메뉴 건너뛰기




Volumn 3193, Issue , 2004, Pages 1-16

Incorporating dynamic constraints in the flexible authorization framework

Author keywords

[No Author keywords available]

Indexed keywords

AUTHORIZATION; COMPUTER PROGRAMMING LANGUAGES; CONSTRAINT PROGRAMMING;

EID: 35048824515     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30108-0_1     Document Type: Article
Times cited : (6)

References (25)
  • 3
    • 84886009826 scopus 로고
    • Stable and extension class theory for logic programs and default theories
    • June
    • C. Baral and V. S. Subrahmanian. Stable and extension class theory for logic programs and default theories. Journal of Automated Reasoning, 8(3):345-366, June 1992.
    • (1992) Journal of Automated Reasoning , vol.8 , Issue.3 , pp. 345-366
    • Baral, C.1    Subrahmanian, V.S.2
  • 4
    • 3042584122 scopus 로고    scopus 로고
    • Flexible access control policy specification with constraint logic programming
    • S. Barker and P. Stuckey. Flexible access control policy specification with constraint logic programming. ACM Transactions on Information and System Security, 6(4):501-546, 2004.
    • (2004) ACM Transactions on Information and System Security , vol.6 , Issue.4 , pp. 501-546
    • Barker, S.1    Stuckey, P.2
  • 5
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management
    • February
    • E. Bertino and V. Atluri. The specification and enforcement of authorization constraints in workflow management. ACM Transactions on Information Systems Security, 2(1):65-104, February 1999.
    • (1999) ACM Transactions on Information Systems Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Atluri, V.2
  • 7
    • 0003051686 scopus 로고
    • Constructive negation based on the completed databases
    • R. A. Kowalski and K. A. Bowen, editors, The MIT Press
    • D. Chan. Constructive negation based on the completed databases. In R. A. Kowalski and K. A. Bowen, editors, Proc. International Conference on Logic Programming (ICLP), pages 111-125. The MIT Press, 1988.
    • (1988) Proc. International Conference on Logic Programming (ICLP) , pp. 111-125
    • Chan, D.1
  • 8
    • 0004664593 scopus 로고
    • An extension of constructive negation and its application in coroutining
    • E. Lusk and R. Overbeek, editors, The MIT Press
    • D. Chan. An extension of constructive negation and its application in coroutining. In E. Lusk and R. Overbeek, editors, Proc. North-American Conference on Logic Programming, pages 477-489. The MIT Press, 1989.
    • (1989) Proc. North-American Conference on Logic Programming , pp. 477-489
    • Chan, D.1
  • 10
    • 0031209371 scopus 로고    scopus 로고
    • Constructive negation by pruning
    • F. Fages. Constructive negation by pruning. Journal of Logic Programming, 32(2):85-118, 1997.
    • (1997) Journal of Logic Programming , vol.32 , Issue.2 , pp. 85-118
    • Fages, F.1
  • 11
    • 0022180593 scopus 로고
    • A kripke-kleene semantics for logic programs
    • M. Fitting. A kripke-kleene semantics for logic programs. Journal of Logic Programming, 2(4):295-312, 1985.
    • (1985) Journal of Logic Programming , vol.2 , Issue.4 , pp. 295-312
    • Fitting, M.1
  • 13
    • 84958756079 scopus 로고    scopus 로고
    • A hierarchy of semantics for normal constraint logic programs
    • F. Francois and G. Roberta. A hierarchy of semantics for normal constraint logic programs. In Algebraic and Logic Programming, pages 77-91, 1996.
    • (1996) Algebraic and Logic Programming , pp. 77-91
    • Francois, F.1    Roberta, G.2
  • 15
  • 18
    • 0023596784 scopus 로고
    • Negation in logic programming
    • December
    • K. J. Kunen. Negation in logic programming. Journal of Logic Programming, 4(4):298-308, December 1987.
    • (1987) Journal of Logic Programming , vol.4 , Issue.4 , pp. 298-308
    • Kunen, K.J.1
  • 20
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • May
    • S. Osborn, R. Sandhu, and Q. Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and Systems, 3(2):85-106, May 2000.
    • (2000) ACM Transactions on Information and Systems , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 21
  • 22
    • 0026187378 scopus 로고
    • Constructive negation for constraint logic programming
    • P. Stuckey. Constructive negation for constraint logic programming. In Logic in Computer Science, pages 328-339, 1991.
    • (1991) Logic in Computer Science , pp. 328-339
    • Stuckey, P.1
  • 23
    • 0004685411 scopus 로고
    • Negation and constraint logic programming
    • P. Stuckey. Negation and constraint logic programming. Information and Computation, 118(1):12-33, 1995.
    • (1995) Information and Computation , vol.118 , Issue.1 , pp. 12-33
    • Stuckey, P.1
  • 25
    • 84974750564 scopus 로고
    • Authorizations in distributed systems: A new approach
    • T. Y. C. Woo and S. S. Lam. Authorizations in distributed systems: A new approach. Journal of Computer Security, 2(2-3):107-136, 1993.
    • (1993) Journal of Computer Security , vol.2 , Issue.2-3 , pp. 107-136
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.