{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:34:46Z","timestamp":1725561286427},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540206422"},{"type":"electronic","value":"9783540245995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-24599-5_3","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T04:53:55Z","timestamp":1280379235000},"page":"20-46","source":"Crossref","is-referenced-by-count":0,"title":["A Logic Programming View of Authorization in Distributed Systems"],"prefix":"10.1007","author":[{"given":"William H.","family":"Winsborough","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/B978-0-934613-40-8.50006-3","volume-title":"Foundations of Deductive Databases and Logic Programming","author":"K.R. Apt","year":"1988","unstructured":"Apt, K.R., Blair, H.A., Walker, A.: Towards a theory of declarative knowledge. In: Minker, J. (ed.) Foundations of Deductive Databases and Logic Programming, pp. 89\u2013148. Morgan Kaufmann, Los Altos (1988)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The KeyNote trust-management system, version 2. IETF RFC 2704 (September 1999)","DOI":"10.17487\/rfc2704"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/SECPRI.1996.502679","volume-title":"Proceedings of the 1996 IEEE Symposium on Security and Privacy","author":"M. Blaze","year":"1996","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, May 1996, pp. 164\u2013173. IEEE Computer Society Press, Los Alamitos (1996)"},{"issue":"3","key":"3_CR4","doi-asserted-by":"crossref","first-page":"241","DOI":"10.3233\/JCS-2002-10303","volume":"10","author":"P. Bonatti","year":"2002","unstructured":"Bonatti, P., Samarati, P.: A uniform framework for regulating service access and information release on the web. Journal of Computer Security\u00a010(3), 241\u2013274 (2002); Extended abstract appeared in Proceedings of the 7th ACM Conference on Computer and Communications Security (November 2000)","journal-title":"Journal of Computer Security"},{"key":"3_CR5","unstructured":"Bray, T., Hollander, D., Layman, A.: Namespaces in XML. W3C Recommendation (January 1999)"},{"key":"3_CR6","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1109\/SP.1987.10001","volume-title":"Proceedings of the 1987 IEEE Symposium on Security and Privacy","author":"D.D. Clark","year":"1987","unstructured":"Clark, D.D., Wilson, D.R.: A comparision of commercial and military computer security policies. In: Proceedings of the 1987 IEEE Symposium on Security and Privacy, May 1987, pp. 184\u2013194. IEEE Computer Society Press, Los Alamitos (1987)"},{"issue":"4","key":"3_CR7","doi-asserted-by":"crossref","first-page":"285","DOI":"10.3233\/JCS-2001-9402","volume":"9","author":"D. Clarke","year":"2001","unstructured":"Clarke, D., Elien, J.-E., Ellison, C., Fredette, M., Morcos, A., Rivest, R.L.: Certificate chain discovery in SPKI\/SDSI. Journal of Computer Security\u00a09(4), 285\u2013322 (2001)","journal-title":"Journal of Computer Security"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI certificate theory. IETF RFC 2693 (September 1999)","DOI":"10.17487\/rfc2693"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Farrell, S., Housley, R.: An Internet attribute certificate profile for authorization (2001)","DOI":"10.17487\/rfc3281"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Scott Graham, G., Denning, P.J.: Protection \u2013 principles and practice. In: Proceedings of the AFIPS Spring Joint Computer Conference, May 16-18, vol.\u00a040, pp. 417\u2013429. AFIPS Press (1972)","DOI":"10.1145\/1478873.1478928"},{"issue":"8","key":"3_CR11","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M.A. Harrison","year":"1976","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Communications of the ACM\u00a019(8), 461\u2013471 (1976)","journal-title":"Communications of the ACM"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/SECPRI.2000.848442","volume-title":"Proceedings of the 2000 IEEE Symposium on Security and Privacy","author":"A. Herzberg","year":"2000","unstructured":"Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., Ravid, Y.: Access control meets public key infrastructure, or: Assigning roles to strangers. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, May 2000, pp. 2\u201314. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/SECPRI.2001.924291","volume-title":"Proceedings of the 2001 IEEE Symposium on Security and Privacy","author":"T. Jim","year":"2001","unstructured":"Jim, T.: SD3: A trust management system with certified evaluation. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, May 2001, pp. 106\u2013115. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"#cr-split#-3_CR14.1","unstructured":"Lampson, B.W.: Protection. In: Proceedings of the 5th Princeton Conference on Information Sciences and Systems (1971);"},{"key":"#cr-split#-3_CR14.2","doi-asserted-by":"crossref","unstructured":"Reprinted in ACM Operating Systems Review 8(1), 18???24 (1974)","DOI":"10.1145\/775265.775268"},{"key":"3_CR15","unstructured":"Li, N.: Delegation Logic: A Logic-based Approach to Distributed Authorization. PhD thesis, NewYork University (September 2000)"},{"key":"3_CR16","first-page":"27","volume-title":"Proceedings of the 2000 IEEE Symposium on Security and Privacy","author":"N. Li","year":"2000","unstructured":"Li, N., Grosof, B.N., Feigenbaum, J.: A practically implementable and tractable Delegation Logic. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, May 2000, pp. 27\u201342. IEEE Computer Society Press, Los Alamitos (2000)"},{"issue":"1","key":"3_CR17","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/605434.605438","volume":"6","author":"N. Li","year":"2003","unstructured":"Li, N., Grosof, B.N., Feigenbaum, J.: Delegation Logic: A logic-based approach to distributed authorization. ACM Transaction on Information and System Security (TISSEC)\u00a06(1), 128\u2013171 (2003)","journal-title":"ACM Transaction on Information and System Security (TISSEC)"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/3-540-36388-2_6","volume-title":"Practical Aspects of Declarative Languages","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J.C.: Datalog with constraints:Afoundation for trust management languages. In: Dahl, V., Wadler, P. (eds.) PADL 2003. LNCS, vol.\u00a02562, pp. 58\u201373. Springer, Heidelberg (2002)"},{"key":"3_CR19","first-page":"89","volume-title":"Proceedings of the 16th IEEE Computer Security Foundations Workshop","author":"N. Li","year":"2003","unstructured":"Li, N., Mitchell, J.C.: Understanding spki\/sdsi using first-order logic. In: Proceedings of the 16th IEEE Computer Security Foundations Workshop, June 2003, pp. 89\u2013103. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"3_CR20","unstructured":"Li, N., Mitchell, J.C., Qiu, Y., Winsborough, W.H., Seamons, K.E., Halcrow, M., Jacobson, J.: RTML: A Role-based Trust-management Markup Language (August 2002) (unpublished manuscript), Available at http:\/\/crypto.stanford.edu\/~ninghui\/papers\/rtml.pdf"},{"key":"3_CR21","first-page":"114","volume-title":"Proceedings of the 2002 IEEE Symposium on Security and Privacy","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, May 2002, pp. 114\u2013130. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"3_CR22","first-page":"123","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"N. Li","year":"2003","unstructured":"Li, N., Winsborough, W.H., Mitchell, J.C.: Beyond proof-of-compliance: Safety and availability analysis in trust management. In: Proceedings of IEEE Symposium on Security and Privacy, May 2003, pp. 123\u2013139. IEEE Computer Society Press, Los Alamitos (2003)"},{"issue":"1","key":"3_CR23","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3233\/JCS-2003-11102","volume":"11","author":"N. Li","year":"2003","unstructured":"Li, N., Winsborough, W.H., Mitchell, J.C.: Distributed credential chain discovery in trust management. Journal of Computer Security\u00a011(1), 35\u201386 (2003); Extended abstract appeared in Proceedings of the Eighth ACM Conference on Computer and Communications Security (November 2001)","journal-title":"Journal of Computer Security"},{"issue":"3","key":"3_CR24","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1145\/322017.322025","volume":"24","author":"R.J. Lipton","year":"1977","unstructured":"Lipton, R.J., Snyder, L.: A linear time algorithm for deciding subject security. Journal of ACM\u00a024(3), 455\u2013464 (1977)","journal-title":"Journal of ACM"},{"key":"3_CR25","unstructured":"ITU-T Rec. X.509 (revised). The Directory \u2013 Authentication Framework. International Telecommunication Union (1993)"},{"key":"3_CR26","unstructured":"Rivest, R.L., Lampson, B.: SDSI \u2014 a simple distributed security infrastructure (October 1996), Available at http:\/\/theory.lcs.mit.edu\/~rivest\/sdsi11.html"},{"issue":"2","key":"3_CR27","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1145\/42282.42286","volume":"35","author":"R.S. Sandhu","year":"1988","unstructured":"Sandhu, R.S.: The Schematic Protection Model: Its definition and analysis for acyclic attenuating systems. Journal of ACM\u00a035(2), 404\u2013432 (1988)","journal-title":"Journal of ACM"},{"key":"3_CR28","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/RISP.1992.213266","volume-title":"Proceedings of the 1992 IEEE Symposium on Security and Privacy","author":"R.S. Sandhu","year":"1992","unstructured":"Sandhu, R.S.: The typed access matrix model. In: Proceedings of the 1992 IEEE Symposium on Security and Privacy, May 1992, pp. 122\u2013136. IEEE Computer Society Press, Los Alamitos (1992)"},{"issue":"2","key":"3_CR29","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"3_CR30","unstructured":"Seamons, K.E., Winsborough, W.H., Winslet, M.: Internet credential acceptance policies. In: Proceedings of the 2nd Internationaln Workshop on on Logic Programming Tools for Internet Applications (July 1997), http:\/\/clip.dia.fi.upm.es\/lpnet\/proceedings97\/proceedings.html"},{"key":"3_CR31","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/CSFW.1997.596811","volume-title":"Proceedings of The 10th Computer Security Foundations Workshop","author":"T.T. Simon","year":"1997","unstructured":"Simon, T.T., Zurko, M.E.: Separation of duty in role-based environments. In: Proceedings of The 10th Computer Security Foundations Workshop, June 1997, pp. 183\u2013194. IEEE Computer Society Press, Los Alamitos (1997)"}],"container-title":["Lecture Notes in Computer Science","Logic Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24599-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T14:57:29Z","timestamp":1591714649000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24599-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540206422","9783540245995"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24599-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}