-
2
-
-
24944578141
-
Enterprise Privacy Authorization Language (EPAL 1.2)
-
Nov.
-
P. Ashley, S. Hada, G. Karjoth, C. Powers, and M. Schunter, "Enterprise Privacy Authorization Language (EPAL 1.2)," technical report, IBM, Nov. 2003.
-
(2003)
Technical Report, IBM
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
3
-
-
77956991874
-
Choice, interoperability, and conformance in interaction protocols and service choreographies
-
M. Baldoni et al., "Choice, Interoperability, and Conformance in Interaction Protocols and Service Choreographies," Proc. Eighth Int'l Conf. Autonomous Agents and Multiagent Systems (AAMAS), pp. 843-850, 2009.
-
(2009)
Proc. Eighth Int'l Conf. Autonomous Agents and Multiagent Systems (AAMAS)
, pp. 843-850
-
-
Baldoni, M.1
-
4
-
-
34748916380
-
On interoperable trust negotiation strategies
-
S. Baselice, P.A. Bonatti, and M. Faella, "On Interoperable Trust Negotiation Strategies," Proc. Eighth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '07), pp. 39-50, 2007.
-
(2007)
Proc. Eighth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '07)
, pp. 39-50
-
-
Baselice, S.1
Bonatti, P.A.2
Faella, M.3
-
6
-
-
77956996791
-
Complexity of abduction in the EL family of lightweight description logics
-
Principles of Knowledge Representation and Reasoning (KR '08)
-
M. Bienvenu, "Complexity of Abduction in the EL Family of Lightweight Description Logics," Proc. 11th Int'l Conf. Principles of Knowledge Representation and Reasoning (KR '08), pp. 220-230, 2008.
-
(2008)
Proc. 11th Int'l Conf.
, pp. 220-230
-
-
Bienvenu, M.1
-
7
-
-
77956986180
-
Automated negotiation mechanisms
-
REWERSE,Apr.
-
P. Bonatti, T. Eiter, and M. Faella, "Automated Negotiation Mechanisms," Technical Report I2-D6, REWERSE, http:// rewerse.net/ deliverables/m24/i2-d6.pdf, Apr. 2006.
-
(2006)
Technical Report
-
-
Bonatti, P.1
Eiter, T.2
Faella, M.3
-
9
-
-
34249798492
-
An integration of reputation-based and policy-based trust management
-
P.A. Bonatti, C. Duma, D. Olmedilla, and N. Shahmehri, "An Integration of Reputation-Based and Policy-Based Trust Management," Proc. Semantic Web Policy Workshop, 2005.
-
(2005)
Proc. Semantic Web Policy Workshop
-
-
Bonatti, P.A.1
Duma, C.2
Olmedilla, D.3
Shahmehri, N.4
-
14
-
-
9344260144
-
Explaining ALC subsumption
-
A. Borgida, E. Franconi, I. Horrocks, D.L. McGuinness, and P.F. Patel-Schneider, "Explaining ALC Subsumption," Proc. Int'l Workshop Description Logics, 1999.
-
(1999)
Proc. Int'l Workshop Description Logics
-
-
Borgida, A.1
Franconi, E.2
Horrocks, I.3
McGuinness, D.L.4
Patel-Schneider, P.F.5
-
15
-
-
30244551622
-
The complexity of selecting maximal solutions
-
Z.-Z. Chen and S. Toda, "The Complexity of Selecting Maximal Solutions," Information and Computation, vol.119, pp. 231-239, 1995.
-
(1995)
Information and Computation
, vol.119
, pp. 231-239
-
-
Chen, Z.-Z.1
Toda, S.2
-
16
-
-
27644565226
-
Concept abduction and contraction for semantic-based discovery of matches and negotiation Spaces in an e-Marketplace
-
S. Colucci et al., "Concept Abduction and Contraction for Semantic-Based Discovery of Matches and Negotiation Spaces in an e-Marketplace," Electronic Commerce Research and Applications, vol.4, no.4, pp. 345-361, 2005.
-
(2005)
Electronic Commerce Research and Applications
, vol.4
, Issue.4
, pp. 345-361
-
-
Colucci, S.1
-
17
-
-
84944048132
-
The ponder policy specification language
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman, "The Ponder Policy Specification Language," Proc. Second IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '01), pp. 18- 38, 2001.
-
(2001)
Proc. Second IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '01)
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
18
-
-
0038062314
-
Complexity and expressive power of logic programming
-
E. Dantsin, T. Eiter, G. Gottlob, and A. Voronkov, "Complexity and Expressive Power of Logic Programming," ACM Computing Surveys, vol.33, no.3, pp. 374-425, 2001.
-
(2001)
ACM Computing Surveys
, vol.33
, Issue.3
, pp. 374-425
-
-
Dantsin, E.1
Eiter, T.2
Gottlob, G.3
Voronkov, A.4
-
19
-
-
77956999855
-
Resolution based explanations for reasoning in the description logic ALC
-
X. Deng et al., "Resolution Based Explanations for Reasoning in the Description Logic ALC," Proc. First Canadian Semantic Web Working Symp. (CSWWS '06), pp. 189-204, 2006.
-
(2006)
Proc. First Canadian Semantic Web Working Symp. (CSWWS '06)
, pp. 189-204
-
-
Deng, X.1
-
20
-
-
84949232061
-
Prolog: A light-weight prolog for internet applications and infrastructures
-
Practical Aspects of Declarative Languages (PADL '01)
-
E. Denti, A. Omicini, and A. Ricci, "tu Prolog: A Light-Weight Prolog for Internet Applications and Infrastructures," Proc. Third Int'l Symp. Practical Aspects of Declarative Languages (PADL '01), pp. 184-198, 2001.
-
(2001)
Proc. Third Int'l Symp
, pp. 184-198
-
-
Denti, E.1
Omicini, A.2
Ricci, A.3
-
21
-
-
34748888266
-
Privacy in the semantic web: What policy languages have to offer
-
C. Duma, A. Herzog, and N. Shahmehri, "Privacy in the Semantic Web: What Policy Languages Have to Offer," Proc. Eighth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '07), pp. 109-118, 2007.
-
(2007)
Proc. Eighth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '07)
, pp. 109-118
-
-
Duma, C.1
Herzog, A.2
Shahmehri, N.3
-
22
-
-
34547260252
-
No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web
-
May
-
R. Gavriloaie et al., "No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on The Semantic Web," Proc. First European Semantic Web Symp. (ESWS '04), pp. 342-356, May 2004.
-
(2004)
Proc. First European Semantic Web Symp. (ESWS '04)
, pp. 342-356
-
-
Gavriloaie, R.1
-
24
-
-
77957009267
-
Explanation in Information Systems: A Design Rationale Approach PhD dissertation, London School of Economics and Political Science
-
S.R. Haynes, "Explanation in Information Systems: A Design Rationale Approach," PhD dissertation, London School of Economics and Political Science, Dept. of Information Systems and Dept. of Social Psychology, 2001.
-
(2001)
Dept. of Information Systems and Dept. of Social Psychology
-
-
Haynes, S.R.1
-
25
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
A. Herzberg, Y. Mass, J. Michaeli, Y. Ravid, and D. Naor, "Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers," Proc. IEEE Symp. Security and Privacy, pp. 2-14, 2000.
-
(2000)
Proc. IEEE Symp. Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Michaeli, J.3
Ravid, Y.4
Naor, D.5
-
26
-
-
84893084758
-
A policy language for a pervasive computing environment
-
L. Kagal, T.W. Finin, and A. Joshi, "A Policy Language for a Pervasive Computing Environment," Proc. Fourth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '03), pp. 63-74, 2003.
-
(2003)
Proc. Fourth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '03)
, pp. 63-74
-
-
Kagal, L.1
Finin, T.W.2
Joshi, A.3
-
27
-
-
51849103380
-
Using dependency tracking to provide explanations for policy management
-
L. Kagal, C. Hanson, and D.J. Weitzner, "Using Dependency Tracking to Provide Explanations for Policy Management," Proc. IEEE Workshop Policies for Distributed Systems and Networks (POLICY '08), pp. 54-61, 2008.
-
(2008)
Proc. IEEE Workshop Policies for Distributed Systems and Networks (POLICY '08)
, pp. 54-61
-
-
Kagal, L.1
Hanson, C.2
Weitzner, D.J.3
-
29
-
-
9344223389
-
Explaining answers from the semantic web: The inference web approach
-
D.L. McGuinness and P.P. da Silva, "Explaining Answers from the Semantic Web: The Inference Web Approach," J. Web Semantics, vol.1, no.4, pp. 397-413, 2004.
-
(2004)
J. Web Semantics
, vol.1
, Issue.4
, pp. 397-413
-
-
McGuinness, D.L.1
Da Silva, P.P.2
-
30
-
-
34748884069
-
Fully automated web services discovery and composition through concept covering and concept abduction
-
A. Ragone et al., "Fully Automated Web Services Discovery and Composition through Concept Covering and Concept Abduction," Int'l J. Web Services Research, vol.4, no.3, pp. 85-112, 2007.
-
(2007)
Int'l J. Web Services Research
, vol.4
, Issue.3
, pp. 85-112
-
-
Ragone, A.1
-
32
-
-
84893105662
-
Requirements for policy languages for trust negotiation
-
K. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobsen, H. Mills, and L. Yu, "Requirements for Policy Languages for Trust Negotiation," Proc. Third Int'l Workshop Policies for Distributed Systems and Networks (POLICY '02), pp. 68-79, 2002.
-
(2002)
Proc. Third Int'l Workshop Policies for Distributed Systems and Networks (POLICY '02)
, pp. 68-79
-
-
Seamons, K.1
Winslett, M.2
Yu, T.3
Smith, B.4
Child, E.5
Jacobsen, J.6
Mills, H.7
Yu, L.8
-
33
-
-
2442512413
-
Oasis Extensible Access Control Markup Language (XACML) Version 1.0
-
Feb.
-
T.M. Simon Godik, "Oasis Extensible Access Control Markup Language (XACML) Version 1.0," technical report, OASIS, Feb. 2003.
-
(2003)
Technical Report, OASIS
-
-
Simon Godik, T.M.1
-
34
-
-
19944433808
-
The pudding of trust
-
Sept.
-
S. Staab, B.K. Bhargava, L. Lilien, A. Rosenthal, M. Winslett, M. Sloman, T.S. Dillon, E. Chang, F.K. Hussain, W. Nejdl, D. Olmedilla, and V. Kashyap, "The Pudding of Trust," IEEE Intelligent Systems, vol.19, no.5, pp. 74-88, Sept. 2004.
-
(2004)
IEEE Intelligent Systems
, vol.19
, Issue.5
, pp. 74-88
-
-
Staab, S.1
Bhargava, B.K.2
Lilien, L.3
Rosenthal, A.4
Winslett, M.5
Sloman, M.6
Dillon, T.S.7
Chang, E.8
Hussain, F.K.9
Nejdl, W.10
Olmedilla, D.11
Kashyap, V.12
-
35
-
-
0003910404
-
-
MIT Press
-
V.S. Subrahmanian, P.A. Bonatti, J. Dix, T. Eiter, S. Kraus, F. Ozcan, and R. Ross, Heterogenous Active Agents. MIT Press, 2000.
-
(2000)
Heterogenous Active Agents
-
-
Subrahmanian, V.S.1
Bonatti, P.A.2
Dix, J.3
Eiter, T.4
Kraus, S.5
Ozcan, F.6
Ross, R.7
-
37
-
-
9344228137
-
Second generation expert system explanation
-
J.-M. David, J.-P. Krivine, and R. Simmons, eds. Springer-Verlag
-
M.R. Wick, "Second Generation Expert System Explanation," Second Generation Expert Systems, J.-M. David, J.-P. Krivine, and R. Simmons, eds., pp. 614-640, Springer-Verlag, 1993.
-
(1993)
Second Generation Expert Systems
, pp. 614-640
-
-
Wick, M.R.1
-
38
-
-
84939548725
-
Automated trust negotiation
-
W. Winsborough, K. Seamons, and V. Jones, "Automated Trust Negotiation," Proc. DARPA Information Survivability Conf. and Exposition (DISCEX '00), pp. 88-102, 2000.
-
(2000)
Proc. DARPA Information Survivability Conf. and Exposition (DISCEX '00)
, pp. 88-102
-
-
Winsborough, W.1
Seamons, K.2
Jones, V.3
|