{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:45:41Z","timestamp":1762004741318,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/ntms.2015.7266473","type":"proceedings-article","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T17:59:13Z","timestamp":1443117553000},"page":"1-5","source":"Crossref","is-referenced-by-count":8,"title":["Analysis of XACML policies with ASP"],"prefix":"10.1109","author":[{"given":"Dhouha","family":"Ayed","sequence":"first","affiliation":[]},{"given":"Marie-Noelle","family":"Lepareux","sequence":"additional","affiliation":[]},{"given":"Cyrille","family":"Martins","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Reasoning about XACML policy descriptions in answer set programming","author":"ahn","year":"2010","journal-title":"NMR&#x2018;10"},{"year":"0","key":"ref11","article-title":"Lparse"},{"year":"0","key":"ref12","article-title":"Clasp"},{"key":"ref13","article-title":"Detecting Incompleteness, Conflicting and Unreachability XACML Policies using Answer Set Programming","author":"ramli","year":"2015","journal-title":"CoRR abs11503 02732"},{"key":"ref14","article-title":"Analyzing Access Control Policies with SMT","author":"turkmen","year":"2014","journal-title":"CCS ACM"},{"year":"0","key":"ref4","article-title":"AU2EU"},{"key":"ref3","article-title":"Knowledge representation","author":"baral","year":"2004","journal-title":"reasoning and declarative solving using AnsProlog"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1007\/s10009-008-0087-9","article-title":"Automated verification of access control policies using a SAT solver","volume":"10","author":"bultan","year":"2008","journal-title":"International Journal on Software Tools for Technology Transfer"},{"key":"ref5","article-title":"A new perspective on stable models","author":"ferraris","year":"2007","journal-title":"International Joint Conference on Artificial Intelligence"},{"article-title":"A Logic-based framework for web access control","year":"2008","author":"vladimir","key":"ref8"},{"key":"ref7","article-title":"Formalistaion and implementation of the XACML Access Control Mechanism","author":"massi","year":"0","journal-title":"4th international conference on Engineering Secure Software and Systems 2012"},{"key":"ref2","article-title":"What is answer set programming","author":"lifschitz","year":"2008","journal-title":"Proc AAAI Conf Artificial Intelligence"},{"journal-title":"OASIS","article-title":"eXtensible Access Control Markup Language (XACML) Version 3.0","year":"2013","key":"ref1"},{"article-title":"XACML3.0 in Answer Set Programming - extended version technical Report","year":"2013","author":"ramli","key":"ref9"}],"event":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2015,7,27]]},"location":"Paris, France","end":{"date-parts":[[2015,7,29]]}},"container-title":["2015 7th International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7210292\/7266450\/07266473.pdf?arnumber=7266473","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T16:09:29Z","timestamp":1498234169000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7266473\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ntms.2015.7266473","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}