{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:08:01Z","timestamp":1763467681022,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,29]],"date-time":"2004-10-29T00:00:00Z","timestamp":1099008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,29]]},"DOI":"10.1145\/1029133.1029140","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:58:48Z","timestamp":1107107928000},"page":"45-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":175,"title":["A logic-based framework for attribute based access control"],"prefix":"10.1145","author":[{"given":"Lingyu","family":"Wang","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Duminda","family":"Wijesekera","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA"}]}],"member":"320","published-online":{"date-parts":[[2004,10,29]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/605434.605437"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/321992.321996"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/352600.352620"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.5555\/603404.603407"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/950191.950194"},{"key":"e_1_3_2_1_6_1","first-page":"111","volume-title":"Proc. International Conference on Logic Programming (ICLP)","author":"Chan David","year":"1988","unstructured":"David Chan . Constructive negation based on the completed databases. In R. A. Kowalski and K. A. Bowen, editors , Proc. International Conference on Logic Programming (ICLP) , pages 111 -- 125 . The MIT Press , 1988 . David Chan. Constructive negation based on the completed databases. In R. A. Kowalski and K. A. Bowen, editors, Proc. International Conference on Logic Programming (ICLP), pages 111--125. The MIT Press, 1988."},{"key":"e_1_3_2_1_7_1","first-page":"477","volume-title":"Proc. North-American Conference on Logic Programming","author":"Chan David","year":"1989","unstructured":"David Chan . An extension of constructive negation and its application in coroutining. In E. Lusk and R. Overbeek, editors , Proc. North-American Conference on Logic Programming , pages 477 -- 489 . The MIT Press , 1989 . David Chan. An extension of constructive negation and its application in coroutining. In E. Lusk and R. Overbeek, editors, Proc. North-American Conference on Logic Programming, pages 477--489. The MIT Press, 1989."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/365151.365169"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.5555\/305052.305057"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1007\/BF03037598"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1016\/0304-3975(95)00148-4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1016\/S0743-1066(96)00092-1"},{"key":"e_1_3_2_1_14_1","volume-title":"Special issue on LOGIC PROGRAMMING, 13(1):19--33","author":"Melvin","year":"1990","unstructured":"Melvin C. Fitting and Marion Ben-Jacob. Stratified, weak stratified, and three-valued semantics. Fundamenta Informaticae , Special issue on LOGIC PROGRAMMING, 13(1):19--33 , March 1990 . Melvin C. Fitting and Marion Ben-Jacob. Stratified, weak stratified, and three-valued semantics. Fundamenta Informaticae, Special issue on LOGIC PROGRAMMING, 13(1):19--33, March 1990."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.5555\/647708.734942"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1016\/S0743-1066(85)80005-4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1016\/S0304-3975(00)00330-3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/41625.41635"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/383891.383894"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1006\/inco.1997.2694"},{"key":"e_1_3_2_1_21_1","volume-title":"Set theory: an introduction to independence proofs","author":"Kunen Kenneth J.","year":"1980","unstructured":"Kenneth J. Kunen . Set theory: an introduction to independence proofs . Elsevier North-Holland , 1980 . Kenneth J. Kunen. Set theory: an introduction to independence proofs. Elsevier North-Holland, 1980."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1016\/0743-1066(87)90007-0"},{"key":"e_1_3_2_1_23_1","first-page":"114","volume-title":"Proc. IEEE Symposium on Security and Privacy","author":"Li N.","year":"2002","unstructured":"N. Li , J.C. Mitchell , and W.H. Winsborough . Design of a role-based trust management framework . In Proc. IEEE Symposium on Security and Privacy , Oakland , pages 114 -- 130 , 2002 . N. Li, J.C. Mitchell, and W.H. Winsborough. Design of a role-based trust management framework. In Proc. IEEE Symposium on Security and Privacy, Oakland, pages 114--130, 2002."},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. IEEE Symposium on Security and Privacy","author":"Li Ninghui","year":"2002","unstructured":"Ninghui Li , John C. Mitchell , and William H. Winsborough . Design of a role-based trust management framework . In Proc. IEEE Symposium on Security and Privacy , Oakland , May 2002 . Ninghui Li, John C. Mitchell, and William H. Winsborough. Design of a role-based trust management framework. In Proc. IEEE Symposium on Security and Privacy, Oakland, May 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1016\/0304-3975(93)90013-J"},{"key":"e_1_3_2_1_26_1","first-page":"697","volume-title":"Transformation of Logic Programs","author":"Petterossi Alberto","year":"1998","unstructured":"Alberto Petterossi and Maurizio Proietti . Transformation of Logic Programs , volume 5 , chapter Handbook of Logic in Artificial Intelligence and Logic Programming, pages 697 -- 787 . Oxford University Press , 1998 . Alberto Petterossi and Maurizio Proietti. Transformation of Logic Programs, volume 5, chapter Handbook of Logic in Artificial Intelligence and Logic Programming, pages 697--787. Oxford University Press, 1998."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_28_1","first-page":"328","volume-title":"Logic in Computer Science","author":"Stuckey Peter J.","year":"1991","unstructured":"Peter J. Stuckey . Constructive negation for constraint logic programming . In Logic in Computer Science , pages 328 -- 339 , 1991 . Peter J. Stuckey. Constructive negation for constraint logic programming. In Logic in Computer Science, pages 328--339, 1991."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1006\/inco.1995.1048"},{"key":"e_1_3_2_1_30_1","first-page":"127","volume-title":"Proceedings of the Second International Logic Programming Conference","author":"Tamaki H.","year":"1984","unstructured":"H. Tamaki and T. Sato . Unfold\/fold transformation of logic programs . In Proceedings of the Second International Logic Programming Conference , pages 127 -- 138 , 1984 . H. Tamaki and T. Sato. Unfold\/fold transformation of logic programs. In Proceedings of the Second International Logic Programming Conference, pages 127--138, 1984."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/937598.937599"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1145\/352600.352633"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/501983.502004"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/605434.605435"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"acronym":"CCS04","name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","location":"Washington DC USA"},"container-title":["Proceedings of the 2004 ACM workshop on Formal methods in security engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029133.1029140","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1029133.1029140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:31:07Z","timestamp":1750264267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029133.1029140"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,29]]},"references-count":33,"alternative-id":["10.1145\/1029133.1029140","10.1145\/1029133"],"URL":"https:\/\/doi.org\/10.1145\/1029133.1029140","relation":{},"subject":[],"published":{"date-parts":[[2004,10,29]]},"assertion":[{"value":"2004-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}