-
1
-
-
84864747393
-
-
ANSI, RBACiNCITS,359-2004
-
ANSI, "RBAC," iNCITS 359-2004, 2004.
-
(2004)
-
-
-
2
-
-
11244302711
-
Unification in privacy policy evaluation - Translating EPAL into prolog
-
Proceedings - Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2004
-
M. Backes, M. Dürmuth, and G. Karjoth, "Unification in Privacy Policy Evaluation-Translating EPAL into Prolog," Proc. IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY), pp. 185-188, 2004. (Pubitemid 40061198)
-
(2004)
Proceedings - Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2004
, pp. 185-188
-
-
Backes, M.1
Durmutht, M.2
Karjoth, G.3
-
4
-
-
19244381332
-
Logic programming and knowledge representation
-
C. Baral and M. Gelfond, "Logic Programming and Knowledge Representation," J. Logic Programming, vols. 19/20, pp. 73-148, 1994.
-
(1994)
J. Logic Programming, vols.
, vol.19-20
, pp. 73-148
-
-
Baral, C.1
Gelfond, M.2
-
7
-
-
56349114982
-
Status-based access control
-
article 1
-
S. Barker, M.J. Sergot, and D. Wijesekera, "Status-Based Access Control," ACM Trans. Information and System Security, vol. 12, no. 1, article 1, 2008.
-
(2008)
ACM Trans. Information and System Security
, vol.12
, Issue.1
-
-
Barker, S.1
Sergot, M.J.2
Wijesekera, D.3
-
8
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
S. Barker and P. Stuckey, "Flexible Access Control Policy Specification with Constraint Logic Programming," ACM Trans. Information and System Security, vol. 6, no. 4, pp. 501-546, 2003.
-
(2003)
ACM Trans. Information and System Security
, vol.6
, Issue.4
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.2
-
9
-
-
77954754889
-
Secpal: Design and semantics of a decentralized authorization language
-
M.Y. Becker, C. Fournet, and A.D. Gordon, "SecPAL: Design and Semantics of a Decentralized Authorization Language," J. Computer Security, vol. 18, no. 4, pp. 619-665, 2010.
-
(2010)
J. Computer Security
, vol.18
, Issue.4
, pp. 619-665
-
-
Becker, M.Y.1
Fournet, C.2
Gordon, A.D.3
-
12
-
-
79951679488
-
Semantic web-based social network access control
-
B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, and B.M. Thuraisingham, "Semantic Web-Based Social Network Access Control," Computers & Security, vol. 30, nos. 2/3, pp. 108-115, 2011.
-
(2011)
Computers & Security
, vol.30
, Issue.2-3
, pp. 108-115
-
-
Carminati, B.1
Ferrari, E.2
Heatherly, R.3
Kantarcioglu, M.4
Thuraisingham, B.M.5
-
13
-
-
70350406398
-
Enforcing access control in web-based social networks
-
article 6
-
B. Carminati, E. Ferrari, and A. Perego, "Enforcing Access Control in Web-Based Social Networks," ACM Trans. Information and System Security, vol. 13, no. 1, article 6, 2009.
-
(2009)
ACM Trans. Information and System Security
, vol.13
, Issue.1
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
14
-
-
85025410371
-
On the semantics of 'now' in databases
-
J. Clifford, C. Dyreson, T. Isakowitz, C. Jensen, and R. Snodgrass, "On the Semantics of 'Now' in Databases," ACM Trans. Database Systems, vol. 22, no. 2, pp. 171-214, 1997.
-
(1997)
ACM Trans. Database Systems
, vol.22
, Issue.2
, pp. 171-214
-
-
Clifford, J.1
Dyreson, C.2
Isakowitz, T.3
Jensen, C.4
Snodgrass, R.5
-
15
-
-
3042822164
-
P3p: Making privacy policies more useful
-
Nov./Dec.
-
L.F. Cranor, "P3P: Making Privacy Policies More Useful," IEEE Security & Privacy, vol. 1, no. 6, pp. 50-55, Nov./Dec. 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.6
, pp. 50-55
-
-
Cranor, L.F.1
-
17
-
-
84880846309
-
Aggregate functions in disjunctive logic programming: Semantics, complexity, and implementation in dlv
-
T. Dell'Armi, W. Faber, G. Ielpa, N. Leone, and G. Pfeifer, "Aggregate Functions in Disjunctive Logic Programming: Semantics, Complexity, and Implementation in DLV," Proc. 18th Int'l Joint Conf. Artificial Intelligence (IJCAI), pp. 847-852, 2003.
-
(2003)
Proc. 18th Int'l Joint Conf. Artificial Intelligence (IJCAI)
, pp. 847-852
-
-
Dell'Armi, T.1
Faber, W.2
Ielpa, G.3
Leone, N.4
Pfeifer, G.5
-
19
-
-
77951505493
-
Classical negation in logic programs and disjunctive databases
-
M. Gelfond and V. Lifschitz, "Classical Negation in Logic Programs and Disjunctive Databases," New Generation Computing, vol. 9, pp. 365-385, 1991.
-
(1991)
New Generation Computing
, vol.9
, pp. 365-385
-
-
Gelfond, M.1
Lifschitz, V.2
-
20
-
-
0001619596
-
Flexible support for multiple access control policies
-
DOI 10.1145/383891.383894
-
S. Jajodia, P. Samarati, M. Sapino, and V. Subrahmaninan, "Flexible Support for Multiple Access Control Policies," ACM Trans. Database Systems, vol. 26, no. 2, pp. 214-260, 2001. (Pubitemid 33661632)
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
22
-
-
85102591607
-
Limiting disclosure in hippocratic databases
-
K. LeFevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu, and D.J. DeWitt, "Limiting Disclosure in Hippocratic Databases," Proc. Int'l Conf. Very Large Data Bases, pp. 108-119, 2004.
-
(2004)
Proc. Int'l Conf. Very Large Data Bases
, pp. 108-119
-
-
LeFevre, K.1
Agrawal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
DeWitt, D.J.6
-
23
-
-
58549107635
-
The dlv project: A tour from theory and research to applications and market
-
N. Leone and W. Faber, "The Dlv Project: A Tour from Theory and Research to Applications and Market," Proc. Int'l Conf. Logic Programming (ICLP), pp. 53-68, 2008.
-
(2008)
Proc. Int'l Conf. Logic Programming (ICLP)
, pp. 53-68
-
-
Leone, N.1
Faber, W.2
-
24
-
-
0036085965
-
Design of a role-based trust-management framework
-
N. Li, J.C. Mitchell, and W.H. Winsborough, "Design of a Role-Based Trust-Management Framework," Proc. IEEE Symp. Security and Privacy, pp. 114-130, 2002. (Pubitemid 34648108)
-
(2002)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
26
-
-
79951855082
-
Guarded resolution for answer set programming
-
V.W. Marek and J.B. Remmel, "Guarded Resolution for Answer Set Programming," Theory and Practice of Logic Programming, vol. 11, no. 1, pp. 111-123, 2011.
-
(2011)
Theory and Practice of Logic Programming
, vol.11
, Issue.1
, pp. 111-123
-
-
Marek, V.W.1
Remmel, J.B.2
-
27
-
-
34548016110
-
Privacy-aware role based access control
-
DOI 10.1145/1266840.1266848, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
-
Q. Ni, A. Trombetta, E. Bertino, and J. Lobo, "Privacy-Aware Role Based Access Control," Proc. 12th ACM Symp. Access Control Models and Technologies (SACMAT), pp. 41-50, 2007. (Pubitemid 47281536)
-
(2007)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 41-50
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
29
-
-
0030086382
-
Role-based access control models
-
Feb.
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-Based Access Control Models," Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
31
-
-
33845705535
-
Handling distributed authorization with delegation through answer set programming
-
DOI 10.1007/s10207-006-0008-4
-
S. Wang and Y. Zhang, "Handling Distributed Authorization with Delegation through Answer Set Programming," Int'l J. Information Security, vol. 6, no. 1, pp. 27-46, 2007. (Pubitemid 44963967)
-
(2007)
International Journal of Information Security
, vol.6
, Issue.1
, pp. 27-46
-
-
Wang, S.1
Zhang, Y.2
|