Access control requirements for environmental information knowledge base systems
JCIT Proceedings of the fifth Jerusalem conference on Information technology
The well-founded semantics for general logic programs
Journal of the ACM (JACM)
Tie-breaking semantics and structural totality
PODS '92 Proceedings of the eleventh ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
The knowledge base partitioning problem: mathematical formulation and heuristic clustering
Data & Knowledge Engineering
The formal semantics of programming languages: an introduction
The formal semantics of programming languages: an introduction
Proceedings of the eleventh international conference on Logic programming
Preferred answer sets for extended logic programs
Artificial Intelligence
XML document security based on provisional authorization
Proceedings of the 7th ACM conference on Computer and communications security
Answer set programming and plan generation
Artificial Intelligence
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
A logical framework for reasoning about access control models
ACM Transactions on Information and System Security (TISSEC)
Delegation logic: A logic-based approach to distributed authorization
ACM Transactions on Information and System Security (TISSEC)
Protecting deductive databases from unauthorized retrieval and update requests
Data & Knowledge Engineering - Data and applications security
Combining Multiple Knowledge Bases
IEEE Transactions on Knowledge and Data Engineering
Arbitration (or How to Merge Knowledge Bases)
IEEE Transactions on Knowledge and Data Engineering
A Knowledge Representation Model for Multiuser Knowledge-Based Systems
IEEE Transactions on Knowledge and Data Engineering
Knowledge Base Views in Multiuser Knowledge Based Systems
Proceedings of the Fourth International Conference on Data Engineering
LICS '03 Proceedings of the 18th Annual IEEE Symposium on Logic in Computer Science
Authorization in Distributed Systems: A Formal Approach
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Flexible access control policy specification with constraint logic programming
ACM Transactions on Information and System Security (TISSEC)
An Access Control Model Based on Distributed Knowledge Management
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
A semantic framework for preference handling in answer set programming
Theory and Practice of Logic Programming
A framework for compiling preferences in logic programs
Theory and Practice of Logic Programming
A logic-based framework for attribute based access control
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Preferred answer sets for ordered logic programs
Theory and Practice of Logic Programming
Presto Authorization: A Bitmap Indexing Scheme for High-Speed Access Control to XML Documents
IEEE Transactions on Knowledge and Data Engineering
The DLV system for knowledge representation and reasoning
ACM Transactions on Computational Logic (TOCL)
Vertical Partitioning Method for Secret Sharing Distributed Database System
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Magic Sets and their application to data integration
Journal of Computer and System Sciences
Coordination in answer set programming
ACM Transactions on Computational Logic (TOCL)
Knowledge sharing in virtual enterprises via an ontology-based access control approach
Computers in Industry
A Logic Specification and Implementation Approach for Object Oriented Database Security
WKDD '08 Proceedings of the First International Workshop on Knowledge Discovery and Data Mining
Maintaining Knowledge Bases at the Object Level
MICAI '07 Proceedings of the 2007 Sixth Mexican International Conference on Artificial Intelligence, Special Session
Efficiently Querying RDF(S) Ontologies with Answer Set Programming
Journal of Logic and Computation
On odd and even cycles in normal logic programs
AAAI'04 Proceedings of the 19th national conference on Artifical intelligence
Debugging ASP programs by means of ASP
LPNMR'07 Proceedings of the 9th international conference on Logic programming and nonmonotonic reasoning
Modularity aspects of disjunctive stable models
LPNMR'07 Proceedings of the 9th international conference on Logic programming and nonmonotonic reasoning
Model-based knowledge representation and reasoning via answer set programming
FLOPS'08 Proceedings of the 9th international conference on Functional and logic programming
Privacy preserving BIRCH algorithm for clustering over vertically partitioned databases
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
A Classification Theory Of Semantics Of Normal Logic Programs: Ii. Weak Properties
Fundamenta Informaticae
Privacy preservation using multi-context systems and default logic
Correct Reasoning
Hi-index | 0.00 |
Unlike conventional rule based knowledge bases (KBs) that support monotonic reasoning, a key correctness issue, i.e. the correctness of a sub-KB with respect to the full KB, arises when using a KB represented by non-monotonic reasoning languages such as Answer Set Programming (ASP). Since a user may have rights to access only a subset of a KB, the non-monotonic nature of ASP may cause the occurrence of consequences, which are erroneous in the sense that the consequences are not reasonable in the full KB. This paper proposes an approach dealing with the problem. The main idea is to let the usage of Closed World Assumptions (CWAs) for literals in a KB satisfy certain constraints. Two kinds of access right propositions are created, rule retrieval right propositions to control the access to rules, and CWA right propositions to control the usage of CWAs for literals. Based on these right propositions, this paper first defines an algorithm for translating an original KB into a KB tagged by right propositions, and then discusses the right dependency in a KB and proposes methods for checking and obtaining a set of rights that is closed under a set of dependency rules. Finally, several results on the correctness of a set of rights in a KB are presented, which serve as guidelines for the correct use of a KB. As an example, a KB of illness-related financial support for teachers of a university is presented to illustrate the application of our approach.