Proceedings of the Semantic Web and Policy Workshop
暂无分享,去创建一个
[1] Ernst Mally,et al. Grundgesetze des Sollens : Elemente der Logik des Willens , 1926 .
[2] P. Fishburn,et al. Utility theory , 1980, Cognitive Choice Modeling.
[3] D. J. Malcolme-Lawes,et al. If… Then….Else , 1969 .
[4] R. L. Keeney,et al. Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.
[5] Christopher Alexander,et al. The Timeless Way of Building , 1979 .
[6] Charles L. Forgy,et al. Rete: A Fast Algorithm for the Many Patterns/Many Objects Match Problem , 1982, Artif. Intell..
[7] Randall Davis,et al. Negotiation as a Metaphor for Distributed Problem Solving , 1988, Artif. Intell..
[8] Manfred Schmidt-Schaubß,et al. Subsumption in KL-ONE is undecidable , 1989, KR 1989.
[9] T. Saaty. How to Make a Decision: The Analytic Hierarchy Process , 1990 .
[10] Dov M. Gabbay,et al. Handbook of logic in artificial intelligence and logic programming (vol. 1) , 1993 .
[11] Michael R. Genesereth,et al. Software agents , 1994, CACM.
[12] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[13] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[14] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[15] Ralph Arnote,et al. Hong Kong (China) , 1996, OECD/G20 Base Erosion and Profit Shifting Project.
[16] Elisa Bertino,et al. A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.
[17] Jeffrey M. Bradshaw,et al. KAoS: toward an industrial-strength open agent architecture , 1997 .
[18] Beat F. Schmid,et al. Elements of a reference model for electronic markets , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[19] Manuel Clavel. Reflection in general logics, rewriting logic, and Maude , 1998, WRLA.
[20] Victoria Ungureanu,et al. A mechanism for establishing policies for electronic commerce , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).
[21] Franz Baader,et al. Description Logics with Concrete Domains and Aggregation , 1998, ECAI.
[22] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[23] Michael J. Maher,et al. A Flexible Framework for Defeasible Logics , 2000, AAAI/IAAI.
[24] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[25] K.E. Seamons,et al. Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[26] Pierangela Samarati,et al. Regulating service access and information release on the Web , 2000, CCS.
[27] José Meseguer. Rewriting Logic and Maude: a Wide-Spectrum Semantic Framework for Object-Based Distributed Systems , 2000, FMOODS.
[28] Gregory D. Abowd,et al. Charting past, present, and future research in ubiquitous computing , 2000, TCHI.
[29] Germano Caronni,et al. Walking the Web of trust , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).
[30] Emil C. Lupu,et al. Ponder: A Language for Specifying Security and Management Policies for Distributed Systems , 2000 .
[31] Marianne Winslett,et al. PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet , 2000, CCS.
[32] C. Castelfranchi,et al. Social Trust : A Cognitive Approach , 2000 .
[33] Gregory D. Abowd,et al. A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications , 2001, Hum. Comput. Interact..
[34] NICHOLAS R. JENNINGS,et al. An agent-based approach for building complex software systems , 2001, CACM.
[35] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[36] Donald Nute,et al. Defeasible Logic , 1994, INAP.
[37] Yao-Hua Tan,et al. Trust and Deception in Virtual Societies , 2001, Springer Netherlands.
[38] Karl Aberer,et al. P-Grid: A Self-Organizing Access Structure for P2P Information Systems , 2001, CoopIS.
[39] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[40] Steven Tuecke,et al. An online credential repository for the Grid: MyProxy , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.
[41] Anupriya Ankolekar,et al. Concurrent Execution Semantics of DAML-S with Subtypes , 2002, International Semantic Web Conference.
[42] Arthur H. M. ter Hofstede,et al. What's in a service? Towards accurate description of non-functional service properties , 2002 .
[43] Sheila A. McIlraith,et al. Simulation, verification and automated composition of web services , 2002, WWW.
[44] Yolanda Gil,et al. Trusting Information Sources One Citizen at a Time , 2002, SEMWEB.
[45] Ian T. Foster,et al. A community authorization service for group collaboration , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[46] Marianne Winslett,et al. Requirements for policy languages for trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[47] Nicola Guarino,et al. Wonderweb Deliverable D17 , 2002 .
[48] Pierangela Samarati,et al. A Uniform Framework for Regulating Service Access and Information Release on the Web , 2002, J. Comput. Secur..
[49] Marianne Winslett,et al. Negotiating Trust on the Web , 2002, IEEE Internet Comput..
[50] Lalana Kagal. Rei : A Policy Language for the Me-Centric Project , 2002 .
[51] Nicola Guarino,et al. The Won-derWeb Library of Foundational Ontologies , 2002 .
[52] Morris Sloman,et al. Specifying and Analysing Trust for Internet Applications , 2002, I3E.
[53] Ian Horrocks,et al. From SHIQ and RDF to OWL: the making of a Web Ontology Language , 2003, J. Web Semant..
[54] Markus Schumacher,et al. Security Engineering with Patterns: Origins, Theoretical Models, and New Applications , 2003 .
[55] Deborah L. McGuinness,et al. Infrastructure for Web Explanations , 2003, SEMWEB.
[56] Brett Benyo,et al. Representation and reasoning for DAML-based policy and domain services in KAoS and nomads , 2003, AAMAS '03.
[57] Jeffrey M. Bradshaw,et al. Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and Ponder , 2003, SEMWEB.
[58] Christof Weinhardt,et al. The Montreal Taxonomy for Electronic Negotiations , 2003 .
[59] Ákos Frohner,et al. VOMS, an Authorization System for Virtual Organizations , 2003, European Across Grids Conference.
[60] Bijan Parsia,et al. Task Computing - The Semantic Web Meets Pervasive Computing , 2003, SEMWEB.
[61] Timothy W. Finin,et al. A policy language for a pervasive computing environment , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[62] Aldo Gangemi,et al. A Constructive Framework for Legal Ontologies , 2003, Law and the Semantic Web.
[63] Ninghui Li,et al. RT: a Role-based Trust-management framework , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[64] Ora Lassila,et al. Semantic Gadgets: Ubiquitous Computing Meets the Semantic Web , 2003, Spinning the Semantic Web.
[65] Timothy W. Finin,et al. Security for DAML Web Services: Annotation and Matchmaking , 2003, SEMWEB.
[66] Dennis G. Kafura,et al. The PRIMA system for privilege management, authorization and enforcement in grid environments , 2003, Proceedings. First Latin American Web Congress.
[67] Alan H. Karp,et al. Representing Utility for Automated Negotiation , 2003 .
[68] Benjamin N. Grosof,et al. SweetDeal : Represen with Exceptions using and Process , 2003 .
[69] Hector Garcia-Molina,et al. EigenRep: Reputation Management in P2P Networks , 2003 .
[70] Matthew Richardson,et al. Trust Management for the Semantic Web , 2003, SEMWEB.
[71] James A. Hendler,et al. Trust Networks on the Semantic Web , 2003, WWW.
[72] Anupam Joshi,et al. Security and Privacy Aspects , 2003 .
[73] Mark O'Neill,et al. Web Services Security , 2003 .
[74] Ian Horrocks,et al. Description logic programs: combining logic programs with description logic , 2003, WWW '03.
[75] A. Ralston. Side effect , 2003 .
[76] Jeffrey M. Bradshaw,et al. Dimensions of Adjustable Autonomy and Mixed-Initiative Interaction , 2003, Agents and Computational Autonomy.
[77] Sasikumar Mukundan,et al. Spinning the Semantic Web , 2004 .
[78] H. Lan,et al. SWRL : A semantic Web rule language combining OWL and ruleML , 2004 .
[79] Steffen Staab,et al. The Pudding of Trust , 2004, IEEE Intell. Syst..
[80] Axel Polleres,et al. Trust Negotiation for Semantic Web Services , 2004, SWSWPC.
[81] Jeffrey M. Bradshaw,et al. KAoS policy management for semantic Web services , 2004, IEEE Intelligent Systems.
[82] Steffen Staab,et al. International Handbooks on Information Systems , 2013 .
[83] Mira Mezini,et al. Aspect-Oriented Web Service Composition with AO4BPEL , 2004, ECOWS.
[84] Jeffrey M. Bradshaw,et al. Policy and Contract Management for Semantic Web Services , 2004 .
[85] Marianne Winslett,et al. PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web , 2004, Secure Data Management.
[86] Georg Lausen,et al. Spreading activation models for trust propagation , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.
[87] Li Chen,et al. Survey of Preference Elicitation Methods , 2004 .
[88] Marianne Winslett,et al. Security of shared data in large systems: state of the art and research directions , 2004, SIGMOD '04.
[89] Aldo Gangemi,et al. Task taxonomies for knowledge content , 2004 .
[90] C. Tregaskis. Being a friend , 2004 .
[91] Elisa Bertino,et al. Access-control language for multidomain environments , 2004, IEEE Internet Computing.
[92] Jeffrey M. Bradshaw,et al. Applying KAoS Services to Ensure Policy Compliance for Semantic Web Services Workflow Composition and Enactment , 2004, SEMWEB.
[93] Dennis G. Kafura,et al. The PRIMA Grid Authorization System , 2004, Journal of Grid Computing.
[94] Pierluigi Plebani,et al. Supporting policy-driven behaviors in web services: experiences and issues , 2004, ICSOC '04.
[95] Christian Bizer,et al. Using context- and content-based trust policies on the semantic web , 2004, WWW Alt. '04.
[96] Harry Chen,et al. SOUPA: standard ontology for ubiquitous and pervasive applications , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[97] Lalana Kagal,et al. A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments , 2004 .
[98] Marianne Winslett,et al. No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web , 2004, ESWS.
[99] Fabien L. Gandon,et al. Semantic web technologies to reconcile privacy and context awareness , 2003, Journal of Web Semantics.
[100] Deborah L. McGuinness,et al. OWL Web ontology language overview , 2004 .
[101] Lujo Bauer,et al. Distributed proving in access-control systems , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[102] J.M. Bradshaw,et al. Context-based security management for multi-agent systems , 2005, IEEE 2nd Symposium on Multi-Agent Security and Survivability, 2005..
[103] Ora Lassila,et al. Ontological Approach to Generating Personalized User Interfaces for Web Services , 2005, SEMWEB.
[104] Daniel Olmedilla,et al. DISCOVERY AND CONTRACTING OF SEMANTIC WEB SERVICES , 2005 .
[105] Nahid Shahmehri,et al. Dynamic trust metrics for peer-to-peer systems , 2005, 16th International Workshop on Database and Expert Systems Applications (DEXA'05).
[106] Jeremy J. Carroll,et al. Named graphs, provenance and trust , 2005, WWW '05.
[107] Norman M. Sadeh,et al. Interleaving Semantic Web Reasoning and Service Discovery to Enforce Context-Sensitive Security and Privacy Policies , 2005, AAAI Fall Symposium: Agents and the Semantic Web.
[108] Daniel Oberle,et al. Approximating service utility from policies and value function patterns , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).
[109] Ora Lassila,et al. Contextualizing applications via semantic middleware , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[110] Francesco Piazza,et al. The DBin Semantic Web platform: an overview , 2005 .
[111] Jens Dietrich,et al. On the Test-Driven Development and Validation of Business Rules , 2005, ISTA.
[112] Yarden Katz,et al. Representing Web Service Policies in OWL-DL , 2005, SEMWEB.
[113] Martin Bichler,et al. SLA Representation, Management and Enforcement - Combining Event Calculus, Deontic Logic, Horn Logic and Event Condition Action Rules , 2005 .
[114] Lalana Kagal,et al. Rein : Where Policies Meet Rules in the Semantic Web , 2005 .
[115] Pompeu Casanovas,et al. Law and the Semantic Web: Legal Ontologies, Methodologies, Legal Information Retrieval, and Applications , 2005, Law and the Semantic Web.
[116] David R. Karger,et al. Piggy Bank: Experience the Semantic Web Inside Your Web Browser , 2005, International Semantic Web Conference.
[117] Marianne Winslett,et al. Negotiating Trust on the Grid , 2005, Semantic Grid.
[118] Lujo Bauer,et al. Device-Enabled Authorization in the Grey System ¶ , 2006 .
[119] Martin Bichler,et al. ContractLog: An Approach to Rule Based Monitoring and Execution of Service Level Agreements , 2005, RuleML.
[120] Jeffrey M. Bradshaw,et al. Behavioural specification of grid services with the KAoS policy language , 2005, CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005..
[121] Piero A. Bonatti,et al. Driving and monitoring provisional trust negotiation with metapolicies , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).
[122] Fabien L. Gandon,et al. Ambient Intelligence: The MyCampus Experience , 2005 .
[123] Marianne Winslett,et al. PeerAccess: a logic for distributed authorization , 2005, CCS '05.
[124] Jennifer Golbeck,et al. Computing and Applying Trust in Web-based Social Networks , 2005 .
[125] Christopher G. Lasater,et al. Design Patterns , 2008, Wiley Encyclopedia of Computer Science and Engineering.
[126] Tobias Straub,et al. Grid Security Infrastructure , 2006 .
[127] Francisco Curbera,et al. Web Services Business Process Execution Language Version 2.0 , 2007 .
[128] Diego Calvanese,et al. The Description Logic Handbook , 2007 .