Rule-based Policy Specification : State of the Art and Future Work

project deliverable D1, Working Group I2 - This report provides an overview of the existing approaches to logic and rule-based system behavior specification in the light of the peculiar needs of business and security rules. It identifies usage scenarios for rule based policies in a semantic web context and it outlines the possible directions of future research.

[1]  Marianne Winslett,et al.  Negotiating Trust on the Grid , 2005, Semantic Grid.

[2]  Norman W. Paton,et al.  Rule Management in Object Oriented Databases: A Uniform Approach , 1991, VLDB.

[3]  John McCarthy,et al.  SOME PHILOSOPHICAL PROBLEMS FROM THE STANDPOINT OF ARTI CIAL INTELLIGENCE , 1987 .

[4]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[5]  Frank Dignum,et al.  Issues in Agent Communication , 2000, Lecture Notes in Computer Science.

[6]  Teodor C. Przymusinski On the Declarative Semantics of Deductive Databases and Logic Programs , 1988, Foundations of Deductive Databases and Logic Programming..

[7]  Andreas Herzig,et al.  Modal Tableaux for Reasoning About Actions and Plans , 1997, ECP.

[8]  Laura Giordano,et al.  Programming Rational Agents in a Modal Action Logic , 2004, Annals of Mathematics and Artificial Intelligence.

[9]  Krzysztof R. Apt,et al.  Logic Programming , 1990, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics.

[10]  A. Josang,et al.  Conditional inference in subjective logic , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[11]  Marianne Winslett,et al.  Interoperable strategies in automated trust negotiation , 2001, CCS '01.

[12]  Wolfgang Faber,et al.  The dlv System: Model Generator and Application Frontends , 1997 .

[13]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[14]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[15]  Marianne Winslett,et al.  Assuring security and privacy for digital library transactions on the Web: client and server security policies , 1997, Proceedings of ADL '97 Forum on Research and Technology. Advances in Digital Libraries.

[16]  Laura Giordano,et al.  Reasoning about Complex Actions with Incomplete Knowledge: A Modal Approach , 2001, ICTCS.

[17]  Michael Kifer,et al.  HILOG: A Foundation for Higher-Order Logic Programming , 1993, J. Log. Program..

[18]  J. Lloyd Foundations of Logic Programming , 1984, Symbolic Computation.

[19]  Laura Giordano,et al.  Dealing with Concurrent Actions in Modal Action Logics , 1998, ECAI.

[20]  K.E. Seamons,et al.  Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[21]  Michael Gelfond,et al.  Representing Action and Change by Logic Programs , 1993, J. Log. Program..

[22]  Audun J sang,et al.  An Algebra for Assessing Trust in Certi cation Chains , 1998 .

[23]  Ernesto Damiani,et al.  A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.

[24]  Fahiem Bacchus,et al.  Planning for temporally extended goals , 1996, Annals of Mathematics and Artificial Intelligence.

[25]  Laura Giordano,et al.  Ramification and causality in a modal action logic , 2000, J. Log. Comput..

[26]  Tran Cao Son,et al.  Approximate Reasoning about Actions in Presence of Sensing and Incomplete Information , 1997, ILPS.

[27]  Helmut Prendinger,et al.  Reasoning about action and change , 1996, J. Log. Lang. Inf..

[28]  Gerd Wagner,et al.  A Database Needs Two Kinds of Negation , 1991, MFDBS.

[29]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[30]  F. Mayer,et al.  Access meditation in a message passing kernel , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[31]  Elisa Bertino,et al.  TRBAC , 2001, ACM Trans. Inf. Syst. Secur..

[32]  Marianne Winslett,et al.  Requirements for policy languages for trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[33]  Hector J. Levesque,et al.  What Is Planning in the Presence of Sensing? , 1996, AAAI/IAAI, Vol. 2.

[34]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.

[35]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[36]  Ian Horrocks,et al.  A proposal for an owl rules language , 2004, WWW '04.

[37]  Ronald L. Rivest,et al.  Certificate Chain Discovery in SPKI/SDSI , 2002, J. Comput. Secur..

[38]  Michael Thielscher,et al.  Representing the Knowledge of a Robot , 2000, KR.

[39]  Hector J. Levesque,et al.  The Frame Problem and Knowledge-Producing Actions , 1993, AAAI.

[40]  Ganesh Ambalavanan Gopalakrishnan MAKING SYBASE FULLY ACTIVE: SUPPORTING COMPOSITE EVENTS AND PRIORITIZED RULES , 2002 .

[41]  John S. Schlipf,et al.  Computing Well-founded Semantics Faster , 1995, LPNMR.

[42]  Benjamin N. Grosof,et al.  Representing E-Business Rules for the Semantic Web: Situated Courteous Logic Programs in RuleML , 2001 .

[43]  Peter Sewell,et al.  Cassandra: flexible trust management, applied to electronic health records , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..

[44]  Hector J. Levesque,et al.  ConGolog, a concurrent programming language based on the situation calculus , 2000, Artif. Intell..

[45]  Raymond Reiter,et al.  A Logic for Default Reasoning , 1987, Artif. Intell..

[46]  Terry Winograd,et al.  A communication agreement framework for access/action control , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[47]  Marianne Winslett,et al.  Formal query languages for secure relational databases , 1994, TODS.

[48]  C. Petri Kommunikation mit Automaten , 1962 .

[49]  K. A. Ross,et al.  Tabled Evaluation with Delaying for General Logic Programs , 1996 .

[50]  Salvatore J. Stolfo,et al.  A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[51]  Robert C. Moore Semantical Considerations on Nonmonotonic Logic , 1985, IJCAI.

[52]  Alberto Martelli,et al.  Reasoning About Interaction Protocols for Web Service Composition , 2004, WSFM.

[53]  M. F.,et al.  Bibliography , 1985, Experimental Gerontology.

[54]  Chitta Baral,et al.  Reasoning about actions: Non-deterministic effects, Constraints, and Qualification , 1995, IJCAI.

[55]  Piero A. Bonatti,et al.  Abduction, ASP and open logic programs , 2002, NMR.

[56]  Frédéric Cuppens,et al.  Merging security policies: analysis of a practical example , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).

[57]  Donald Nute,et al.  Defeasible Logic , 1994, INAP.

[58]  Gerd Wagner,et al.  Agent-Oriented Enterprise Modeling Based on Business Rules , 2001, ER.

[59]  Piero A. Bonatti,et al.  Reasoning with Open Logic Programs , 2001, LPNMR.

[60]  Charles L. Forgy,et al.  Rete: a fast algorithm for the many pattern/many object pattern match problem , 1991 .

[61]  Ulf Lindqvist,et al.  Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[62]  Joan Feigenbaum,et al.  KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.

[63]  Torsten Schaub,et al.  A semantic framework for preference handling in answer set programming , 2003, Theory and Practice of Logic Programming.

[64]  Sushil Jajodia,et al.  A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[65]  Sharma Chakravarthy,et al.  Design of Sentinel: an object-oriented DMBS with event-based rules , 1994, Inf. Softw. Technol..

[66]  Martín Abadi,et al.  Analyzing security protocols with secrecy types and logic programs , 2002, POPL '02.

[67]  Letizia Tanca,et al.  Logic Programming and Databases , 1990, Surveys in Computer Science.

[68]  Robin Milner,et al.  Communication and concurrency , 1989, PHI Series in computer science.

[69]  Marianne Winslett,et al.  Credentials for privacy and interoperation , 1995, Proceedings of 1995 New Security Paradigms Workshop.

[70]  Michael J. Maher,et al.  Representation results for defeasible logic , 2000, TOCL.

[71]  Alberto Martelli,et al.  An Efficient Unification Algorithm , 1982, TOPL.

[72]  Benjamin N. Grosof Prioritized Conflict Handling for Logic Programs , 1997, ILPS.

[73]  Ioannis P. Vlahavas,et al.  DR-DEVICE: A Defeasible Logic System for the Semantic Web , 2004, PPSWR.

[74]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[75]  Joan Feigenbaum,et al.  Delegation logic: A logic-based approach to distributed authorization , 2003, TSEC.

[76]  Myungchul Kim,et al.  ARML: an active rule mark-up language for heterogeneous active information systems , 2002, RuleML.

[77]  Victor W. Marek,et al.  The Relationship Between Stable, Supported, Default and Autoepistemic Semantics for General Logic Programs , 1992, Theor. Comput. Sci..

[78]  Paolo Torroni,et al.  Dialogues for Negotiation: Agent Varieties and Dialogue Sequences , 2001, ATAL.

[79]  Luigi Palopoli,et al.  Polynomial-time computable stable models , 1993, Annals of Mathematics and Artificial Intelligence.

[80]  Gary Riley,et al.  Expert Systems: Principles and Programming , 2004 .

[81]  Audun Jsang,et al.  Analysing topologies of transitive trust , 2003 .

[82]  James A. Hendler,et al.  Trust Networks on the Semantic Web , 2003, WWW.

[83]  Joachim Biskup,et al.  Lying versus refusal for known potential secrets , 2001, Data Knowl. Eng..

[84]  Laura Giordano,et al.  Reasoning about Communicating Agents in the Semantic Web , 2003, PPSWR.

[85]  Enrico Giunchiglia,et al.  Representing Action: Indeterminacy and Ramifications , 1997, Artif. Intell..

[86]  Silvana Castano,et al.  Database Security , 1997, IFIP Advances in Information and Communication Technology.

[87]  Gerd Wagner How to Design a General Rule Markup Language? , 2002, XSW.

[88]  Michael Kifer,et al.  The XSB System Version 2.5 Volume 1: Programmer's Manual , 2003 .

[89]  Robert C. Moore A Formal Theory of Knowledge and Action , 1984 .

[90]  V. S. Subrahmanian,et al.  Merging Heterogeneous Security Orderings , 1996, ESORICS.

[91]  Cristina Baroglio,et al.  Web-Based Adaptive Tutoring: An Approach Based on Logic Agents and Reasoning about Actions , 2004, Artificial Intelligence Review.

[92]  Laura Giordano,et al.  Verifying Communicating Agents by Model Checking in a Temporal Action Logic , 2004, JELIA.

[93]  Simon S. Lam,et al.  Authorizations in Distributed Systems: A New Approach , 1993, J. Comput. Secur..

[94]  Michael Gelfond,et al.  Logic Programs with Classical Negation , 1990, ICLP.

[95]  Joachim Biskup For unknown secrecies refusal is better than lying , 1999, Data Knowl. Eng..

[96]  Laura Giordano,et al.  Reasoning about Actions in Dynamic Linear Time Temporal Logic , 2001, Log. J. IGPL.

[97]  Pierangela Samarati,et al.  Regulating service access and information release on the Web , 2000, CCS.

[98]  Victoria Ungureanu,et al.  A mechanism for establishing policies for electronic commerce , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).

[99]  Grigoris Antoniou,et al.  Nonmonotonic reasoning , 1997 .

[100]  Carlo Zaniolo,et al.  Stable models and non-determinism in logic programs with negation , 1990, PODS.

[101]  Marianne Winslett,et al.  Internet Credential Acceptance Policies , 1997, APPIA-GULP-PRODE.

[102]  Marianne Winslett,et al.  No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web , 2004, ESWS.

[103]  Donald Steiner,et al.  FIPA: Foundation for Intelligent Physical Agents - Das aktuelle Schlagwort , 1998, Künstliche Intell..

[104]  Munindar P. Singh,et al.  A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.

[105]  Axel Polleres,et al.  Trust Negotiation for Semantic Web Services , 2004, SWSWPC.

[106]  Frédéric Cuppens,et al.  A Logical View of Secure Dependencies , 1992, J. Comput. Secur..

[107]  Jorge Lobo,et al.  A Policy Description Language , 1999, AAAI/IAAI.

[108]  Guido Moerkotte,et al.  Efficient maintenance of materialized mediated views , 1995, SIGMOD '95.

[109]  Fabio Massacci,et al.  Verifying security protocols as planning in logic programming , 2001, ACM Trans. Comput. Log..

[110]  Elisa Bertino,et al.  An access control model supporting periodicity constraints and temporal reasoning , 1998, TODS.

[111]  Hector J. Levesque,et al.  An Incremental Interpreter for High-Level Programs with Sensing , 1999 .

[112]  Robert A. Kowalski,et al.  Predicate Logic as Programming Language , 1974, IFIP Congress.

[113]  Jeffrey D. Ullman,et al.  Protection in operating systems , 1976, CACM.

[114]  Li Gong,et al.  Computational Issues in Secure Interoperation , 1996, IEEE Trans. Software Eng..

[115]  Mike P. Papazoglou,et al.  A Framework for Business Rule Driven Service Composition , 2003, TES.

[116]  Paul F. Syverson,et al.  A logical approach to multilevel security of probabilistic systems , 1998, Distributed Computing.

[117]  P. S. Thiagarajan,et al.  A Product Version of Dynamic Linear Time Temporal Logic , 1997, CONCUR.

[118]  Nancy Martin,et al.  Programming Expert Systems in OPS5 - An Introduction to Rule-Based Programming(1) , 1985, Int. CMG Conference.

[119]  David Harel,et al.  Statecharts: A Visual Formalism for Complex Systems , 1987, Sci. Comput. Program..

[120]  Sharma Chakravarthy,et al.  Snoop: An Expressive Event Specification Language for Active Databases , 1994, Data Knowl. Eng..

[121]  Frédéric Cuppens,et al.  Specifying a security policy: a case study , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[122]  Pierangela Samarati,et al.  Providing Security and Interoperation of Heterogeneous Systems , 2004, Distributed and Parallel Databases.

[123]  S. Brison The Intentional Stance , 1989 .

[124]  Milton Harris,et al.  Organization Design , 2000, Manag. Sci..

[125]  Elisa Bertino,et al.  Temporal Authorization Bases: From Specification to Integration , 2000, J. Comput. Secur..

[126]  Julita Vassileva,et al.  Bayesian Network Trust Model in Peer-to-Peer Networks , 2003, AP2PC.

[127]  P. S. Thiagarajan,et al.  Dynamic Linear Time Temporal Logic , 1997, Ann. Pure Appl. Log..

[128]  Tran Cao Son,et al.  Adapting Golog for Composition of Semantic Web Services , 2002, KR.

[129]  H. Lan,et al.  SWRL : A semantic Web rule language combining OWL and ruleML , 2004 .

[130]  Teresa F. Lunt,et al.  Access Control Policies for Database Systems , 1988, DBSec.

[131]  Sabrina De Capitani di Vimercati,et al.  An algebra for composing access control policies , 2002, TSEC.

[132]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[133]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[134]  Tran Cao Son,et al.  Formalizing sensing actions A transition function based approach , 2001, Artif. Intell..

[135]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[136]  Francis Guerin,et al.  Specifying agent communication languages , 2002 .

[137]  Nicola Leone,et al.  Ordered Logic Programming with Sets , 1993, J. Log. Comput..

[138]  Vladimir Lifschitz,et al.  Actions with Indirect Effects (Preliminary Report) , 1994, KR.

[139]  Sarit Kraus,et al.  Foundations of Secure Deductive Databases , 1995, IEEE Trans. Knowl. Data Eng..

[140]  John McCarthy,et al.  Applications of Circumscription to Formalizing Common Sense Knowledge , 1987, NMR.

[141]  Elisa Bertino,et al.  A logical framework for reasoning on data access control policies , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.

[142]  Joan Feigenbaum,et al.  A practically implementable and tractable delegation logic , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[143]  Benjamin N. Grosof,et al.  A declarative approach to business rules in contracts: courteous logic programs in XML , 2015, EC '99.

[144]  Marianne Winslett,et al.  PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web , 2004, Secure Data Management.

[145]  Allen Van Gelder,et al.  The Alternating Fixpoint of Logic Programs with Negation , 1993, J. Comput. Syst. Sci..

[146]  Jeremy V. Pitt,et al.  Communication Protocols in Multi-agent Systems: A Development Method and Reference Architecture , 2000, Issues in Agent Communication.

[147]  Robert A. Kowalski,et al.  The Semantics of Predicate Logic as a Programming Language , 1976, JACM.

[148]  Tom Fawcett,et al.  Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.

[149]  Michel Barbeau,et al.  Planning Control Rules for Reactive Agents , 1997, Artif. Intell..

[150]  Chitta Baral,et al.  Reasoning About Effects of Concurrent Actions , 1997, J. Log. Program..

[151]  Tony Andrews Business Process Execution Language for Web Services Version 1.1 , 2003 .

[152]  Karl Aberer,et al.  P-Grid: A Self-Organizing Access Structure for P2P Information Systems , 2001, CoopIS.

[153]  Munindar P. Singh A Social Semantics for Agent Communication Languages , 2000, Issues in Agent Communication.

[154]  Joan Feigenbaum,et al.  Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.

[155]  C. R. Ramakrishnan,et al.  A Model Checker for Value-Passing Mu-Calculus Using Logic Programming , 2001, PADL.

[156]  Gerti Kappel,et al.  Composite events for xml , 2004, WWW '04.

[157]  John F. Sowa,et al.  Knowledge representation: logical, philosophical, and computational foundations , 2000 .

[158]  Germano Caronni,et al.  Walking the Web of trust , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).

[159]  Prasun Dewan,et al.  Access control for collaborative environments , 1992, CSCW '92.

[160]  Peter Mertens,et al.  Aktionsorientierte Datenverarbeitung , 1986, Inform. Spektrum.

[161]  Tran Cao Son,et al.  Adapting Golog for Programming the Semantic Web , 2001 .

[162]  Timothy W. Finin,et al.  SweetJess: Translating DAMLRuleML to JESS , 2002, RuleML.

[163]  Camilla B. Schwind A Logic Based Framework for Action Theories , 1996 .

[164]  Martín Abadi,et al.  A Calculus for Access Control in Distributed Systems , 1991, CRYPTO.

[165]  Michael J. Maher,et al.  Defeasible Logic versus Logic Programming without Negation as Failure , 2000, J. Log. Program..

[166]  Dominique Longin,et al.  Belief Dynamics in Cooperative Dialogues , 2000, J. Semant..

[167]  Anneke Kleppe,et al.  The object constraint language: precise modeling with UML , 1998 .

[168]  Julita Vassileva,et al.  Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[169]  Laura Giordano,et al.  An Abductive Proof Procedure for Reasoning About Actions in Modal Logic Programming , 1996, NMELP.

[170]  Philippe Bretier,et al.  A Rational Agent as the Kernel of a Cooperative Spoken Dialogue System: Implementing a Logical Theory of Interaction , 1996, ATAL.

[171]  Dan Suciu,et al.  Dynamically distributed query evaluation , 2001, PODS.

[172]  Daniel P. Miranker TREAT: a better match algorithm for AI production systems , 1987, AAAI 1987.

[173]  Hector Garcia-Molina,et al.  Identity crisis: anonymity vs reputation in P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[174]  Trevor Jim,et al.  SD3: a trust management system with certified evaluation , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[175]  José Meseguer,et al.  Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.

[176]  Angelos D. Keromytis,et al.  Key note: Trust management for public-key infrastructures , 1999 .

[177]  Georg Gottlob,et al.  Complexity Results for Nonmonotonic Logics , 1992, J. Log. Comput..

[178]  Joachim K. H. W. Schmidt Planvolle Steuerung gesellschaftlichen Handelns , 1975 .

[179]  Jennifer Widom,et al.  Active Database Systems: Triggers and Rules For Advanced Database Processing , 1994 .

[180]  Sabrina De Capitani di Vimercati,et al.  A modular approach to composing access control policies , 2000, CCS.

[181]  Ravi S. Sandhu,et al.  Role-Based Access Control , 1998, Adv. Comput..

[182]  Ninghui Li,et al.  Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[183]  Matjaz B. Juric,et al.  Business process execution language for web services , 2004 .

[184]  Michael Stonebraker,et al.  The design of the POSTGRES rules system , 1987, 1987 IEEE Third International Conference on Data Engineering.

[185]  Hector Garcia-Molina,et al.  EigenRep: Reputation Management in P2P Networks , 2003 .

[186]  Ninghui Li,et al.  Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..

[187]  José Júlio Alferes,et al.  Reasoning with Logic Programming , 1996, Lecture Notes in Computer Science.

[188]  Ilkka Niemelä,et al.  Smodels - An Implementation of the Stable Model and Well-Founded Semantics for Normal LP , 1997, LPNMR.

[189]  Naftaly H. Minsky,et al.  A software development environment for law-governed systems , 1988, SDE 3.

[190]  Ling Liu,et al.  TrustMe: anonymous management of trust relationships in decentralized P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[191]  Gerd Wagner,et al.  Design Rationale for RuleML: A Markup Language for Semantic Web Rules , 2001, SWWS.

[192]  David Billington,et al.  A modular translation from defeasible nets to defeasible logics , 1990, J. Exp. Theor. Artif. Intell..

[193]  Hector J. Levesque,et al.  Reasoning about Concurrent Execution Prioritized Interrupts, and Exogenous Actions in the Situation Calculus , 1997, IJCAI.

[194]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[195]  V. S. Subrahmanian,et al.  Stable and extension class theory for logic programs and default logics , 2006, Journal of Automated Reasoning.

[196]  Sharma Chakravarthy Sentinel: an object-oriented DBMS with event-based rules , 1997, SIGMOD '97.

[197]  Laura Giordano,et al.  Specifying and Verifying Systems of Communicating Agents in a Temporal Action Logic , 2003, AI*IA.

[198]  Eric N. Hanson,et al.  Rule condition testing and action execution in Ariel , 1992, SIGMOD '92.

[199]  Jorge Lobo,et al.  A Logic Programming Approach to Conflict Resolution in Policy Management , 2000, KR.

[200]  Danny De Schreye,et al.  Representing Incomplete Knowledge in Abductive Logic Programming , 1993, J. Log. Comput..

[201]  Marianne Winslett,et al.  Using Digital Credentials on the World Wide Web , 1997, J. Comput. Secur..

[202]  Hector J. Levesque,et al.  Specifying communicative multi-agent systems , 1998 .

[203]  H. Van Dyke Parunak,et al.  Representing Agent Interaction Protocols in UML , 2000, AOSE.

[204]  Francisco Curbera,et al.  Web services description language (wsdl) version 1. 2 , 2001 .

[205]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System Version 2 , 1999, RFC.

[206]  J. van Leeuwen,et al.  Logic Programming , 2002, Lecture Notes in Computer Science.

[207]  Hector J. Levesque,et al.  GOLOG: A Logic Programming Language for Dynamic Domains , 1997, J. Log. Program..

[208]  Jorge Lobo,et al.  Adding Knowledge to the Action Description Language A , 1997, AAAI/IAAI.

[209]  Ninghui Li,et al.  DATALOG with Constraints: A Foundation for Trust Management Languages , 2003, PADL.

[210]  Peter Sewell,et al.  Cassandra: distributed access control policies with tunable expressiveness , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..

[211]  F. Cuppens,et al.  A logical analysis of authorized and prohibited information flows , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[212]  Robert B. Ross,et al.  IMPACT: A System for Building Agent Applications , 2000, Journal of Intelligent Information Systems.

[213]  Elisa Bertino,et al.  A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.

[214]  Rik Eshuis,et al.  Semantics and Verification of UML Activity Diagrams for Workflow Modelling , 2002 .

[215]  Sheila A. McIlraith,et al.  Agent-based composite services in DAML-S: The behavior-oriented design of an intelligent semantic web , 2003 .

[216]  Maurizio Lenzerini,et al.  PDL-based framework for reasoning about actions , 1995, AI*IA.

[217]  S. Chakravarthy,et al.  Support for Temporal Events in Sentinel: Design, Implementation, and Preprocessing , 1998 .

[218]  Stéphane Bressan,et al.  Introduction to Database Systems , 2005 .

[219]  Michael J. Maher,et al.  On the analysis of regulations using defeasible rules , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[220]  Juliana Freire,et al.  The XSB Programmer’s Manual , 1800 .

[221]  Alberto Martelli,et al.  Reasoning about Self and Others: Communicating Agents in a Model Action Logic , 2003, ICTCS.

[222]  Giuseppe De Giacomo,et al.  Minimal Knowledge Approach to Reasoning about Actions and Sensing , 1999, Electron. Trans. Artif. Intell..

[223]  Raymond Reiter,et al.  The Frame Problem in the Situation Calculus: A Simple Solution (Sometimes) and a Completeness Result for Goal Regression , 1991, Artificial and Mathematical Theory of Computation.

[224]  Umeshwar Dayal,et al.  The HiPAC project: combining active databases and timing constraints , 1988, SGMD.

[225]  Bruce Christianson,et al.  Why Isn't Trust Transitive? , 1996, Security Protocols Workshop.

[226]  Paul Resnick,et al.  PICS: Internet access controls without censorship , 1996, CACM.

[227]  Joan Feigenbaum,et al.  A logic-based knowledge representation for authorization with delegation , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.

[228]  Ian Pratt-Hartmann,et al.  Fragments of Language , 2004, J. Log. Lang. Inf..

[229]  Ninghui Li,et al.  RT: a Role-based Trust-management framework , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[230]  Benjamin N. Grosof,et al.  SweetDeal : Represen with Exceptions using and Process , 2003 .

[231]  Michael Kifer,et al.  Concurrency and Communication in Transaction Logic , 1996, JICSLP.

[232]  V. S. Subrahmanian,et al.  Maintaining views incrementally , 1993, SIGMOD Conference.

[233]  Adrian Walker,et al.  Towards a Theory of Declarative Knowledge , 1988, Foundations of Deductive Databases and Logic Programming..

[234]  Reind P. van de Riet,et al.  Answering queries without revealing secrets , 1983, TODS.