Information Technology Reference
In-Depth Information
be proven, they can be eciently implemented (in various languages), and they
can be used to protect the information in a variety of web servers and databases.
In future work on SBAC programs, we propose to investigate the issues relat-
ing to the representation and checking of application-specific constraints on a
formulation of an SBAC policy.
References
1. Sandhu, R. and Ferraiolo, D. and Kuhn, R.: The NIST Model for Role-Based Access
Control: Towards a Unified Standard. Proc. 4th ACM Workshop on Role-Based
Access Control (2000) 47-61
2. S. Barker: Protecting Deductive Databases from Unauthorized Retrievals. DBSec
2000, Kluwer (2000) 301-311
3. Jajodia, S. and Samarati, P. and Sapino, M. and Subrahmaninan, V.S.: Flexible
Support for Multiple Access Control Policies. ACM TODS, Vol. 26, no 2 (2001)
214-260
4. Bertino, E. and Catania, B. and Ferrari, E. and Perlasca, P.: A System to Spec-
ify and Manage Multipolicy Access Control Models. Proc. POLICY 2002, IEEE
Computer Society (2002) 116-127
5. Barker, S. and Stuckey, P.: Flexible Access Control Policy Specification with Con-
straint Logic Programming. ACM Trans. on Information and System Security (To
appear)
6. Bertino, E. and Bonatti, P. and Ferrari, E.: TRBAC: A Temporal Role-Based
Access Control Model. Proc. 5th ACM Workshop on Role-Based Access Control
(2000) 21-30
7. Barker, S.: Temporal Authorization in the Simplified Event Calculus. DBSec 1999
(1999) 271-284
8. Damianou, N. and Dulay N. and Lupu E. and Sloman M.: The Ponder Policy
Specification Language. Proc. International Workshop on Policies for Distributed
Systems and Networks, Springer, Lecture Notes in Computer Science, Vol. 1995
(2001) 18-38
9. Barker, S.: Status-based Access Control (To appear)
10. Przymusinski T.: On the Declarative Semantics of Deductive Databases and Logic
Programming. Ed. Minker, J., Foundations of Deductive Databases and Logic
Programming, Morgan-Kaufmann (1988) 193-216
11. Clark, K.: Negation as Failure. Ed. Gallaire H. and Minker, J., Logic and
Databases, Plenum (1978) 293-322
12. van Gelder, A. and Ross, K. and Schlipf, J.: The Well-Founded Semantics for
General Logic Programs. JACM, Vol. 8 (1991) 620-650
13. CGIHTML, The CGIHTML package, http://www.eekim.com/software/cgihtml/
14. Sagonas, K. and Swift, T. and Warren, D. and Freire, J. and Rao, P.: The XSB
System Version 2.0, Programmer's Manual (1999)
15. Barker, S.: Access Control for Deductive Databases by Logic Programming Ed. Pe-
ter J. Stuckey, Proc. 18th ICLP 2002, ICLP, Springer, Lecture Notes in Computer
Science, Vol. 2401 (2002) 54-69
 
Search WWH ::




Custom Search