Relational queries computable in polynomial time
Information and Control
The expressive power of stratified logic programs
Information and Computation
Handbook of theoretical computer science (vol. B)
Equivalence of datalog queries is undecidable
Journal of Logic Programming
Second generation expert system explanation
Second generation expert systems
The art of Prolog (2nd ed.): advanced programming techniques
The art of Prolog (2nd ed.): advanced programming techniques
XSB as an efficient deductive database engine
SIGMOD '94 Proceedings of the 1994 ACM SIGMOD international conference on Management of data
Querying disjunctive databases through nonmonotonic logics
Theoretical Computer Science
Reconciling role based management and role based access control
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Role templates for content-based access control
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
On the decidability of query containment under constraints
PODS '98 Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
Complexity and expressive power of logic programming
ACM Computing Surveys (CSUR)
An algebra for composing access control policies
ACM Transactions on Information and System Security (TISSEC)
Description logics of minimal knowledge and negation as failure
ACM Transactions on Computational Logic (TOCL)
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
A uniform framework for regulating service access and information release on the web
Journal of Computer Security
Explanations in Knowledge Systems: The Roles of the Task Structure and Domain Functional Models
IEEE Expert: Intelligent Systems and Their Applications
A Deductive System for Non-Monotonic Reasoning
LPNMR '97 Proceedings of the 4th International Conference on Logic Programming and Nonmonotonic Reasoning
Smodels - An Implementation of the Stable Model and Well-Founded Semantics for Normal LP
LPNMR '97 Proceedings of the 4th International Conference on Logic Programming and Nonmonotonic Reasoning
Descriptive and Computational Complexity
FCT '89 Proceedings of the International Conference on Fundamentals of Computation Theory
Reconstruction Proofs at the Assertion Level
CADE-12 Proceedings of the 12th International Conference on Automated Deduction
IJCAR '01 Proceedings of the First International Joint Conference on Automated Reasoning
WhyNot: debugging failed queries in large knowledge bases
Eighteenth national conference on Artificial intelligence
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
A Policy Language for a Pervasive Computing Environment
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Requirements for Policy Languages for Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
The description logic handbook: theory, implementation, and applications
The description logic handbook: theory, implementation, and applications
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
POLICY '04 Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks
On the decidability of containment of recursive datalog queries - preliminary report
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Driving and Monitoring Provisional Trust Negotiation with Metapolicies
POLICY '05 Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks
Decidable containment of recursive queries
Theoretical Computer Science - Database theory
Communications of the ACM - Privacy and security in highly dynamic systems
Behavioural specification of grid services with the KAoS policy language
CCGRID '05 Proceedings of the Fifth IEEE International Symposium on Cluster Computing and the Grid (CCGrid'05) - Volume 2 - Volume 02
The Diagnosis Frontend of the dlv system
AI Communications
Analyzing web access control policies
Proceedings of the 16th international conference on World Wide Web
Privacy in the Semantic Web: What Policy Languages Have to Offer
POLICY '07 Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks
ROWLBAC: representing role based access control in OWL
Proceedings of the 13th ACM symposium on Access control models and technologies
Verifiable agent interaction in abductive logic programming: The SCIFF framework
ACM Transactions on Computational Logic (TOCL)
Rules and Ontologies for the Semantic Web
Reasoning Web
Reasoning about Typicality in Preferential Description Logics
JELIA '08 Proceedings of the 11th European conference on Logics in Artificial Intelligence
POLICY '08 Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks
Using Dependency Tracking to Provide Explanations for Policy Management
POLICY '08 Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks
Advanced Policy Explanations on the Web
Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy
Understanding and capturing people's privacy policies in a mobile social networking application
Personal and Ubiquitous Computing
Conjunctive query answering for the description logic SHIQ
Journal of Artificial Intelligence Research
Embedding non-ground logic programs into autoepistemic logic for knowledge-base combination
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
A faithful integration of description logics with logic programming
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
Abductive matchmaking using description logics
IJCAI'03 Proceedings of the 18th international joint conference on Artificial intelligence
IJCAI'05 Proceedings of the 19th international joint conference on Artificial intelligence
Defeasible inclusions in low-complexity DLs: preliminary notes
IJCAI'09 Proceedings of the 21st international jont conference on Artifical intelligence
Query answering in description logics with transitive roles
IJCAI'09 Proceedings of the 21st international jont conference on Artifical intelligence
A Preferential Tableaux Calculus for Circumscriptive ${\mathcal ALCO}$
RR '09 Proceedings of the 3rd International Conference on Web Reasoning and Rule Systems
Theory and Practice of Logic Programming
Explaining answers from the Semantic Web: the Inference Web approach
Web Semantics: Science, Services and Agents on the World Wide Web
The role of abduction in declarative authorization policies
PADL'08 Proceedings of the 10th international conference on Practical aspects of declarative languages
Rule-based policy representations and reasoning
Semantic techniques for the web
SecPAL: Design and semantics of a decentralized authorization language
Journal of Computer Security - Digital Identity Management (DIM 2007)
Rational closure for defeasible description logics
JELIA'10 Proceedings of the 12th European conference on Logics in artificial intelligence
A Rule-Based Trust Negotiation System
IEEE Transactions on Knowledge and Data Engineering
Web explanations for semantic heterogeneity discovery
ESWC'05 Proceedings of the Second European conference on The Semantic Web: research and Applications
CEL: a polynomial-time reasoner for life science ontologies
IJCAR'06 Proceedings of the Third international joint conference on Automated Reasoning
A policy language for distributed usage control
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Towards law-aware semantic cloud policies with exceptions for data integration and protection
Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics
Crafting a balance between big data utility and protection in the semantic data cloud
Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics
Hi-index | 0.00 |
Logic-based policy languages are appreciated because of their clean semantics and expressiveness. Datalog has been used for a long time as a foundation of many security models and policy languages. Recently, Description Logics (DLs for short) have been adopted as policy languages, too. In this paper we carry out a comparison of Datalog and Description Logics as policy languages, based both on expressiveness analysis and on an assessment of the current maturity of the two fields, expressly related to the representation and reasoning tasks involved in policy authoring, enforcement, and management. We shall argue that Datalog-based approaches are currently more powerful and mature than those based on pure DLs, although the ongoing research on the latter might change the picture in a near future. The potential of hybrid approaches will be briefly discussed.