{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:20:05Z","timestamp":1743049205232,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540229872"},{"type":"electronic","value":"9783540301080"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30108-0_1","type":"book-chapter","created":{"date-parts":[[2010,9,16]],"date-time":"2010-09-16T18:15:03Z","timestamp":1284660903000},"page":"1-16","source":"Crossref","is-referenced-by-count":5,"title":["Incorporating Dynamic Constraints in the Flexible Authorization Framework"],"prefix":"10.1007","author":[{"given":"Shiping","family":"Chen","sequence":"first","affiliation":[]},{"given":"Duminda","family":"Wijesekera","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"1_CR1","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/382912.382913","volume":"3","author":"G. Ahn","year":"2000","unstructured":"Ahn, G., Sandhu, R.: Role-based authorization constraints specification. ACM Transactions on Information and Systems Security\u00a03(4), 207\u2013226 (2000)","journal-title":"ACM Transactions on Information and Systems Security"},{"key":"1_CR2","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/B978-0-934613-40-8.50006-3","volume-title":"Foundations of Deductive Databases and Logic Programming","author":"K.R. Apt","year":"1988","unstructured":"Apt, K.R., Blair, H., Walker, A.: Towards a theory of declarative knowledge. In: Foundations of Deductive Databases and Logic Programming, pp. 89\u2013148. Morgan Kaufmann, San Francisco (1988)"},{"issue":"3","key":"1_CR3","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/BF02341854","volume":"8","author":"C. Baral","year":"1992","unstructured":"Baral, C., Subrahmanian, V.S.: Stable and extension class theory for logic programs and default theories. Journal of Automated Reasoning\u00a08(3), 345\u2013366 (1992)","journal-title":"Journal of Automated Reasoning"},{"issue":"4","key":"1_CR4","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1145\/950191.950194","volume":"6","author":"S. Barker","year":"2004","unstructured":"Barker, S., Stuckey, P.: Flexible access control policy specification with constraint logic programming. ACM Transactions on Information and System Security\u00a06(4), 501\u2013546 (2004)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"1","key":"1_CR5","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/300830.300837","volume":"2","author":"E. Bertino","year":"1999","unstructured":"Bertino, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management. ACM Transactions on Information Systems Security\u00a02(1), 65\u2013104 (1999)","journal-title":"ACM Transactions on Information Systems Security"},{"issue":"1","key":"1_CR6","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/605434.605437","volume":"6","author":"E. Bertino","year":"2003","unstructured":"Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A logical framework for reasoning about access control models. ACM Transactions on Information and System Security\u00a06(1), 71\u2013127 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"key":"1_CR7","first-page":"111","volume-title":"Proc. International Conference on Logic Programming (ICLP)","author":"D. Chan","year":"1988","unstructured":"Chan, D.: Constructive negation based on the completed databases. In: Kowalski, R.A., Bowen, K.A. (eds.) Proc. International Conference on Logic Programming (ICLP), pp. 111\u2013125. MIT Press, Cambridge (1988)"},{"key":"1_CR8","first-page":"477","volume-title":"Proc. North-American Conference on Logic Programming","author":"D. Chan","year":"1989","unstructured":"Chan, D.: An extension of constructive negation and its application in coroutining. In: Lusk, E., Overbeek, R. (eds.) Proc. North-American Conference on Logic Programming, pp. 477\u2013489. MIT Press, Cambridge (1989)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Chen, S., Wijesekera, D., Jajodia, S.: Incorporating dynamic constraints in the flexible authorization framework. Technical Report CSIS-TR-04-01, Center for Secure Information Systems, George Mason University (June 2004)","DOI":"10.4018\/978-1-59140-186-5.ch004"},{"issue":"2","key":"1_CR10","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/S0743-1066(96)00092-1","volume":"32","author":"F. Fages","year":"1997","unstructured":"Fages, F.: Constructive negation by pruning. Journal of Logic Programming\u00a032(2), 85\u2013118 (1997)","journal-title":"Journal of Logic Programming"},{"issue":"4","key":"1_CR11","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/S0743-1066(85)80005-4","volume":"2","author":"M. Fitting","year":"1985","unstructured":"Fitting, M.: A kripke-kleene semantics for logic programs. Journal of Logic Programming\u00a02(4), 295\u2013312 (1985)","journal-title":"Journal of Logic Programming"},{"issue":"1","key":"1_CR12","doi-asserted-by":"crossref","first-page":"19","DOI":"10.3233\/FI-1990-13104","volume":"13","author":"M. Fitting","year":"1990","unstructured":"Fitting, M., Ben-Jacob, M.: Stratified, weak stratified, and three-valued semantics. Fundamenta Informaticae, Special issue on LOGIC PROGRAMMING\u00a013(1), 19\u201333 (1990)","journal-title":"Fundamenta Informaticae, Special issue on LOGIC PROGRAMMING"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Francois, F., Roberta, G.: A hierarchy of semantics for normal constraint logic programs. In: Algebraic and Logic Programming, pp. 77\u201391 (1996)","DOI":"10.1007\/3-540-61735-3_5"},{"key":"1_CR14","unstructured":"Gelfond, M., Lifschitz, L.: The stable model semantics for logic programming. In: Proc. Fifth International Conference and Symposium on Logic Programming, pp. 1070\u20131080 (1988)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Jaeger, T.: On the increasing importance of constraints. In: Proc. of the Fourth Role Based Access Control, Fairfax, VA, pp. 33\u201342 (1999)","DOI":"10.1145\/319171.319175"},{"issue":"2","key":"1_CR16","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1145\/317087.317091","volume":"2","author":"T. Jaeger","year":"1999","unstructured":"Jaeger, T., Prakash, A., Liedtke, J., Islam, N.: Flexible control of downloaded executable content. ACM Transactions on Information Systems Security\u00a02(2), 177\u2013228 (1999)","journal-title":"ACM Transactions on Information Systems Security"},{"issue":"2","key":"1_CR17","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Transactions on Database Systems\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM Transactions on Database Systems"},{"issue":"4","key":"1_CR18","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1016\/0743-1066(87)90007-0","volume":"4","author":"K.J. Kunen","year":"1987","unstructured":"Kunen, K.J.: Negation in logic programming. Journal of Logic Programming\u00a04(4), 298\u2013308 (1987)","journal-title":"Journal of Logic Programming"},{"issue":"1","key":"1_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/300830.300832","volume":"2","author":"M. Nayanchama","year":"1999","unstructured":"Nayanchama, M., Osborn, S.: The role graph model and conflict of interest. ACM Transactions on Information and Systems Security\u00a02(1), 3\u201333 (1999)","journal-title":"ACM Transactions on Information and Systems Security"},{"issue":"2","key":"1_CR20","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/354876.354878","volume":"3","author":"S. Osborn","year":"2000","unstructured":"Osborn, S., Sandhu, R., Munawer, Q.: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and Systems\u00a03(2), 85\u2013106 (2000)","journal-title":"ACM Transactions on Information and Systems"},{"issue":"2","key":"1_CR21","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Stuckey, P.: Constructive negation for constraint logic programming. In: Logic in Computer Science, pp. 328\u2013339 (1991)","DOI":"10.1109\/LICS.1991.151657"},{"issue":"1","key":"1_CR23","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1006\/inco.1995.1048","volume":"118","author":"P. Stuckey","year":"1995","unstructured":"Stuckey, P.: Negation and constraint logic programming. Information and Computation\u00a0118(1), 12\u201333 (1995)","journal-title":"Information and Computation"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"van Gelder, A.: The alternating fixpoint of logic programs with negation. In: Proc. 8th ACM Symposium on Principles of Database Systems, pp. 1\u201310 (1989)","DOI":"10.1145\/73721.73722"},{"issue":"2-3","key":"1_CR25","doi-asserted-by":"crossref","first-page":"107","DOI":"10.3233\/JCS-1993-22-304","volume":"2","author":"T.Y.C. Woo","year":"1993","unstructured":"Woo, T.Y.C., Lam, S.S.: Authorizations in distributed systems: A new approach. Journal of Computer Security\u00a02(2-3), 107\u2013136 (1993)","journal-title":"Journal of Computer Security"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2004"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30108-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T21:52:07Z","timestamp":1740520327000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30108-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540229872","9783540301080"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30108-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}