{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:50:50Z","timestamp":1725490250779},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540746089"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74610-2_26","type":"book-chapter","created":{"date-parts":[[2007,8,24]],"date-time":"2007-08-24T02:33:31Z","timestamp":1187922811000},"page":"380-394","source":"Crossref","is-referenced-by-count":7,"title":["Core TuLiP Logic Programming for Trust Management"],"prefix":"10.1007","author":[{"given":"Marcin","family":"Czenko","sequence":"first","affiliation":[]},{"given":"Sandro","family":"Etalle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","volume-title":"From Logic Programming to Prolog","author":"K.R. Apt","year":"1997","unstructured":"Apt, K.R.: From Logic Programming to Prolog. Prentice-Hall, Englewood Cliffs (1997)"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1007\/3-540-60043-4_47","volume-title":"Algebraic Methodology and Software Technology","author":"K.R. Apt","year":"1995","unstructured":"Apt, K.R., Luitjes, I.: Verification of Logic Programs with Delay Declarations. In: Alagar, V.S., Nivat, M. (eds.) AMAST 1995. LNCS, vol.\u00a0936, pp. 66\u201390. Springer, Heidelberg (1995)"},{"issue":"6A","key":"26_CR3","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1007\/BF01213601","volume":"6","author":"K.R. Apt","year":"1994","unstructured":"Apt, K.R., Marchiori, E.: Reasoning about Prolog programs: from Modes through Types to Assertions. Formal Aspects of Computing\u00a06(6A), 743\u2013765 (1994)","journal-title":"Formal Aspects of Computing"},{"issue":"7","key":"26_CR4","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1109\/TKDE.2004.1318565","volume":"16","author":"E. Bertino","year":"2004","unstructured":"Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust-\u03c7: A Peer-to-Peer Framework for Trust Establishment. IEEE Trans. Knowl. Data Eng.\u00a016(7), 827\u2013842 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust-Management System, Version 2. IETF RFC 2704 (September 1999)","DOI":"10.17487\/rfc2704"},{"key":"26_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-48749-2_8","volume-title":"Secure Internet Programming","author":"M. Blaze","year":"1999","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The Role of Trust Management in Distributed Systems Security. In: Vitek, J., Jensen, C. (eds.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 185\u2013210. Springer, Heidelberg (1999)"},{"key":"26_CR7","first-page":"164","volume-title":"Proc. of the 17th IEEE Symposium on Security and Privacy","author":"M. Blaze","year":"1996","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. of the 17th IEEE Symposium on Security and Privacy, pp. 164\u2013173. IEEE Computer Society Press, Los Alamitos (1996)"},{"issue":"4","key":"26_CR8","doi-asserted-by":"crossref","first-page":"285","DOI":"10.3233\/JCS-2001-9402","volume":"9","author":"D. Clarke","year":"2001","unstructured":"Clarke, D., Elien, J.E., Ellison, C., Fredette, M., Morcos, A., Rivest, R.L.: Certificate Chain Discovery in SPKI\/SDSI. Journal of Computer Security\u00a09(4), 285\u2013322 (2001)","journal-title":"Journal of Computer Security"},{"key":"26_CR9","unstructured":"Czenko, M.R., Etalle, S.: Core TuLiP. Technical Report TR-CTIT-07-22, Centre for Telematics and Information Technology. University of Twente, Enschede (March 2007)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. IETF RFC 2693 (September 1999)","DOI":"10.17487\/rfc2693"},{"key":"26_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1063979.1063981","volume-title":"Proc. 10th ACM Symp. on Access Control Models and Technologies (SACMAT)","author":"S. Etalle","year":"2005","unstructured":"Etalle, S., Winsborough, W.H.: Integrity Constraints in Trust Management \u2013 Extended Abstract. In: Ahn, G-J. (ed.) Proc. 10th ACM Symp. on Access Control Models and Technologies (SACMAT), pp. 1\u201310. ACM Press, New York (2005), Extended version available at CoRR: http:\/\/arxiv.org\/abs\/cs.CR\/0503061"},{"key":"26_CR12","unstructured":"Freeband Communication. I-Share: Sharing Resources in Virtual Communities for Storage, Communications, and Processing of Multimedia Data. URL: http:\/\/www.freeband.nl\/project.cfm?language=en&id=520"},{"key":"26_CR13","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/SECPRI.2001.924291","volume-title":"Proceedings of the 2001 IEEE Symposium on Security and Privacy","author":"T. Jim","year":"2001","unstructured":"Jim, T.: SD3: A Trust Management System with Certified Evaluation. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 106\u2013115. IEEE Computer Society Press, Los Alamitos (2001)"},{"issue":"1","key":"26_CR14","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/605434.605438","volume":"6","author":"N. Li","year":"2003","unstructured":"Li, N., Grosof, B., Feigenbaum, J.: Delegation Logic: A Logic-based Approach to Distributed Authorization. ACM Transactions on Information and System Security (TISSEC)\u00a06(1), 128\u2013171 (2003)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"26_CR15","first-page":"114","volume-title":"Proc. 2002 IEEE Symposium on Security and Privacy","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J., Winsborough, W.: Design of A Role-based Trust-management Framework. In: Proc. 2002 IEEE Symposium on Security and Privacy, pp. 114\u2013130. IEEE Computer Society Press, Los Alamitos (2002)"},{"issue":"1","key":"26_CR16","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3233\/JCS-2003-11102","volume":"11","author":"N. Li","year":"2003","unstructured":"Li, N., Winsborough, W., Mitchell, J.: Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security\u00a011(1), 35\u201386 (2003)","journal-title":"Journal of Computer Security"},{"key":"26_CR17","volume-title":"Foundations of Logic Programming","author":"J.W. Lloyd","year":"1993","unstructured":"Lloyd, J.W.: Foundations of Logic Programming, 2nd edn. Springer, Heidelberg (1993)","edition":"2"},{"key":"26_CR18","series-title":"Electronic Notes in Theoretical Computer Science","first-page":"113","volume-title":"Proc. of the 1st International Workshop on Security and Trust Management","author":"M. Czenko","year":"2006","unstructured":"Czenko, M., Tran, H., Doumen, J., Etalle, S., Hartel, P., den Hartog, J.: Nonmonotonic Trust Management for P2P Applications. In: Proc. of the 1st International Workshop on Security and Trust Management. Electronic Notes in Theoretical Computer Science, vol.\u00a0157, pp. 113\u2013130. Elsevier, Amsterdam (2006)"},{"key":"26_CR19","unstructured":"OASIS.: eXtensible Access Control Markup Language (XACML) Version 2.0 (February 2005), URL: http:\/\/www.oasis.org"},{"key":"26_CR20","unstructured":"Rivest, R., Lampson, B.: SDSI - A Simple Distributed Security Infrastructure (October 1996), Available at http:\/\/theory.lcs.mit.edu\/~rivest\/sdsi11.html"},{"key":"26_CR21","first-page":"92","volume-title":"POLICY","author":"W.H. Winsborough","year":"2002","unstructured":"Winsborough, W.H., Li, N.: Towards Practical Automated Trust Negotiation. In: POLICY, pp. 92\u2013103. IEEE Computer Society Press, Los Alamitos (2002)"}],"container-title":["Lecture Notes in Computer Science","Logic Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74610-2_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:30:10Z","timestamp":1619519410000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74610-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540746089"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74610-2_26","relation":{},"subject":[]}}