Foundations of logic programming; (2nd extended ed.)
Foundations of logic programming; (2nd extended ed.)
The well-founded semantics for general logic programs
Journal of the ACM (JACM)
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
Internet Privacy Enhanced Mail
Communications of the ACM - Special issue on internetworking
Authentication in the Taos operating system
ACM Transactions on Computer Systems (TOCS) - Special issue on operating systems principles
The official PGP user's guide
PICS: Internet access controls without censorship
Communications of the ACM
A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
Prioritized conflict handing for logic programs
ILPS '97 Proceedings of the 1997 international symposium on Logic programming
Referee: trust management for Web applications
World Wide Web Journal - Special issue: Web security: a matter of trust
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Compliance Checking in the PolicyMaker Trust Management System
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
A declarative approach to business rules in contracts: courteous logic programs in XML
Proceedings of the 1st ACM conference on Electronic commerce
A modular approach to composing access control policies
Proceedings of the 7th ACM conference on Computer and communications security
A rule-based framework for role based delegation
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Some thoughts on agent trust and delegation
Proceedings of the fifth international conference on Autonomous agents
An authorization model for a public key management service
ACM Transactions on Information and System Security (TISSEC)
An algebra for composing access control policies
ACM Transactions on Information and System Security (TISSEC)
Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
A uniform framework for regulating service access and information release on the web
Journal of Computer Security
Delegation logic: A logic-based approach to distributed authorization
ACM Transactions on Information and System Security (TISSEC)
A Knowledge-Based Approach to Internet Authorizations
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Information Agents for Mobile and Embedded Devices
CIA '01 Proceedings of the 5th International Workshop on Cooperative Information Agents V
A Policy Language for the Management of Distributed Agents
AOSE '01 Revised Papers and Invited Contributions from the Second International Workshop on Agent-Oriented Software Engineering II
ITTALKS: An Application of Agents in the Semantic Web
ESAW '01 Proceedings of the Second International Workshop on Engineering Societies in the Agents World II
Phobos: An Agent-Based User Authentication System
IEEE Intelligent Systems
Formalising key distribution in the presence of trust using object-Z
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Rights protection for relational data
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
A Logical Reconstruction of SPKI
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
A rule-based framework for role-based delegation and revocation
ACM Transactions on Information and System Security (TISSEC)
Belief, information acquisition, and trust in multi-agent systems: a modal logic formulation
Artificial Intelligence
Authentication with P2P Agents
BT Technology Journal
A logical reconstruction of SPKI
Journal of Computer Security - Special issue on CSFW14
Rights Protection for Relational Data
IEEE Transactions on Knowledge and Data Engineering
Rights Protection for Categorical Data
IEEE Transactions on Knowledge and Data Engineering
Query execution assurance for outsourced databases
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Modeling Delegation through an i*-based Approach
IAT '06 Proceedings of the IEEE/WIC/ACM international conference on Intelligent Agent Technology
A scalable and flexible web services authentication model
Proceedings of the 2007 ACM workshop on Secure web services
Protecting Information Sharing in Distributed Collaborative Environment
Advanced Web and NetworkTechnologies, and Applications
Nonmonotonic Trust Management for P2P Applications
Electronic Notes in Theoretical Computer Science (ENTCS)
An introduction to the role based trust management framework RT
Foundations of security analysis and design IV
Joining privately on outsourced data
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
A model for distribution and revocation of certificates
ICGT'10 Proceedings of the 5th international conference on Graph transformations
Confidentiality-preserving proof theories for distributed proof systems
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
A formalization of distributed authorization with delegation
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Towards a mechanism for discretionary overriding of access control
SP'04 Proceedings of the 12th international conference on Security Protocols
Specifying distributed authorization with delegation using logic programming
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
On the use of formal specifications as part of running programs
Software Engineering for Multi-Agent Systems IV
Subset selection approach for watermarking relational databases
ICDEM'10 Proceedings of the Second international conference on Data Engineering and Management
Hi-index | 0.00 |