메뉴 건너뛰기




Volumn 4734 LNCS, Issue , 2007, Pages 375-389

Obligations and their interaction with programs

Author keywords

[No Author keywords available]

Indexed keywords

APPROXIMATION THEORY; COMPUTER SOFTWARE; MATHEMATICAL MODELS; STANDARDS; STATIC ANALYSIS;

EID: 38049083819     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74835-9_25     Document Type: Conference Paper
Times cited : (31)

References (35)
  • 1
    • 38049023063 scopus 로고    scopus 로고
    • Moses, T, extensible Access Control Markup Language (XACML) version 1.0. Technical report, OASIS February 2003
    • Moses, T.: extensible Access Control Markup Language (XACML) version 1.0. Technical report, OASIS (February 2003)
  • 3
    • 0003706051 scopus 로고    scopus 로고
    • Garner, B.A, ed, 8th edn. Thomson-West Publishers
    • Garner, B.A. (ed.): Black's Law Dictionary, 8th edn. Thomson-West Publishers (2004)
    • (2004) Black's Law Dictionary
  • 10
    • 3142757108 scopus 로고    scopus 로고
    • Specification and verification of data-driven web services
    • Deutsch, A., Sui, L., Vianu, V.: Specification and verification of data-driven web services. In: Principles of Database Systems, pp. 71-82 (2004)
    • (2004) Principles of Database Systems , pp. 71-82
    • Deutsch, A.1    Sui, L.2    Vianu, V.3
  • 11
    • 35248859723 scopus 로고    scopus 로고
    • Verifying temporal heap properties specified via evolution logic
    • Degano, P, ed, ESOP 2003 and ETAPS 2003, Springer, Heidelberg
    • Yahav, E., Reps, T., Sagiv, M., Wilhelm, R.: Verifying temporal heap properties specified via evolution logic. In: Degano, P. (ed.) ESOP 2003 and ETAPS 2003. LNCS, vol. 2618, pp. 204-222. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2618 , pp. 204-222
    • Yahav, E.1    Reps, T.2    Sagiv, M.3    Wilhelm, R.4
  • 12
    • 44949280298 scopus 로고
    • Verification of concurrent programs: The automata-theoretic framework
    • Vardi, M. Y.: Verification of concurrent programs: The automata-theoretic framework. Annals of Pure and Applied Logic 51(1-2), 79-98 (1991)
    • (1991) Annals of Pure and Applied Logic , vol.51 , Issue.1-2 , pp. 79-98
    • Vardi, M.Y.1
  • 14
  • 15
    • 0039193007 scopus 로고
    • Deontic logic
    • von Wright, G.H.: Deontic logic. Mind 60, 1-15 (1951)
    • (1951) Mind , vol.60 , pp. 1-15
    • von Wright, G.H.1
  • 16
    • 11144269059 scopus 로고
    • Conditional obligation, deontic paradoxes, and the logic of agency
    • Bartha, P.: Conditional obligation, deontic paradoxes, and the logic of agency. Annals of Mathematics and Artificial Intelligence 9(1-2), 1-23 (1993)
    • (1993) Annals of Mathematics and Artificial Intelligence , vol.9 , Issue.1-2 , pp. 1-23
    • Bartha, P.1
  • 19
    • 44149125457 scopus 로고    scopus 로고
    • A system to handle privacy obligations in enterprises
    • Technical Report HPL2005-180, HP Laboratories Bristol October
    • Mont, M.C.: A system to handle privacy obligations in enterprises. Technical Report HPL2005-180, HP Laboratories Bristol (October 2005)
    • (2005)
    • Mont, M.C.1
  • 25
    • 0034450091 scopus 로고    scopus 로고
    • XML document security based on provisional authorization
    • Kudo, M., Hada, S.: XML document security based on provisional authorization. In: Computer and Communications Security, pp. 87-96 (2000)
    • (2000) Computer and Communications Security , pp. 87-96
    • Kudo, M.1    Hada, S.2
  • 26
    • 0036986420 scopus 로고    scopus 로고
    • An asynchronous rule-based approach for business process automation using obligations
    • Abrahams, A., Eyers, D., Bacon, J.: An asynchronous rule-based approach for business process automation using obligations. In: Rule-Based Programming, pp. 93-104 (2002)
    • (2002) Rule-Based Programming , pp. 93-104
    • Abrahams, A.1    Eyers, D.2    Bacon, J.3
  • 28
    • 84894114949 scopus 로고    scopus 로고
    • An extended analysis of delegating obligations
    • Schaad, A.: An extended analysis of delegating obligations. In: Data and Applications Security, pp. 49-64 (2004)
    • (2004) Data and Applications Security , pp. 49-64
    • Schaad, A.1
  • 29
    • 26444620963 scopus 로고    scopus 로고
    • Revocation of obligation and authorisation policy objects
    • Schaad, A.: Revocation of obligation and authorisation policy objects. In: Data and Applications Security, pp. 28-39 (2005)
    • (2005) Data and Applications Security , pp. 28-39
    • Schaad, A.1
  • 33
    • 0034144974 scopus 로고    scopus 로고
    • Specifying communication in distributed information systems
    • Ehrich, H.D., Caleiro, C.: Specifying communication in distributed information systems. Acta Informatica 36(8), 591-616 (2000)
    • (2000) Acta Informatica , vol.36 , Issue.8 , pp. 591-616
    • Ehrich, H.D.1    Caleiro, C.2
  • 34
    • 33947620690 scopus 로고    scopus 로고
    • Privacy APIs: Access control techniques to analyze and verify legal privacy policies
    • Workshop
    • May, M.J., Gunter, CA., Lee, I.: Privacy APIs: Access control techniques to analyze and verify legal privacy policies. In: Computer Security Foundations Workshop (2006)
    • (2006) Computer Security Foundations
    • May, M.J.1    Gunter, C.A.2    Lee, I.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.