-
1
-
-
79551602978
-
-
Scientific American
-
Berners-Lee, T., Hendler, J., Lassila., O.: The Semantic Web. Scientific American 284 (2001) 34-43
-
(2001)
The Semantic Web
, vol.284
, pp. 34-43
-
-
Berners-Lee, T.1
Hendler, J.2
Lassila, O.3
-
4
-
-
84893084758
-
A policy language for pervasive computing environment
-
Lake Como, Italy
-
Kagal, L., Finin, T., Joshi, A.: A policy language for pervasive computing environment. In: Proceedings of IEEE Fourth International Workshop on Policy (Policy 2003), Lake Como, Italy (2003) 63-76
-
(2003)
Proceedings of IEEE Fourth International Workshop on Policy (Policy 2003)
, pp. 63-76
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
5
-
-
37149051976
-
KAoS policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement
-
Lake Como, Italy
-
Uszok, A., Bradshaw, J., Jeffers, R., Suri, N., Hayes, P., Breedy, M., Bunch, L., Johnson, M., Kulkarni, S., Lott, J.: KAoS policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In: Proceedings of IEEE Fourth International Workshop on Policy (Policy 2003), Lake Como, Italy (2003) 93-98
-
(2003)
Proceedings of IEEE Fourth International Workshop on Policy (Policy 2003)
, pp. 93-98
-
-
Uszok, A.1
Bradshaw, J.2
Jeffers, R.3
Suri, N.4
Hayes, P.5
Breedy, M.6
Bunch, L.7
Johnson, M.8
Kulkarni, S.9
Lott, J.10
-
6
-
-
10744225535
-
Representation and reasoning for daml-based policy and domain services in kaos and nomads
-
Melbourne, Australia
-
Bradshaw, J., Uszok, A., Jeffers, R., Suri, N., Hayes, P., Burstein, M., Acquisti, A., Benyo, B., Breedy, M., Carvalho, M., Diller, D., Johnson, M., Kulkarni, S., Lott, J., Sierhuis, M., Hoof, R.V.: Representation and reasoning for daml-based policy and domain services in kaos and nomads. In: Proceedings of the Autonomous Agents and Multi-Agent Systems Conference (AAMAS 2003), Melbourne, Australia (2003) 835-842
-
(2003)
Proceedings of the Autonomous Agents and Multi-Agent Systems Conference (AAMAS 2003)
, pp. 835-842
-
-
Bradshaw, J.1
Uszok, A.2
Jeffers, R.3
Suri, N.4
Hayes, P.5
Burstein, M.6
Acquisti, A.7
Benyo, B.8
Breedy, M.9
Carvalho, M.10
Diller, D.11
Johnson, M.12
Kulkarni, S.13
Lott, J.14
Sierhuis, M.15
Hoof, R.V.16
-
7
-
-
0001809810
-
The ponder policy specification language
-
Bristol, UK
-
Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The ponder policy specification language. In: Proceedings of Workshop on Policies for Distributed Systems and Networks (POLICY 2001), Bristol, UK (2001)
-
(2001)
Proceedings of Workshop on Policies for Distributed Systems and Networks (POLICY 2001)
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
8
-
-
84974750564
-
Authorization in distributed systems: A new approach
-
Woo, T.Y., Lam, S.S.: Authorization in distributed systems: A new approach. Journal of Computer Security 2 (1993) 107-136
-
(1993)
Journal of Computer Security
, vol.2
, pp. 107-136
-
-
Woo, T.Y.1
Lam, S.S.2
-
10
-
-
0001619596
-
Flexible support for multiple access control policies
-
Jajodia, S., Samarati, P., Sapino, M., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Transactions on Database Systems 26 (2001) 214-260
-
(2001)
ACM Transactions on Database Systems
, vol.26
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmanian, V.S.4
-
11
-
-
84865788031
-
A model of oasis role-based access control and its support for active security
-
Bacon, J., Moody, K., Yao, W.: A model of oasis role-based access control and its support for active security. ACM Transactions on Information and System Security (TISSEC) 5 (2002) 492-540
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
12
-
-
0041524664
-
A logical framework for reasoning about access control models
-
Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A logical framework for reasoning about access control models. ACM Transactions on Information and System Security (TISSEC) 6 (2003) 71-127
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
14
-
-
33749451774
-
Representation and reasoning on RBAC: A description logic approach
-
Hanoi, Vietnam
-
Zhao, C., Nuermaimaiti.Heilili, Liu, S., Lin, Z.: Representation and reasoning on RBAC: A description logic approach. In: ICTAC05 - International Colloquium on Theoretical Aspects of Computing, Hanoi, Vietnam (2005)
-
(2005)
ICTAC05 - International Colloquium on Theoretical Aspects of Computing
-
-
Zhao, C.1
Nuermaimaiti, H.2
Liu, S.3
Lin, Z.4
-
16
-
-
0003727420
-
-
Cambridge University Press
-
Baader, F., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F.: The Description Logic Handbook: Theory, Implementation and Applications. Cambridge University Press (2002)
-
(2002)
The Description Logic Handbook: Theory, Implementation and Applications
-
-
Baader, F.1
McGuinness, D.L.2
Nardi, D.3
Patel-Schneider, P.F.4
-
17
-
-
0030732547
-
An extended authorization model for relational databases
-
Bertino, E., Samarati, P., Jajodia, S.: An extended authorization model for relational databases. IEEE Transactions on Knowledge and Data Engineering 9 (1997) 85-101
-
(1997)
IEEE Transactions on Knowledge and Data Engineering
, vol.9
, pp. 85-101
-
-
Bertino, E.1
Samarati, P.2
Jajodia, S.3
-
18
-
-
0027741527
-
Authorizations in relational database management systems
-
Fairfax, Virginia, United States, ACM Press New York, NY, USA
-
Bertino, E., Pierangela, Samarati, Jajodia, S.: Authorizations in relational database management systems. In: Proceedings of the 1st ACM conference on Computer and communications security, Fairfax, Virginia, United States, ACM Press New York, NY, USA (1993) 130-139
-
(1993)
Proceedings of the 1st ACM Conference on Computer and Communications Security
, pp. 130-139
-
-
Bertino, E.1
Pierangela, S.2
Jajodia, S.3
-
19
-
-
21644481193
-
Rule-based RBAC with negative authorization
-
Tucson, Arizona, USA
-
Al-Kahtani, M.A., Sandhu, R.: Rule-based RBAC with negative authorization. In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04), Tucson, Arizona, USA (2004)
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04)
-
-
Al-Kahtani, M.A.1
Sandhu, R.2
-
22
-
-
4344615591
-
From SHIQ and RDF to OWL: The making of a web ontology language
-
Horrocks, I., Patel-Schneider, P.F., Harmelen, F.v.: From SHIQ and RDF to OWL: The making of a web ontology language. Jouranl of Web Semantics 1 (2003) 7-26
-
(2003)
Jouranl of Web Semantics
, vol.1
, pp. 7-26
-
-
Horrocks, I.1
Patel-Schneider, P.F.2
Harmelen, F.V.3
-
24
-
-
18744404327
-
-
Horrocks, I., Patel-Schneider, P.F., Boley, H., Tabet, S., Grosof, B., Dean, M.: SWRL: A semantic web rule language combining OWL and RuleML (version 0.5) (2003) http://www.daml.org/2003/11/swrl/.
-
(2003)
SWRL: A Semantic Web Rule Language Combining OWL and RuleML (Version 0.5)
-
-
Horrocks, I.1
Patel-Schneider, P.F.2
Boley, H.3
Tabet, S.4
Grosof, B.5
Dean, M.6
|