{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T17:40:41Z","timestamp":1684345241923},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2008,4,12]],"date-time":"2008-04-12T00:00:00Z","timestamp":1207958400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Higher-Order Symb Comput"],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1007\/s10990-008-9030-8","type":"journal-article","created":{"date-parts":[[2008,4,11]],"date-time":"2008-04-11T20:09:10Z","timestamp":1207944550000},"page":"5-35","source":"Crossref","is-referenced-by-count":7,"title":["Efficient and flexible access control via Jones-optimal logic program specialisation"],"prefix":"10.1007","volume":"21","author":[{"given":"Steve","family":"Barker","sequence":"first","affiliation":[]},{"given":"Michael","family":"Leuschel","sequence":"additional","affiliation":[]},{"given":"Mauricio","family":"Varea","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,4,12]]},"reference":[{"key":"9030_CR1","volume-title":"Meta-logics and Logic Programming","author":"K.R. Apt","year":"1995","unstructured":"Apt, K.R., Turini, F.: Meta-logics and Logic Programming. MIT Press, Cambridge (1995)"},{"key":"9030_CR2","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/0743-1066(94)90025-6","volume":"19\/20","author":"C. Baral","year":"1994","unstructured":"Baral, C., Gelfond, M.: Logic programming and knowledge representation. JLP 19\/20, 73\u2013148 (1994)","journal-title":"JLP"},{"key":"9030_CR3","unstructured":"Barker, S.: Web usage control in RSCLP. In: Proc. 18th IFIP WG Conf. on Database Security (2004)"},{"issue":"4","key":"9030_CR4","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1145\/950191.950194","volume":"6","author":"S. Barker","year":"2003","unstructured":"Barker, S., Stuckey, P.: Flexible access control policy specification with constraint logic programming. ACM TISSEC 6(4), 501\u2013546 (2003)","journal-title":"ACM TISSEC"},{"key":"9030_CR5","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1145\/1014007.1014026","volume-title":"PEPM\u201904: Proceedings of the 2004 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation","author":"S. Barker","year":"2004","unstructured":"Barker, S., Leuschel, M., Varea, M.: Efficient and flexible access control via logic program specialisation. In: PEPM\u201904: Proceedings of the 2004 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation, New York, NY, USA, 2004, pp. 190\u2013199. ACM Press, New York (2004)"},{"issue":"3","key":"9030_CR6","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1145\/293910.293151","volume":"23","author":"E. Bertino","year":"1998","unstructured":"Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: An access control model supporting periodicity constraints and temporal reasoning. ACM TODS 23(3), 231\u2013285 (1998)","journal-title":"ACM TODS"},{"key":"9030_CR7","doi-asserted-by":"crossref","unstructured":"Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A system to specify and manage multipolicy access control models. In: Proc. IEEE 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002) (2002)","DOI":"10.1109\/POLICY.2002.1011299"},{"key":"9030_CR8","doi-asserted-by":"crossref","unstructured":"Bondorf, A., Palsberg, J.: Generating action compilers by partial evaluation. J. Funct. Program. 6(2) (1996)","DOI":"10.1017\/S0956796800001684"},{"key":"9030_CR9","unstructured":"Briney, A.: Information security 2000. In: Information Security, pp. 40\u201368 (2000)"},{"key":"9030_CR10","first-page":"293","volume-title":"Logic and Databases","author":"K. Clark","year":"1978","unstructured":"Clark, K.: Negation as failure. In: Gallaire, H., Minker, J. (eds.) Logic and Databases, pp. 293\u2013322. Plenum, New York (1978)"},{"key":"9030_CR11","volume-title":"An Introduction to Database Systems","author":"C. Date","year":"2003","unstructured":"Date, C.: An Introduction to Database Systems. Addison\u2013Wesley, Reading (2003)"},{"key":"9030_CR12","unstructured":"Ferraiolo, D., Cugini, J., Kuhn, R.: Role-based access control (RBAC): features and motivations. In: Proc. of the 11th Annual Computer Security Applications Conf., pp. 241\u2013248 (1995)"},{"issue":"4","key":"9030_CR13","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1023\/A:1010095604496","volume":"12","author":"Y. Futamura","year":"1999","unstructured":"Futamura, Y.: Partial evaluation of computation process\u2014an approach to a compiler-compiler. Higher-Order Symb. Comput. 12(4), 381\u2013391 (1999). Reprinted from Systems \u22c5 Computers \u22c5 Controls 2(5), 1971, with a foreword","journal-title":"Higher-Order Symb. Comput."},{"key":"9030_CR14","first-page":"88","volume-title":"Proceedings of PEPM\u201993, the ACM Sigplan Symposium on Partial Evaluation and Semantics-Based Program Manipulation","author":"J. Gallagher","year":"1993","unstructured":"Gallagher, J.: Tutorial on specialisation of logic programs. In: Proceedings of PEPM\u201993, the ACM Sigplan Symposium on Partial Evaluation and Semantics-Based Program Manipulation, pp. 88\u201398. ACM Press, New York (1993)"},{"key":"9030_CR15","first-page":"229","volume-title":"Proceedings of Meta90 Workshop on Meta Programming in Logic","author":"J. Gallagher","year":"1990","unstructured":"Gallagher, J., Bruynooghe, M.: Some low-level transformations for logic programs. In: Bruynooghe, M. (ed.) Proceedings of Meta90 Workshop on Meta Programming in Logic, Leuven, Belgium, pp. 229\u2013244 (1990)"},{"key":"9030_CR16","doi-asserted-by":"crossref","unstructured":"Grosof, B., Poon, T.: Representing agent contracts with exceptions using XML rules, ontologies and process descriptions. In: WWW 2003, pp. 340\u2013349 (2003)","DOI":"10.2139\/ssrn.442040"},{"key":"9030_CR17","series-title":"Oxford Science Publications","first-page":"421","volume-title":"Handbook of Logic in Artificial Intelligence and Logic Programming","author":"P. Hill","year":"1998","unstructured":"Hill, P., Gallagher, J.: Meta-programming in logic programming. In: Gabbay, D.M., Hogger, C.J., Robinson, J.A. (eds.) Handbook of Logic in Artificial Intelligence and Logic Programming. Oxford Science Publications, vol. 5, pp. 421\u2013497. Oxford University Press, London (1998)"},{"issue":"2","key":"9030_CR18","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M., Subrahmanian, V.: Flexible support for multiple access control policies. ACM TODS 26(2), 214\u2013260 (2001)","journal-title":"ACM TODS"},{"key":"9030_CR19","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1007\/BFb0032064","volume-title":"Automata, Languages and Programming","author":"N.D. Jones","year":"1990","unstructured":"Jones, N.D.: Partial evaluation, self-application and types. In: Paterson, M.S. (ed.) Automata, Languages and Programming. LNCS, vol. 443, pp. 639\u2013659. Springer, Berlin (1990)"},{"key":"9030_CR20","volume-title":"Partial Evaluation and Automatic Program Generation","author":"N.D. Jones","year":"1993","unstructured":"Jones, N.D., Gomard, C.K., Sestoft, P.: Partial Evaluation and Automatic Program Generation. Prentice Hall, New York (1993)"},{"issue":"3","key":"9030_CR21","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/0743-1066(89)90022-8","volume":"7","author":"K. Kunen","year":"1989","unstructured":"Kunen, K.: Signed data dependencies in logic programs. J. Log. Program. 7(3), 231\u2013245 (1989)","journal-title":"J. Log. Program."},{"key":"9030_CR22","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/BF03037513","volume":"8","author":"A. Lakhotia","year":"1990","unstructured":"Lakhotia, A., Sterling, L.: How to control unfolding when specializing interpreters. New Gener. Comput. 8, 61\u201370 (1990)","journal-title":"New Gener. Comput."},{"key":"9030_CR23","series-title":"LNCS","first-page":"379","volume-title":"The Essence of Computation\u2014Essays Dedicated to Neil Jones","author":"M. Leuschel","year":"2002","unstructured":"Leuschel, M.: Homeomorphic embedding for online termination of symbolic methods. In: Mogensen,\u00a0T.\u00c6., Schmidt,\u00a0D., Sudborough,\u00a0I.H. (eds.) The Essence of Computation\u2014Essays Dedicated to Neil Jones. LNCS, vol. 2566, pp. 379\u2013403. Springer, Berlin (2002)"},{"issue":"4\u20135","key":"9030_CR24","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1017\/S147106840200145X","volume":"2","author":"M. Leuschel","year":"2002","unstructured":"Leuschel, M., Bruynooghe, M.: Logic program specialisation through partial deduction: Control issues. Theory Practice Log. Program. 2(4\u20135), 461\u2013515 (2002)","journal-title":"Theory Practice Log. Program."},{"issue":"1","key":"9030_CR25","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/S0743-1066(97)10012-7","volume":"36","author":"M. Leuschel","year":"1998","unstructured":"Leuschel, M., Schreye, D.D.: Creating specialised integrity checks through partial evaluation of meta-interpreters. JLP 36(1), 149\u2013193 (1998)","journal-title":"JLP"},{"issue":"1","key":"9030_CR26","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1145\/271510.271525","volume":"20","author":"M. Leuschel","year":"1998","unstructured":"Leuschel, M., Martens, B., De Schreye, D.: Controlling generalisation and polyvariance in partial deduction of normal logic programs. ACM Trans. Program. Lang. Syst. 20(1), 208\u2013258 (1998)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"9030_CR27","series-title":"LNCS","first-page":"341","volume-title":"Program Development in Computational Logic","author":"M. Leuschel","year":"2004","unstructured":"Leuschel, M., Craig, S., Bruynooghe, M., Vanhoof, W.: Specializing interpreters using offline partial deduction. In: Bruynooghe, M., Lau, K.-K. (eds.) Program Development in Computational Logic. LNCS, vol. 3049, pp. 341\u2013376. Springer, Berlin (2004)"},{"issue":"1","key":"9030_CR28","first-page":"139","volume":"4","author":"M. Leuschel","year":"2004","unstructured":"Leuschel, M., J\u00f8rgensen, J., VanHoof, W., Bruynooghe, M.: Offline specialisation in Prolog using a hand-written compiler generator. TPLP 4(1), 139\u2013191 (2004)","journal-title":"TPLP"},{"key":"9030_CR29","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-83189-8","volume-title":"Foundations of Logic Programming","author":"J.W. Lloyd","year":"1987","unstructured":"Lloyd, J.W.: Foundations of Logic Programming. Springer, Berlin (1987)"},{"key":"9030_CR30","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-45350-4_11","volume-title":"Semantics, Applications, and Implementation of Program Generation","author":"H. Makholm","year":"2000","unstructured":"Makholm, H.: On Jones-optimal specialization for strongly typed languages. In: Taha, W. (ed.) Semantics, Applications, and Implementation of Program Generation. LNCS, vol. 1924, pp. 129\u2013148. Springer, Berlin (2000)"},{"key":"9030_CR31","unstructured":"Martens, B.: On the semantics of meta-programming and the control of partial deduction in logic programming. PhD thesis, K.U. Leuven (February 1994)"},{"key":"9030_CR32","first-page":"597","volume-title":"Proceedings ICLP\u201995","author":"B. Martens","year":"1995","unstructured":"Martens, B., Gallagher, J.: Ensuring global termination of partial deduction while allowing flexible polyvariance. In: Sterling, L. (ed.) Proceedings ICLP\u201995, Kanagawa Japan, June 1995, pp. 597\u2013613. MIT Press, Cambridge (1995)"},{"key":"9030_CR33","unstructured":"NIST: The economic impact of role-based access control. NIST Planning Report 02-01 (2002)"},{"key":"9030_CR34","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/B978-0-934613-40-8.50009-9","volume-title":"Foundations of Deductive Databases and Logic Programming","author":"T. Przymusinski","year":"1988","unstructured":"Przymusinski, T.: On the declarative semantics of deductive databases and logic programming. In: Minker, J. (ed.) Foundations of Deductive Databases and Logic Programming, pp. 193\u2013216. Morgan Kaufmann, San Mateo (1988)"},{"key":"9030_CR35","first-page":"442","volume-title":"Proceedings of the ACM SIGMOD International Conference on the Management of Data","author":"K. Sagonas","year":"1994","unstructured":"Sagonas, K., Swift, T., Warren, D.S.: XSB as an efficient deductive database engine. In: Proceedings of the ACM SIGMOD International Conference on the Management of Data, Minneapolis, Minnesota, May 1994, pp. 442\u2013453. ACM Press, New York (1994)"},{"issue":"1","key":"9030_CR36","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/BF03038271","volume":"12","author":"D. Sahlin","year":"1993","unstructured":"Sahlin, D.: Mixtus: an automatic partial evaluator for full prolog. New Gener. Comput. 12(1), 7\u201351 (1993)","journal-title":"New Gener. Comput."},{"key":"9030_CR37","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST model for role-based access control: towards a unified standard. In: Proc. 4th ACM Workshop on Role-Based Access Control, pp. 47\u201361 (2000)","DOI":"10.1145\/344287.344301"},{"key":"9030_CR38","unstructured":"SETA: A marketing survey of civil federal government organizations to determine the need for RBAC security product. SETA Corporation (1996)"},{"key":"9030_CR39","series-title":"LNCS","first-page":"322","volume-title":"Logic Program Synthesis and Transformation, Proceedings of LOPSTR\u201997","author":"W. Vanhoof","year":"1997","unstructured":"Vanhoof, W., Martens, B.: To parse or not to parse. In: Fuchs, N. (ed.) Logic Program Synthesis and Transformation, Proceedings of LOPSTR\u201997, Leuven, Belgium, July 1997. LNCS, vol. 1463, pp. 322\u2013342. Springer, Berlin (1997)"}],"container-title":["Higher-Order and Symbolic Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10990-008-9030-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10990-008-9030-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10990-008-9030-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T17:21:11Z","timestamp":1684344071000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10990-008-9030-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4,12]]},"references-count":39,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2008,6]]}},"alternative-id":["9030"],"URL":"https:\/\/doi.org\/10.1007\/s10990-008-9030-8","relation":{},"ISSN":["1388-3690","1573-0557"],"issn-type":[{"value":"1388-3690","type":"print"},{"value":"1573-0557","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,4,12]]}}}