Flexible access control policy specification with constraint logic programming, ACM Transactions on Information and System Security, vol.6, issue.4, pp.501-546, 2003. ,
DOI : 10.1145/950191.950194
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.71.5636
Semirings for Soft Constraint Solving and Programming, LNCS, vol.2962, 2004. ,
DOI : 10.1007/b95712
Soft constraint propagation and solving in CHRs, Proceedings of the 2002 ACM symposium on Applied computing , SAC '02, pp.1-5, 2002. ,
DOI : 10.1145/508791.508793
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.3927
Enhancing constraints manipulation in semiring-based formalisms, ECAI '06: European Conference on Artificial Intelligence, pp.63-67, 2006. ,
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family, Lecture Notes in Computer Science, vol.5060, pp.481-495, 2008. ,
DOI : 10.1007/978-3-540-69295-9_38
Deduction and abduction with soft constraints, to appear in Autonomic and Trusted Computing, 5th International Conference, 2010. ,
Weighted Datalog and Levels of Trust, 2008 Third International Conference on Availability, Reliability and Security, pp.1128-1134, 2008. ,
DOI : 10.1109/ARES.2008.197
Semiring-based constraint satisfaction and optimization, Journal of the ACM, vol.44, issue.2, pp.201-236, 1997. ,
DOI : 10.1145/256303.256306
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.3513
Semiring-based contstraint logic programming: syntax and semantics, ACM Transactions on Programming Languages and Systems, vol.23, issue.1, pp.1-29, 2001. ,
DOI : 10.1145/383721.383725
The keynote trust-management system, rfc2704, 1999. ,
DOI : 10.17487/rfc2704
An integration of reputation-based and policy-based trust management, Semantic Web Policy Workshop, 2005. ,
What you always wanted to know about Datalog (and never dared to ask), IEEE Transactions on Knowledge and Data Engineering, vol.1, issue.1, pp.146-166, 1989. ,
DOI : 10.1109/69.43410
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.210.1118
TrustBAC, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.49-58, 2006. ,
DOI : 10.1145/1133058.1133067
HYPROLOG: A New Logic Programming Language with Assumptions and Abduction, Logic Programming, 21st International Conference, pp.159-173, 2005. ,
DOI : 10.1007/11562931_14
Certificate chain discovery in SPKI/SDSI, Journal of Computer Security, vol.9, issue.4, pp.285-322, 2001. ,
DOI : 10.3233/JCS-2001-9402
Abduction and concurrent logic languages, ECAI '94: European Conference on Artificial Intelligence, pp.75-79 ,
The complexity of soft constraint satisfaction, Artificial Intelligence, vol.170, issue.11, pp.983-1016, 2006. ,
DOI : 10.1016/j.artint.2006.04.002
Fine Grained Access Control with Trust and Reputation Management for Globus, OTM Conferences, pp.1505-1515, 2007. ,
DOI : 10.1007/978-3-540-76843-2_26
Binder, a logic-based security language, Proceedings 2002 IEEE Symposium on Security and Privacy, 2002. ,
DOI : 10.1109/SECPRI.2002.1004365
Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System, Proc. 6th International Workshop on Security and Trust Management, 2010. ,
DOI : 10.1007/978-3-642-22444-7_7
Constraint Handling Rules, 2009. ,
SD3: a trust management system with certified evaluation, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 2001. ,
DOI : 10.1109/SECPRI.2001.924291
A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007. ,
DOI : 10.1016/j.dss.2005.05.019
ACLP: Integrating abduction and constraint solving, 2000. ,
A Negotiation Scheme for Access Rights Establishment in Autonomic Communication, Journal of Network and Systems Management, vol.6, issue.1, pp.117-136, 2007. ,
DOI : 10.1007/s10922-006-9057-2
Delegation logic, ACM Transactions on Information and System Security, vol.6, issue.1, pp.128-171, 2003. ,
DOI : 10.1145/605434.605438
Datalog with Constraints: A Foundation for Trust Management Languages, PADL '03: Proc. of Practical Aspects of Declarative Languages, pp.58-73, 2003. ,
DOI : 10.1007/3-540-36388-2_6
Design of a role-based trust-management framework, SP '02: Proc. of Security and Privacy, pp.114-130, 2002. ,
Abduction of Linear Arithmetic Constraints, ICLP '05: Conf. on Logic Programming, pp.174-188, 2005. ,
DOI : 10.1007/11562931_15
On Computing Constraint Abduction Answers, Logic for Programming, pp.421-435, 2008. ,
DOI : 10.1007/978-3-540-89439-1_30
A uniform approach for the modeling of security and trust on protocols and services, ICS '06: International Workshop on Computer Security, 2006. ,
Applications of abduction: knowledge-level modelling, International Journal of Human-Computer Studies, vol.45, issue.3, pp.305-335, 1996. ,
DOI : 10.1006/ijhc.1996.0054
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
Prediction is deduction but explanation is abduction, IJCAI'89: Proc. of the International Joint Conference on Artificial Intelligence, pp.1055-1060, 1989. ,
Trust evaluation in ad-hoc networks, Proceedings of the 2004 ACM workshop on Wireless security , WiSe '04, pp.1-10, 2004. ,
DOI : 10.1145/1023646.1023648
The complexity of logic-based abduction, J. ACM, vol.42, pp.3-42, 1995. ,
An overview of the SWI-Prolog programming environment, Proc. of the 13th International Workshop on Logic Programming Environments, pp.1-16, 2003. ,