[1]
T. W. Finin, A. Joshi, L. Kagal, J. Niu, R. S. Sandhu, W. H. Winsborough, and B. M. Thuraisingham. ROWLBAC: representing role based access control in OWL. In SACMAT 2008, 13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pages 73-82, (2008).
DOI: 10.1145/1377836.1377849
Google Scholar
[2]
B. N. Grosof, I. Horrocks, R. Volz, and S. Decker. Description logic programs: combining logic programs with description logic. In WWW '03: Proceedings of the 12th International World Wide Web Conference, Budapest, Hungary, pages 48-57, (2003).
DOI: 10.1145/775152.775160
Google Scholar
[3]
I. Horrocks and P. F. Patel-Schneider. A proposal for an OWL rules language. In Proc. of the Thirteenth International World Wide Web Conference (WWW 2004), pages 723-731. ACM, (2004).
DOI: 10.1145/988672.988771
Google Scholar
[4]
V. Kolovski, J. Hendler, and B. Parsia. Analyzing web access control policies. In Proceedings of the 16th international conference on World Wide Web, pages 677-686, Banff, Alberta, Canada, 2007. ACM.
DOI: 10.1145/1242572.1242664
Google Scholar
[5]
N. Li, J. C. Mitchell, and W. H. Winsborough. Design of a role-based trust management framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 114-130. IEEE Computer Society Press, May (2002).
DOI: 10.1109/secpri.2002.1004366
Google Scholar
[6]
N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1): 35-86, (2003).
DOI: 10.3233/jcs-2003-11102
Google Scholar
[7]
E. Sirin, B. Parsia, B. C. Grau, A. Kalyanpur, and Y. Katz. Pellet: A practical owl-dl reasoner. Journal of Web Semantics, 5(2): 51-53, (2007).
DOI: 10.1016/j.websem.2007.03.004
Google Scholar
[8]
A. C. Squicciarini, E. Bertino, E. Ferrari, and I. Ray. Achieving privacy in trust negotiations with an ontology-based approach. IEEE Trans. Dependable Sec. Comput., 3(1): 13-30, (2006).
DOI: 10.1109/tdsc.2006.3
Google Scholar
[9]
G. Tonti, J. M. Bradshaw, R. Je_ers, R. Montanari, N. Suri, and A. Uszok. Semantic web languages for policy representation and reasoning: A comparison of kaos. pages 419-437. Springer, (2003).
DOI: 10.1007/978-3-540-39718-2_27
Google Scholar
[10]
C. Zhao, N. Heilili, S. Liu, and Z. Lin. Using description logic to formalize role-based access control model. In I. Horrocks, U. Sattler, and F. Wolter, editors, Description Logics, volume 147 of CEUR Workshop Proceedings. CEUR-WS. org, (2005).
Google Scholar