{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:06:05Z","timestamp":1725483965374},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540439301"},{"type":"electronic","value":"9783540456193"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45619-8_5","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T10:57:41Z","timestamp":1179572261000},"page":"54-69","source":"Crossref","is-referenced-by-count":5,"title":["Access Control for Deductive Databases by Logic Programming"],"prefix":"10.1007","author":[{"given":"Steve","family":"Barker","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,18]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Barker, S., Data Protection by Logic Programming, 1st International Conference on Computational Logic, LNAI 1861, 1300\u20131313, Springer, 2000.","DOI":"10.1007\/3-540-44957-4_87"},{"key":"5_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/3-540-45241-9_9","volume-title":"3rd Inat. Symp. on Practical Applications of Declarative Languages (PADL\u201901)","author":"S. Barker","year":"2001","unstructured":"Barker, S., Secure Deductive Databases, 3rd Inat. Symp. on Practical Applications of Declarative Languages (PADL\u201901), LNCS 1990, Springer, 123\u2013137, 2001."},{"key":"5_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/3-540-45116-1_19","volume-title":"Proc. MMMANCS International Workshop on Network Security","author":"S. Barker","year":"2001","unstructured":"Barker, S., TRBACN: A Temporal Authorization Model, Proc. MMMANCS International Workshop on Network Security, LNCS 2052, 178\u2013188, Springer, 2001."},{"key":"5_CR4","unstructured":"Barker. S., and Douglas, P., Secure Web Access, in preparation."},{"key":"5_CR5","unstructured":"Barker. S., Extended Protected Databases, in preparation."},{"issue":"3","key":"5_CR6","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1109\/69.390247","volume":"7","author":"P. Bonatti","year":"1995","unstructured":"Bonatti, P., Kraus, S., and Subrahmanian, V., Foundations of Secure Deductive Databases, IEEE Trans. on Knowledge and Data Engineering, 7,3, 406\u2013422, 1995.","journal-title":"IEEE Trans. on Knowledge and Data Engineering"},{"key":"5_CR7","unstructured":"Castano, S., Fugini, M., Martella, G., and Samarati, P., Database Security, Addison-Wesley, 1995."},{"issue":"1","key":"5_CR8","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/S0925-8388(96)02487-5","volume":"43","author":"W. Chen","year":"1996","unstructured":"Chen, W., and Warren, D., Tabled Evaluation with Delaying for General Logic Programs, J. A CM, 43(1), 20\u201374, 1996.","journal-title":"J. A CM"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Cuppens, F., and Demolombe, R., A Modal Logical Framework for Security Policies, ISMIS\u201997, 1997.","DOI":"10.1007\/3-540-63614-5_56"},{"key":"5_CR10","unstructured":"Date, C., An Introduction to Database Systems, Addison-Wesley, 2000."},{"key":"5_CR11","unstructured":"Ferraiolo, D., Gilbert, D., and Lynch, N., An Examination of Federal and Commercial Access Control Policy Needs, Proc. 16th NIST-NSA National Computer Security Conference, 107\u2013116, 1993."},{"key":"5_CR12","unstructured":"Gardenfors, P., Knowledge in Flux: Modeling the Dynamics of Epistemic States, MIT Press, 1988."},{"key":"5_CR13","unstructured":"Hogger, C., Foundations of Logic Programming, Oxford, 1990."},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Samarati, P., and Subrahmanian, V., A Logical Language for Expressing Authorizations, Proc. IEEE Symp. on Security and Privacy, 94\u2013107, 1997.","DOI":"10.1109\/SECPRI.1997.601312"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Jamil, H., Belief Reasoning in MLS Deductive Databases, ACM SIGMOD\u201999, 109\u2013120, 1999.","DOI":"10.1145\/304182.304192"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"LLoyd, J., Foundations of Logic Programming, Springer, 1987.","DOI":"10.1007\/978-3-642-83189-8"},{"key":"5_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BFb0031734","volume-title":"1st International Workshop on Logic in Databases","author":"J. Minker","year":"1996","unstructured":"Minker, J., Logic and Databases: A 20 Year Retrospective, 1st International Workshop on Logic in Databases, LNCS 1154, 3\u201357, Springer, 1996."},{"key":"5_CR18","unstructured":"Przymusinski, T., Perfect Model Semantics, Proc. 5th ICLP, MIT Press, 1081\u20131096, 1988."},{"key":"5_CR19","unstructured":"Sagonas, K., Swift, T., Warren, D., Freire, J., Rao, P., The XSB System, Version 2.0, Programmer\u2019s Manual, 1999."},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ferraiolo, D., and Kuhn, R., The NIST Model for Role-Based Access Control: Towards a Unified Standard, Proc. 4th ACM Workshop on Role-Based Access Control, 47\u201361, 2000.","DOI":"10.1145\/344287.344301"},{"key":"5_CR21","unstructured":"Ullman, J., Principles of Database and Knowledge-Base Systems: Volume 1, Computer Science Press, 1990."},{"issue":"3","key":"5_CR22","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1145\/116825.116838","volume":"38","author":"A. Gelder Van","year":"1991","unstructured":"Van Gelder, A., Ross, K., and Schlipf, J., The Well-Founded Semantics for General Logic Programs, J. ACM, 38(3), 620\u2013650, 1991.","journal-title":"J. ACM"}],"container-title":["Lecture Notes in Computer Science","Logic Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45619-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T01:20:51Z","timestamp":1556414451000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45619-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540439301","9783540456193"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-45619-8_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}