Foundations of logic programming; (2nd extended ed.)
Foundations of logic programming; (2nd extended ed.)
The alternating fixpoint of logic programs with negation
PODS '89 Selected papers of the eighth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
Role-Based Access Control Models
Computer
Tabled evaluation with delaying for general logic programs
Journal of the ACM (JACM)
From logic programming to Prolog
From logic programming to Prolog
On the semantics of “now” in databases
ACM Transactions on Database Systems (TODS)
TRBAC: a temporal role-based access control model
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
Intelligent Database Systems
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
Delegation logic: A logic-based approach to distributed authorization
ACM Transactions on Information and System Security (TISSEC)
A Policy Language for a Pervasive Computing Environment
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Binder, a Logic-Based Security Language
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Obligation Monitoring in Policy Management
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
SD3: A Trust Management System with Certified Evaluation
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Flexible access control policy specification with constraint logic programming
ACM Transactions on Information and System Security (TISSEC)
Technologies for Trust in Electronic Commerce
Electronic Commerce Research
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
POLICY '04 Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks
Semantic web architecture: stack or two towers?
PPSWR'05 Proceedings of the Third international conference on Principles and Practice of Semantic Web Reasoning
Traceable and automatic compliance of privacy policies in federated digital identity management
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Access control by action control
Proceedings of the 13th ACM symposium on Access control models and technologies
Dynamic Meta-level Access Control in SQL
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Distributed event-based access control
International Journal of Information and Computer Security
Automated analysis of rule-based access control policies
PLPV '13 Proceedings of the 7th workshop on Programming languages meets program verification
Hi-index | 0.00 |
We introduce a generalization of Role-based Access Control that we call the Action-Status Access Control (ASAC) model. The ASAC model addresses certain shortcomings with RBAC models when applied in distributed computing contexts. The ASAC model is based on the notion of status, and a nonmonotonic theory of access control that is founded upon the notions of events, actions and times. The approach allows automatic changes to be made to policy requirements and agent authorizations that may be based, in part, on an agent's intentional behaviors.