메뉴 건너뛰기




Volumn 157, Issue 3, 2006, Pages 113-130

Nonmonotonic Trust Management for P2P Applications

Author keywords

Chain Discovery; Distributed Trust Management (DTM); Non monotonic Policies; Peer to Peer (P2P); Role Based Trust Management (RT); Virtual Communities (VC)

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; DISTRIBUTED COMPUTER SYSTEMS; ELECTRONIC COMMUNITIES; LOGIC PROGRAMMING; SEMANTICS;

EID: 33646551446     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2005.09.037     Document Type: Article
Times cited : (21)

References (27)
  • 1
    • 85094162508 scopus 로고    scopus 로고
    • Abdul-Rahman, A. and S. Hailes, Supporting trust in virtual communities, in: HICSS '00: Proc. of the 33rd Hawaii International Conference on System Sciences-Volume 6 (2000), p. 6007
  • 2
    • 3042584122 scopus 로고    scopus 로고
    • Flexible access control policy specification with constraint logic programming
    • Barker S., and Stuckey P.J. Flexible access control policy specification with constraint logic programming. ACM Trans. on Information and System Security 6 (2003) 501-546
    • (2003) ACM Trans. on Information and System Security , vol.6 , pp. 501-546
    • Barker, S.1    Stuckey, P.J.2
  • 3
    • 33646595707 scopus 로고    scopus 로고
    • Boella, G. and L. van der Torre, Permission and authorization in policies for virtual communities of agents, in: Proc. of Agents and P2P Computing Workshop at AAMAS'04 (2004)
  • 5
    • 0001425243 scopus 로고
    • Efficient top-down computation of queries under the well-founded semantics
    • Chen W., Swift T., and Warren D. Efficient top-down computation of queries under the well-founded semantics. Journal of Logic Programming 24 (1995) 161-199
    • (1995) Journal of Logic Programming , vol.24 , pp. 161-199
    • Chen, W.1    Swift, T.2    Warren, D.3
  • 7
    • 34548042479 scopus 로고    scopus 로고
    • Trust Negotiation with Nonmonotonic Access Policies
    • Proc. IFIP International Conference on Intelligence in Communication Systems. (INTELLCOMM 04)
    • Dung P., and Thang P. Trust Negotiation with Nonmonotonic Access Policies. Proc. IFIP International Conference on Intelligence in Communication Systems. (INTELLCOMM 04). LNCS 3283 (2004) 70-84
    • (2004) LNCS , vol.3283 , pp. 70-84
    • Dung, P.1    Thang, P.2
  • 8
    • 33646586744 scopus 로고    scopus 로고
    • Eiter, T., W. Faber, N. Leone and G. Pfeifer, Declarative problem-solving using the DLV system (2000), pp. 79-103
  • 9
    • 0022180593 scopus 로고
    • A Kripke-Kleene semantics for Logic Programs
    • Fitting M. A Kripke-Kleene semantics for Logic Programs. Journal of Logic Programming 2 (1985) 295-312
    • (1985) Journal of Logic Programming , vol.2 , pp. 295-312
    • Fitting, M.1
  • 10
    • 71149116148 scopus 로고
    • The well-founded semantics for general logic programs
    • Gelder A., Ross K., and Schlipf J. The well-founded semantics for general logic programs. Journal of ACM 38 (1991) 620-650
    • (1991) Journal of ACM , vol.38 , pp. 620-650
    • Gelder, A.1    Ross, K.2    Schlipf, J.3
  • 11
    • 33646575974 scopus 로고    scopus 로고
    • Gelfond, M. and V. Lifschitz, The Stable Model Semantics For Logic Programming, in: Proc. 5th International Conference on Logic Programming (1988), pp. 1070-1080
  • 12
    • 0025023289 scopus 로고    scopus 로고
    • Gong, L., R. Needham and R. Yahalom, Reasoning About Belief in Cryptographic Protocols, in: Proceedings 1990 IEEE Symposium on Research in Security and Privacy (1990), pp. 234-248. URL citeseer.ist.psu.edu/gong90reasoning.html
  • 15
    • 0023596784 scopus 로고
    • Negation in Logic Programming
    • Kunen K. Negation in Logic Programming. Journal of Logic Programming 4 (1987) 289-308
    • (1987) Journal of Logic Programming , vol.4 , pp. 289-308
    • Kunen, K.1
  • 16
    • 33646543073 scopus 로고    scopus 로고
    • Lee, F., D. Vogel and M. Limayem, Adoption of informatics to support virtual communities, in: HICSS '02: Proc. of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 8 (2002), p. 214.2
  • 17
    • 0032671779 scopus 로고    scopus 로고
    • Li, N., J. Feigenbaum and B. N. Grosof, A Logic-based Knowledge Representation for Authorization with Delegation (Extended Abstract), in: Proc. 1999 IEEE Computer Security Foundations Workshop (1999), pp. 162-174
  • 18
    • 84948440714 scopus 로고    scopus 로고
    • Li, N., J. Mitchell and W. Winsborough, Design of A Role-based Trust-management Framework, in: Proc. 2002 IEEE Symposium on Security and Privacy (2002), pp. 114-130
  • 19
  • 20
    • 33646563792 scopus 로고    scopus 로고
    • Niemel, I. and P. Simons, Smodels - an implementation of the stable model and well-founded semantics for normal lp, in: LPNMR '97: Proc. of the 4th International Conference on Logic Programming and Nonmonotonic Reasoning (1997), pp. 421-430
  • 21
    • 84887853842 scopus 로고    scopus 로고
    • Pearlman, L., V. Welch, I. T. Foster, C. Kesselman and S. Tuecke, A community authorization service for group collaboration, in: POLICY (2002), pp. 50-59
  • 22
    • 33646596354 scopus 로고    scopus 로고
    • Pouwelse, J., P. Garbacki, D. Epema and H. Sips, The Bittorrent P2P File-sharing System: Measurements and Analysis, in: Proc. of the 4th International Workshop on Peer-to-Peer Systems (IPTPS05), 2005
  • 23
    • 33646566043 scopus 로고    scopus 로고
    • Przymusinski, T. C., Perfect model semantics, in: Fifth international Conference and Symposium on Logic programming, Seattle, U.S.A. (1988), pp. 1081-1096
  • 24
    • 84893105662 scopus 로고    scopus 로고
    • Seamons, K. E., M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobson, H. Mills and L. Yu, Requirements for Policy Languages for Trust Negotiation, in: Proc. 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002) (2002), pp. 68-80. URL http://isrl.cs.byu.edu/pubs/policy2002.pdf
  • 27
    • 20444479906 scopus 로고    scopus 로고
    • Wang, L., D. Wijesekera and S. Jajodia, A logic-based framework for attribute based access control, in: Proc. 2004 ACM workshop on Formal methods in security engineering FMSE'04 (2004), pp. 45-55


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.