메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 164-175

Timed constraint programming: A declarative approach to usage control

Author keywords

Constraints; Reactive Systems; Role Based Access Control; Trust Management; Usage Control

Indexed keywords

CONSTRAINTS; REACTIVE SYSTEMS; ROLE-BASED ACCESS CONTROL; TRUST MANAGEMENT; USAGE CONTROL;

EID: 33746064509     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1069774.1069790     Document Type: Conference Paper
Times cited : (20)

References (44)
  • 2
    • 35048879817 scopus 로고    scopus 로고
    • An algebra for composing enterprise privacy policies
    • P. Samarati, D. Gollmann, and R. Molva, editors, ESORICS. Springer
    • M. Backes, M. Dürmuth, and R. Steinwandt. An algebra for composing enterprise privacy policies. In P. Samarati, D. Gollmann, and R. Molva, editors, ESORICS, volume 3193 of Lecture Notes in Computer Science, pages 33-52. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3193 , pp. 33-52
    • Backes, M.1    Dürmuth, M.2    Steinwandt, R.3
  • 5
    • 3042584122 scopus 로고    scopus 로고
    • Flexible access control policy specification with constraint logic programming
    • S. Barker and P. J. Stuckey. Flexible access control policy specification with constraint logic programming. ACM Trans. Inf. Syst. Secur., 6(4):501-546, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.4 , pp. 501-546
    • Barker, S.1    Stuckey, P.J.2
  • 7
    • 0011537495 scopus 로고
    • Real-time programming: General purpose or special-purpose languages
    • G. Ritter, editor. Elsevier Science Publishers B.V. (North Holland)
    • G. Berry. Real-time programming: General purpose or special-purpose languages. In G. Ritter, editor, Information Processing 89, pages 11-17. Elsevier Science Publishers B.V. (North Holland), 1989.
    • (1989) Information Processing , vol.89 , pp. 11-17
    • Berry, G.1
  • 15
    • 0003720571 scopus 로고
    • The Kluwer international series in Engineering and Computer Science. Kluwer Academic publishers
    • N. Halbwachs. Synchronous programming of reactive systems. The Kluwer international series in Engineering and Computer Science. Kluwer Academic publishers, 1993.
    • (1993) Synchronous Programming of Reactive Systems
    • Halbwachs, N.1
  • 18
    • 0000835369 scopus 로고
    • chapter On the development of reactive systems. NATO Advanced Study Institute
    • D. Harel and A. Pnueli. Logics and Models of Concurrent Systems, volume 13, chapter On the development of reactive systems, pages 471-498. NATO Advanced Study Institute, 1985.
    • (1985) Logics and Models of Concurrent Systems , vol.13 , pp. 471-498
    • Harel, D.1    Pnueli, A.2
  • 19
    • 0003999750 scopus 로고
    • Constraint processing in cc(fd)
    • Computer Science Department, Brown University
    • P. V. Hentenryck, V. A. Saraawat, and Y. Deville. Constraint processing in cc(fd). Technical report, Computer Science Department, Brown University, 1992.
    • (1992) Technical Report
    • Hentenryck, P.V.1    Saraawat, V.A.2    Deville, Y.3
  • 20
    • 4243532938 scopus 로고
    • Constraint logic programming: A survey
    • J. Jaffar and M. J. Maher. Constraint logic programming: A survey. J. Log. Program., 19/20:503-581, 1994.
    • (1994) J. Log. Program. , vol.19-20 , pp. 503-581
    • Jaffar, J.1    Maher, M.J.2
  • 22
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • N. Li, B. N. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur., 6(1):128-171, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.1 , pp. 128-171
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 25
    • 0038825043 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Safety and availability analysis in trust management
    • IEEE Computer Society
    • N. Li, W. H. Winsborough, and J. C. Mitchell. Beyond proof-of-compliance: Safety and availability analysis in trust management. In IEEE Symposium on Security and Privacy, pages 123-139. IEEE Computer Society, 2003.
    • (2003) IEEE Symposium on Security and Privacy , pp. 123-139
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 29
    • 12444291569 scopus 로고    scopus 로고
    • Temporal concurrent constraint programming: Denotation, logic and applications
    • M. Nielsen, C. Palamidessi, and F. D. Valencia. Temporal concurrent constraint programming: Denotation, logic and applications, Nord. J. Comput., 9(1):145-188, 2002.
    • (2002) Nord. J. Comput. , vol.9 , Issue.1 , pp. 145-188
    • Nielsen, M.1    Palamidessi, C.2    Valencia, F.D.3
  • 34
    • 0030295477 scopus 로고    scopus 로고
    • Timed default concurrent constraint programming
    • November/December
    • V. A. Saraswat, R. Jagadeesan, and V. Gupta. Timed Default Concurrent Constraint Programming. Journal of Symbolic Computation, 22(5-6):475-520, November/December 1996.
    • (1996) Journal of Symbolic Computation , vol.22 , Issue.5-6 , pp. 475-520
    • Saraswat, V.A.1    Jagadeesan, R.2    Gupta, V.3
  • 35
    • 0348216531 scopus 로고    scopus 로고
    • Jcc: Integrating timed default concurrent constraint programming into Java
    • F. Moura-Pires and S. Abreu, editors, EPIA. Springer
    • V. A. Saraswat, R. Jagadeesan, and V. Gupta. jcc: Integrating timed default concurrent constraint programming into Java. In F. Moura-Pires and S. Abreu, editors, EPIA, volume 2902 of Lecture Notes in Computer Science, pages 156-170. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2902 , pp. 156-170
    • Saraswat, V.A.1    Jagadeesan, R.2    Gupta, V.3
  • 43
    • 3142523600 scopus 로고    scopus 로고
    • A prepositional policy algebra for access control
    • D. Wijesekera and S. Jajodia. A prepositional policy algebra for access control. ACM Trans. Inf. Syst. Secur., 6(2):286-325, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.2 , pp. 286-325
    • Wijesekera, D.1    Jajodia, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.