Journal of Logic Programming
POPL '87 Proceedings of the 14th ACM SIGACT-SIGPLAN symposium on Principles of programming languages
Stratified, weak stratified and three-valued semantics
Fundamenta Informaticae - Special issue on LOGIC PROGRAMMING
A transformation system for deductive database modules with perfect model semantics
Theoretical Computer Science
Negation and constraint logic programming
Information and Computation
Role-Based Access Control Models
Computer
Transformations of CLP modules
Theoretical Computer Science
Set constraints and logic programming
Information and Computation
A uniform axiomatic view of lists, multisets, and sets, and the relevant unification algorithms
Fundamenta Informaticae
A Transformation System for Developing Recursive Programs
Journal of the ACM (JACM)
Regulating service access and information release on the Web
Proceedings of the 7th ACM conference on Computer and communications security
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
Proceedings of the 7th ACM conference on Computer and communications security
Sets and constraint logic programming
ACM Transactions on Programming Languages and Systems (TOPLAS)
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
Interoperable strategies in automated trust negotiation
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Fixpoint semantics for logic programming a survey
Theoretical Computer Science
A uniform framework for regulating service access and information release on the web
Journal of Computer Security
ACM Transactions on Information and System Security (TISSEC)
A logical framework for reasoning about access control models
ACM Transactions on Information and System Security (TISSEC)
A Hierarchy of Semantics for Normal Constraint Logic Programs
ALP '96 Proceedings of the 5th International Conference on Algebraic and Logic Programming
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Removing permissions in the flexible authorization framework
ACM Transactions on Database Systems (TODS)
Flexible access control policy specification with constraint logic programming
ACM Transactions on Information and System Security (TISSEC)
Timed constraint programming: a declarative approach to usage control
PPDP '05 Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming
PeerAccess: a logic for distributed authorization
Proceedings of the 12th ACM conference on Computer and communications security
Access control management in a distributed environment supporting dynamic collaboration
Proceedings of the 2005 workshop on Digital identity management
Policy-based dissemination of partial web-ontologies
Proceedings of the 2005 workshop on Secure web services
Traust: a trust negotiation-based authorization service for open systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Theory and Practice of Logic Programming
Trust management services in relational databases
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Proceedings of the 12th ACM symposium on Access control models and technologies
Using semantics for automatic enforcement of access control policies among dynamic coalitions
Proceedings of the 12th ACM symposium on Access control models and technologies
The Traust Authorization Service
ACM Transactions on Information and System Security (TISSEC)
A Trust- and Property-based Access Control Model
Electronic Notes in Theoretical Computer Science (ENTCS)
Access control policies and languages
International Journal of Computational Science and Engineering
ROWLBAC: representing role based access control in OWL
Proceedings of the 13th ACM symposium on Access control models and technologies
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Access Control for XML Document
IEA/AIE '08 Proceedings of the 21st international conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems: New Frontiers in Applied Artificial Intelligence
A secure collaborative web-based environment for virtual organisations
International Journal of Web Based Communities
Model-driven business process security requirement specification
Journal of Systems Architecture: the EUROMICRO Journal
Verification of Business Process Entailment Constraints Using SPIN
ESSoS '09 Proceedings of the 1st International Symposium on Engineering Secure Software and Systems
Specification and enforcement of flexible security policy for active cooperation
Information Sciences: an International Journal
Towards a dynamic and composable model of trust
Proceedings of the 14th ACM symposium on Access control models and technologies
Towards Trustworthy Delegation in Role-Based Access Control Model
ISC '09 Proceedings of the 12th International Conference on Information Security
Nonmonotonic Trust Management for P2P Applications
Electronic Notes in Theoretical Computer Science (ENTCS)
A role and attribute based access control system using semantic web technologies
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
A logic for state-modifying authorization policies
ACM Transactions on Information and System Security (TISSEC)
A card requirements language enabling privacy-preserving access control
Proceedings of the 15th ACM symposium on Access control models and technologies
Using ASP for knowledge management with user authorization
Data & Knowledge Engineering
SecPAL: Design and semantics of a decentralized authorization language
Journal of Computer Security - Digital Identity Management (DIM 2007)
Attribute-Based Messaging: Access Control and Confidentiality
ACM Transactions on Information and System Security (TISSEC)
BABAC: An Access Control Framework for Network Virtualization Using User Behaviors and Attributes
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Editorial: Using OWL and SWRL to represent and reason with situation-based access control policies
Data & Knowledge Engineering
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Influence of attribute freshness on decision making in usage control
STM'10 Proceedings of the 6th international conference on Security and trust management
Eyeing your exposure: quantifying and controlling information sharing for improved privacy
Proceedings of the Seventh Symposium on Usable Privacy and Security
Virtual fingerprinting as a foundation for reputation in open systems
iTrust'06 Proceedings of the 4th international conference on Trust Management
Considering privacy and effectiveness of authorization policies for shared electronic health records
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
Risk-based security decisions under uncertainty
Proceedings of the second ACM conference on Data and Application Security and Privacy
Policies, models, and languages for access control
DNIS'05 Proceedings of the 4th international conference on Databases in Networked Information Systems
Privacy in the electronic society
ICISS'06 Proceedings of the Second international conference on Information Systems Security
ICISS'05 Proceedings of the First international conference on Information Systems Security
Integrating trust management and access control in data-intensive Web applications
ACM Transactions on the Web (TWEB)
The authorization leap from rights to attributes: maturation or chaos?
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
A unified attribute-based access control model covering DAC, MAC and RBAC
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
From MDM to DB2: a case study of security enforcement migration
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Declarative secure distributed information systems
Computer Languages, Systems and Structures
A role-based administration model for attributes
Proceedings of the First International Workshop on Secure and Resilient Architectures and Systems
Selective and confidential message exchange in vehicular ad hoc networks
NSS'12 Proceedings of the 6th international conference on Network and System Security
How to use attribute-based encryption to implement role-based access control in the cloud
Proceedings of the 2013 international workshop on Security in cloud computing
Model-based, event-driven programming paradigm for interactive web applications
Proceedings of the 2013 ACM international symposium on New ideas, new paradigms, and reflections on programming & software
An access control framework for hybrid policies
Proceedings of the 6th International Conference on Security of Information and Networks
Designing flexible access control models for the cloud
Proceedings of the 6th International Conference on Security of Information and Networks
Adaptiveness and social-compliance in trust management within virtual communities
Web Intelligence and Agent Systems - Web Intelligence and Communities
Hi-index | 0.00 |
Attribute based access control (ABAC) grants accesses to services based on the attributes possessed by the requester. Thus, ABAC differs from the traditional discretionary access control model by replacing the subject by a set of attributes and the object by a set of services in the access control matrix. The former is appropriate in an identity-less system like the Internet where subjects are identified by their characteristics, such as those substantiated by certificates. These can be modeled as attribute sets. The latter is appropriate because most Internet users are not privy to method names residing on remote servers. These can be modeled as sets of service options. We present a framework that models this aspect of access control using logic programming with set constraints of a computable set theory [DPPR00]. Our framework specifies policies as stratified constraint flounder-free logic programs that admit primitive recursion. The design of the policy specification framework ensures that they are consistent and complete. Our ABAC policies can be transformed to ensure faster runtimes.