메뉴 건너뛰기




Volumn 4670 LNCS, Issue , 2007, Pages 380-394

Core TuLiP logic programming for trust management

Author keywords

[No Author keywords available]

Indexed keywords

INFERENCE ENGINES; LOGIC PROGRAMMING; SEMANTICS;

EID: 38149043621     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74610-2_26     Document Type: Conference Paper
Times cited : (9)

References (21)
  • 1
    • 38149099816 scopus 로고    scopus 로고
    • Apt, K.R.: From Logic Programming to Prolog. Prentice-Hall, Englewood Cliffs (1997)
    • Apt, K.R.: From Logic Programming to Prolog. Prentice-Hall, Englewood Cliffs (1997)
  • 2
    • 84957810442 scopus 로고
    • Verification of Logic Programs with Delay Declarations
    • Alagar, V.S, Nivat, M, eds, AMAST 1995, Springer, Heidelberg
    • Apt, K.R., Luitjes, I.: Verification of Logic Programs with Delay Declarations. In: Alagar, V.S., Nivat, M. (eds.) AMAST 1995. LNCS, vol. 936, pp. 66-90. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.936 , pp. 66-90
    • Apt, K.R.1    Luitjes, I.2
  • 3
    • 0001588190 scopus 로고
    • Reasoning about Prolog programs: From Modes through Types to Assertions
    • Apt, K.R., Marchiori, E.: Reasoning about Prolog programs: from Modes through Types to Assertions. Formal Aspects of Computing 6(6A), 743-765 (1994)
    • (1994) Formal Aspects of Computing 6(6A) , pp. 743-765
    • Apt, K.R.1    Marchiori, E.2
  • 5
    • 38149138594 scopus 로고    scopus 로고
    • Blaze, M, Feigenbaum, J, Ioannidis, J, Keromytis, A, The KeyNote Trust-Management System, Version 2. IETF RFC 2704 September 1999
    • Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust-Management System, Version 2. IETF RFC 2704 (September 1999)
  • 6
    • 84982899264 scopus 로고    scopus 로고
    • The Role of Trust Management in Distributed Systems Security
    • Vitek, J, Jensen, C, eds, Secure Internet Programming, Springer, Heidelberg
    • Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The Role of Trust Management in Distributed Systems Security. In: Vitek, J., Jensen, C. (eds.) Secure Internet Programming. LNCS, vol. 1603, pp. 185-210. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1603 , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.4
  • 9
    • 38149051318 scopus 로고    scopus 로고
    • Czenko, M.R., Etalle, S.: Core TuLiP. Technical Report TR-CTIT-07-22, Centre for Telematics and Information Technology. University of Twente, Enschede (March 2007)
    • Czenko, M.R., Etalle, S.: Core TuLiP. Technical Report TR-CTIT-07-22, Centre for Telematics and Information Technology. University of Twente, Enschede (March 2007)
  • 11
    • 30644480441 scopus 로고    scopus 로고
    • Etalle, S., Winsborough, W.H.: Integrity Constraints in Trust Management - Extended Abstract. In: Ahn, G-J. (ed.) Proc. 10th ACM Symp. on Access Control Models and Technologies (SACMAT), pp. 1-10. ACM Press, New York (2005), Extended version available at CoRR:http://arxiv.org/abs/cs.CR/0503061
    • Etalle, S., Winsborough, W.H.: Integrity Constraints in Trust Management - Extended Abstract. In: Ahn, G-J. (ed.) Proc. 10th ACM Symp. on Access Control Models and Technologies (SACMAT), pp. 1-10. ACM Press, New York (2005), Extended version available at CoRR:http://arxiv.org/abs/cs.CR/0503061
  • 12
    • 38149047356 scopus 로고    scopus 로고
    • Freeband Communication. I-Share: Sharing Resources in Virtual Communities for Storage, Communications, and Processing of Multimedia Data. URL: http://www.freeband.nl/project.cfm?language=en\&id=520
    • Freeband Communication. I-Share: Sharing Resources in Virtual Communities for Storage, Communications, and Processing of Multimedia Data. URL: http://www.freeband.nl/project.cfm?language=en\&id=520
  • 13
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A Trust Management System with Certified Evaluation
    • IEEE Computer Society Press, Los Alamitos
    • Jim, T.: SD3: A Trust Management System with Certified Evaluation. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 106-115. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) Proceedings of the 2001 IEEE Symposium on Security and Privacy , pp. 106-115
    • Jim, T.1
  • 15
    • 84948440714 scopus 로고    scopus 로고
    • Li, N., Mitchell, J., Winsborough, W.: Design of A Role-based Trust-management Framework. In: Proc. 2002 IEEE Symposium on Security and Privacy, pp. 114-130. IEEE Computer Society Press, Los Alamitos (2002)
    • Li, N., Mitchell, J., Winsborough, W.: Design of A Role-based Trust-management Framework. In: Proc. 2002 IEEE Symposium on Security and Privacy, pp. 114-130. IEEE Computer Society Press, Los Alamitos (2002)
  • 16
    • 0037243196 scopus 로고    scopus 로고
    • Distributed Credential Chain Discovery in Trust Management
    • Li, N., Winsborough, W., Mitchell, J.: Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security 11(1), 35-86 (2003)
    • (2003) Journal of Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.2    Mitchell, J.3
  • 18
    • 33646551446 scopus 로고    scopus 로고
    • Nonmonotonic Trust Management for P2P Applications
    • Proc. of the 1st International Workshop on Security and Trust Management, Elsevier, Amsterdam
    • Czenko, M., Tran, H., Doumen, J., Etalle, S., Hartel, P., den Hartog, J.: Nonmonotonic Trust Management for P2P Applications. In: Proc. of the 1st International Workshop on Security and Trust Management. Electronic Notes in Theoretical Computer Science, vol. 157, pp. 113-130. Elsevier, Amsterdam (2006)
    • (2006) Electronic Notes in Theoretical Computer Science , vol.157 , pp. 113-130
    • Czenko, M.1    Tran, H.2    Doumen, J.3    Etalle, S.4    Hartel, P.5    den Hartog, J.6
  • 19
    • 38149128673 scopus 로고    scopus 로고
    • OASIS, eXtensible Access Control Markup Language (XACML) Version 2.0 February 2005, URL
    • OASIS.: eXtensible Access Control Markup Language (XACML) Version 2.0 (February 2005), URL: http: //www.oasis.org
  • 20
    • 38149093878 scopus 로고    scopus 로고
    • Rivest, R., Lampson, B.: SDSI - A Simple Distributed Security Infrastructure (October 1996), Available at http: //theory.lcs.mit.edu/ ∼rivest/sdsill.html
    • Rivest, R., Lampson, B.: SDSI - A Simple Distributed Security Infrastructure (October 1996), Available at http: //theory.lcs.mit.edu/ ∼rivest/sdsill.html
  • 21
    • 84893110297 scopus 로고    scopus 로고
    • Towards Practical Automated Trust Negotiation. In: POLICY
    • Los Alamitos
    • Winsborough, W.H., Li, N.: Towards Practical Automated Trust Negotiation. In: POLICY, pp. 92-103. IEEE Computer Society Press, Los Alamitos (2002)
    • (2002) IEEE Computer Society Press , pp. 92-103
    • Winsborough, W.H.1    Li, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.