{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T04:40:35Z","timestamp":1737693635697,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540774419"},{"type":"electronic","value":"9783540774426"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77442-6_7","type":"book-chapter","created":{"date-parts":[[2007,12,19]],"date-time":"2007-12-19T04:35:03Z","timestamp":1198038903000},"page":"84-99","source":"Crossref","is-referenced-by-count":19,"title":["The Role of Abduction in Declarative\u00a0Authorization\u00a0Policies"],"prefix":"10.1007","author":[{"given":"Moritz Y.","family":"Becker","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Nanz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust management framework. In: Symposium on Security and Privacy, pp. 114\u2013130 (2002)"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"DeTreville, J.: Binder, a logic-based security language. In: IEEE Symposium on Security and Privacy, pp. 105\u2013113 (2002)","DOI":"10.1109\/SECPRI.2002.1004365"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Li, N., Mitchell, J.C.: Datalog with constraints: A foundation for trust management languages. Practical Aspects of Declarative Languages, 58\u201373 (2003)","DOI":"10.1007\/3-540-36388-2_6"},{"key":"7_CR4","unstructured":"Becker, M.Y., Sewell, P.: Cassandra: Flexible trust management, applied to electronic health records. In: IEEE Computer Security Foundations Workshop (2004)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Becker, M.Y., Fournet, C., Gordon, A.D.: Design and semantics of a decentralized authorization language. In: IEEE Computer Security Foundations Symposium (2007)","DOI":"10.1109\/CSF.2007.18"},{"key":"7_CR6","unstructured":"Peirce, C.: Abduction and Induction. In: Philosophical Writings of Peirce (1955)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Kakas, A.C., Kowalski, R.A., Toni, F.: The role of abduction in logic programming. In: Gabbay, D.M., Hogger, C.J., Robinson, J.A. (eds.) Handbook of Logic in Artificial Intelligence and Logic Programming, vol.\u00a05, pp. 235\u2013324 (1998)","DOI":"10.1093\/oso\/9780198537922.003.0007"},{"key":"7_CR8","unstructured":"Becker, M.Y., Nanz, S.: The role of abduction in declarative authorization policies. Technical Report MSR-TR-2007-105, Microsoft Research (2007), http:\/\/research.microsoft.com\/research\/pubs\/view.aspx?tr_id=1348"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Becker, M.Y., Sewell, P.: Cassandra: distributed access control policies with tunable expressiveness. In: IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 159\u2013168 (2004)","DOI":"10.1109\/POLICY.2004.1309162"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/3-540-16492-8_66","volume-title":"ICLP 1986","author":"H. Tamaki","year":"1986","unstructured":"Tamaki, H., Sato, T.: OLD resolution with tabulation. In: Shapiro, E. (ed.) ICLP 1986. LNCS, vol.\u00a0225, pp. 84\u201398. Springer, Heidelberg (1986)"},{"issue":"1","key":"7_CR11","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/227595.227597","volume":"43","author":"W. Chen","year":"1996","unstructured":"Chen, W., Warren, D.S.: Tabled evaluation with delaying for general logic programs. Journal of the ACM\u00a043(1), 20\u201374 (1996)","journal-title":"Journal of the ACM"},{"key":"7_CR12","volume-title":"Foundations of Databases","author":"S. Abiteboul","year":"1995","unstructured":"Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, Reading (1995)"},{"issue":"4","key":"7_CR13","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1017\/S1471068403001960","volume":"4","author":"J.J. Alferes","year":"2004","unstructured":"Alferes, J.J., Pereira, L.M., Swift, T.: Abduction in well-founded semantics and generalized stable models via tabled dual programs. Theory and Practice of Logic Programming\u00a04(4), 383\u2013428 (2004)","journal-title":"Theory and Practice of Logic Programming"},{"issue":"2","key":"7_CR14","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/S0743-1066(97)00074-5","volume":"34","author":"M. Denecker","year":"1998","unstructured":"Denecker, M., Schreye, D.D.: SLDNFA: An abductive procedure for abductive logic programs. Journal of Logic Programming\u00a034(2), 111\u2013167 (1998)","journal-title":"Journal of Logic Programming"},{"key":"7_CR15","unstructured":"Verbaeten, S.: Termination analysis for abductive general logic programs. In: International Conference on Logic Programming, pp. 365\u2013379 (1999)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition, vol.\u00a01 (2000)","DOI":"10.1109\/DISCEX.2000.824965"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Winsborough, W.H., Li, N.: Towards practical automated trust negotiation. In: IEEE International Workshop on Policies for Distributed Systems and Networks (2002)","DOI":"10.1109\/POLICY.2002.1011297"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Koshutanski, H., Massacci, F.: Interactive access control for web services. In: International Information Security Conference, pp. 151\u2013166 (2004)","DOI":"10.1007\/1-4020-8143-X_10"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Kapadia, A., Sampemane, G., Campbell, R.H.: Know why your access was denied: regulating feedback for usable security. In: ACM conference on computer and communications security, pp. 52\u201361 (2004)","DOI":"10.1145\/1030083.1030092"},{"key":"7_CR20","unstructured":"Bonatti, P.A., Olmedilla, D., Peer, J.: Advanced policy explanations on the web. In: European Conference on Artificial Intelligence, pp. 200\u2013204 (2006)"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Becker, M.Y., Nanz, S.: A logic for state-modifying authorization policies. In: European Symposium on Research in Computer Security (2007)","DOI":"10.1007\/978-3-540-74835-9_14"}],"container-title":["Lecture Notes in Computer Science","Practical Aspects of Declarative Languages"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77442-6_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T03:33:51Z","timestamp":1737689631000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77442-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540774419","9783540774426"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77442-6_7","relation":{},"subject":[]}}