The complexity of logic-based abduction
Journal of the ACM (JACM)
Role-Based Access Control Models
Computer
Applications of abduction: knowledge-level modelling
International Journal of Human-Computer Studies
Semiring-based constraint satisfaction and optimization
Journal of the ACM (JACM)
Semiring-based constraint logic programming: syntax and semantics
ACM Transactions on Programming Languages and Systems (TOPLAS)
Soft constraint propagation and solving in CHRs
Proceedings of the 2002 ACM symposium on Applied computing
Certificate chain discovery in SPKI?SDSI
Journal of Computer Security
Delegation logic: A logic-based approach to distributed authorization
ACM Transactions on Information and System Security (TISSEC)
What You Always Wanted to Know About Datalog (And Never Dared to Ask)
IEEE Transactions on Knowledge and Data Engineering
DATALOG with Constraints: A Foundation for Trust Management Languages
PADL '03 Proceedings of the 5th International Symposium on Practical Aspects of Declarative Languages
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Binder, a Logic-Based Security Language
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
SD3: A Trust Management System with Certified Evaluation
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Flexible access control policy specification with constraint logic programming
ACM Transactions on Information and System Security (TISSEC)
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
A survey of trust and reputation systems for online service provision
Decision Support Systems
A Negotiation Scheme for Access Rights Establishment in Autonomic Communication
Journal of Network and Systems Management
Weighted Datalog and Levels of Trust
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
On Computing Constraint Abduction Answers
LPAR '08 Proceedings of the 15th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning
Enhancing constraints manipulation in semiring-based formalisms
Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy
Constraint Handling Rules
Prediction is deduction but explanation is abduction
IJCAI'89 Proceedings of the 11th international joint conference on Artificial intelligence - Volume 2
The complexity of soft constraint satisfaction
Artificial Intelligence
Fine grained access control with trust and reputation management for globus
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
HYPROLOG: a new logic programming language with assumptions and abduction
ICLP'05 Proceedings of the 21st international conference on Logic Programming
Abduction of linear arithmetic constraints
ICLP'05 Proceedings of the 21st international conference on Logic Programming
Hi-index | 0.09 |
We present a variant of the Datalog language (we call it Datalog^W), which is able to deal with weights on ground facts. The weights are chosen from a semiring algebraic structure. Our goal is to use this language as a semantic foundation for trust-management languages, in order to express trust relationships associated with a preference (e.g., a cost, an uncertainty, a trust or a fuzzy value). We apply Datalog^W as the basis to give a uniform semantics to a weighted extension of the RT language family, called RT^W. Moreover, we show that we can model the deduction and abduction reasoning with semiring-based soft constraints: deduction can validate or not the access request, while abduction can be used to compute the missing credentials if the access is denied and the level of preference that would grant the access.