{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:48:55Z","timestamp":1725583735337},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642207747"},{"type":"electronic","value":"9783642207754"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20775-4_4","type":"book-chapter","created":{"date-parts":[[2011,5,21]],"date-time":"2011-05-21T05:38:36Z","timestamp":1305956316000},"page":"66-83","source":"Crossref","is-referenced-by-count":0,"title":["An Access Control Language Based on Term Rewriting and Description Logic"],"prefix":"10.1007","author":[{"given":"Michele","family":"Baggi","sequence":"first","affiliation":[]},{"given":"Demis","family":"Ballis","sequence":"additional","affiliation":[]},{"given":"Moreno","family":"Falaschi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"volume-title":"The Description Logic Handbook","year":"2003","key":"4_CR1","unstructured":"Baader, F., Calvanese, D., McGuinness, D., Nardi, D., Patel-Scheider, P. (eds.): The Description Logic Handbook. Cambridge University Press, Cambridge (2003)"},{"key":"4_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139172752","volume-title":"Term Rewriting and All That","author":"F. Baader","year":"1998","unstructured":"Baader, F., Nipkow, T.: Term Rewriting and All That. Cambridge University Press, Cambridge (1998)"},{"key":"4_CR3","unstructured":"Baggi, M., Ballis, D., Falaschi, M.: Paul - The Policy Specification and Analysis Language (2009), http:\/\/sole.dimi.uniud.it\/~michele.baggi\/paul"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/11805588_13","volume-title":"Data and Applications Security XX","author":"S. Barker","year":"2006","unstructured":"Barker, S., Fern\u00e1ndez, M.: Term rewriting for access control. In: Damiani, E., Liu, P. (eds.) Data and Applications Security 2006. LNCS, vol.\u00a04127, pp. 179\u2013193. Springer, Heidelberg (2006)"},{"key":"4_CR5","unstructured":"Bechhofer, S..: The DIG Description Logic Interface: DIG\/1.1. Tech. rep., University of Manchester (2003)"},{"key":"4_CR6","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1145\/1389449.1389476","volume-title":"10th Int\u2019l ACM SIGPLAN Conference on Principles and Practice of Declarative Programming (PPDP 2008)","author":"C. Bertolissi","year":"2008","unstructured":"Bertolissi, C., Fern\u00e1ndez, M.: A Rewriting Framework for the Composition of Access Control Policies. In: 10th Int\u2019l ACM SIGPLAN Conference on Principles and Practice of Declarative Programming (PPDP 2008), pp. 217\u2013225. ACM, New York (2008)"},{"issue":"1","key":"4_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/504909.504910","volume":"5","author":"P. Bonatti","year":"2002","unstructured":"Bonatti, P., De Capitani di Vimercati, S., Samarati, P.: An Algebra for Composing Access Control Policies. ACM Transactions on Information and System Security\u00a05(1), 1\u201335 (2002)","journal-title":"ACM Transactions on Information and System Security"},{"key":"4_CR8","unstructured":"World Wide\u00a0Web Consortium\u00a0(W3C): OWL Web Ontology Language Guide (2004), http:\/\/www.w3.org\/"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-540-27834-4_41","volume-title":"Web Engineering","author":"E. Damiani","year":"2004","unstructured":"Damiani, E., di Vimercati, S.D.C., Fugazza, C., Samarati, P.: Extending policy languages to the semantic web. In: Koch, N., Fraternali, P., Wirsing, M. (eds.) ICWE 2004. LNCS, vol.\u00a03140, pp. 330\u2013343. Springer, Heidelberg (2004)"},{"key":"4_CR10","unstructured":"Dean, M., Schreiber, G.: OWL Web Ontology Language Reference \u2014 W3C recommendation (2004), http:\/\/www.w3.org\/TR\/owl-ref\/"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/978-3-540-39718-2_22","volume-title":"The Semantic Web - ISWC 2003","author":"G. Denker","year":"2003","unstructured":"Denker, G., Kagal, L., Finin, T.W., Paolucci, M., Sycara, K.P.: Security for DAML web services: Annotation and matchmaking. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol.\u00a02870, pp. 335\u2013350. Springer, Heidelberg (2003)"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/SECPRI.2002.1004365","volume-title":"2002 IEEE Symposium on Security and Privacy","author":"J. DeTreville","year":"2002","unstructured":"DeTreville, J.: Binder, a Logic-Based Security Language. In: 2002 IEEE Symposium on Security and Privacy, pp. 105\u2013113. IEEE Computer Society, Los Alamitos (2002)"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1007\/978-3-540-74835-9_38","volume-title":"Computer Security \u2013 ESORICS 2007","author":"D.J. Dougherty","year":"2007","unstructured":"Dougherty, D.J., Kirchner, C., Kirchner, H., de Oliveira, A.S.: Modular access control via strategic rewriting. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 578\u2013593. Springer, Heidelberg (2007)"},{"issue":"4","key":"4_CR14","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/637411.637416","volume":"31","author":"T.W. Finin","year":"2002","unstructured":"Finin, T.W., Joshi, A.: Agents, Trust, and Information Access on the Semantic Web. SIGMOD Record\u00a031(4), 30\u201335 (2002)","journal-title":"SIGMOD Record"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-540-25956-5_24","volume-title":"The Semantic Web: Research and Applications","author":"R. Gavriloaie","year":"2004","unstructured":"Gavriloaie, R., Nejdl, W., Olmedilla, D., Seamons, K.E., Winslett, M.: No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web. In: Bussler, C.J., Davies, J., Fensel, D., Studer, R. (eds.) ESWS 2004. LNCS, vol.\u00a03053, pp. 342\u2013356. Springer, Heidelberg (2004)"},{"key":"4_CR16","volume-title":"21st National Conference on Artificial Intelligence AAAI 2006","author":"L. Kagal","year":"2006","unstructured":"Kagal, L., Berners-Lee, T., Connolly, D., Weitzner, D.J.: Using Semantic Web Technologies for Policy Management on the Web. In: 21st National Conference on Artificial Intelligence AAAI 2006, AAAI Press, Menlo Park (2006)"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/978-3-540-39718-2_26","volume-title":"The Semantic Web - ISWC 2003","author":"L. Kagal","year":"2003","unstructured":"Kagal, L., Finin, T.W., Joshi, A.: A policy based approach to security for the semantic web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol.\u00a02870, pp. 402\u2013418. Springer, Heidelberg (2003)"},{"key":"4_CR18","first-page":"55","volume":"234","author":"C. Kirchner","year":"2009","unstructured":"Kirchner, C., Kirchner, H., de Oliveira, A.S.: Analysis of Rewrite-Based Access Control Policies. ENTCS\u00a0234, 55\u201375 (2009)","journal-title":"ENTCS"},{"key":"4_CR19","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1145\/1242572.1242664","volume-title":"16th Int\u2019l Conference on World Wide Web (WWW 2007)","author":"V. Kolovski","year":"2007","unstructured":"Kolovski, V., Hendler, J., Parsia, B.: Analyzing Web Access Control Policies. In: 16th Int\u2019l Conference on World Wide Web (WWW 2007), pp. 677\u2013686. ACM, New York (2007)"},{"issue":"1","key":"4_CR20","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/605434.605438","volume":"6","author":"N. Li","year":"2003","unstructured":"Li, N., Grosof, B.N., Feigenbaum, J.: Delegation Logic: A Logic-Based Approach to Distributed Authorization. ACM Transactions on Information and System Security\u00a06(1), 128\u2013171 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"key":"4_CR21","unstructured":"Moses, T.: eXtensible Access Control Markup Language (XACML) v2.0. Technical report, OASIS (2005)"},{"key":"4_CR22","volume-title":"EATCS Monographs on Theoretical Computer Science","author":"P. Padawitz","year":"1988","unstructured":"Padawitz, P.: Computing in Horn Clause Theories. In: EATCS Monographs on Theoretical Computer Science, vol.\u00a016. Springer, Heidelberg (1988)"},{"issue":"2","key":"4_CR23","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.websem.2007.03.004","volume":"5","author":"E. Sirin","year":"2007","unstructured":"Sirin, E., Parsia, B., Grau, B.C., Kalyanpur, A., Katz, Y.: Pellet: a Practical OWL-DL Reasoner. Journal of Web Semantics\u00a05(2), 51\u201353 (2007)","journal-title":"Journal of Web Semantics"},{"issue":"4","key":"4_CR24","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MIS.2004.31","volume":"19","author":"A. Uszok","year":"2004","unstructured":"Uszok, A., Bradshaw, J.M., Johnson, M., Jeffers, R., Tate, A., Dalton, J., Aitken, J.S.: Kaos Policy Management for Semantic Web Services. IEEE Intelligent Systems\u00a019(4), 32\u201341 (2004)","journal-title":"IEEE Intelligent Systems"},{"key":"4_CR25","unstructured":"World Wide\u00a0Web Consortium\u00a0(W3C): Web Services Policy 1.2 - Framework, WS-Policy (2006), http:\/\/www.w3.org\/Submission\/WS-Policy\/"},{"key":"4_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/11560647_25","volume-title":"Theoretical Aspects of Computing \u2013 ICTAC 2005","author":"C. Zhao","year":"2005","unstructured":"Zhao, C., Heilili, N., Liu, S., Lin, Z.: Representation and reasoning on RBAC: A description logic approach. In: Van Hung, D., Wirsing, M. (eds.) ICTAC 2005. LNCS, vol.\u00a03722, pp. 381\u2013393. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Functional and Constraint Logic Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20775-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T21:43:46Z","timestamp":1637703826000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20775-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642207747","9783642207754"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20775-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}