-
3
-
-
84886009826
-
Stable and extension class theory for logic programs and default theories
-
June
-
C. Baral and V. S. Subrahmanian. Stable and extension class theory for logic programs and default theories. Journal of Automated Reasoning, 8(3):345-366, June 1992.
-
(1992)
Journal of Automated Reasoning
, vol.8
, Issue.3
, pp. 345-366
-
-
Baral, C.1
Subrahmanian, V.S.2
-
4
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
S. Barker and P. Stuckey. Flexible access control policy specification with constraint logic programming. ACM Transactions on Information and System Security, 6(4):501-546, 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.2
-
5
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management
-
February
-
E. Bertino and V. Atluri. The specification and enforcement of authorization constraints in workflow management. ACM Transactions on Information Systems Security, 2(1):65-104, February 1999.
-
(1999)
ACM Transactions on Information Systems Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Atluri, V.2
-
6
-
-
0041524664
-
A logical framework for reasoning about access control models
-
February
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca. A logical framework for reasoning about access control models. ACM Transactions on Information and System Security, 6(1):71-127, February 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
7
-
-
0003051686
-
Constructive negation based on the completed databases
-
R. A. Kowalski and K. A. Bowen, editors, The MIT Press
-
D. Chan. Constructive negation based on the completed databases. In R. A. Kowalski and K. A. Bowen, editors, Proc. International Conference on Logic Programming (ICLP), pages 111-125. The MIT Press, 1988.
-
(1988)
Proc. International Conference on Logic Programming (ICLP)
, pp. 111-125
-
-
Chan, D.1
-
8
-
-
0004664593
-
An extension of constructive negation and its application in coroutining
-
E. Lusk and R. Overbeek, editors, The MIT Press
-
D. Chan. An extension of constructive negation and its application in coroutining. In E. Lusk and R. Overbeek, editors, Proc. North-American Conference on Logic Programming, pages 477-489. The MIT Press, 1989.
-
(1989)
Proc. North-American Conference on Logic Programming
, pp. 477-489
-
-
Chan, D.1
-
9
-
-
35048828610
-
-
Technical Report CSIS-TR-04-01, Center for Secure Information Systems, George Mason University, June
-
S. Chen, D. Wijesekera, and S. Jajodia. Incorporating dynamic constraints in the flexible authorization framework. Technical Report CSIS-TR-04-01, Center for Secure Information Systems, George Mason University, June 2004.
-
(2004)
Incorporating Dynamic Constraints in the Flexible Authorization Framework
-
-
Chen, S.1
Wijesekera, D.2
Jajodia, S.3
-
10
-
-
0031209371
-
Constructive negation by pruning
-
F. Fages. Constructive negation by pruning. Journal of Logic Programming, 32(2):85-118, 1997.
-
(1997)
Journal of Logic Programming
, vol.32
, Issue.2
, pp. 85-118
-
-
Fages, F.1
-
11
-
-
0022180593
-
A kripke-kleene semantics for logic programs
-
M. Fitting. A kripke-kleene semantics for logic programs. Journal of Logic Programming, 2(4):295-312, 1985.
-
(1985)
Journal of Logic Programming
, vol.2
, Issue.4
, pp. 295-312
-
-
Fitting, M.1
-
12
-
-
20444440194
-
Stratified, weak stratified, and three-valued semantics
-
March
-
M. Fitting and M. Ben-Jacob. Stratified, weak stratified, and three-valued semantics. Fundamenta Informaticae, Special issue on LOGIC PROGRAMMING, 13(1):19-33, March 1990.
-
(1990)
Fundamenta Informaticae, Special Issue on Logic Programming
, vol.13
, Issue.1
, pp. 19-33
-
-
Fitting, M.1
Ben-Jacob, M.2
-
13
-
-
84958756079
-
A hierarchy of semantics for normal constraint logic programs
-
F. Francois and G. Roberta. A hierarchy of semantics for normal constraint logic programs. In Algebraic and Logic Programming, pages 77-91, 1996.
-
(1996)
Algebraic and Logic Programming
, pp. 77-91
-
-
Francois, F.1
Roberta, G.2
-
15
-
-
0242528825
-
On the increasing importance of constraints
-
Fairfax, VA
-
T. Jaeger. On the increasing importance of constraints. In Proc. of the Fourth Role Based Access Control, pages 33-42, Fairfax, VA, 1999.
-
(1999)
Proc. of the Fourth Role Based Access Control
, pp. 33-42
-
-
Jaeger, T.1
-
16
-
-
85013593271
-
Flexible control of downloaded executable content
-
May
-
T. Jaeger, A. Prakash, J. Liedtke, and N. Islam. Flexible control of downloaded executable content. ACM Transactions on Information Systems Security, 2(2):177-228, May 1999.
-
(1999)
ACM Transactions on Information Systems Security
, vol.2
, Issue.2
, pp. 177-228
-
-
Jaeger, T.1
Prakash, A.2
Liedtke, J.3
Islam, N.4
-
17
-
-
0001619596
-
Flexible support for multiple access control policies
-
June
-
S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. ACM Transactions on Database Systems, 26(2):214-260, June 2001.
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
18
-
-
0023596784
-
Negation in logic programming
-
December
-
K. J. Kunen. Negation in logic programming. Journal of Logic Programming, 4(4):298-308, December 1987.
-
(1987)
Journal of Logic Programming
, vol.4
, Issue.4
, pp. 298-308
-
-
Kunen, K.J.1
-
20
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
May
-
S. Osborn, R. Sandhu, and Q. Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and Systems, 3(2):85-106, May 2000.
-
(2000)
ACM Transactions on Information and Systems
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
21
-
-
0030086382
-
Role-based access control models
-
Febraury
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, Febraury 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
22
-
-
0026187378
-
Constructive negation for constraint logic programming
-
P. Stuckey. Constructive negation for constraint logic programming. In Logic in Computer Science, pages 328-339, 1991.
-
(1991)
Logic in Computer Science
, pp. 328-339
-
-
Stuckey, P.1
-
23
-
-
0004685411
-
Negation and constraint logic programming
-
P. Stuckey. Negation and constraint logic programming. Information and Computation, 118(1):12-33, 1995.
-
(1995)
Information and Computation
, vol.118
, Issue.1
, pp. 12-33
-
-
Stuckey, P.1
-
25
-
-
84974750564
-
Authorizations in distributed systems: A new approach
-
T. Y. C. Woo and S. S. Lam. Authorizations in distributed systems: A new approach. Journal of Computer Security, 2(2-3):107-136, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2-3
, pp. 107-136
-
-
Woo, T.Y.C.1
Lam, S.S.2
|