{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:21:45Z","timestamp":1725488505064},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540421030"},{"type":"electronic","value":"9783540451167"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45116-1_19","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T17:22:00Z","timestamp":1186420920000},"page":"178-188","source":"Crossref","is-referenced-by-count":3,"title":["TRBACN: A Temporal Authorization Model"],"prefix":"10.1007","author":[{"given":"Steve","family":"Barker","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,5,8]]},"reference":[{"key":"19_CR1","unstructured":"Abiteboul, S., Hull, R., and Vianu, V.: Foundations of Databases. Addison-Wesley (1995)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Apt, K., Blair, H., and Walker, A.: Towards a Theory of Declarative Knowledge. In Minker, J. (ed.): Foundations of Deductive Databases and Logic Programming. Morgan-Kaufmann Publishers (1988)","DOI":"10.1016\/B978-0-934613-40-8.50006-3"},{"key":"19_CR3","unstructured":"Apt, K., and Bezem, M.: Acyclic Programs. New Generation Computing (1990)"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Apt., K., and Pedreschi., D.: Reasoning about Termination of Pure Prolog Programs. Information and Computation, 106 (1993)","DOI":"10.1006\/inco.1993.1051"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Barker, S.: Temporal Authorization in the Simplified Event Calculus. In Atluri V., and Hale, J., Hale J. (eds): Research Advances in Database and Information Systems Security. Kluwer Academic Publishers (2000)","DOI":"10.1007\/978-0-387-35508-5_18"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Barker, S.: Data Protection by Logic Programming, 1st International Conference on Computational Logic, LNAI 1861, Springer-Verlag (2000)","DOI":"10.1007\/3-540-44957-4_87"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Barker, S.: Secure Deductive Databases. PADL\u201901 (2001)","DOI":"10.1007\/3-540-45241-9_9"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Bertino, E., Bettini, C., Ferrari, E., and Samarati, P.: A Temporal Access Control Mechanism for Database Systems. IEEE TKDE, 8(1) (1996)","DOI":"10.1109\/69.485637"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Bertino, E., Bettini, C., Ferrari, E., and Samarati, P.: An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. TODS, 23(3) (1998)","DOI":"10.1145\/293910.293151"},{"key":"19_CR10","unstructured":"Castano, S., Fugini, M., Martella, G., and Samarati, P.: Database Security, Addison Wesley. (1995)"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Chen, W., Swift, T., and Warren, D.: Efficient Top-Down Computation of Queries Under the Well-Founded Semantics. JLP, 24(3) (1995)","DOI":"10.1016\/0743-1066(94)00028-5"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Clark, K.: Negation as Failure. In H. Gallaire and J. Minker (eds): Logic and Databases. Plenum (1978)","DOI":"10.1007\/978-1-4684-3384-5_11"},{"key":"19_CR13","unstructured":"Ferraiolo, D., Cugini, J., and Kuhn, R.: Role-Based Access Control: Features and Motivations. Proc. 11th Annual Computer Security Applications Conf., (1995)"},{"key":"19_CR14","unstructured":"Ferraiolo, D., Gilbert, D., and Lynch, N.: An Examination of Federal and Commercial Access Control Policy Needs. Proc. NIST-NCSC National Security Conf. (1993)"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Lloyd, J.: Foundations of Logic Programming, 2nd Ed., Springer (1987)","DOI":"10.1007\/978-3-642-83189-8"},{"key":"19_CR16","unstructured":"Przymusinski, T.: Perfect Model Semantics. Proc. 5th ICLP, (1988)"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., and Youman, C.: Role-Based Access Control Models. IEEE Computer, (1996)","DOI":"10.1109\/2.485845"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., and Youman, C.: Role-Based Access Control: A Multi-Dimensional View. Proc. 10th Annual Computer Security Applications Conf. (1994)","DOI":"10.1109\/CSAC.1994.367293"},{"key":"19_CR19","unstructured":"Thomas, R., and Sandhu, R.: Discretionary Access Control in Object-Oriented Databases: Issues and Research Directions, Proc. 16th National Computer Security Conf. (1993)"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Van Gelder, A.: Negation as Failure Using Tight Derivations for General Logic Programs. In Minker, J. (ed.): Foundations of Deductive Databases and Logic Programming. Morgan-Kaufmann Publishers (1988)","DOI":"10.1016\/B978-0-934613-40-8.50007-5"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Van Gelder, A., Ross, K., and Schlipf, J.: The Well-Founded Semantics for General Logic Programs. J. ACM, 383) (1991)","DOI":"10.1145\/137097.137854"},{"key":"19_CR22","unstructured":"Vardi, M.: The Complexity of Query Languages. ACM Symp. on the Theory of Computing (May, 1982)"}],"container-title":["Lecture Notes in Computer Science","Information Assurance in Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45116-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T19:44:10Z","timestamp":1556739850000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45116-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540421030","9783540451167"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-45116-1_19","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}