{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:15:07Z","timestamp":1743048907932,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642294136"},{"type":"electronic","value":"9783642294143"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29414-3_19","type":"book-chapter","created":{"date-parts":[[2012,4,24]],"date-time":"2012-04-24T21:45:41Z","timestamp":1335303941000},"page":"349-373","source":"Crossref","is-referenced-by-count":5,"title":["Logical Approaches to Authorization Policies"],"prefix":"10.1007","author":[{"given":"Steve","family":"Barker","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"19_CR1","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., Burrows, M., Lampson, B.W., Plotkin, G.D.: A calculus for access con-trol in distributed systems. ACM Trans. Program. Lang. Syst.\u00a015(4), 706\u2013734 (1993)","journal-title":"ACM Trans. Program. Lang. Syst."},{"unstructured":"ANSI. RBAC, INCITS 359-2004 (2004)","key":"19_CR2"},{"doi-asserted-by":"crossref","unstructured":"Baral, C.: Knowledge Representation, Reasoning and Declarative Problem Solving. Cambridge University Press (2003)","key":"19_CR3","DOI":"10.1017\/CBO9780511543357"},{"doi-asserted-by":"crossref","unstructured":"Barker, S.: The next 700 access control models or a unifying meta-model? In: SACMAT, pp. 187\u2013196 (2009)","key":"19_CR4","DOI":"10.1145\/1542207.1542238"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-642-20895-9_34","volume-title":"Logic Programming and Nonmonotonic Reasoning","author":"S. Barker","year":"2011","unstructured":"Barker, S., Genovese, V.: Secommunity: A Framework for Distributed Access Control. In: Delgrande, J.P., Faber, W. (eds.) LPNMR 2011. LNCS, vol.\u00a06645, pp. 297\u2013303. Springer, Heidelberg (2011)"},{"doi-asserted-by":"crossref","unstructured":"Barker, S., Sergot, M.J., Wijesekera, D.: Status-based access control. ACM Trans. Inf. Syst. Secur.\u00a012(1) (2008)","key":"19_CR6","DOI":"10.1145\/1410234.1410235"},{"issue":"4","key":"19_CR7","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1145\/950191.950194","volume":"6","author":"S. Barker","year":"2003","unstructured":"Barker, S., Stuckey, P.: Flexible access control policy specification with constraint logic programming. ACM Trans. on Information and System Security\u00a06(4), 501\u2013546 (2003)","journal-title":"ACM Trans. on Information and System Security"},{"unstructured":"Bauer, L., Schneider, M.A., Felten, E.W.: A general and flexible access-control system for the web. In: USENIX Security Symposium, pp. 93\u2013108 (2002)","key":"19_CR8"},{"issue":"4","key":"19_CR9","doi-asserted-by":"crossref","first-page":"619","DOI":"10.3233\/JCS-2009-0364","volume":"18","author":"M.Y. Becker","year":"2010","unstructured":"Becker, M.Y., Fournet, C., Gordon, A.D.: SecPAL: Design and semantics of a decentralized authorization language. Journal of Computer Security\u00a018(4), 619\u2013665 (2010)","journal-title":"Journal of Computer Security"},{"doi-asserted-by":"crossref","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer system: Unified exposition and multics interpretation. MITRE-2997 (1976)","key":"19_CR10","DOI":"10.21236\/ADA023588"},{"unstructured":"Biba, K.: Integrity considerations for secure computer systems. MITRE Report MTR-3153 (1977)","key":"19_CR11"},{"doi-asserted-by":"crossref","unstructured":"Brewer, D.F.C., Nash, M.J.: The Chinese Wall security policy. In: IEEE Symposium on Security and Privacy, pp. 206\u2013214 (1989)","key":"19_CR12","DOI":"10.1109\/SECPRI.1989.36295"},{"issue":"4","key":"19_CR13","doi-asserted-by":"crossref","first-page":"333","DOI":"10.3233\/FI-1994-2144","volume":"21","author":"P. Cholak","year":"1994","unstructured":"Cholak, P., Blair, H.A.: The complexity of local stratification. Fundam. Inform.\u00a021(4), 333\u2013344 (1994)","journal-title":"Fundam. Inform."},{"doi-asserted-by":"crossref","unstructured":"Clark, K.: Negation as failure. In: Gallaire, H., Minker, J. (eds.) Logic and Databases, pp. 293\u2013322. Plenum (1978)","key":"19_CR14","DOI":"10.1007\/978-1-4684-3384-5_11"},{"doi-asserted-by":"crossref","unstructured":"Craven, R., Lobo, J., Ma, J., Russo, A., Lupu, E.C., Bandara, A.K.: Expressive policy analysis with enhanced system dynamicity. In: ASIACCS, pp. 239\u2013250 (2009)","key":"19_CR15","DOI":"10.1145\/1533057.1533091"},{"unstructured":"Dell\u2019Armi, T., Faber, W., Ielpa, G., Leone, N., Pfeifer, G.: Aggregate functions in disjunctive logic programming: Semantics, complexity, and implementation in DLV. In: Proceedings of the Eighteenth International Joint Conference on Artificial Intelligence IJCAI, pp. 847\u2013852 (2003)","key":"19_CR16"},{"doi-asserted-by":"crossref","unstructured":"DeTreville, J.: Binder, a logic-based security language. In: Proc. IEEE Symposium on Security and Privacy, pp. 105\u2013113 (2002)","key":"19_CR17","DOI":"10.1109\/SECPRI.2002.1004365"},{"key":"19_CR18","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/BF03037169","volume":"9","author":"M. Gelfond","year":"1991","unstructured":"Gelfond, M., Lifschitz, V.: Classical negation in logic programs and disjunctive databases. New Generation Computing\u00a09, 365\u2013385 (1991)","journal-title":"New Generation Computing"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-540-89982-2_7","volume-title":"Logic Programming","author":"M. Gelfond","year":"2008","unstructured":"Gelfond, M., Lobo, J.: Authorization and Obligation Policies in Dynamic Systems. In: Garcia de la Banda, M., Pontelli, E. (eds.) ICLP 2008. LNCS, vol.\u00a05366, pp. 22\u201336. Springer, Heidelberg (2008)"},{"doi-asserted-by":"crossref","unstructured":"Halpern, J.Y., Weissman, V.: Using first-order logic to reason about policies. ACM Trans. Inf. Syst. Secur.\u00a011(4) (2008)","key":"19_CR20","DOI":"10.1145\/1380564.1380569"},{"issue":"2","key":"19_CR21","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M., Subrahmaninan, V.: Flexible support for mul-tiple access control policies. ACM TODS\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM TODS"},{"doi-asserted-by":"crossref","unstructured":"Jim, T.: SD3: A trust management system with certified evaluation. In: IEEE Symp. Security and Privacy, pp. 106\u2013115 (2001)","key":"19_CR22","DOI":"10.1109\/SECPRI.2001.924291"},{"key":"19_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/BFb0013894","volume-title":"Computer Security - ESORICS 92","author":"J.I. Jones","year":"1992","unstructured":"Jones, J.I., Sergot, M.J.: Formal Specification of Security Requirements Using the Theory of Normative Positions. In: Deswarte, Y., Quisquater, J.-J., Eizenberg, G. (eds.) ESORICS 1992. LNCS, vol.\u00a0648, pp. 103\u2013121. Springer, Heidelberg (1992)"},{"issue":"3","key":"19_CR24","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1093\/jigpal\/4.3.427","volume":"4","author":"A.J.I. Jones","year":"1996","unstructured":"Jones, A.J.I., Sergot, M.J.: A formal characterisation of institutionalised power. Logic Journal of the IGPL\u00a04(3), 427\u2013443 (1996)","journal-title":"Logic Journal of the IGPL"},{"issue":"1","key":"19_CR25","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/BF03037383","volume":"4","author":"R. Kowalski","year":"1986","unstructured":"Kowalski, R., Sergot, M.: A logic-based calculus of events. New Generation Computing\u00a04(1), 67\u201395 (1986)","journal-title":"New Generation Computing"},{"doi-asserted-by":"crossref","unstructured":"Kuhn, T.: The Structure of Scientific Revolutions, 3rd edn. University of Chicago Press (1996)","key":"19_CR26","DOI":"10.7208\/chicago\/9780226458106.001.0001"},{"issue":"1","key":"19_CR27","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/605434.605438","volume":"6","author":"N. Li","year":"2003","unstructured":"Li, N., Grosof, B.N., Feigenbaum, J.: Delegation logic: A logic-based approach to dis- tributed authorization. ACM Trans. Inf. Syst. Secur.\u00a06(1), 128\u2013171 (2003)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust-management framework. In: IEEE Symposium on Security and Privacy, pp. 114\u2013130 (2002)","key":"19_CR28"},{"key":"19_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-83189-8","volume-title":"Foundations of Logic Programming","author":"J. Lloyd","year":"1987","unstructured":"Lloyd, J.: Foundations of Logic Programming. Springer, Heidelberg (1987)"},{"doi-asserted-by":"crossref","unstructured":"Przymusinski, T.C.: On the declarative semantics of deductive databases and logic programs. In: Foundations of Deductive Databases and Logic Programming, pp. 193\u2013216. Morgan Kaufmann (1988)","key":"19_CR30","DOI":"10.1016\/B978-0-934613-40-8.50009-9"},{"unstructured":"Russell, B.: The Principles of Mathematics. Cambridge University Press (1903)","key":"19_CR31"},{"issue":"2","key":"19_CR32","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"doi-asserted-by":"crossref","unstructured":"Thomas, R.: Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In: ACM Workshop on Role-Based Access Control, pp. 13\u201319 (1997)","key":"19_CR33","DOI":"10.1145\/266741.266748"},{"issue":"1","key":"19_CR34","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s10207-006-0008-4","volume":"6","author":"S. Wang","year":"2007","unstructured":"Wang, S., Zhang, Y.: Handling distributed authorization with delegation through answer set programming. Int. J. Inf. Sec.\u00a06(1), 27\u201346 (2007)","journal-title":"Int. J. Inf. Sec."}],"container-title":["Lecture Notes in Computer Science","Logic Programs, Norms and Action"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29414-3_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:40:40Z","timestamp":1743000040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29414-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642294136","9783642294143"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29414-3_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}