Using ASP for knowledge management with user authorization
暂无分享,去创建一个
[1] Amit Basu,et al. Knowledge base views in multiuser knowledge based systems , 1988, Proceedings. Fourth International Conference on Data Engineering.
[2] Sarit Kraus,et al. Combining Multiple Knowledge Bases , 1991, IEEE Trans. Knowl. Data Eng..
[3] Grzegorz J. Nalepa,et al. A visual edition tool for design and verification of knowledge in rule-based systems , 2005 .
[4] Giorgio Terracina,et al. Enhancing a DLP System for Advanced Database Applications , 2008, RR.
[5] Jean Bacon,et al. A model of OASIS role-based access control and its support for active security , 2002, ACM Trans. Inf. Syst. Secur..
[6] Torsten Schaub. Model-Based Knowledge Representation and Reasoning Via Answer Set Programming , 2008, FLOPS.
[7] Peter Buneman,et al. Semistructured data , 1997, PODS.
[8] Tsung-Yi Chen,et al. Knowledge sharing in virtual enterprises via an ontology-based access control approach , 2008, Comput. Ind..
[9] Steve Barker,et al. Protecting deductive databases from unauthorized retrieval and update requests , 2002, Data Knowl. Eng..
[10] Sébastien Konieczny,et al. On the Logic of Merging , 1998, KR.
[11] Stefan Woltran,et al. Merging Logic Programs under Answer Set Semantics , 2009, ICLP.
[12] Paramartha Dutta,et al. An evolutionary heuristic for knowledge base partitioning problem , 1997, Proceedings of 1997 IEEE International Conference on Evolutionary Computation (ICEC '97).
[13] Joan Feigenbaum,et al. Delegation logic: A logic-based approach to distributed authorization , 2003, TSEC.
[14] Thomas Eiter,et al. Preferred Answer Sets for Extended Logic Programs , 1999, Artif. Intell..
[15] C. Pandu Rangan,et al. Privacy Preserving BIRCH Algorithm for Clustering over Vertically Partitioned Databases , 2006, Secure Data Management.
[16] Chitta Baral,et al. Logic Programming and Knowledge Representation , 1994, J. Log. Program..
[17] Wolfgang Faber,et al. The DLV system for knowledge representation and reasoning , 2002, TOCL.
[18] Marco Schaerf,et al. Arbitration (or How to Merge Knowledge Bases) , 1998, IEEE Trans. Knowl. Data Eng..
[19] Dirk Vermeir,et al. Preferred answer sets for ordered logic programs , 2006, Theory Pract. Log. Program..
[20] Wolfgang Faber,et al. Magic Sets and their application to data integration , 2007, J. Comput. Syst. Sci..
[21] Peter J. Stuckey,et al. Flexible access control policy specification with constraint logic programming , 2003, TSEC.
[22] Gheorghe Tecuci,et al. Rapid development of large knowledge bases , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[23] Johann Eder,et al. Logic and Databases , 1992, Advanced Topics in Artificial Intelligence.
[24] Ni Xianjun. A Logic Specification and Implementation Approach for Object Oriented Database Security , 2008, First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008).
[25] Jürgen Dix,et al. A Classification Theory of Semantics of Normal Logic Programs: I. Strong Properties , 1995, Fundam. Informaticae.
[26] Michiharu Kudo,et al. XML document security based on provisional authorization , 2000, CCS.
[27] Antonio Brogi,et al. On the Semantics of Logic Program Composition , 2004, Program Development in Computational Logic.
[28] Torsten Schaub,et al. A semantic framework for preference handling in answer set programming , 2003, Theory and Practice of Logic Programming.
[29] Sushil Jajodia,et al. A logic-based framework for attribute based access control , 2004, FMSE '04.
[30] Stefan Woltran,et al. Modularity Aspects of Disjunctive Stable Models , 2007, LPNMR.
[31] Vladimir Lifschitz,et al. Answer set programming and plan generation , 2002, Artif. Intell..
[32] Tzvi Raz,et al. The knowledge base partitioning problem: Mathematical formulation and heuristic clustering , 1992, Data Knowl. Eng..
[33] Hans Tompits,et al. A framework for compiling preferences in logic programs , 2002, Theory and Practice of Logic Programming.
[34] J.C.A. Guadarrama,et al. Maintaining Knowledge Bases at the Object Level , 2007, 2007 Sixth Mexican International Conference on Artificial Intelligence, Special Session (MICAI).
[35] Michael Gelfond,et al. Classical negation in logic programs and disjunctive databases , 1991, New Generation Computing.
[36] Giovambattista Ianni,et al. Institut F ¨ Ur Informationssysteme Efficiently Querying Rdf(s) Ontologies with Answer Set Programming Efficiently Querying Rdf(s) Ontologies with Answer Set Programming , 2022 .
[37] Amit Basu,et al. A Knowledge Representation Model for Multiuser Knowledge-Based Systems , 1993, IEEE Trans. Knowl. Data Eng..
[38] Chiaki Sakama,et al. Coordination in answer set programming , 2008, TOCL.
[39] Yasuhiro Morita,et al. Vertical Partitioning Method for Secret Sharing Distributed Database System , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[40] Mihalis Yannakakis,et al. Tie-breaking semantics and structural totality , 1992, PODS '92.
[41] Gerhard Steinke. Access control requirements for environmental information knowledge base systems , 1990, Proceedings of the 5th Jerusalem Conference on Information Technology, 1990. 'Next Decade in Information Technology'.
[42] Kenneth A. Ross,et al. The well-founded semantics for general logic programs , 1991, JACM.
[43] Martín Abadi,et al. Logic in access control , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..
[44] Joost Vennekens,et al. Building a Knowledge Base System for an Integration of Logic Programming and Classical Logic , 2008, ICLP.
[45] Glynn Winskel,et al. The formal semantics of programming languages - an introduction , 1993, Foundation of computing series.
[46] Stefan Woltran,et al. Debugging ASP Programs by Means of ASP , 2007, LPNMR.
[47] Yuh-Min Chen,et al. Development of an access control model, system architecture and approaches for resource sharing in virtual enterprise , 2007, Comput. Ind..
[48] Pascal Richard,et al. Data Partitioning in Data Warehouses: Hardness Study, Heuristics and ORACLE Validation , 2008, DaWaK.
[49] Stephen Hailes,et al. An access control model based on distributed knowledge management , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[50] Fangzhen Lin,et al. On Odd and Even Cycles in Normal Logic Programs , 2004, AAAI.
[51] Vladimir Lifschitz,et al. Splitting a Logic Program , 1994, ICLP.
[52] Luís Moniz Pereira,et al. Layer Supported Models of Logic Programs , 2009, LPNMR.
[53] Enrico Pontelli,et al. A Tool for Knowledge Base Integration and Querying , 2006, AAAI Spring Symposium: Formalizing and Compiling Background Knowledge and Its Applications to Knowledge Representation and Question Answering.
[54] Simon S. Lam,et al. Authorization in distributed systems: a formal approach , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[55] Jong P. Yoon. Presto authorization: a bitmap indexing scheme for high-speed access control to XML documents , 2006, IEEE Transactions on Knowledge and Data Engineering.