{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:28:17Z","timestamp":1725517697755},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540855620"},{"type":"electronic","value":"9783540855637"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85563-7_39","type":"book-chapter","created":{"date-parts":[[2008,8,31]],"date-time":"2008-08-31T21:00:37Z","timestamp":1220216437000},"page":"278-285","source":"Crossref","is-referenced-by-count":0,"title":["Reasoning for Incomplete Authorizations"],"prefix":"10.1007","author":[{"given":"Yun","family":"Bai","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"20","key":"39_CR1","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/0743-1066(94)90024-8","volume":"19","author":"K.R. Apt","year":"1994","unstructured":"Apt, K.R., Bol, R.N.: Logic programming and negation: A survey. Journal of Logic Programming\u00a019(20), 9\u201371 (1994)","journal-title":"Journal of Logic Programming"},{"key":"39_CR2","unstructured":"Bai, Y.: On XML Document Security. In: International Conference on Software Engineering and Data Engineering, pp. 39\u201342 (2007)"},{"issue":"2-2","key":"39_CR3","doi-asserted-by":"crossref","first-page":"109","DOI":"10.3233\/JCS-2000-82-303","volume":"8","author":"E. Bertino","year":"2000","unstructured":"Bertino, E., Buccafurri, F., Ferrari, E., Rullo, P.: A Logic-based Approach for Enforcing Access Control. Computer Security\u00a08(2-2), 109\u2013140 (2000)","journal-title":"Computer Security"},{"issue":"1","key":"39_CR4","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/605434.605437","volume":"6","author":"E. Bertino","year":"2003","unstructured":"Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A Logical Framework for Reasoning about Access Control Models. ACM Transactions on Information and System Security\u00a06(1), 71\u2013127 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Bettini, C., Jajodia, S., Wang, X.S., Wijesekera, D.: Provisions and Obligations in Policy Management and Security Applications. In: Proceedings of the Very Large Database Conference, pp. 502\u2013513 (2002)","DOI":"10.1016\/B978-155860869-6\/50051-2"},{"key":"39_CR6","unstructured":"Chomicki, J., Lobo, J., Naqvi, S.: A Logical Programming Approach to Conflict Resolution in Policy Management. In: Proceedings of International Conference on Principles of Knowledge Representation and Reasoning, pp. 121\u2013132 (2000)"},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Crescini, V., Zhang, Y.: A logic Based Approach for Dynamic Access Control. In: Proceedings of 17th Australian Joint Conference on Artificial Intelligence (AI 2004), pp. 623\u2013635 (2004)","DOI":"10.1007\/978-3-540-30549-1_54"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Damiani, E., Vimercati, S., Paraboschi, S., Samarati, P.: A Fine Grained Access Control System for XML Documents. ACM Transactions on Information and System Security, 160\u2013202 (2002)","DOI":"10.1145\/505586.505590"},{"key":"39_CR9","first-page":"1070","volume-title":"Proceedings of the Fifth Joint International Conference and Symposium","author":"M. Gelfond","year":"1988","unstructured":"Gelfond, M., Lifschitz, V.: The stable model semantics for logic programming. In: Proceedings of the Fifth Joint International Conference and Symposium, pp. 1070\u20131080. MIT Press, Cambridge (1988)"},{"key":"39_CR10","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/BF03037169","volume":"9","author":"M. Gelfond","year":"1991","unstructured":"Gelfond, M., Lifschitz, V.: Classical negation in logic programs and disjunctive databases. New Generation Computing\u00a09, 365\u2013386 (1991)","journal-title":"New Generation Computing"},{"issue":"2","key":"39_CR11","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"29","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible Support for Multiple Access Control Policies. ACM Transactions on Database Systems\u00a029(2), 214\u2013260 (2001)","journal-title":"ACM Transactions on Database Systems"},{"issue":"1","key":"39_CR12","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/605434.605438","volume":"6","author":"N. Li","year":"2003","unstructured":"Li, N., Grosof, B., Feigenbaum, J.: Delegation Logic: A Logic-based Approach to Distributed Authorization. ACM Transactions on Information and System Security\u00a06(1), 128\u2013171 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Woo, T.Y.C., Lam, S.S.: Authorization in Distributed systems: A Formal Approach. In: Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 33\u201350 (1992)","DOI":"10.1109\/RISP.1992.213272"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Bai, Y.: The Characterization on the Uniqueness of the solution \u00acholds(S 1, R, O) can be derived. Answer Set for Prioritized Logic Programs. In: Proceedings of the International Symposium on methodologies on Intelligent Systems, pp. 349\u2013356 (2003)","DOI":"10.1007\/978-3-540-39592-8_49"},{"issue":"4","key":"39_CR15","first-page":"183","volume":"14","author":"Y. Zhang","year":"2001","unstructured":"Zhang, Y., Wu, C.M., Bai, Y.: Implementing Prioritized Logic Programming. AI Communications\u00a014(4), 183\u2013196 (2001)","journal-title":"AI Communications"}],"container-title":["Lecture Notes in Computer Science","Knowledge-Based Intelligent Information and Engineering Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85563-7_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:32:22Z","timestamp":1606185142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85563-7_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540855620","9783540855637"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85563-7_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}