S. Barker and P. J. Stuckey, Flexible access control policy specification with constraint logic programming, ACM Transactions on Information and System Security, vol.6, issue.4, pp.501-546, 2003.
DOI : 10.1145/950191.950194

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.71.5636

S. Bistarelli, Semirings for Soft Constraint Solving and Programming, LNCS, vol.2962, 2004.
DOI : 10.1007/b95712

S. Bistarelli, T. Frühwirth, and M. Marte, Soft constraint propagation and solving in CHRs, Proceedings of the 2002 ACM symposium on Applied computing , SAC '02, pp.1-5, 2002.
DOI : 10.1145/508791.508793

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.3927

S. Bistarelli and F. Gadducci, Enhancing constraints manipulation in semiring-based formalisms, ECAI '06: European Conference on Artificial Intelligence, pp.63-67, 2006.

S. Bistarelli, F. Martinelli, and F. Santini, A Semantic Foundation for Trust Management Languages with Weights: An Application to the RT Family, Lecture Notes in Computer Science, vol.5060, pp.481-495, 2008.
DOI : 10.1007/978-3-540-69295-9_38

S. Bistarelli, F. Martinelli, and F. Santini, Deduction and abduction with soft constraints, to appear in Autonomic and Trusted Computing, 5th International Conference, 2010.

S. Bistarelli, F. Martinelli, and F. Santini, Weighted Datalog and Levels of Trust, 2008 Third International Conference on Availability, Reliability and Security, pp.1128-1134, 2008.
DOI : 10.1109/ARES.2008.197

S. Bistarelli, U. Montanari, and F. Rossi, Semiring-based constraint satisfaction and optimization, Journal of the ACM, vol.44, issue.2, pp.201-236, 1997.
DOI : 10.1145/256303.256306

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.3513

S. Bistarelli and F. Rossi, Semiring-based contstraint logic programming: syntax and semantics, ACM Transactions on Programming Languages and Systems, vol.23, issue.1, pp.1-29, 2001.
DOI : 10.1145/383721.383725

M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, The keynote trust-management system, rfc2704, 1999.
DOI : 10.17487/rfc2704

P. Bonatti, C. Duma, D. Olmedilla, and N. Shahmehri, An integration of reputation-based and policy-based trust management, Semantic Web Policy Workshop, 2005.

S. Ceri, G. Gottlob, and L. Tanca, What you always wanted to know about Datalog (and never dared to ask), IEEE Transactions on Knowledge and Data Engineering, vol.1, issue.1, pp.146-166, 1989.
DOI : 10.1109/69.43410

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.210.1118

S. Chakraborty and I. Ray, TrustBAC, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.49-58, 2006.
DOI : 10.1145/1133058.1133067

H. Christiansen and V. Dahl, HYPROLOG: A New Logic Programming Language with Assumptions and Abduction, Logic Programming, 21st International Conference, pp.159-173, 2005.
DOI : 10.1007/11562931_14

D. Clarke, J. Elien, C. Ellison, M. Fredette, A. M. et al., Certificate chain discovery in SPKI/SDSI, Journal of Computer Security, vol.9, issue.4, pp.285-322, 2001.
DOI : 10.3233/JCS-2001-9402

C. Codognet and P. Codognet, Abduction and concurrent logic languages, ECAI '94: European Conference on Artificial Intelligence, pp.75-79

D. A. Cohen, M. C. Cooper, P. G. Jeavons, and A. A. Krokhin, The complexity of soft constraint satisfaction, Artificial Intelligence, vol.170, issue.11, pp.983-1016, 2006.
DOI : 10.1016/j.artint.2006.04.002

M. Colombo, F. Martinelli, P. Mori, M. Petrocchi, and A. Vaccarelli, Fine Grained Access Control with Trust and Reputation Management for Globus, OTM Conferences, pp.1505-1515, 2007.
DOI : 10.1007/978-3-540-76843-2_26

J. Detreville, Binder, a logic-based security language, Proceedings 2002 IEEE Symposium on Security and Privacy, 2002.
DOI : 10.1109/SECPRI.2002.1004365

S. N. Foley, W. M. Adams, and B. O. Sullivan, Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System, Proc. 6th International Workshop on Security and Trust Management, 2010.
DOI : 10.1007/978-3-642-22444-7_7

T. W. Frühwirth, Constraint Handling Rules, 2009.

T. Jim, SD3: a trust management system with certified evaluation, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 2001.
DOI : 10.1109/SECPRI.2001.924291

A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007.
DOI : 10.1016/j.dss.2005.05.019

A. C. Kakas, ACLP: Integrating abduction and constraint solving, 2000.

H. Koshutanski and F. Massacci, A Negotiation Scheme for Access Rights Establishment in Autonomic Communication, Journal of Network and Systems Management, vol.6, issue.1, pp.117-136, 2007.
DOI : 10.1007/s10922-006-9057-2

N. Li, B. N. Grosof, and J. Feigenbaum, Delegation logic, ACM Transactions on Information and System Security, vol.6, issue.1, pp.128-171, 2003.
DOI : 10.1145/605434.605438

N. Li and J. C. Mitchell, Datalog with Constraints: A Foundation for Trust Management Languages, PADL '03: Proc. of Practical Aspects of Declarative Languages, pp.58-73, 2003.
DOI : 10.1007/3-540-36388-2_6

N. Li, J. C. Mitchell, and W. H. Winsborough, Design of a role-based trust-management framework, SP '02: Proc. of Security and Privacy, pp.114-130, 2002.

M. J. Maher, Abduction of Linear Arithmetic Constraints, ICLP '05: Conf. on Logic Programming, pp.174-188, 2005.
DOI : 10.1007/11562931_15

M. J. Maher and G. Huang, On Computing Constraint Abduction Answers, Logic for Programming, pp.421-435, 2008.
DOI : 10.1007/978-3-540-89439-1_30

F. Martinelli and M. Petrocchi, A uniform approach for the modeling of security and trust on protocols and services, ICS '06: International Workshop on Computer Security, 2006.

T. Menzies, Applications of abduction: knowledge-level modelling, International Journal of Human-Computer Studies, vol.45, issue.3, pp.305-335, 1996.
DOI : 10.1006/ijhc.1996.0054

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

M. Shanahan, Prediction is deduction but explanation is abduction, IJCAI'89: Proc. of the International Joint Conference on Artificial Intelligence, pp.1055-1060, 1989.

G. Theodorakopoulos and J. S. Baras, Trust evaluation in ad-hoc networks, Proceedings of the 2004 ACM workshop on Wireless security , WiSe '04, pp.1-10, 2004.
DOI : 10.1145/1023646.1023648

E. Thomas and G. Gottlob, The complexity of logic-based abduction, J. ACM, vol.42, pp.3-42, 1995.

J. Wielemaker, An overview of the SWI-Prolog programming environment, Proc. of the 13th International Workshop on Logic Programming Environments, pp.1-16, 2003.