-
1
-
-
29244468339
-
Semirings for Soft Constraint Solving and Programming
-
Springer, Heidelberg
-
Bistarelli, S.: Semirings for Soft Constraint Solving and Programming. LNCS, vol. 2962. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2962
-
-
Bistarelli, S.1
-
2
-
-
49049108917
-
Weighted datalog and levels of trust
-
Los Alamitos to appear
-
Bistarelli, S., Martinelli, F., Santini, F.: Weighted datalog and levels of trust. In: Advances in Policy Enforcement. IEEE, Los Alamitos (to appear, 2008)
-
(2008)
Advances in Policy Enforcement. IEEE
-
-
Bistarelli, S.1
Martinelli, F.2
Santini, F.3
-
3
-
-
0031095278
-
Semiring-based constraint solving and optimization
-
Bistarelli, S., Montanari, U., Rossi, F.: Semiring-based constraint solving and optimization. Journal of the ACM 44(2), 201-236 (1997)
-
(1997)
Journal of the ACM
, vol.44
, Issue.2
, pp. 201-236
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
4
-
-
0041405781
-
Semiring-based constraint logic programming: Syntax and semantics
-
Bistarelli, S., Rossi, F.: Semiring-based constraint logic programming: syntax and semantics. ACM Trans. Program. Lang. Syst. 23(1), 1-29 (2001)
-
(2001)
ACM Trans. Program. Lang. Syst
, vol.23
, Issue.1
, pp. 1-29
-
-
Bistarelli, S.1
Rossi, F.2
-
5
-
-
33750051130
-
An integration of reputation-based and policy-based trust management
-
Bonatti, P., Duma, C., Olmedilla, D., Shahmehri, N.: An integration of reputation-based and policy-based trust management. In: Semantic Web Policy Workshop (2005)
-
(2005)
Semantic Web Policy Workshop
-
-
Bonatti, P.1
Duma, C.2
Olmedilla, D.3
Shahmehri, N.4
-
6
-
-
33748081445
-
TrustBAC: Integrating trust relationships into the rbac model for access control in open systems
-
ACM Press, New York
-
Chakraborty, S., Ray, I.: TrustBAC: integrating trust relationships into the rbac model for access control in open systems. In: SACMAT 2006: Proc. of Access control models and technologies, pp. 49-58. ACM Press, New York (2006)
-
(2006)
SACMAT 2006: Proc. of Access control models and technologies
, pp. 49-58
-
-
Chakraborty, S.1
Ray, I.2
-
7
-
-
33745822390
-
The complexity of soft constraint satisfaction
-
Cohen, D.A., Cooper, M.C., Jeavons, P.G., Krokhin, A.A.: The complexity of soft constraint satisfaction. Artif. Intell. 170(11), 983-1016 (2006)
-
(2006)
Artif. Intell
, vol.170
, Issue.11
, pp. 983-1016
-
-
Cohen, D.A.1
Cooper, M.C.2
Jeavons, P.G.3
Krokhin, A.A.4
-
8
-
-
38349047685
-
Fine grained access control with trust and reputation management for globus
-
Colombo, M., Martinelli, F., Mori, P., Petrocchi, M., Vaccarelli, A.: Fine grained access control with trust and reputation management for globus. In: OTM Conferences (2), pp. 1505-1515 (2007)
-
(2007)
OTM Conferences (2)
, pp. 1505-1515
-
-
Colombo, M.1
Martinelli, F.2
Mori, P.3
Petrocchi, M.4
Vaccarelli, A.5
-
9
-
-
0036083264
-
Binder, a logic-based security language
-
Washington, DC, USA, p, IEEE Computer Society, Los Alamitos
-
De Treville, J.: Binder, a logic-based security language. In: SP 2002: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Washington, DC, USA, p. 105. IEEE Computer Society, Los Alamitos (2002)
-
(2002)
SP 2002: Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 105
-
-
De Treville, J.1
-
10
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
Washington, DC, USA, p, IEEE Computer Society, Los Alamitos
-
Jim, T.: SD3: A trust management system with certified evaluation. In: SP 2001: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Washington, DC, USA, p. 106. IEEE Computer Society, Los Alamitos (2001)
-
(2001)
SP 2001: Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 106
-
-
Jim, T.1
-
11
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618-644 (2007)
-
(2007)
Decis. Support Syst
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
12
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
Li, N., Grosof, B.N., Feigenbaum, J.: Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur. 6(1), 128-171 (2003)
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
13
-
-
35248834606
-
-
Li, N., Mitchell, J.C.: Datalog with constraints: A foundation for trust management languages. In: Dahl, V., Wadler, P. (eds.) PADL 2003. LNCS, 2562, pp. 58-73. Springer, Heidelberg (2002)
-
Li, N., Mitchell, J.C.: Datalog with constraints: A foundation for trust management languages. In: Dahl, V., Wadler, P. (eds.) PADL 2003. LNCS, vol. 2562, pp. 58-73. Springer, Heidelberg (2002)
-
-
-
-
14
-
-
84948440714
-
Design of a role-based trust-management framework
-
IEEE Computer Society, Los Alamitos
-
Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust-management framework. In: SP 2002: Proc. of Security and Privacy, p. 114. IEEE Computer Society, Los Alamitos (2002)
-
(2002)
SP 2002: Proc. of Security and Privacy
, pp. 114
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
|