Nonmonotonic Trust Management for P2P Applications
暂无分享,去创建一个
Jerry den Hartog | Pieter H. Hartel | Sandro Etalle | Marcin Czenko | Jeroen Doumen | Ha Tran | S. Etalle | P. Hartel | J. Doumen | J. D. Hartog | Marcin Czenko | Ha Tran
[1] Phan Minh Dung,et al. Trust Negotiation with Nonmonotonic Access Policies , 2004, INTELLCOMM.
[2] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Ian T. Foster,et al. A community authorization service for group collaboration , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[4] David Scott Warren,et al. Efficient Top-Down Computation of Queries under the Well-Founded Semantics , 1995, J. Log. Program..
[5] Johan A. Pouwelse,et al. The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.
[6] Melvin Fitting,et al. A Kripke-Kleene Semantics for Logic Programs , 1985, J. Log. Program..
[7] Amir Herzberg,et al. Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[8] Sushil Jajodia,et al. A logic-based framework for attribute based access control , 2004, FMSE '04.
[9] Kenneth A. Ross,et al. The well-founded semantics for general logic programs , 1991, JACM.
[10] Joan Feigenbaum,et al. A logic-based knowledge representation for authorization with delegation , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[11] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[12] Guido Boella,et al. Permission and Authorization in Policies for Virtual Communities of Agents , 2004, AP2PC.
[13] Douglas R. Vogel,et al. Adoption of Informatics to Support Virtual Communities , 2002, HICSS.
[14] Peter J. Stuckey,et al. Flexible access control policy specification with constraint logic programming , 2003, TSEC.
[15] Ninghui Li,et al. Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[16] Ninghui Li,et al. Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..
[17] Ilkka Niemelä,et al. Smodels - An Implementation of the Stable Model and Well-Founded Semantics for Normal LP , 1997, LPNMR.
[18] Kenneth Kunen,et al. Negation in Logic Programming , 1987, J. Log. Program..
[19] Teodor C. Przymusinski. Perfect Model Semantics , 1988, ICLP/SLP.
[20] Vitaly Shmatikov,et al. Reputation-Based Trust Management ∗ , 2003 .
[21] Ronald L. Rivest,et al. Certificate Chain Discovery in SPKI/SDSI , 2002, J. Comput. Secur..
[22] Marianne Winslett,et al. Requirements for policy languages for trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[23] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[24] Wolfgang Faber,et al. Declarative problem-solving using the DLV system , 2000 .
[25] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[26] John C. Shepherdson,et al. Negation in Logic Programming , 1988, Foundations of Deductive Databases and Logic Programming..