参考文章(24)
Ninghui Li, William H. Winsborough, John C. Mitchell, Distributed credential chain discovery in trust management Journal of Computer Security. ,vol. 11, pp. 35- 86 ,(2003) , 10.3233/JCS-2003-11102
P.C. Kanellakis, G.M. Kuper, P.Z. Revesz, Constraint Query Languages Journal of Computer and System Sciences. ,vol. 51, pp. 26- 52 ,(1995) , 10.1006/JCSS.1995.1051
Ninghui Li, John C. Mitchell, DATALOG with Constraints: A Foundation for Trust Management Languages practical aspects of declarative languages. pp. 58- 73 ,(2003) , 10.1007/3-540-36388-2_6
Lujo Bauer, Michael A Schneider, Edward W Felten, None, A General and Flexible Access-Control System for the Web usenix security symposium. pp. 93- 108 ,(2002)
David Kotz, Jonathan R. Howell, Naming and sharing resources across administrative boundaries Dartmouth College. ,(2000)
Ronald L. Rivest, Butler Lampson, SDSI - A Simple Distributed Security Infrastructure ,(1996)
J. DeTreville, Binder, a logic-based security language ieee symposium on security and privacy. pp. 105- 113 ,(2002) , 10.1109/SECPRI.2002.1004365
A. Keromytis, M. Blaze, J. Feigenbaum, J. Ioannidis, The KeyNote Trust-Management System Version 2 RFC. ,vol. 2704, pp. 1- 37 ,(1999)
Martín Abadi, Michael Burrows, Butler Lampson, Gordon Plotkin, A calculus for access control in distributed systems ACM Transactions on Programming Languages and Systems. ,vol. 15, pp. 706- 734 ,(1993) , 10.1145/155183.155225
Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum, Delegation logic ACM Transactions on Information and System Security. ,vol. 6, pp. 128- 171 ,(2003) , 10.1145/605434.605438