Expressive Policy Analysis with Laws of System Change

[1]  Jorge Lobo,et al.  Expressive policy analysis with enhanced system dynamicity , 2009, ASIACCS '09.

[2]  Marek J. Sergot,et al.  A logic-based calculus of events , 1989, New Generation Computing.

[3]  Sebastian Nanz,et al.  The Role of Abduction in Declarative Authorization Policies , 2008, PADL.

[4]  Jorge Lobo,et al.  Toward a Formal Characterization of Policy Specification & Analysis , 2007 .

[5]  Kathi Fisler,et al.  Obligations and Their Interaction with Programs , 2007, ESORICS.

[6]  Naranker Dulay,et al.  Authorisation and Conflict Resolution for Hierarchical Domains , 2007, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07).

[7]  Ting Yu,et al.  On the modeling and analysis of obligations , 2006, CCS '06.

[8]  Kathi Fisler,et al.  Specifying and Reasoning About Dynamic Access-Control Policies , 2006, IJCAR.

[9]  George Pavlou,et al.  Policy refinement for DiffServ quality of service management , 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005..

[10]  Bert Van Nuffelen Abductive constraint logic programming: implementation and applications. , 2004 .

[11]  Peter Sewell,et al.  Cassandra: flexible trust management, applied to electronic health records , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..

[12]  Joseph Y. Halpern,et al.  Using first-order logic to reason about policies , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..

[13]  Murray Shanahan,et al.  Some Alternative Formulations of the Event Calculus , 2002, Computational Logic: Logic Programming and Beyond.

[14]  Stephen Smalley,et al.  Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.

[15]  Sushil Jajodia,et al.  Flexible support for multiple access control policies , 2001, TODS.

[16]  R. Sandhu,et al.  The ARBAC97 model for role-based administration of roles , 1999, TSEC.

[17]  Mary Ellen Zurko,et al.  Separation of duty in role-based environments , 1997, Proceedings 10th Computer Security Foundations Workshop.

[18]  Elisa Bertino,et al.  A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.

[19]  Sushil Jajodia,et al.  A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[20]  Jan Chomicki,et al.  Efficient checking of temporal integrity constraints using bounded history encoding , 1995, TODS.

[21]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[22]  V. Lifschitz,et al.  The Stable Model Semantics for Logic Programming , 1988, ICLP/SLP.

[23]  R. Goldblatt Logics of Time and Computation , 1987 .