NORMATIVE LOGIC BASED SEMANTIC-AWARE AUTHORIZATION MODEL

[1]  Peter Steenkiste,et al.  Exploiting Information Relationships for Access Control , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[2]  Linh Anh Nguyen Analytic Tableau Systems for Propositional Bimodal Logics of Knowledge and Belief , 2002, TABLEAUX.

[3]  K J Biba,et al.  Integrity Considerations for Secure Computer Systems , 1977 .

[4]  Sabrina De Capitani di Vimercati,et al.  A fine-grained access control system for XML documents , 2002, TSEC.

[5]  Sushil Jajodia,et al.  Provisions and Obligations in Policy Rule Management , 2003, Journal of Network and Systems Management.

[6]  Peter J. Stuckey,et al.  Flexible access control policy specification with constraint logic programming , 2003, TSEC.

[7]  Vijayalakshmi Atluri,et al.  Role-based Access Control , 1992 .

[8]  Ian Horrocks,et al.  Description logic programs: combining logic programs with description logic , 2003, WWW '03.

[9]  Carsten Lutz,et al.  A Tableau Decision Algorithm for Modalized ALC with Constant Domains , 2002, Stud Logica.

[10]  E. F. Michiels,et al.  ISO/IEC 10181-4:1995 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework , 1996 .

[11]  Morteza Amini,et al.  A semantic-based access control mechanism using semantic technologies , 2009, SIN '09.

[12]  Sushil Jajodia,et al.  Flexible support for multiple access control policies , 2001, TODS.

[13]  Francesco M. Donini,et al.  AL-log: Integrating Datalog and Description Logics , 1998, Journal of Intelligent Information Systems.

[14]  Maria Grazia Fugini,et al.  ACTEN: A conceptual model for security systems design , 1984, Comput. Secur..

[15]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[16]  Diego Calvanese,et al.  Conjunctive Query Containment in Description Logics with n-ary Relations , 1997, Description Logics.

[17]  Jeffrey M. Bradshaw,et al.  KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[18]  Elisa Bertino,et al.  TRBAC , 2001, ACM Trans. Inf. Syst. Secur..

[19]  Guido Governatori,et al.  KED: A Deontic Theorem Prover , 1994, ICLP Workshop: Legal Application of Logic Programming.

[20]  Carole A. Goble,et al.  An overview of S-OGSA: A Reference Semantic Grid Architecture , 2006, J. Web Semant..

[21]  Peter J. Denning,et al.  Data Security , 1979, CSUR.

[22]  Michiharu Kudo PBAC: Provision-based access control model , 2002, International Journal of Information Security.

[23]  Amirreza Masoumzadeh,et al.  Context-Aware Provisional Access Control , 2006, ICISS.

[24]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[25]  Morteza Amini,et al.  A Context-Aware Access Control Model for Pervasive Computing Environments , 2007 .

[26]  Li Qin,et al.  Concept-level access control for the Semantic Web , 2003, XMLSEC '03.

[27]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[28]  Hui-Chuan Chu,et al.  Development of a Semantic Awareness Framework for Textual Content Management in e-Learning , 2006 .

[29]  Alan H. Karp Authorization-Based Access Control for the Services Oriented Architecture , 2006, Fourth International Conference on Creating, Connecting and Collaborating through Computing (C5'06).

[30]  Elisa Bertino,et al.  A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.

[31]  Shourya Roy,et al.  Identity Delegation in Policy Based Systems , 2006, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07).

[32]  Xiao Ming Zhang A Semantic Grid Oriented to E-Tourism , 2009, CloudCom.

[33]  Yarden Katz,et al.  Pellet: A practical OWL-DL reasoner , 2007, J. Web Semant..

[34]  Boris Motik,et al.  Query Answering for OWL-DL with Rules , 2004, SEMWEB.

[35]  Sudhir Agarwal,et al.  Specification of Access Control and Certification Policies for Semantic Web Services , 2005, EC-Web.

[36]  Mark Strembeck,et al.  Using Subject- and Object-Specific Attributes for Access Control in Web-based Knowledge Management Systems , 2004 .

[37]  Sushil Jajodia,et al.  Provisions and Obligations in Policy Management and Security Applications , 2002, VLDB.

[38]  Elisa Bertino,et al.  Securing XML Documents with Author-X , 2001, IEEE Internet Comput..

[39]  Jeffrey D. Ullman,et al.  Protection in operating systems , 1976, CACM.

[40]  Martín Abadi,et al.  A calculus for access control in distributed systems , 1991, TOPL.

[41]  Morteza Amini,et al.  A Context-Aware Mandatory Access Control Model for Multilevel Security Environments , 2008, SAFECOMP.

[42]  Huajun Chen,et al.  Semantic Grid: Model, Methodology, and Applications , 2008 .

[43]  Martin Otto,et al.  On Logics with Two Variables , 1999, Theor. Comput. Sci..

[44]  Anton Riabov,et al.  Specifying and Enforcing High-Level Semantic Obligation Policies , 2007, POLICY.

[45]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[46]  Dieter Gollmann,et al.  A method for access authorisation through delegation networks , 2006, ACSW.

[47]  Sushil Jajodia,et al.  A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[48]  Jeffrey M. Bradshaw,et al.  New Developments in Ontology-Based Policy Management: Increasing the Practicality and Comprehensiveness of KAoS , 2008, 2008 IEEE Workshop on Policies for Distributed Systems and Networks.

[49]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[50]  Timothy W. Finin,et al.  Policy-Based Access Control for an RDF Store , 2005, IJCAI 2007.

[51]  Sylvia L. Osborn,et al.  The role graph model and conflict of interest , 1999, TSEC.

[52]  Paulo Ferreira,et al.  Obligation policies: an enforcement platform , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).

[53]  Jeffrey M. Bradshaw,et al.  KAoS policy management for semantic Web services , 2004, IEEE Intelligent Systems.

[54]  Ian T. Foster,et al.  The Anatomy of the Grid: Enabling Scalable Virtual Organizations , 2001, Int. J. High Perform. Comput. Appl..

[55]  M. de Rijke,et al.  Modal Logic , 2001, Cambridge Tracts in Theoretical Computer Science.

[56]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[57]  Joan Feigenbaum,et al.  Delegation logic: A logic-based approach to distributed authorization , 2003, TSEC.

[58]  Leon Henkin,et al.  The completeness of the first-order functional calculus , 1949, Journal of Symbolic Logic.

[59]  Laurent Catach,et al.  TABLEAUX: A general theorem prover for modal logics , 1991, Journal of Automated Reasoning.

[60]  Peter Balsiger,et al.  Comparison of Theorem Provers for Modal Logics - Introduction and Summary , 1998, TABLEAUX.

[61]  Zhen Li,et al.  An implementation of a tableau theorem prover for modal logics , 2004, IJCAR Doctoral Programme.

[62]  Thorsten Liebig,et al.  Parallelizing Tableaux-Based Description Logic Reasoning , 2007, OTM Workshops.

[63]  Emil C. Lupu,et al.  Conflicts in Policy-Based Distributed Systems Management , 1999, IEEE Trans. Software Eng..

[64]  Elisa Bertino,et al.  Temporal Authorization Bases: From Specification to Integration , 2000, J. Comput. Secur..

[65]  Xu Hong-wei Temporal Role-Based Access Control Model , 2009 .

[66]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[67]  Rasool Jalili,et al.  Multi-Determiner Protection of Private Data in Pervasive Computing Environments , 2006 .

[68]  Timothy W. Finin,et al.  A Policy Based Approach to Security for the Semantic Web , 2003, SEMWEB.

[69]  Ravi S. Sandhu,et al.  The schematic protection model: its definition and analysis for acyclic attenuating schemes , 1988, JACM.

[70]  José M. Troya,et al.  Applying the semantic Web layers to access control , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[71]  Olivier Gasquet,et al.  Tableaux with Dynamic Filtration for Layered Modal Logics , 2007, TABLEAUX.

[72]  Deborah L. McGuinness,et al.  OWL Web ontology language overview , 2004 .

[73]  Guido Governatori,et al.  On constructing fibred tableaux for BDI logics , 2006 .

[74]  Marco Casassa Mont,et al.  A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises , 2006, Privacy Enhancing Technologies.

[75]  Dorothy E. Denning,et al.  Secure information flow in computer systems. , 1975 .

[76]  Michael Dick,et al.  Towards the Semantic Grid: A State of the Art Survey of Semantic Web Services and their Applicability to Collaborative Design, Engineering, and Procurement , 2008 .

[77]  Lalana Kagal,et al.  A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments , 2006, SEMWEB.

[78]  Sudhir Agarwal,et al.  Credential Based Access Control for Semantic Web Services , 2004 .

[79]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[80]  Masakazu Soshi,et al.  Safety Analysis of the Dynamic-Typed Access Matrix Model , 2000, ESORICS.

[81]  Morteza Amini,et al.  Multi-level authorisation model and framework for distributed semantic-aware environments , 2010, IET Inf. Secur..

[82]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[83]  Guido Governatori,et al.  Labelled Tableaux for Non-normal Modal Logics , 1999, AI*IA.

[84]  Ravi S. Sandhu The typed access matrix model , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[85]  Frank Wolter,et al.  Handbook of Modal Logic , 2007, Studies in logic and practical reasoning.

[86]  Glenn H. MacEwen,et al.  Reasoning about Knowledge and Permission in Secure Distributed Systems , 1988, CSFW.

[87]  Dimiter Vakarelov,et al.  PDL with intersection of programs: a complete axiomatization , 2003, J. Appl. Non Class. Logics.

[88]  Norbert E. Fuchs,et al.  Semantic Web Policies - A Discussion of Requirements and Research Issues , 2006, ESWC.

[89]  Reiner Hähnle,et al.  Tableaux and Related Methods , 2001, Handbook of Automated Reasoning.

[90]  Sushil Jajodia,et al.  A propositional policy algebra for access control , 2003, TSEC.

[91]  Phokion G. Kolaitis,et al.  On the Decision Problem for Two-Variable First-Order Logic , 1997, Bulletin of Symbolic Logic.

[92]  Thomas R. Gruber,et al.  A translation approach to portable ontology specifications , 1993, Knowl. Acquis..

[93]  Carsten Lutz,et al.  NEXP TIME-complete description logics with concrete domains , 2004, TOCL.

[94]  Volker Haarslev,et al.  RACER System Description , 2001, IJCAR.

[95]  Tim Berners-Lee,et al.  Creating a Policy-Aware Web: Discretionary, Rule-Based Access for the World Wide Web , 2008 .

[96]  Mustaque Ahamad,et al.  Generalized Role-Based Access Control for Securing Future Applications , 2000 .

[97]  Luke C. Dion A Complete Protection Model , 1981, 1981 IEEE Symposium on Security and Privacy.

[98]  Andreas Dengel,et al.  What Is the Role of the Semantic Layer Cake for Guiding the Use of Knowledge Representation and Machine Learning in the Development of the Semantic Web? , 2008, AAAI Spring Symposium: Symbiotic Relationships between Semantic Web and Knowledge Engineering.

[99]  Thomas Herchenr,et al.  Lightweight Semantic Web Oriented Reasoning in Prolog: Tableaux Inference for Description Logics , 2006 .

[100]  Jaehong Park,et al.  The UCONABC usage control model , 2004, TSEC.

[101]  Ravi S. Sandhu,et al.  The Extended Schematic Protection Model , 1992, J. Comput. Secur..

[102]  Diego Calvanese,et al.  The Description Logic Handbook: Theory, Implementation, and Applications , 2003, Description Logic Handbook.

[103]  Ian T. Foster Globus Toolkit Version 4: Software for Service-Oriented Systems , 2005, NPC.

[104]  Anton Naumenko Semantics-based access control in business networks , 2007 .

[105]  Robert Goldblatt Mathematical modal logic: A view of its evolution , 2003, J. Appl. Log..

[106]  Ravi S. Sandhu,et al.  The ARBAC97 model for role-based administration of roles: preliminary description and outline , 1997, RBAC '97.

[107]  Sushil Jajodia,et al.  Toward a multilevel secure relational data model , 1991, SIGMOD '91.

[108]  Johan van Benthem,et al.  Modal Languages and Bounded Fragments of Predicate Logic , 1998, J. Philos. Log..

[109]  Michael Leuschel,et al.  Efficient and flexible access control via logic program specialisation , 2004, PEPM '04.

[110]  Duminda Wijesekera,et al.  Policy-based dissemination of partial web-ontologies , 2005, SWS '05.

[111]  Franz Baader,et al.  A Scheme for Integrating Concrete Domains into Concept Languages , 1991, IJCAI.

[112]  Christian Schläger,et al.  Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies , 2007, J. Softw..

[113]  Joachim Quantz,et al.  Deriving Inference Rules for Terminological Logics , 1992, JELIA.

[114]  Elisa Bertino,et al.  A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.

[115]  Frédéric Cuppens An Epistemic and Deontic Logic for Reasoning about Computer Security , 1990, ESORICS.

[116]  Marianne Winslett,et al.  Entity Modeling in the MLS Relational Model , 1992, VLDB.

[117]  Hong Fan,et al.  A context-aware role-based access control model for Web services , 2005, IEEE International Conference on e-Business Engineering (ICEBE'05).

[118]  Martín Abadi,et al.  Logic in access control , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..

[119]  Simon S. Lam,et al.  Authorizations in Distributed Systems: A New Approach , 1993, J. Comput. Secur..

[120]  Ian Horrocks,et al.  FaCT++ Description Logic Reasoner: System Description , 2006, IJCAR.

[121]  Roderic A. Girle,et al.  Modal Logics and Philosophy , 2000 .

[122]  Richard J. Lipton,et al.  A Linear Time Algorithm for Deciding Subject Security , 1977, JACM.

[123]  Alon Y. Halevy,et al.  Combining Horn Rules and Description Logics in CARIN , 1998, Artif. Intell..

[124]  Elisa Bertino,et al.  A model of authorization for next-generation database systems , 1991, TODS.

[125]  Silvana Castano,et al.  Database Security , 1997, IFIP Advances in Information and Communication Technology.

[126]  Ralf Küsters,et al.  Extensions to Description Logics , 2003, Description Logic Handbook.

[127]  Grit Denker,et al.  OWL-S Semantics of Security Web Services: a Case Study , 2004, ESWS.

[128]  Ian T. Foster,et al.  A community authorization service for group collaboration , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[129]  N. L. Chervany,et al.  THE MEANINGS OF TRUST , 2000 .