Norm-based deontic logic for access control, some computational results
暂无分享,去创建一个
[1] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[2] Deepak Garg,et al. New Modalities for Access Control Logics: Permission, Control and Ratification , 2011, STM.
[3] John F. Horty,et al. Reasoning with Moral Conflicts , 2003 .
[4] John-Jules Ch. Meyer,et al. A different approach to deontic logic: deontic logic viewed as a variant of dynamic logic , 1987, Notre Dame J. Formal Log..
[5] Audun Stolpe,et al. A theory of permission based on the notion of derogation , 2010, J. Appl. Log..
[6] Guido Governatori,et al. A system for modal and deontic defeasible reasoning , 2007, SAC '08.
[7] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[8] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[9] Frédéric Cuppens,et al. A stratification-based approach for handling conflicts in access control , 2003, SACMAT '03.
[10] Frank Pfenning,et al. Stateful Authorization Logic: - Proof Theory and a Case Study , 2010, STM.
[11] Mark W. Krentel. Generalizations of Opt P to the Polynomial Hierarchy , 1992, Theor. Comput. Sci..
[12] Insup Lee,et al. Permission to speak: A logic for access control and conformance , 2011, J. Log. Algebraic Methods Program..
[13] Sven Ove Hansson,et al. David Makinson on Classical Methods for Non-Classical Problems , 2014 .
[14] Nora Cuppens-Boulahia,et al. Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic , 2008, DEON.
[15] Marc Denecker,et al. Distributed Autoepistemic Logic and its Application to Access Control , 2016, IJCAI.
[16] Xavier Parent,et al. Moral particularism in the light of deontic logic , 2011, Artificial Intelligence and Law.
[17] Guido Governatori,et al. A modal and deontic defeasible reasoning system for modelling policies and multi-agent systems , 2009, Expert Syst. Appl..
[18] Roderick M. Chisholm,et al. Contrary-To-Duty Imperatives and Deontic Logic , 1963 .
[19] Leon van der Torre,et al. Constraints for Input/Output Logics , 2001, J. Philos. Log..
[20] J. Horty. Agency and Deontic Logic , 2001 .
[21] Grzegorz Kolaczek,et al. APPLICATION OF DEONTIC LOGIC IN ROLE-BASED ACCESS CONTROL , 2002 .
[22] Martín Abadi,et al. Logic in access control , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..
[23] Guido Governatori,et al. Computing Strong and Weak Permissions in Defeasible Logic , 2012, Journal of Philosophical Logic.
[24] B. V. Fraassen. Values and the Heart's Command , 1973 .
[25] Leon van der Torre,et al. Input/Output Logics , 2000, J. Philos. Log..
[26] Jörg Hansen. Reasoning About Permission and Obligation , 2014 .
[27] Davide Grossi,et al. Constitutive Norms and Counts-as Conditionals , 2013 .
[28] Gerhard Brewka,et al. Preferred Subtheories: An Extended Logical Framework for Default Reasoning , 1989, IJCAI.
[29] Xin Sun,et al. Conditional Ought, a Game Theoretical Perspective , 2011, LORI.
[30] Xin Sun,et al. Computational Complexity of Input/Output Logic , 2015, MIWAI.
[31] Leon van der Torre,et al. Combining Constitutive and Regulative Norms in Input/Output Logic , 2014, DEON.
[32] J. Horty. Reasons as Defaults , 2012 .
[33] V. Wiktor Marek,et al. Nonmonotonic Logic , 1993, Artificial Intelligence.
[34] Leon van der Torre,et al. Permission from an Input/Output Perspective , 2003, J. Philos. Log..
[35] Selim G. Akl,et al. A Quantum Cryptographic Solution to the Problem of Access Control in a Hierarchy , 2010, Parallel Process. Lett..
[36] Sanjeev Arora,et al. Computational Complexity: A Modern Approach , 2009 .
[37] Victor W. Marek,et al. Nonmonotonic logic - context-dependent reasoning , 1997, Artificial intelligence.
[38] Jörg Hansen. Prioritized conditional imperatives: problems and a new proposal , 2007, Autonomous Agents and Multi-Agent Systems.
[39] Martín Abadi,et al. A Modal Deconstruction of Access Control Logics , 2008, FoSSaCS.
[40] Ron van der Meyden,et al. The Dynamic Logic of Permission , 1990, J. Log. Comput..