{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:39:23Z","timestamp":1725557963966},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540407973"},{"type":"electronic","value":"9783540452157"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45215-7_18","type":"book-chapter","created":{"date-parts":[[2010,6,23]],"date-time":"2010-06-23T20:27:59Z","timestamp":1277324879000},"page":"217-228","source":"Crossref","is-referenced-by-count":0,"title":["Distributed Access Control: A Logic-Based Approach"],"prefix":"10.1007","author":[{"given":"Steve","family":"Barker","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST Model for Role-Based Access Control: Towards a Unified Standard. In: Proc. 4th ACM Workshop on Role-Based Access Control, pp. 47\u201361 (2000)","DOI":"10.1145\/344287.344301"},{"key":"18_CR2","first-page":"301","volume-title":"DBSec 2000","author":"S. Barker","year":"2000","unstructured":"Barker, S.: Protecting Deductive Databases from Unauthorized Retrievals. In: DBSec 2000, pp. 301\u2013311. Kluwer, Dordrecht (2000)"},{"issue":"2","key":"18_CR3","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M., Subrahmaninan, V.S.: Flexible Support for Multiple Access Control Policies. ACM TODS\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM TODS"},{"key":"18_CR4","first-page":"116","volume-title":"Proc. POLICY 2002","author":"E. Bertino","year":"2002","unstructured":"Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A System to Specify and Manage Multipolicy Access Control Models. In: Proc. POLICY 2002, pp. 116\u2013127. IEEE Computer Society, Los Alamitos (2002)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Barker, S., Stuckey, P.: Flexible Access Control Policy Specification with Constraint Logic Programming. ACM Trans. on Information and System Security (to appear)","DOI":"10.1145\/950191.950194"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Bertino, E., Bonatti, P., Ferrari, E.: TRBAC: A Temporal Role-Based Access Control Model. In: Proc. 5th ACM Workshop on Role-Based Access Control, pp. 21\u201330 (2000)","DOI":"10.1145\/344287.344298"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Barker, S.: Temporal Authorization in the Simplified Event Calculus. In: DBSec 1999, pp. 271\u2013284 (1999)","DOI":"10.1007\/978-0-387-35508-5_18"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks","author":"N. Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol.\u00a01995, pp. 18\u201338. Springer, Heidelberg (2001)"},{"key":"18_CR9","unstructured":"Barker, S.: Status-based Access Control (to appear)"},{"key":"18_CR10","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/B978-0-934613-40-8.50009-9","volume-title":"Foundations of Deductive Databases and Logic Programming","author":"T. Przymusinski","year":"1988","unstructured":"Przymusinski, T.: On the Declarative Semantics of Deductive Databases and Logic Programming. In: Minker, J. (ed.) Foundations of Deductive Databases and Logic Programming, pp. 193\u2013216. Morgan-Kaufmann, San Francisco (1988)"},{"key":"18_CR11","first-page":"293","volume-title":"Logic and Databases","author":"K. Clark","year":"1978","unstructured":"Clark, K.: Negation as Failure. In: Gallaire, H., Minker, J. (eds.) Logic and Databases, pp. 293\u2013322. Plenum, New York (1978)"},{"key":"18_CR12","first-page":"620","volume":"8","author":"A. Gelder van","year":"1991","unstructured":"van Gelder, A., Ross, K., Schlipf, J.: The Well-Founded Semantics for General Logic Programs. JACM\u00a08, 620\u2013650 (1991)","journal-title":"JACM"},{"key":"18_CR13","unstructured":"CGIHTML. The CGIHTML package, http:\/\/www.eekim.com\/software\/cgihtml\/"},{"key":"18_CR14","unstructured":"Sagonas, K., Swift, T., Warren, D., Freire, J., Rao, P.: The XSB System Version 2.0. In: Programmer\u2019s Manual (1999)"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-45619-8_5","volume-title":"Logic Programming","author":"S. Barker","year":"2002","unstructured":"Barker, S.: Access Control for Deductive Databases by Logic Programming. In: Stuckey, P.J. (ed.) ICLP 2002. LNCS, vol.\u00a02401, pp. 54\u201369. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45215-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T06:57:09Z","timestamp":1559199429000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45215-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540407973","9783540452157"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45215-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}