Authorization and Obligation Policies in Dynamic Systems
暂无分享,去创建一个
[1] Simon S. Lam,et al. Authorizations in Distributed Systems: A New Approach , 1993, J. Comput. Secur..
[2] Sushil Jajodia,et al. Incorporating Dynamic Constraints in the Flexible Authorization Framework , 2004, ESORICS.
[3] Marcello Balduccini,et al. Architectures for intelligent theory-based agents : Papers from the AAAI Spring Symposium , 2008 .
[4] Jorge Lobo,et al. A Formal Framework for Policy Analysis , 2008 .
[5] Jorge Lobo,et al. Toward a Formal Characterization of Policy Specification & Analysis , 2007 .
[6] C. R. Ramakrishnan,et al. Efficient policy analysis for administrative role based access control , 2007, CCS '07.
[7] Kathi Fisler,et al. Obligations and Their Interaction with Programs , 2007, ESORICS.
[8] Joachim Biskup,et al. Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings , 2007, ESORICS.
[9] Joseph Y. Halpern,et al. Using First-Order Logic to Reason about Policies , 2008, TSEC.
[10] Elisa Bertino,et al. A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.
[11] Hudson Turner,et al. Representing Actions in Logic Programs and Default Theories: A Situation Calculus Approach , 1997, J. Log. Program..
[12] Alex M. Andrew,et al. Knowledge Representation, Reasoning and Declarative Problem Solving , 2004 .
[13] Jack Minker,et al. Logic-Based Artificial Intelligence , 2000 .
[14] James A. Hendler,et al. Analyzing web access control policies , 2007, WWW '07.
[15] Sushil Jajodia,et al. A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[16] Chitta Baral,et al. Reasoning agents in dynamic domains , 2000 .
[17] Marek J. Sergot,et al. A logic-based calculus of events , 1989, New Generation Computing.
[18] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[19] Dieter Gollmann,et al. Computer Security – ESORICS 2004 , 2004, Lecture Notes in Computer Science.
[20] Antonis C. Kakas,et al. ACLP: Abductive Constraint Logic Programming , 2000, J. Log. Program..
[21] Andreas Matheus,et al. How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML) , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[22] C. R. Ramakrishnan,et al. Policy Analysis for Administrative Role Based Access Control , 2006, CSFW.
[23] Michael Gelfond,et al. The AAA Architecture: An Overview , 2008, AAAI Spring Symposium: Emotion, Personality, and Social Behavior.