standard. In Proceedings of 4th ACM Workshop on Role-Based Access Control, 47-61.
-
(2000)
Proceedings of 4th ACM Workshop on Role-based Access Control
, pp. 47-61
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, R.3
-
30
-
-
84890082647
-
Termination analysis for mercury
-
P. V. Hentenryck, Ed. Lecture Notes in Computer Science. Springer, Berlin
-
SPEIRS, C., SOMOGYI, Z., AND SØNDERGAARD, H. 1997. Termination analysis for mercury. In Proceedings of 4th International Symposium on Static Analysis. P. V. Hentenryck, Ed. Lecture Notes in Computer Science, vol. 1302. Springer, Berlin, 160-171.
-
(1997)
Proceedings of 4th International Symposium on Static Analysis
, vol.1302
, pp. 160-171
-
-
Speirs, C.1
Somogyi, Z.2
Søndergaard, H.3
-
32
-
-
0004685411
-
Negation and constraint logic programming
-
STUCKEY, P. 1995. Negation and constraint logic programming. Information and Computation 118, 1, 12-33.
-
(1995)
Information and Computation
, vol.118
, Issue.1
, pp. 12-33
-
-
Stuckey, P.1
-
33
-
-
84974750564
-
Authorizations in distributed systems: A new approach
-
Woo, T. AND LAM, S. 1993. Authorizations in distributed systems: A new approach. Journal of Computer Security 2, 2/3, 107-136.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2-3
, pp. 107-136
-
-
Woo, T.1
Lam, S.2
|