2008
DOI: 10.3233/jcs-2008-16102
|View full text |Cite
|
Sign up to set email alerts
|

A logical framework for history-based access control and reputation systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
39
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 28 publications
(39 citation statements)
references
References 31 publications
0
39
0
Order By: Relevance
“…Summary structures (future formulas) précis no online yes no reduce [4] yes offline no no Chomicki [8,9] no online yes no Krukow et al [10] Bauer et al [11] yes online yes no Basin et al [5,7] no online yes yes Basin et al [6] yes online yes yes Bauer et al [19] no online (automata)* (automata)* Table 1: Comparison of design choices in précis and prior work using first-order temporal logic for privacy compliance. *Automata-based approaches have no explicit notion of summary structures.…”
Section: Implementation and Evaluationmentioning
confidence: 99%
See 3 more Smart Citations
“…Summary structures (future formulas) précis no online yes no reduce [4] yes offline no no Chomicki [8,9] no online yes no Krukow et al [10] Bauer et al [11] yes online yes no Basin et al [5,7] no online yes yes Basin et al [6] yes online yes yes Bauer et al [19] no online (automata)* (automata)* Table 1: Comparison of design choices in précis and prior work using first-order temporal logic for privacy compliance. *Automata-based approaches have no explicit notion of summary structures.…”
Section: Implementation and Evaluationmentioning
confidence: 99%
“…Alternatively, an online program may monitor privacy-relevant events, check them against the prevailing privacy policy and report violations on the fly. Both approaches have been considered in literature: An algorithm for offline compliance checking has been proposed by a subset of the authors [4], whereas online monitoring has been the subject of extensive work by other researchers [5][6][7][8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…[10] for a π-calculus dialect. A calculus for ubiquitous computing dealing with trust is proposed in [26], a framework allowing LTL model checking. An instance of a formal approach based on the actor model dealing with trust management is [41].…”
Section: Related Workmentioning
confidence: 99%