-
1
-
-
29244468339
-
Semirings for Soft Constraint Solving and Programming
-
of, Springer
-
S. Bistarelli. Semirings for Soft Constraint Solving and Programming, volume 2962 of Lecture Notes in Computer Science. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2962
-
-
Bistarelli, S.1
-
2
-
-
0031095278
-
Semiring-based constraint solving and optimization
-
S. Bistarelli, U. Montanari, and F. Rossi. Semiring-based constraint solving and optimization. Journal of the ACM, 44(2):201-236, 1997.
-
(1997)
Journal of the ACM
, vol.44
, Issue.2
, pp. 201-236
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
3
-
-
33748307458
-
Soft concurrent constraint programming
-
S. Bistarelli, U. Montanari, and F. Rossi. Soft concurrent constraint programming. ACM Trans. Comput. Logic, 7(3):563-589, 2006.
-
(2006)
ACM Trans. Comput. Logic
, vol.7
, Issue.3
, pp. 563-589
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
4
-
-
0041405781
-
Semiring-based constraint logic programming: Syntax and semantics
-
S. Bistarelli and F. Rossi. Semiring-based constraint logic programming: syntax and semantics. ACM Trans. Program. Lang. Syst., 23(1): 1-29, 2001.
-
(2001)
ACM Trans. Program. Lang. Syst
, vol.23
, Issue.1
, pp. 1-29
-
-
Bistarelli, S.1
Rossi, F.2
-
8
-
-
49049099896
-
-
F. Bueno, D. Cabeza, M. Carro, M. Hermenegildo, P. López- García, and G. Puebla. The CIAO prolog system: reference manual. Technical Report CLIP3/97.1, School of Computer Science, Technical University of Madrid (UPM), 1997.
-
F. Bueno, D. Cabeza, M. Carro, M. Hermenegildo, P. López- García, and G. Puebla. The CIAO prolog system: reference manual. Technical Report CLIP3/97.1, School of Computer Science, Technical University of Madrid (UPM), 1997.
-
-
-
-
9
-
-
33748081445
-
Trustbac: Integrating trust relationships into the rbac model for access control in open systems
-
ACM
-
S. Chakraborty and I. Ray. Trustbac: integrating trust relationships into the rbac model for access control in open systems. In SACMAT '06: Proc. of Access control models and technologies, pages 49-58. ACM, 2006.
-
(2006)
SACMAT '06: Proc. of Access control models and technologies
, pp. 49-58
-
-
Chakraborty, S.1
Ray, I.2
-
10
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
D. Clarke, J.-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. L. Rivest. Certificate chain discovery in SPKI/SDSI. J. Comput. Secur., 9(4):285-322, 2001.
-
(2001)
J. Comput. Secur
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
11
-
-
33745822390
-
The complexity of soft constraint satisfaction
-
D. A. Cohen, M. C. Cooper, P. G. Jeavons, and A. A. Krokhin. The complexity of soft constraint satisfaction. Artif. Intell., 170(11):983-1016, 2006.
-
(2006)
Artif. Intell
, vol.170
, Issue.11
, pp. 983-1016
-
-
Cohen, D.A.1
Cooper, M.C.2
Jeavons, P.G.3
Krokhin, A.A.4
-
12
-
-
38349047685
-
Fine grained access control with trust and reputation management for globus
-
M. Colombo, F. Martinelli, P. Mori, M. Petrocchi, and A. Vaccarelli. Fine grained access control with trust and reputation management for globus. In OTM Conferences (2), pages 1505-1515, 2007.
-
(2007)
OTM Conferences (2)
, pp. 1505-1515
-
-
Colombo, M.1
Martinelli, F.2
Mori, P.3
Petrocchi, M.4
Vaccarelli, A.5
-
13
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
A. Jøsang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decis. Support Syst., 43(2):618-644, 2007.
-
(2007)
Decis. Support Syst
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
14
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
N. Li, B. N. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur., 6(1):128-171, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
19
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. Computer, 29(2):38-47, 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
20
-
-
49049087008
-
-
T. Stüber and H. Vogler. Weighted monadic datalog. In Workshop on Theorietag Automaten und Formale Sprachen, pages 126-130. Informal Proc., 2007.
-
T. Stüber and H. Vogler. Weighted monadic datalog. In Workshop on Theorietag Automaten und Formale Sprachen, pages 126-130. Informal Proc., 2007.
-
-
-
|