-
1
-
-
70450259479
-
-
ANSI. RBAC, 2004. INCITS 359-2004.
-
ANSI. RBAC, 2004. INCITS 359-2004.
-
-
-
-
2
-
-
19244381332
-
Logic programming and knowledge representation
-
C. Baral and M. Gelfond. Logic programming and knowledge representation. JLP, 19/20:73-148, 1994.
-
(1994)
JLP
, vol.19-20
, pp. 73-148
-
-
Baral, C.1
Gelfond, M.2
-
4
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
S. Barker and P. Stuckey. Flexible access control policy specification with constraint logic programming. ACM Trans. on Information and System Security, 6(4):501-546, 2003.
-
(2003)
ACM Trans. on Information and System Security
, vol.6
, Issue.4
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.2
-
5
-
-
35048879241
-
Design and semantics of a decentralized authorization language
-
M. Y. Becker, C. Fournet, and A. D. Gordon. Design and semantics of a decentralized authorization language. In CSF, pages 3-15, 2007.
-
(2007)
CSF
, pp. 3-15
-
-
Becker, M.Y.1
Fournet, C.2
Gordon, A.D.3
-
6
-
-
56349097648
-
Secure computer system: Unified exposition and multics interpretation
-
D. E. Bell and L. J. LaPadula. Secure computer system: Unified exposition and multics interpretation. MITRE-2997, 1976.
-
(1976)
MITRE-2997
-
-
Bell, D.E.1
LaPadula, L.J.2
-
7
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. An access control model supporting periodicity constraints and temporal reasoning. ACM TODS, 23(3):231-285, 1998.
-
(1998)
ACM TODS
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
8
-
-
13244267910
-
Design rationale of ruleml: A markup language for semantic web rules
-
H. Boley, S. Tabet, and G. Wagner. Design rationale of ruleml: A markup language for semantic web rules. In SWWS 2001, pages 381-401, 2001.
-
(2001)
SWWS 2001
, pp. 381-401
-
-
Boley, H.1
Tabet, S.2
Wagner, G.3
-
9
-
-
0024772001
-
A completeness theorem for SLDNF resolution
-
L. Cavedon and J. Lloyd. A completeness theorem for SLDNF resolution. JLP, 7(3):177-192, 1989.
-
(1989)
JLP
, vol.7
, Issue.3
, pp. 177-192
-
-
Cavedon, L.1
Lloyd, J.2
-
10
-
-
0000826543
-
Negation as failure
-
H. Gallaire and J. Minker, editors, Plenum
-
K. Clark. Negation as failure. In H. Gallaire and J. Minker, editors, Logic and Databases, pages 293-322. Plenum, 1978.
-
(1978)
Logic and Databases
, pp. 293-322
-
-
Clark, K.1
-
11
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
D. E. Clarke, J.-E. Elien, C. M. Ellison, M. Fredette, A. Morcos, and R. L. Rivest. Certificate chain discovery in SPKI/SDSI. J. Computer Security, 9(4):285-322, 2001.
-
(2001)
J. Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.E.1
Elien, J.-E.2
Ellison, C.M.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
12
-
-
57349141482
-
A meta model for access control: Why is it needed and is it even possible to achieve?
-
D. F. Ferraiolo and V. Atluri. A meta model for access control: why is it needed and is it even possible to achieve? In SACMAT'08, pages 153-154, 2008.
-
(2008)
SACMAT'08
, pp. 153-154
-
-
Ferraiolo, D.F.1
Atluri, V.2
-
13
-
-
84992227458
-
Proposed nist standard for role-based access control
-
D. F. Ferraiolo, R. S. Sandhu, S. I. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed nist standard for role-based access control. ACM TISSEC, 4(3):224-274, 2001.
-
(2001)
ACM TISSEC
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.S.2
Gavrila, S.I.3
Kuhn, D.R.4
Chandramouli, R.5
-
14
-
-
84937430803
-
Inferring termination conditions for logic programs using backwards analysis
-
of, Springer
-
S. Genaim and M. Codish. Inferring termination conditions for logic programs using backwards analysis. volume 2250 of LNCS, pages 685-694. Springer, 2001.
-
(2001)
LNCS
, vol.2250
, pp. 685-694
-
-
Genaim, S.1
Codish, M.2
-
15
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M. Sapino, and V. Subrahmaninan. Flexible support for multiple access control policies. ACM TODS, 26(2):214-260, 2001.
-
(2001)
ACM TODS
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmaninan, V.4
-
16
-
-
17444406680
-
A generalized temporal role-based access control model
-
J. Joshi, E. Bertino, U. Latif, and A. Ghafoor. A generalized temporal role-based access control model. IEEE Trans. Knowl. Data Eng., 17(1):4-23, 2005.
-
(2005)
IEEE Trans. Knowl. Data Eng
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
17
-
-
84943347452
-
The next 700 programming languages
-
P. J. Landin. The next 700 programming languages. Commun. ACM, 9(3):157-166, 1966.
-
(1966)
Commun. ACM
, vol.9
, Issue.3
, pp. 157-166
-
-
Landin, P.J.1
-
19
-
-
0041887465
-
Belief, information acquisition, and trust in multi-agent systems - a modal logic formulation
-
C.-J. Liau. Belief, information acquisition, and trust in multi-agent systems - a modal logic formulation. Artif. Intell., 149(1):31-60, 2003.
-
(2003)
Artif. Intell
, vol.149
, Issue.1
, pp. 31-60
-
-
Liau, C.-J.1
-
22
-
-
33750124112
-
Creating a policy-aware web: Discretionary, rule-based access for the world wide web
-
D. J. Weitzner, J. Hendler, T. Berners-Lee, and D. Connolly. Creating a policy-aware web: Discretionary, rule-based access for the world wide web. Web and Information Security, 2006.
-
(2006)
Web and Information Security
-
-
Weitzner, D.J.1
Hendler, J.2
Berners-Lee, T.3
Connolly, D.4
|