메뉴 건너뛰기




Volumn 3945 LNCS, Issue , 2006, Pages 130-145

Soutei, a logic-based trust-management system system description

Author keywords

Access control; Backtracking; Datalog; Haskell; Logic Programming; Non determinism; Security Language

Indexed keywords

ACCESS CONTROL; BACKTRACKING; CONDITIONAL DELEGATION; DATLOGS; HASKELL; NON-DETERMINISM; SECURITY LANGUAGES;

EID: 33745830075     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11737414_10     Document Type: Conference Paper
Times cited : (15)

References (24)
  • 1
    • 0042467968 scopus 로고    scopus 로고
    • Logic in access control
    • ABADI, M. Logic in access control. In LICS [16], pp. 228-233.
    • LICS [16] , pp. 228-233
    • Abadi, M.1
  • 4
    • 0347526057 scopus 로고    scopus 로고
    • A tutorial on proof theoretic foundations of logic programming
    • ICLP C. Palamidessi, Ed., Springer
    • BRUSCOLI, P., AND GUGLIELMI, A. A tutorial on proof theoretic foundations of logic programming. In ICLP (2003), C. Palamidessi, Ed., vol. 2916 of Lecture Notes in Computer Science, Springer, pp. 109-127.
    • (2003) Lecture Notes in Computer Science , vol.2916 , pp. 109-127
    • Bruscoli, P.1    Guglielmi, A.2
  • 12
    • 84858926178 scopus 로고    scopus 로고
    • Feb. The working server with Soutei Authorization can be accessed via http://www.metnet.navy.mil/cgi-bin/oleg/server
    • KISELYOV, O. Metcast Channels. http://www.metnet.navy.mil/Metcast/Metcast-Channels.html, Feb. 2003. The working server with Soutei Authorization can be accessed via http://www.metnet.navy.mil/cgi-bin/oleg/server.
    • (2003) Metcast Channels
    • Kiselyov, O.1
  • 15
    • 35248834606 scopus 로고    scopus 로고
    • Datalog with constraints: A foundation for trust management languages
    • PADL V. Dahl and P. Wadler, Eds., Springer
    • LI, N., AND MITCHELL, J. C. Datalog with constraints: A foundation for trust management languages. In PADL (2003), V. Dahl and P. Wadler, Eds., vol. 2562 of Lecture Notes in Computer Science, Springer, pp. 58-73.
    • (2003) Lecture Notes in Computer Science , vol.2562 , pp. 58-73
    • Li, N.1    Mitchell, J.C.2
  • 17
    • 0042969226 scopus 로고    scopus 로고
    • A proof theory for generic judgments: An extended abstract
    • MILLER, D., AND TIU, A. F. A proof theory for generic judgments: An extended abstract. In LICS [16], pp. 118-127.
    • LICS [16] , pp. 118-127
    • Miller, D.1    Tiu, A.F.2
  • 18
    • 33745847877 scopus 로고    scopus 로고
    • Embedding prolog in haskell
    • E. Meier, Ed., Tech. Rep. UU-CS-1999-28, Department of Computer Science, Utrecht University
    • SERES, S., AND SPIVEY, J. M. Embedding Prolog in Haskell. In Proceedings of the 1999 Haskell Workshop (1999), E. Meier, Ed., Tech. Rep. UU-CS-1999-28, Department of Computer Science, Utrecht University.
    • (1999) Proceedings of the 1999 Haskell Workshop
    • Seres, S.1    Spivey, J.M.2
  • 19
    • 33745850523 scopus 로고    scopus 로고
    • Life without firewalls
    • Dec.
    • SINGER, A. Life without firewalls. USENIX ;login: 28, 6 (Dec. 2003), 34-41.
    • (2003) USENIX; Login , vol.28 , Issue.6 , pp. 34-41
    • Singer, A.1
  • 20
    • 0030262017 scopus 로고    scopus 로고
    • The execution algorithm of Mercury, an efficient purely declarative logic programming language
    • SOMOGYI, Z., HENDERSON, F., AND CONWAY, T. The execution algorithm of Mercury, an efficient purely declarative logic programming language. J. Log. Program. 29, 1-3 (1996), 17-64.
    • (1996) J. Log. Program. , vol.29 , Issue.1-3 , pp. 17-64
    • Somogyi, Z.1    Henderson, F.2    Conway, T.3
  • 21
    • 85034994733 scopus 로고
    • How to replace failure by a list of successes: A method for exception handling, backtracking, and pattern matching in lazy functional languages
    • WADLER, P. How to replace failure by a list of successes: A method for exception handling, backtracking, and pattern matching in lazy functional languages. In FPCA (1985), pp. 113-128.
    • (1985) FPCA , pp. 113-128
    • Wadler, P.1
  • 23
    • 3042617182 scopus 로고    scopus 로고
    • A quantitative study of firewall configuration errors
    • WOOL, A. A quantitative study of firewall configuration errors. IEEE Computer 37, 6 (2004), 62-67.
    • (2004) IEEE Computer , vol.37 , Issue.6 , pp. 62-67
    • Wool, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.