NORMATIVE LOGIC BASED SEMANTIC-AWARE AUTHORIZATION MODEL
暂无分享,去创建一个
[1] Peter Steenkiste,et al. Exploiting Information Relationships for Access Control , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[2] Linh Anh Nguyen. Analytic Tableau Systems for Propositional Bimodal Logics of Knowledge and Belief , 2002, TABLEAUX.
[3] K J Biba,et al. Integrity Considerations for Secure Computer Systems , 1977 .
[4] Sabrina De Capitani di Vimercati,et al. A fine-grained access control system for XML documents , 2002, TSEC.
[5] Sushil Jajodia,et al. Provisions and Obligations in Policy Rule Management , 2003, Journal of Network and Systems Management.
[6] Peter J. Stuckey,et al. Flexible access control policy specification with constraint logic programming , 2003, TSEC.
[7] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .
[8] Ian Horrocks,et al. Description logic programs: combining logic programs with description logic , 2003, WWW '03.
[9] Carsten Lutz,et al. A Tableau Decision Algorithm for Modalized ALC with Constant Domains , 2002, Stud Logica.
[10] E. F. Michiels,et al. ISO/IEC 10181-4:1995 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework , 1996 .
[11] Morteza Amini,et al. A semantic-based access control mechanism using semantic technologies , 2009, SIN '09.
[12] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[13] Francesco M. Donini,et al. AL-log: Integrating Datalog and Description Logics , 1998, Journal of Intelligent Information Systems.
[14] Maria Grazia Fugini,et al. ACTEN: A conceptual model for security systems design , 1984, Comput. Secur..
[15] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[16] Diego Calvanese,et al. Conjunctive Query Containment in Description Logics with n-ary Relations , 1997, Description Logics.
[17] Jeffrey M. Bradshaw,et al. KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[18] Elisa Bertino,et al. TRBAC , 2001, ACM Trans. Inf. Syst. Secur..
[19] Guido Governatori,et al. KED: A Deontic Theorem Prover , 1994, ICLP Workshop: Legal Application of Logic Programming.
[20] Carole A. Goble,et al. An overview of S-OGSA: A Reference Semantic Grid Architecture , 2006, J. Web Semant..
[21] Peter J. Denning,et al. Data Security , 1979, CSUR.
[22] Michiharu Kudo. PBAC: Provision-based access control model , 2002, International Journal of Information Security.
[23] Amirreza Masoumzadeh,et al. Context-Aware Provisional Access Control , 2006, ICISS.
[24] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[25] Morteza Amini,et al. A Context-Aware Access Control Model for Pervasive Computing Environments , 2007 .
[26] Li Qin,et al. Concept-level access control for the Semantic Web , 2003, XMLSEC '03.
[27] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[28] Hui-Chuan Chu,et al. Development of a Semantic Awareness Framework for Textual Content Management in e-Learning , 2006 .
[29] Alan H. Karp. Authorization-Based Access Control for the Services Oriented Architecture , 2006, Fourth International Conference on Creating, Connecting and Collaborating through Computing (C5'06).
[30] Elisa Bertino,et al. A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.
[31] Shourya Roy,et al. Identity Delegation in Policy Based Systems , 2006, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07).
[32] Xiao Ming Zhang. A Semantic Grid Oriented to E-Tourism , 2009, CloudCom.
[33] Yarden Katz,et al. Pellet: A practical OWL-DL reasoner , 2007, J. Web Semant..
[34] Boris Motik,et al. Query Answering for OWL-DL with Rules , 2004, SEMWEB.
[35] Sudhir Agarwal,et al. Specification of Access Control and Certification Policies for Semantic Web Services , 2005, EC-Web.
[36] Mark Strembeck,et al. Using Subject- and Object-Specific Attributes for Access Control in Web-based Knowledge Management Systems , 2004 .
[37] Sushil Jajodia,et al. Provisions and Obligations in Policy Management and Security Applications , 2002, VLDB.
[38] Elisa Bertino,et al. Securing XML Documents with Author-X , 2001, IEEE Internet Comput..
[39] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[40] Martín Abadi,et al. A calculus for access control in distributed systems , 1991, TOPL.
[41] Morteza Amini,et al. A Context-Aware Mandatory Access Control Model for Multilevel Security Environments , 2008, SAFECOMP.
[42] Huajun Chen,et al. Semantic Grid: Model, Methodology, and Applications , 2008 .
[43] Martin Otto,et al. On Logics with Two Variables , 1999, Theor. Comput. Sci..
[44] Anton Riabov,et al. Specifying and Enforcing High-Level Semantic Obligation Policies , 2007, POLICY.
[45] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[46] Dieter Gollmann,et al. A method for access authorisation through delegation networks , 2006, ACSW.
[47] Sushil Jajodia,et al. A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[48] Jeffrey M. Bradshaw,et al. New Developments in Ontology-Based Policy Management: Increasing the Practicality and Comprehensiveness of KAoS , 2008, 2008 IEEE Workshop on Policies for Distributed Systems and Networks.
[49] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[50] Timothy W. Finin,et al. Policy-Based Access Control for an RDF Store , 2005, IJCAI 2007.
[51] Sylvia L. Osborn,et al. The role graph model and conflict of interest , 1999, TSEC.
[52] Paulo Ferreira,et al. Obligation policies: an enforcement platform , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).
[53] Jeffrey M. Bradshaw,et al. KAoS policy management for semantic Web services , 2004, IEEE Intelligent Systems.
[54] Ian T. Foster,et al. The Anatomy of the Grid: Enabling Scalable Virtual Organizations , 2001, Int. J. High Perform. Comput. Appl..
[55] M. de Rijke,et al. Modal Logic , 2001, Cambridge Tracts in Theoretical Computer Science.
[56] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[57] Joan Feigenbaum,et al. Delegation logic: A logic-based approach to distributed authorization , 2003, TSEC.
[58] Leon Henkin,et al. The completeness of the first-order functional calculus , 1949, Journal of Symbolic Logic.
[59] Laurent Catach,et al. TABLEAUX: A general theorem prover for modal logics , 1991, Journal of Automated Reasoning.
[60] Peter Balsiger,et al. Comparison of Theorem Provers for Modal Logics - Introduction and Summary , 1998, TABLEAUX.
[61] Zhen Li,et al. An implementation of a tableau theorem prover for modal logics , 2004, IJCAR Doctoral Programme.
[62] Thorsten Liebig,et al. Parallelizing Tableaux-Based Description Logic Reasoning , 2007, OTM Workshops.
[63] Emil C. Lupu,et al. Conflicts in Policy-Based Distributed Systems Management , 1999, IEEE Trans. Software Eng..
[64] Elisa Bertino,et al. Temporal Authorization Bases: From Specification to Integration , 2000, J. Comput. Secur..
[65] Xu Hong-wei. Temporal Role-Based Access Control Model , 2009 .
[66] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[67] Rasool Jalili,et al. Multi-Determiner Protection of Private Data in Pervasive Computing Environments , 2006 .
[68] Timothy W. Finin,et al. A Policy Based Approach to Security for the Semantic Web , 2003, SEMWEB.
[69] Ravi S. Sandhu,et al. The schematic protection model: its definition and analysis for acyclic attenuating schemes , 1988, JACM.
[70] José M. Troya,et al. Applying the semantic Web layers to access control , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..
[71] Olivier Gasquet,et al. Tableaux with Dynamic Filtration for Layered Modal Logics , 2007, TABLEAUX.
[72] Deborah L. McGuinness,et al. OWL Web ontology language overview , 2004 .
[73] Guido Governatori,et al. On constructing fibred tableaux for BDI logics , 2006 .
[74] Marco Casassa Mont,et al. A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises , 2006, Privacy Enhancing Technologies.
[75] Dorothy E. Denning,et al. Secure information flow in computer systems. , 1975 .
[76] Michael Dick,et al. Towards the Semantic Grid: A State of the Art Survey of Semantic Web Services and their Applicability to Collaborative Design, Engineering, and Procurement , 2008 .
[77] Lalana Kagal,et al. A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments , 2006, SEMWEB.
[78] Sudhir Agarwal,et al. Credential Based Access Control for Semantic Web Services , 2004 .
[79] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[80] Masakazu Soshi,et al. Safety Analysis of the Dynamic-Typed Access Matrix Model , 2000, ESORICS.
[81] Morteza Amini,et al. Multi-level authorisation model and framework for distributed semantic-aware environments , 2010, IET Inf. Secur..
[82] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[83] Guido Governatori,et al. Labelled Tableaux for Non-normal Modal Logics , 1999, AI*IA.
[84] Ravi S. Sandhu. The typed access matrix model , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[85] Frank Wolter,et al. Handbook of Modal Logic , 2007, Studies in logic and practical reasoning.
[86] Glenn H. MacEwen,et al. Reasoning about Knowledge and Permission in Secure Distributed Systems , 1988, CSFW.
[87] Dimiter Vakarelov,et al. PDL with intersection of programs: a complete axiomatization , 2003, J. Appl. Non Class. Logics.
[88] Norbert E. Fuchs,et al. Semantic Web Policies - A Discussion of Requirements and Research Issues , 2006, ESWC.
[89] Reiner Hähnle,et al. Tableaux and Related Methods , 2001, Handbook of Automated Reasoning.
[90] Sushil Jajodia,et al. A propositional policy algebra for access control , 2003, TSEC.
[91] Phokion G. Kolaitis,et al. On the Decision Problem for Two-Variable First-Order Logic , 1997, Bulletin of Symbolic Logic.
[92] Thomas R. Gruber,et al. A translation approach to portable ontology specifications , 1993, Knowl. Acquis..
[93] Carsten Lutz,et al. NEXP TIME-complete description logics with concrete domains , 2004, TOCL.
[94] Volker Haarslev,et al. RACER System Description , 2001, IJCAR.
[95] Tim Berners-Lee,et al. Creating a Policy-Aware Web: Discretionary, Rule-Based Access for the World Wide Web , 2008 .
[96] Mustaque Ahamad,et al. Generalized Role-Based Access Control for Securing Future Applications , 2000 .
[97] Luke C. Dion. A Complete Protection Model , 1981, 1981 IEEE Symposium on Security and Privacy.
[98] Andreas Dengel,et al. What Is the Role of the Semantic Layer Cake for Guiding the Use of Knowledge Representation and Machine Learning in the Development of the Semantic Web? , 2008, AAAI Spring Symposium: Symbiotic Relationships between Semantic Web and Knowledge Engineering.
[99] Thomas Herchenr,et al. Lightweight Semantic Web Oriented Reasoning in Prolog: Tableaux Inference for Description Logics , 2006 .
[100] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.
[101] Ravi S. Sandhu,et al. The Extended Schematic Protection Model , 1992, J. Comput. Secur..
[102] Diego Calvanese,et al. The Description Logic Handbook: Theory, Implementation, and Applications , 2003, Description Logic Handbook.
[103] Ian T. Foster. Globus Toolkit Version 4: Software for Service-Oriented Systems , 2005, NPC.
[104] Anton Naumenko. Semantics-based access control in business networks , 2007 .
[105] Robert Goldblatt. Mathematical modal logic: A view of its evolution , 2003, J. Appl. Log..
[106] Ravi S. Sandhu,et al. The ARBAC97 model for role-based administration of roles: preliminary description and outline , 1997, RBAC '97.
[107] Sushil Jajodia,et al. Toward a multilevel secure relational data model , 1991, SIGMOD '91.
[108] Johan van Benthem,et al. Modal Languages and Bounded Fragments of Predicate Logic , 1998, J. Philos. Log..
[109] Michael Leuschel,et al. Efficient and flexible access control via logic program specialisation , 2004, PEPM '04.
[110] Duminda Wijesekera,et al. Policy-based dissemination of partial web-ontologies , 2005, SWS '05.
[111] Franz Baader,et al. A Scheme for Integrating Concrete Domains into Concept Languages , 1991, IJCAI.
[112] Christian Schläger,et al. Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies , 2007, J. Softw..
[113] Joachim Quantz,et al. Deriving Inference Rules for Terminological Logics , 1992, JELIA.
[114] Elisa Bertino,et al. A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.
[115] Frédéric Cuppens. An Epistemic and Deontic Logic for Reasoning about Computer Security , 1990, ESORICS.
[116] Marianne Winslett,et al. Entity Modeling in the MLS Relational Model , 1992, VLDB.
[117] Hong Fan,et al. A context-aware role-based access control model for Web services , 2005, IEEE International Conference on e-Business Engineering (ICEBE'05).
[118] Martín Abadi,et al. Logic in access control , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..
[119] Simon S. Lam,et al. Authorizations in Distributed Systems: A New Approach , 1993, J. Comput. Secur..
[120] Ian Horrocks,et al. FaCT++ Description Logic Reasoner: System Description , 2006, IJCAR.
[121] Roderic A. Girle,et al. Modal Logics and Philosophy , 2000 .
[122] Richard J. Lipton,et al. A Linear Time Algorithm for Deciding Subject Security , 1977, JACM.
[123] Alon Y. Halevy,et al. Combining Horn Rules and Description Logics in CARIN , 1998, Artif. Intell..
[124] Elisa Bertino,et al. A model of authorization for next-generation database systems , 1991, TODS.
[125] Silvana Castano,et al. Database Security , 1997, IFIP Advances in Information and Communication Technology.
[126] Ralf Küsters,et al. Extensions to Description Logics , 2003, Description Logic Handbook.
[127] Grit Denker,et al. OWL-S Semantics of Security Web Services: a Case Study , 2004, ESWS.
[128] Ian T. Foster,et al. A community authorization service for group collaboration , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[129] N. L. Chervany,et al. THE MEANINGS OF TRUST , 2000 .