{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T05:07:51Z","timestamp":1750136871310,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540334385"},{"type":"electronic","value":"9783540334392"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11737414_10","type":"book-chapter","created":{"date-parts":[[2006,3,15]],"date-time":"2006-03-15T11:54:37Z","timestamp":1142423677000},"page":"130-145","source":"Crossref","is-referenced-by-count":18,"title":["Soutei, a Logic-Based Trust-Management System"],"prefix":"10.1007","author":[{"given":"Andrew","family":"Pimlott","sequence":"first","affiliation":[]},{"given":"Oleg","family":"Kiselyov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M. Logic in access control. In: LICS [16], pp. 228\u2013233","DOI":"10.1109\/LICS.2003.1210062"},{"key":"10_CR2","unstructured":"Blaze, M.: Using the KeyNote Trust Management System (March 2001), http:\/\/www.crypto.com\/trustmgt\/"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: IEEE Symposium on Security and Privacy (May 1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-540-24599-5_9","volume-title":"Logic Programming","author":"P. Bruscoli","year":"2003","unstructured":"Bruscoli, P., Guglielmi, A.: A tutorial on proof theoretic foundations of logic programming. In: Palamidessi, C. (ed.) ICLP 2003. LNCS, vol.\u00a02916, pp. 109\u2013127. Springer, Heidelberg (2003)"},{"key":"10_CR5","first-page":"5","volume":"9","author":"P. Chisholm","year":"2005","unstructured":"Chisholm, P.: IA roadmap. Military Information Technology\u00a09, 5 (2005)","journal-title":"Military Information Technology"},{"key":"10_CR6","first-page":"1","volume":"41","author":"K. Claessen","year":"2000","unstructured":"Claessen, K., Ljungl\u00f6f, P.: Typed logical variables in haskell. Electr. Notes Theor. Comput. Sci.\u00a041, 1 (2000)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Detreville, J.: Binder, a logic-based security language. In: IEEE Symposium on Security and Privacy, pp. 105\u2013113 (2002)","DOI":"10.1109\/SECPRI.2002.1004365"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Fisler, K., Krishnamurthi, S., Meyerovich, L.A., Tschantz, M.C.: Veri- fication and change impact analysis of access-control policies. In: International Conference on Software Engineering (May 2005)","DOI":"10.1145\/1062455.1062502"},{"key":"10_CR9","unstructured":"Garg, D., Pfenning, F.: Non-interference in constructive authorization logic. Submitted for publication (October 2005)"},{"key":"10_CR10","first-page":"186","volume-title":"ICFP 2000: Proceedings of the 5th ACM SIGPLAN International Conference on Functional Programming","author":"R. Hinze","year":"2000","unstructured":"Hinze, R.: Deriving backtracking monad transformers. In: ICFP 2000: Proceedings of the 5th ACM SIGPLAN International Conference on Functional Programming, pp. 186\u2013197. ACM Press, New York (2000)"},{"key":"10_CR11","unstructured":"A declarative applicative logic programming system (2005), http:\/\/kanren.sourceforge.net\/"},{"key":"10_CR12","unstructured":"Kiselyov, O.: Metcast Channels (February 2003), http:\/\/www.metnet.navy.mil\/Metcast\/Metcast-Channels.html , The working server with Soutei Authorization can be accessed via, http:\/\/www.metnet.navy.mil\/cgi-bin\/oleg\/server"},{"key":"10_CR13","unstructured":"Kiselyov, O.: Soutei: syntax, semantics, and use cases (June 13, 2005), http:\/\/www.metnet.navy.mil\/Metcast\/Auth-use-cases.html"},{"key":"10_CR14","volume-title":"ICFP 2005: ACMSIGPLAN International Conference on Functional Programming","author":"O. Kiselyov","year":"2005","unstructured":"Kiselyov, O., Shan, C., Friedman, D.P., Sabry, A.: Backtracking, interleaving, and terminating monad transformers. In: ICFP 2005: ACMSIGPLAN International Conference on Functional Programming. ACM Press, New York (2005)"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/3-540-36388-2_6","volume-title":"Practical Aspects of Declarative Languages","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J.C.: Datalog with constraints: A foundation for trust management languages. In: Dahl, V., Wadler, P. (eds.) PADL 2003. LNCS, vol.\u00a02562, pp. 58\u201373. Springer, Heidelberg (2002)"},{"key":"10_CR16","unstructured":"Proceedings of 18th IEEE Symposium on Logic in Computer Science (LICS 2003), Ottawa, Canada, June 22-25. IEEE Computer Society, Los Alamitos (2003)"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Miller, D., Tiu, A.F.: A proof theory for generic judgments: An extended abstract. In: LICS [16], pp. 118\u2013127","DOI":"10.1109\/LICS.2003.1210051"},{"key":"#cr-split#-10_CR18.1","unstructured":"Seres, S., Spivey, J.M.: Embedding Prolog in Haskell. In: Proceedings of the 1999 Haskell Workshop (1999);"},{"key":"#cr-split#-10_CR18.2","unstructured":"Meier, E. (ed.) Tech. Rep. UU-CS-1999-28, Department of Computer Science, Utrecht University"},{"issue":"6","key":"10_CR19","first-page":"34","volume":"28","author":"A. Singer","year":"2003","unstructured":"Singer, A.: Life without firewalls. USENIX;login\u00a028(6), 34\u201341 (2003)","journal-title":"USENIX ;login"},{"issue":"1-3","key":"10_CR20","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/S0743-1066(96)00068-4","volume":"29","author":"Z. Somogyi","year":"1996","unstructured":"Somogyi, Z., Henderson, F., Conway, T.: The execution algorithm of Mercury, an efficient purely declarative logic programming language. J. Log. Program.\u00a029(1-3), 17\u201364 (1996)","journal-title":"J. Log. Program."},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/3-540-15975-4_33","volume-title":"Functional Programming Languages and Computer Architecture","author":"P. Wadler","year":"1985","unstructured":"Wadler, P.: How to replace failure by a list of successes: A method for exception handling, backtracking, and pattern matching in lazy functional languages. In: Jouannaud, J.-P. (ed.) FPCA 1985. LNCS, vol.\u00a0201, pp. 113\u2013128. Springer, Heidelberg (1985)"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Westerinen, A., Schnizlein, J., Strassner, J., Scherling, M., Quinn, B., Herzog, S., Huynh, A., Carlson, M., Perry, J., Waldbusser, S.: Terminology for policy-based management. RFC 3198 (November 2001)","DOI":"10.17487\/rfc3198"},{"issue":"6","key":"10_CR23","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MC.2004.2","volume":"37","author":"A. Wool","year":"2004","unstructured":"Wool, A.: A quantitative study of firewall configuration errors. IEEE Computer\u00a037(6), 62\u201367 (2004)","journal-title":"IEEE Computer"},{"key":"10_CR24","unstructured":"OASIS eXtensible Access Control Markup Language (XACML). Version 2.0 (February 2005), http:\/\/www.oasis-open.org\/committees\/tchome.php?wgabbrev=xacml"}],"container-title":["Lecture Notes in Computer Science","Functional and Logic Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11737414_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T01:17:15Z","timestamp":1736299035000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11737414_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540334385","9783540334392"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/11737414_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}