메뉴 건너뛰기




Volumn 3053, Issue , 2004, Pages 342-356

No registration needed: How to use declarative policies and negotiation to access sensitive resources on the Semantic Web

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; JAVA PROGRAMMING LANGUAGE;

EID: 34547260252     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-25956-5_24     Document Type: Article
Times cited : (69)

References (18)
  • 4
    • 0442283424 scopus 로고    scopus 로고
    • Representing e-business rules for the semantic web: Situated courteous logic programs in RuleML
    • New Orleans, LA, USA, Dec.
    • B. Grosof. Representing e-business rules for the semantic web: Situated courteous logic programs in RuleML. In Proceedings of the Workshop on Information Technologies and Systems (WITS), New Orleans, LA, USA, Dec. 2001.
    • (2001) Proceedings of the Workshop on Information Technologies and Systems (WITS)
    • Grosof, B.1
  • 5
    • 0442330459 scopus 로고    scopus 로고
    • SweetDeal: Representing agent contracts with exceptions using XML rules, ontologies, and process descriptions
    • Budapest, Hungary, May
    • B. Grosof and T. Poon. SweetDeal: Representing agent contracts with exceptions using XML rules, ontologies, and process descriptions. In Proceedings of the 12th World Wide Web Conference, Budapest, Hungary, May 2003.
    • (2003) Proceedings of the 12th World Wide Web Conference
    • Grosof, B.1    Poon, T.2
  • 8
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A Trust Management System with Certified Evaluation
    • Oakland, CA, May
    • T. Jim. SD3: A Trust Management System With Certified Evaluation. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2001.
    • (2001) IEEE Symposium on Security and Privacy
    • Jim, T.1
  • 16
    • 85034759466 scopus 로고
    • Guarded horn clauses
    • Logic Programming '85. Proceedings of the 4th Conference
    • K. Ueda. Guarded horn clauses. In Logic Programming '85. Proceedings of the 4th Conference, LNCS 221, pages 168-179, 1986.
    • (1986) LNCS , vol.221 , pp. 168-179
    • Ueda, K.1
  • 18
    • 1642327001 scopus 로고    scopus 로고
    • Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies in Automated Trust Negotiation
    • Feb.
    • T. Yu, M. Winslett, and K. Seamons. Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies in Automated Trust Negotiation. ACM Transactions on Information and System Security, 6(1), Feb. 2003.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.1
    • Yu, T.1    Winslett, M.2    Seamons, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.