Rule-based Policy Specification : State of the Art and Future Work
暂无分享,去创建一个
Alberto Martelli | Norbert E. Fuchs | Wolfgang Nejdl | Grigoris Antoniou | Nahid Shahmehri | Piero A. Bonatti | Paolo Coraggio | Cristina Baroglio | Matteo Baldoni | Viviana Patti | Daniel Olmedilla | Claudiu Duma | Joachim Peer | Paolo Coraggio | M. Baldoni | C. Baroglio | A. Martelli | G. Antoniou | W. Nejdl | N. Shahmehri | V. Patti | P. Bonatti | C. Duma | D. Olmedilla | J. Peer | Claudiu Duma
[1] Marianne Winslett,et al. Negotiating Trust on the Grid , 2005, Semantic Grid.
[2] Norman W. Paton,et al. Rule Management in Object Oriented Databases: A Uniform Approach , 1991, VLDB.
[3] John McCarthy,et al. SOME PHILOSOPHICAL PROBLEMS FROM THE STANDPOINT OF ARTI CIAL INTELLIGENCE , 1987 .
[4] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[5] Frank Dignum,et al. Issues in Agent Communication , 2000, Lecture Notes in Computer Science.
[6] Teodor C. Przymusinski. On the Declarative Semantics of Deductive Databases and Logic Programs , 1988, Foundations of Deductive Databases and Logic Programming..
[7] Andreas Herzig,et al. Modal Tableaux for Reasoning About Actions and Plans , 1997, ECP.
[8] Laura Giordano,et al. Programming Rational Agents in a Modal Action Logic , 2004, Annals of Mathematics and Artificial Intelligence.
[9] Krzysztof R. Apt,et al. Logic Programming , 1990, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics.
[10] A. Josang,et al. Conditional inference in subjective logic , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.
[11] Marianne Winslett,et al. Interoperable strategies in automated trust negotiation , 2001, CCS '01.
[12] Wolfgang Faber,et al. The dlv System: Model Generator and Application Frontends , 1997 .
[13] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[14] Joan Feigenbaum,et al. REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.
[15] Marianne Winslett,et al. Assuring security and privacy for digital library transactions on the Web: client and server security policies , 1997, Proceedings of ADL '97 Forum on Research and Technology. Advances in Digital Libraries.
[16] Laura Giordano,et al. Reasoning about Complex Actions with Incomplete Knowledge: A Modal Approach , 2001, ICTCS.
[17] Michael Kifer,et al. HILOG: A Foundation for Higher-Order Logic Programming , 1993, J. Log. Program..
[18] J. Lloyd. Foundations of Logic Programming , 1984, Symbolic Computation.
[19] Laura Giordano,et al. Dealing with Concurrent Actions in Modal Action Logics , 1998, ECAI.
[20] K.E. Seamons,et al. Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[21] Michael Gelfond,et al. Representing Action and Change by Logic Programs , 1993, J. Log. Program..
[22] Audun J sang,et al. An Algebra for Assessing Trust in Certi cation Chains , 1998 .
[23] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.
[24] Fahiem Bacchus,et al. Planning for temporally extended goals , 1996, Annals of Mathematics and Artificial Intelligence.
[25] Laura Giordano,et al. Ramification and causality in a modal action logic , 2000, J. Log. Comput..
[26] Tran Cao Son,et al. Approximate Reasoning about Actions in Presence of Sensing and Incomplete Information , 1997, ILPS.
[27] Helmut Prendinger,et al. Reasoning about action and change , 1996, J. Log. Lang. Inf..
[28] Gerd Wagner,et al. A Database Needs Two Kinds of Negation , 1991, MFDBS.
[29] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[30] F. Mayer,et al. Access meditation in a message passing kernel , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[31] Elisa Bertino,et al. TRBAC , 2001, ACM Trans. Inf. Syst. Secur..
[32] Marianne Winslett,et al. Requirements for policy languages for trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[33] Hector J. Levesque,et al. What Is Planning in the Presence of Sensing? , 1996, AAAI/IAAI, Vol. 2.
[34] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[35] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[36] Ian Horrocks,et al. A proposal for an owl rules language , 2004, WWW '04.
[37] Ronald L. Rivest,et al. Certificate Chain Discovery in SPKI/SDSI , 2002, J. Comput. Secur..
[38] Michael Thielscher,et al. Representing the Knowledge of a Robot , 2000, KR.
[39] Hector J. Levesque,et al. The Frame Problem and Knowledge-Producing Actions , 1993, AAAI.
[40] Ganesh Ambalavanan Gopalakrishnan. MAKING SYBASE FULLY ACTIVE: SUPPORTING COMPOSITE EVENTS AND PRIORITIZED RULES , 2002 .
[41] John S. Schlipf,et al. Computing Well-founded Semantics Faster , 1995, LPNMR.
[42] Benjamin N. Grosof,et al. Representing E-Business Rules for the Semantic Web: Situated Courteous Logic Programs in RuleML , 2001 .
[43] Peter Sewell,et al. Cassandra: flexible trust management, applied to electronic health records , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[44] Hector J. Levesque,et al. ConGolog, a concurrent programming language based on the situation calculus , 2000, Artif. Intell..
[45] Raymond Reiter,et al. A Logic for Default Reasoning , 1987, Artif. Intell..
[46] Terry Winograd,et al. A communication agreement framework for access/action control , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[47] Marianne Winslett,et al. Formal query languages for secure relational databases , 1994, TODS.
[48] C. Petri. Kommunikation mit Automaten , 1962 .
[49] K. A. Ross,et al. Tabled Evaluation with Delaying for General Logic Programs , 1996 .
[50] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[51] Robert C. Moore. Semantical Considerations on Nonmonotonic Logic , 1985, IJCAI.
[52] Alberto Martelli,et al. Reasoning About Interaction Protocols for Web Service Composition , 2004, WSFM.
[53] M. F.,et al. Bibliography , 1985, Experimental Gerontology.
[54] Chitta Baral,et al. Reasoning about actions: Non-deterministic effects, Constraints, and Qualification , 1995, IJCAI.
[55] Piero A. Bonatti,et al. Abduction, ASP and open logic programs , 2002, NMR.
[56] Frédéric Cuppens,et al. Merging security policies: analysis of a practical example , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[57] Donald Nute,et al. Defeasible Logic , 1994, INAP.
[58] Gerd Wagner,et al. Agent-Oriented Enterprise Modeling Based on Business Rules , 2001, ER.
[59] Piero A. Bonatti,et al. Reasoning with Open Logic Programs , 2001, LPNMR.
[60] Charles L. Forgy,et al. Rete: a fast algorithm for the many pattern/many object pattern match problem , 1991 .
[61] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[62] Joan Feigenbaum,et al. KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.
[63] Torsten Schaub,et al. A semantic framework for preference handling in answer set programming , 2003, Theory and Practice of Logic Programming.
[64] Sushil Jajodia,et al. A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[65] Sharma Chakravarthy,et al. Design of Sentinel: an object-oriented DMBS with event-based rules , 1994, Inf. Softw. Technol..
[66] Martín Abadi,et al. Analyzing security protocols with secrecy types and logic programs , 2002, POPL '02.
[67] Letizia Tanca,et al. Logic Programming and Databases , 1990, Surveys in Computer Science.
[68] Robin Milner,et al. Communication and concurrency , 1989, PHI Series in computer science.
[69] Marianne Winslett,et al. Credentials for privacy and interoperation , 1995, Proceedings of 1995 New Security Paradigms Workshop.
[70] Michael J. Maher,et al. Representation results for defeasible logic , 2000, TOCL.
[71] Alberto Martelli,et al. An Efficient Unification Algorithm , 1982, TOPL.
[72] Benjamin N. Grosof. Prioritized Conflict Handling for Logic Programs , 1997, ILPS.
[73] Ioannis P. Vlahavas,et al. DR-DEVICE: A Defeasible Logic System for the Semantic Web , 2004, PPSWR.
[74] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[75] Joan Feigenbaum,et al. Delegation logic: A logic-based approach to distributed authorization , 2003, TSEC.
[76] Myungchul Kim,et al. ARML: an active rule mark-up language for heterogeneous active information systems , 2002, RuleML.
[77] Victor W. Marek,et al. The Relationship Between Stable, Supported, Default and Autoepistemic Semantics for General Logic Programs , 1992, Theor. Comput. Sci..
[78] Paolo Torroni,et al. Dialogues for Negotiation: Agent Varieties and Dialogue Sequences , 2001, ATAL.
[79] Luigi Palopoli,et al. Polynomial-time computable stable models , 1993, Annals of Mathematics and Artificial Intelligence.
[80] Gary Riley,et al. Expert Systems: Principles and Programming , 2004 .
[81] Audun Jsang,et al. Analysing topologies of transitive trust , 2003 .
[82] James A. Hendler,et al. Trust Networks on the Semantic Web , 2003, WWW.
[83] Joachim Biskup,et al. Lying versus refusal for known potential secrets , 2001, Data Knowl. Eng..
[84] Laura Giordano,et al. Reasoning about Communicating Agents in the Semantic Web , 2003, PPSWR.
[85] Enrico Giunchiglia,et al. Representing Action: Indeterminacy and Ramifications , 1997, Artif. Intell..
[86] Silvana Castano,et al. Database Security , 1997, IFIP Advances in Information and Communication Technology.
[87] Gerd Wagner. How to Design a General Rule Markup Language? , 2002, XSW.
[88] Michael Kifer,et al. The XSB System Version 2.5 Volume 1: Programmer's Manual , 2003 .
[89] Robert C. Moore. A Formal Theory of Knowledge and Action , 1984 .
[90] V. S. Subrahmanian,et al. Merging Heterogeneous Security Orderings , 1996, ESORICS.
[91] Cristina Baroglio,et al. Web-Based Adaptive Tutoring: An Approach Based on Logic Agents and Reasoning about Actions , 2004, Artificial Intelligence Review.
[92] Laura Giordano,et al. Verifying Communicating Agents by Model Checking in a Temporal Action Logic , 2004, JELIA.
[93] Simon S. Lam,et al. Authorizations in Distributed Systems: A New Approach , 1993, J. Comput. Secur..
[94] Michael Gelfond,et al. Logic Programs with Classical Negation , 1990, ICLP.
[95] Joachim Biskup. For unknown secrecies refusal is better than lying , 1999, Data Knowl. Eng..
[96] Laura Giordano,et al. Reasoning about Actions in Dynamic Linear Time Temporal Logic , 2001, Log. J. IGPL.
[97] Pierangela Samarati,et al. Regulating service access and information release on the Web , 2000, CCS.
[98] Victoria Ungureanu,et al. A mechanism for establishing policies for electronic commerce , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).
[99] Grigoris Antoniou,et al. Nonmonotonic reasoning , 1997 .
[100] Carlo Zaniolo,et al. Stable models and non-determinism in logic programs with negation , 1990, PODS.
[101] Marianne Winslett,et al. Internet Credential Acceptance Policies , 1997, APPIA-GULP-PRODE.
[102] Marianne Winslett,et al. No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web , 2004, ESWS.
[103] Donald Steiner,et al. FIPA: Foundation for Intelligent Physical Agents - Das aktuelle Schlagwort , 1998, Künstliche Intell..
[104] Munindar P. Singh,et al. A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.
[105] Axel Polleres,et al. Trust Negotiation for Semantic Web Services , 2004, SWSWPC.
[106] Frédéric Cuppens,et al. A Logical View of Secure Dependencies , 1992, J. Comput. Secur..
[107] Jorge Lobo,et al. A Policy Description Language , 1999, AAAI/IAAI.
[108] Guido Moerkotte,et al. Efficient maintenance of materialized mediated views , 1995, SIGMOD '95.
[109] Fabio Massacci,et al. Verifying security protocols as planning in logic programming , 2001, ACM Trans. Comput. Log..
[110] Elisa Bertino,et al. An access control model supporting periodicity constraints and temporal reasoning , 1998, TODS.
[111] Hector J. Levesque,et al. An Incremental Interpreter for High-Level Programs with Sensing , 1999 .
[112] Robert A. Kowalski,et al. Predicate Logic as Programming Language , 1974, IFIP Congress.
[113] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[114] Li Gong,et al. Computational Issues in Secure Interoperation , 1996, IEEE Trans. Software Eng..
[115] Mike P. Papazoglou,et al. A Framework for Business Rule Driven Service Composition , 2003, TES.
[116] Paul F. Syverson,et al. A logical approach to multilevel security of probabilistic systems , 1998, Distributed Computing.
[117] P. S. Thiagarajan,et al. A Product Version of Dynamic Linear Time Temporal Logic , 1997, CONCUR.
[118] Nancy Martin,et al. Programming Expert Systems in OPS5 - An Introduction to Rule-Based Programming(1) , 1985, Int. CMG Conference.
[119] David Harel,et al. Statecharts: A Visual Formalism for Complex Systems , 1987, Sci. Comput. Program..
[120] Sharma Chakravarthy,et al. Snoop: An Expressive Event Specification Language for Active Databases , 1994, Data Knowl. Eng..
[121] Frédéric Cuppens,et al. Specifying a security policy: a case study , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[122] Pierangela Samarati,et al. Providing Security and Interoperation of Heterogeneous Systems , 2004, Distributed and Parallel Databases.
[123] S. Brison. The Intentional Stance , 1989 .
[124] Milton Harris,et al. Organization Design , 2000, Manag. Sci..
[125] Elisa Bertino,et al. Temporal Authorization Bases: From Specification to Integration , 2000, J. Comput. Secur..
[126] Julita Vassileva,et al. Bayesian Network Trust Model in Peer-to-Peer Networks , 2003, AP2PC.
[127] P. S. Thiagarajan,et al. Dynamic Linear Time Temporal Logic , 1997, Ann. Pure Appl. Log..
[128] Tran Cao Son,et al. Adapting Golog for Composition of Semantic Web Services , 2002, KR.
[129] H. Lan,et al. SWRL : A semantic Web rule language combining OWL and ruleML , 2004 .
[130] Teresa F. Lunt,et al. Access Control Policies for Database Systems , 1988, DBSec.
[131] Sabrina De Capitani di Vimercati,et al. An algebra for composing access control policies , 2002, TSEC.
[132] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[133] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[134] Tran Cao Son,et al. Formalizing sensing actions A transition function based approach , 2001, Artif. Intell..
[135] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[136] Francis Guerin,et al. Specifying agent communication languages , 2002 .
[137] Nicola Leone,et al. Ordered Logic Programming with Sets , 1993, J. Log. Comput..
[138] Vladimir Lifschitz,et al. Actions with Indirect Effects (Preliminary Report) , 1994, KR.
[139] Sarit Kraus,et al. Foundations of Secure Deductive Databases , 1995, IEEE Trans. Knowl. Data Eng..
[140] John McCarthy,et al. Applications of Circumscription to Formalizing Common Sense Knowledge , 1987, NMR.
[141] Elisa Bertino,et al. A logical framework for reasoning on data access control policies , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[142] Joan Feigenbaum,et al. A practically implementable and tractable delegation logic , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[143] Benjamin N. Grosof,et al. A declarative approach to business rules in contracts: courteous logic programs in XML , 2015, EC '99.
[144] Marianne Winslett,et al. PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web , 2004, Secure Data Management.
[145] Allen Van Gelder,et al. The Alternating Fixpoint of Logic Programs with Negation , 1993, J. Comput. Syst. Sci..
[146] Jeremy V. Pitt,et al. Communication Protocols in Multi-agent Systems: A Development Method and Reference Architecture , 2000, Issues in Agent Communication.
[147] Robert A. Kowalski,et al. The Semantics of Predicate Logic as a Programming Language , 1976, JACM.
[148] Tom Fawcett,et al. Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.
[149] Michel Barbeau,et al. Planning Control Rules for Reactive Agents , 1997, Artif. Intell..
[150] Chitta Baral,et al. Reasoning About Effects of Concurrent Actions , 1997, J. Log. Program..
[151] Tony Andrews. Business Process Execution Language for Web Services Version 1.1 , 2003 .
[152] Karl Aberer,et al. P-Grid: A Self-Organizing Access Structure for P2P Information Systems , 2001, CoopIS.
[153] Munindar P. Singh. A Social Semantics for Agent Communication Languages , 2000, Issues in Agent Communication.
[154] Joan Feigenbaum,et al. Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.
[155] C. R. Ramakrishnan,et al. A Model Checker for Value-Passing Mu-Calculus Using Logic Programming , 2001, PADL.
[156] Gerti Kappel,et al. Composite events for xml , 2004, WWW '04.
[157] John F. Sowa,et al. Knowledge representation: logical, philosophical, and computational foundations , 2000 .
[158] Germano Caronni,et al. Walking the Web of trust , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).
[159] Prasun Dewan,et al. Access control for collaborative environments , 1992, CSCW '92.
[160] Peter Mertens,et al. Aktionsorientierte Datenverarbeitung , 1986, Inform. Spektrum.
[161] Tran Cao Son,et al. Adapting Golog for Programming the Semantic Web , 2001 .
[162] Timothy W. Finin,et al. SweetJess: Translating DAMLRuleML to JESS , 2002, RuleML.
[163] Camilla B. Schwind. A Logic Based Framework for Action Theories , 1996 .
[164] Martín Abadi,et al. A Calculus for Access Control in Distributed Systems , 1991, CRYPTO.
[165] Michael J. Maher,et al. Defeasible Logic versus Logic Programming without Negation as Failure , 2000, J. Log. Program..
[166] Dominique Longin,et al. Belief Dynamics in Cooperative Dialogues , 2000, J. Semant..
[167] Anneke Kleppe,et al. The object constraint language: precise modeling with UML , 1998 .
[168] Julita Vassileva,et al. Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[169] Laura Giordano,et al. An Abductive Proof Procedure for Reasoning About Actions in Modal Logic Programming , 1996, NMELP.
[170] Philippe Bretier,et al. A Rational Agent as the Kernel of a Cooperative Spoken Dialogue System: Implementing a Logical Theory of Interaction , 1996, ATAL.
[171] Dan Suciu,et al. Dynamically distributed query evaluation , 2001, PODS.
[172] Daniel P. Miranker. TREAT: a better match algorithm for AI production systems , 1987, AAAI 1987.
[173] Hector Garcia-Molina,et al. Identity crisis: anonymity vs reputation in P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[174] Trevor Jim,et al. SD3: a trust management system with certified evaluation , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[175] José Meseguer,et al. Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.
[176] Angelos D. Keromytis,et al. Key note: Trust management for public-key infrastructures , 1999 .
[177] Georg Gottlob,et al. Complexity Results for Nonmonotonic Logics , 1992, J. Log. Comput..
[178] Joachim K. H. W. Schmidt. Planvolle Steuerung gesellschaftlichen Handelns , 1975 .
[179] Jennifer Widom,et al. Active Database Systems: Triggers and Rules For Advanced Database Processing , 1994 .
[180] Sabrina De Capitani di Vimercati,et al. A modular approach to composing access control policies , 2000, CCS.
[181] Ravi S. Sandhu,et al. Role-Based Access Control , 1998, Adv. Comput..
[182] Ninghui Li,et al. Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[183] Matjaz B. Juric,et al. Business process execution language for web services , 2004 .
[184] Michael Stonebraker,et al. The design of the POSTGRES rules system , 1987, 1987 IEEE Third International Conference on Data Engineering.
[185] Hector Garcia-Molina,et al. EigenRep: Reputation Management in P2P Networks , 2003 .
[186] Ninghui Li,et al. Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..
[187] José Júlio Alferes,et al. Reasoning with Logic Programming , 1996, Lecture Notes in Computer Science.
[188] Ilkka Niemelä,et al. Smodels - An Implementation of the Stable Model and Well-Founded Semantics for Normal LP , 1997, LPNMR.
[189] Naftaly H. Minsky,et al. A software development environment for law-governed systems , 1988, SDE 3.
[190] Ling Liu,et al. TrustMe: anonymous management of trust relationships in decentralized P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[191] Gerd Wagner,et al. Design Rationale for RuleML: A Markup Language for Semantic Web Rules , 2001, SWWS.
[192] David Billington,et al. A modular translation from defeasible nets to defeasible logics , 1990, J. Exp. Theor. Artif. Intell..
[193] Hector J. Levesque,et al. Reasoning about Concurrent Execution Prioritized Interrupts, and Exogenous Actions in the Situation Calculus , 1997, IJCAI.
[194] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[195] V. S. Subrahmanian,et al. Stable and extension class theory for logic programs and default logics , 2006, Journal of Automated Reasoning.
[196] Sharma Chakravarthy. Sentinel: an object-oriented DBMS with event-based rules , 1997, SIGMOD '97.
[197] Laura Giordano,et al. Specifying and Verifying Systems of Communicating Agents in a Temporal Action Logic , 2003, AI*IA.
[198] Eric N. Hanson,et al. Rule condition testing and action execution in Ariel , 1992, SIGMOD '92.
[199] Jorge Lobo,et al. A Logic Programming Approach to Conflict Resolution in Policy Management , 2000, KR.
[200] Danny De Schreye,et al. Representing Incomplete Knowledge in Abductive Logic Programming , 1993, J. Log. Comput..
[201] Marianne Winslett,et al. Using Digital Credentials on the World Wide Web , 1997, J. Comput. Secur..
[202] Hector J. Levesque,et al. Specifying communicative multi-agent systems , 1998 .
[203] H. Van Dyke Parunak,et al. Representing Agent Interaction Protocols in UML , 2000, AOSE.
[204] Francisco Curbera,et al. Web services description language (wsdl) version 1. 2 , 2001 .
[205] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[206] J. van Leeuwen,et al. Logic Programming , 2002, Lecture Notes in Computer Science.
[207] Hector J. Levesque,et al. GOLOG: A Logic Programming Language for Dynamic Domains , 1997, J. Log. Program..
[208] Jorge Lobo,et al. Adding Knowledge to the Action Description Language A , 1997, AAAI/IAAI.
[209] Ninghui Li,et al. DATALOG with Constraints: A Foundation for Trust Management Languages , 2003, PADL.
[210] Peter Sewell,et al. Cassandra: distributed access control policies with tunable expressiveness , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..
[211] F. Cuppens,et al. A logical analysis of authorized and prohibited information flows , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[212] Robert B. Ross,et al. IMPACT: A System for Building Agent Applications , 2000, Journal of Intelligent Information Systems.
[213] Elisa Bertino,et al. A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.
[214] Rik Eshuis,et al. Semantics and Verification of UML Activity Diagrams for Workflow Modelling , 2002 .
[215] Sheila A. McIlraith,et al. Agent-based composite services in DAML-S: The behavior-oriented design of an intelligent semantic web , 2003 .
[216] Maurizio Lenzerini,et al. PDL-based framework for reasoning about actions , 1995, AI*IA.
[217] S. Chakravarthy,et al. Support for Temporal Events in Sentinel: Design, Implementation, and Preprocessing , 1998 .
[218] Stéphane Bressan,et al. Introduction to Database Systems , 2005 .
[219] Michael J. Maher,et al. On the analysis of regulations using defeasible rules , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.
[220] Juliana Freire,et al. The XSB Programmer’s Manual , 1800 .
[221] Alberto Martelli,et al. Reasoning about Self and Others: Communicating Agents in a Model Action Logic , 2003, ICTCS.
[222] Giuseppe De Giacomo,et al. Minimal Knowledge Approach to Reasoning about Actions and Sensing , 1999, Electron. Trans. Artif. Intell..
[223] Raymond Reiter,et al. The Frame Problem in the Situation Calculus: A Simple Solution (Sometimes) and a Completeness Result for Goal Regression , 1991, Artificial and Mathematical Theory of Computation.
[224] Umeshwar Dayal,et al. The HiPAC project: combining active databases and timing constraints , 1988, SGMD.
[225] Bruce Christianson,et al. Why Isn't Trust Transitive? , 1996, Security Protocols Workshop.
[226] Paul Resnick,et al. PICS: Internet access controls without censorship , 1996, CACM.
[227] Joan Feigenbaum,et al. A logic-based knowledge representation for authorization with delegation , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[228] Ian Pratt-Hartmann,et al. Fragments of Language , 2004, J. Log. Lang. Inf..
[229] Ninghui Li,et al. RT: a Role-based Trust-management framework , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[230] Benjamin N. Grosof,et al. SweetDeal : Represen with Exceptions using and Process , 2003 .
[231] Michael Kifer,et al. Concurrency and Communication in Transaction Logic , 1996, JICSLP.
[232] V. S. Subrahmanian,et al. Maintaining views incrementally , 1993, SIGMOD Conference.
[233] Adrian Walker,et al. Towards a Theory of Declarative Knowledge , 1988, Foundations of Deductive Databases and Logic Programming..
[234] Reind P. van de Riet,et al. Answering queries without revealing secrets , 1983, TODS.