메뉴 건너뛰기




Volumn 235, Issue C, 2009, Pages 35-53

Event-oriented Web-based E-trading

Author keywords

e trading; logic specification; policies; Web applications

Indexed keywords

COMPUTERS; LOGIC PROGRAMMING; PROBLEM ORIENTED LANGUAGES; SPECIFICATIONS; WORLD WIDE WEB;

EID: 62849092542     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2009.03.004     Document Type: Article
Times cited : (1)

References (17)
  • 1
    • 84976728043 scopus 로고
    • Concurrency control performance modeling: Alternatives and implications
    • Agrawal R., Carey M., and Livny M. Concurrency control performance modeling: Alternatives and implications. ACM TODS 12 4 (1987) 609-654
    • (1987) ACM TODS , vol.12 , Issue.4 , pp. 609-654
    • Agrawal, R.1    Carey, M.2    Livny, M.3
  • 2
    • 0036038511 scopus 로고    scopus 로고
    • Grigoris Antoniou and M. Arief. Executable declarative business rules and their use in electronic commerce. In SAC, pages 6-10, 2002
    • Grigoris Antoniou and M. Arief. Executable declarative business rules and their use in electronic commerce. In SAC, pages 6-10, 2002
  • 3
    • 19244381332 scopus 로고
    • Logic programming and knowledge representation
    • Baral C., and Gelfond M. Logic programming and knowledge representation. JLP 19/20 (1994) 73-148
    • (1994) JLP , vol.19-20 , pp. 73-148
    • Baral, C.1    Gelfond, M.2
  • 4
    • 11244252943 scopus 로고    scopus 로고
    • Protecting deductive databases from unauthorized retrieval and update requests
    • Barker S. Protecting deductive databases from unauthorized retrieval and update requests. Journal of Data and Knowledge Engineering 23 3 (2002) 231-285
    • (2002) Journal of Data and Knowledge Engineering , vol.23 , Issue.3 , pp. 231-285
    • Barker, S.1
  • 5
    • 3042584122 scopus 로고    scopus 로고
    • Flexible access control policy specification with constraint logic programming
    • Barker S., and Stuckey P. Flexible access control policy specification with constraint logic programming. ACM Trans. on Information and System Security 6 4 (2003) 501-546
    • (2003) ACM Trans. on Information and System Security , vol.6 , Issue.4 , pp. 501-546
    • Barker, S.1    Stuckey, P.2
  • 6
    • 62849084509 scopus 로고    scopus 로고
    • Tim Berners-Lee, Dan Connolly, Lalana Kagal, Yosi Scharf, and Jim Hendler. N3logic: A logical framework for the world wide web. CoRR, abs/0711.1533, 2007
    • Tim Berners-Lee, Dan Connolly, Lalana Kagal, Yosi Scharf, and Jim Hendler. N3logic: A logical framework for the world wide web. CoRR, abs/0711.1533, 2007
  • 7
    • 13244267910 scopus 로고    scopus 로고
    • Design rationale of ruleml: A markup language for semantic web rules
    • H. Boley, S. Tabet, and G. Wagner. Design rationale of ruleml: A markup language for semantic web rules. In SWWS 2001, pages 381-401, 2001
    • (2001) In SWWS 2001 , pp. 381-401
    • Boley, H.1    Tabet, S.2    Wagner, G.3
  • 8
    • 62849106552 scopus 로고    scopus 로고
    • The Ciao Prolog System, 2004
    • The Ciao Prolog System, 2004
  • 10
    • 84944048132 scopus 로고    scopus 로고
    • The Ponder Policy Specification Language
    • Proc. Int. Workshop on Policies for Distributed Systems and Networks, Springer
    • Damianou N., Dulay N., Lupu E., and Sloman M. The Ponder Policy Specification Language. Proc. Int. Workshop on Policies for Distributed Systems and Networks. LNCS volume 1995 (2001), Springer 18-38
    • (2001) LNCS , vol.1995 , pp. 18-38
    • Damianou, N.1    Dulay, N.2    Lupu, E.3    Sloman, M.4
  • 14
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • T. Jim. SD3: A trust management system with certified evaluation. In IEEE Symp. Security and Privacy, pages 106-115, 2001
    • (2001) IEEE Symp. Security and Privacy , pp. 106-115
    • Jim, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.