-
1
-
-
85094162508
-
-
Abdul-Rahman, A. and S. Hailes, Supporting trust in virtual communities, in: HICSS '00: Proc. of the 33rd Hawaii International Conference on System Sciences-Volume 6 (2000), p. 6007
-
-
-
-
2
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
Barker S., and Stuckey P.J. Flexible access control policy specification with constraint logic programming. ACM Trans. on Information and System Security 6 (2003) 501-546
-
(2003)
ACM Trans. on Information and System Security
, vol.6
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.J.2
-
3
-
-
33646595707
-
-
Boella, G. and L. van der Torre, Permission and authorization in policies for virtual communities of agents, in: Proc. of Agents and P2P Computing Workshop at AAMAS'04 (2004)
-
-
-
-
5
-
-
0001425243
-
Efficient top-down computation of queries under the well-founded semantics
-
Chen W., Swift T., and Warren D. Efficient top-down computation of queries under the well-founded semantics. Journal of Logic Programming 24 (1995) 161-199
-
(1995)
Journal of Logic Programming
, vol.24
, pp. 161-199
-
-
Chen, W.1
Swift, T.2
Warren, D.3
-
6
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
Clarke D., Elien J., Ellison C., Fredette M., Morcos A., and Rivest R.L. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security 9 (2001) 285-322
-
(2001)
Journal of Computer Security
, vol.9
, pp. 285-322
-
-
Clarke, D.1
Elien, J.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
7
-
-
34548042479
-
Trust Negotiation with Nonmonotonic Access Policies
-
Proc. IFIP International Conference on Intelligence in Communication Systems. (INTELLCOMM 04)
-
Dung P., and Thang P. Trust Negotiation with Nonmonotonic Access Policies. Proc. IFIP International Conference on Intelligence in Communication Systems. (INTELLCOMM 04). LNCS 3283 (2004) 70-84
-
(2004)
LNCS
, vol.3283
, pp. 70-84
-
-
Dung, P.1
Thang, P.2
-
8
-
-
33646586744
-
-
Eiter, T., W. Faber, N. Leone and G. Pfeifer, Declarative problem-solving using the DLV system (2000), pp. 79-103
-
-
-
-
9
-
-
0022180593
-
A Kripke-Kleene semantics for Logic Programs
-
Fitting M. A Kripke-Kleene semantics for Logic Programs. Journal of Logic Programming 2 (1985) 295-312
-
(1985)
Journal of Logic Programming
, vol.2
, pp. 295-312
-
-
Fitting, M.1
-
10
-
-
71149116148
-
The well-founded semantics for general logic programs
-
Gelder A., Ross K., and Schlipf J. The well-founded semantics for general logic programs. Journal of ACM 38 (1991) 620-650
-
(1991)
Journal of ACM
, vol.38
, pp. 620-650
-
-
Gelder, A.1
Ross, K.2
Schlipf, J.3
-
11
-
-
33646575974
-
-
Gelfond, M. and V. Lifschitz, The Stable Model Semantics For Logic Programming, in: Proc. 5th International Conference on Logic Programming (1988), pp. 1070-1080
-
-
-
-
12
-
-
0025023289
-
-
Gong, L., R. Needham and R. Yahalom, Reasoning About Belief in Cryptographic Protocols, in: Proceedings 1990 IEEE Symposium on Research in Security and Privacy (1990), pp. 234-248. URL citeseer.ist.psu.edu/gong90reasoning.html
-
-
-
-
13
-
-
0033724294
-
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
-
(S&P 2000)
-
Herzberg A., Mass Y., Michaeli J., Ravid Y., and Naor D. Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. Proc. 2000 IEEE Symposium on Security and Privacy. (S&P 2000) (2000) 2-14
-
(2000)
Proc. 2000 IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Michaeli, J.3
Ravid, Y.4
Naor, D.5
-
15
-
-
0023596784
-
Negation in Logic Programming
-
Kunen K. Negation in Logic Programming. Journal of Logic Programming 4 (1987) 289-308
-
(1987)
Journal of Logic Programming
, vol.4
, pp. 289-308
-
-
Kunen, K.1
-
16
-
-
33646543073
-
-
Lee, F., D. Vogel and M. Limayem, Adoption of informatics to support virtual communities, in: HICSS '02: Proc. of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 8 (2002), p. 214.2
-
-
-
-
17
-
-
0032671779
-
-
Li, N., J. Feigenbaum and B. N. Grosof, A Logic-based Knowledge Representation for Authorization with Delegation (Extended Abstract), in: Proc. 1999 IEEE Computer Security Foundations Workshop (1999), pp. 162-174
-
-
-
-
18
-
-
84948440714
-
-
Li, N., J. Mitchell and W. Winsborough, Design of A Role-based Trust-management Framework, in: Proc. 2002 IEEE Symposium on Security and Privacy (2002), pp. 114-130
-
-
-
-
20
-
-
33646563792
-
-
Niemel, I. and P. Simons, Smodels - an implementation of the stable model and well-founded semantics for normal lp, in: LPNMR '97: Proc. of the 4th International Conference on Logic Programming and Nonmonotonic Reasoning (1997), pp. 421-430
-
-
-
-
21
-
-
84887853842
-
-
Pearlman, L., V. Welch, I. T. Foster, C. Kesselman and S. Tuecke, A community authorization service for group collaboration, in: POLICY (2002), pp. 50-59
-
-
-
-
22
-
-
33646596354
-
-
Pouwelse, J., P. Garbacki, D. Epema and H. Sips, The Bittorrent P2P File-sharing System: Measurements and Analysis, in: Proc. of the 4th International Workshop on Peer-to-Peer Systems (IPTPS05), 2005
-
-
-
-
23
-
-
33646566043
-
-
Przymusinski, T. C., Perfect model semantics, in: Fifth international Conference and Symposium on Logic programming, Seattle, U.S.A. (1988), pp. 1081-1096
-
-
-
-
24
-
-
84893105662
-
-
Seamons, K. E., M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobson, H. Mills and L. Yu, Requirements for Policy Languages for Trust Negotiation, in: Proc. 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002) (2002), pp. 68-80. URL http://isrl.cs.byu.edu/pubs/policy2002.pdf
-
-
-
-
27
-
-
20444479906
-
-
Wang, L., D. Wijesekera and S. Jajodia, A logic-based framework for attribute based access control, in: Proc. 2004 ACM workshop on Formal methods in security engineering FMSE'04 (2004), pp. 45-55
-
-
-
|