{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:59Z","timestamp":1750307999884,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,7,10]],"date-time":"2006-07-10T00:00:00Z","timestamp":1152489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,7,10]]},"DOI":"10.1145\/1140335.1140361","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"213-224","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Inferring dynamic credentials for r\u00f4le-based trust management"],"prefix":"10.1145","author":[{"given":"Daniele","family":"Gorla","sequence":"first","affiliation":[{"name":"University di Roma \"La Sapienza\""}]},{"given":"Matthew","family":"Hennessy","sequence":"additional","affiliation":[{"name":"University of Sussex"}]},{"given":"Vladimiro","family":"Sassone","sequence":"additional","affiliation":[{"name":"University of Southampton"}]}],"member":"320","published-online":{"date-parts":[[2006,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The CIFF web-page. http:\/\/www.doc.ic.ac.uk\/~ue\/ciff\/  The CIFF web-page. http:\/\/www.doc.ic.ac.uk\/~ue\/ciff\/"},{"key":"e_1_3_2_1_2_1","volume-title":"Handbook of Theoretical Computer Science","author":"Apt K. R.","year":"1990","unstructured":"K. R. Apt . Logic programming . In J. van Leeuwen, editor, Handbook of Theoretical Computer Science , Volume B: Formal Models and Sematics, pages 493-- 574 . Elsevier and MIT Press , 1990 . K. R. Apt. Logic programming. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics, pages 493--574. Elsevier and MIT Press, 1990."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/61352.61354"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/0743-1066(94)90024-8"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/293910.293151"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/525080.884248"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/234752.234756"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/512756.512758"},{"key":"e_1_3_2_1_9_1","first-page":"2693","article-title":"SPKI certificate theory","author":"Ellison C.","year":"1999","unstructured":"C. Ellison , B. Frantz , B. Lampson , R. Rivest , B. Thomas , and T. Ylonen . SPKI certificate theory . IETF RFC 2693 , 1999 . C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory. IETF RFC 2693, 1999.","journal-title":"IETF RFC"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30227-8_6"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF03037172"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0743-1066(97)00026-5"},{"key":"e_1_3_2_1_14_1","first-page":"1070","volume-title":"Proc. of 5th Intern. Conf. on Logic Programming","author":"Gelfond M.","year":"1988","unstructured":"M. Gelfond and V. Lifschitz . The stable model semantics for logic programming . In Proc. of 5th Intern. Conf. on Logic Programming , pages 1070 -- 1080 . MIT Press , 1988 . M. Gelfond and V. Lifschitz. The stable model semantics for logic programming. In Proc. of 5th Intern. Conf. on Logic Programming, pages 1070--1080. MIT Press, 1988."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/2.6.719"},{"key":"e_1_3_2_1_17_1","first-page":"385","volume-title":"Proc. of 9th European Conference on Artificial Intelligence","author":"Kakas A. C.","year":"1990","unstructured":"A. C. Kakas and P. Mancarella . Generalized stable models: a semantics for abduction . In Proc. of 9th European Conference on Artificial Intelligence , pages 385 -- 391 , 1990 . A. C. Kakas and P. Mancarella. Generalized stable models: a semantics for abduction. In Proc. of 9th European Conference on Artificial Intelligence, pages 385--391, 1990."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0743-1066(99)00075-8"},{"key":"e_1_3_2_1_19_1","first-page":"89","volume-title":"Proc. of CSFW","author":"Li N.","year":"2003","unstructured":"N. Li and J. C. Mitchell . Understanding SPKI\/SDSI using first-order logic . In Proc. of CSFW , pages 89 -- 103 . IEEE Computer Society , 2003 . N. Li and J. C. Mitchell. Understanding SPKI\/SDSI using first-order logic. In Proc. of CSFW, pages 89--103. IEEE Computer Society, 2003."},{"key":"e_1_3_2_1_20_1","first-page":"114","volume-title":"IEEE Symposium on Security and Privacy","author":"Li N.","year":"2002","unstructured":"N. Li , J. C. Mitchell , and W. H. Winsborough . Design of a role-based trust-management framework . In IEEE Symposium on Security and Privacy , pages 114 -- 130 , 2002 . N. Li, J. C. Mitchell, and W. H. Winsborough. Design of a role-based trust-management framework. In IEEE Symposium on Security and Privacy, pages 114--130, 2002."},{"key":"e_1_3_2_1_21_1","first-page":"123","volume-title":"IEEE Symposium on Security and Privacy","author":"Li N.","year":"2003","unstructured":"N. Li , W. H. Winsborough , and J. C. Mitchell . Beyond proof-of-compliance: Safety and availability analysis in trust management . In IEEE Symposium on Security and Privacy , pages 123 -- 139 . IEEE Computer Society , 2003 . Full version to appear in JACM. N. Li, W. H. Winsborough, and J. C. Mitchell. Beyond proof-of-compliance: Safety and availability analysis in trust management. In IEEE Symposium on Security and Privacy, pages 123--139. IEEE Computer Society, 2003. Full version to appear in JACM."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/773065.773067"},{"key":"e_1_3_2_1_23_1","first-page":"217","volume-title":"Proc. of 7th USENIX Security Symposium","author":"Naor M.","year":"1998","unstructured":"M. Naor and K. Nissim . Certificate revocation and certificate update . In Proc. of 7th USENIX Security Symposium , pages 217 -- 228 , 1998 . M. Naor and K. Nissim. Certificate revocation and certificate update. In Proc. of 7th USENIX Security Symposium, pages 217--228, 1998."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-934613-40-8.50009-9"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(80)90014-4"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/647502.728327"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/882491.884226"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.17"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/321978.321991"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/116825.116838"}],"event":{"name":"PPDP06: Principles and Practice of Declarative Programming","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","ACM Association for Computing Machinery"],"location":"Venice Italy","acronym":"PPDP06"},"container-title":["Proceedings of the 8th ACM SIGPLAN international conference on Principles and practice of declarative programming"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1140335.1140361","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1140335.1140361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:24Z","timestamp":1750259184000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1140335.1140361"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7,10]]},"references-count":30,"alternative-id":["10.1145\/1140335.1140361","10.1145\/1140335"],"URL":"https:\/\/doi.org\/10.1145\/1140335.1140361","relation":{},"subject":[],"published":{"date-parts":[[2006,7,10]]},"assertion":[{"value":"2006-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}