@article(af17, author = {Sandra Alves and Maribel Fernandez}, year = {2017}, title = {A graph-based framework for the analysis of access control policies}, journal = {Theoretical Computer Science}, volume = {685}, pages = {3--22}, doi = {10.1016/j.tcs.2016.10.018}, ) @inproceedings(bg08, author = {Marcello Balduccini and Michael Gelfond}, year = {2008}, title = {The {AAA} Architecture: An Overview}, booktitle = {Architectures for Intelligent Theory-Based Agents, Papers from the 2008 {AAAI} Spring Symposium, 2008}, publisher = {{AAAI} {P}ress}, pages = {1--6}, url = {https://www.aaai.org/Library/Symposia/Spring/2008/ss08-02-001.php}, ) @inproceedings(bs12, author = {Steve Barker}, year = {2012}, title = {Logical Approaches to Authorization Policies}, editor = {Alexander Artikis and Robert Craven and Nihan Kesim Cicekli and Babak Sadighi and Kostas Stathis}, booktitle = {Logic Programs, Norms and Action - Essays in Honor of Marek J. Sergot on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {7360}, publisher = {Springer}, pages = {349--373}, doi = {10.1007/978-3-642-29414-3\_19}, ) @article(bbgg14, author = {Steve Barker and Guido Boella and Dov Gabbay and Valerio Genovese}, year = {2014}, title = {Reasoning about delegation and revocation schemes in answer set programming}, journal = {Journal of Logic and Computation}, volume = {24}, number = {1}, pages = {89--116}, doi = {10.1093/logcom/exs014}, note = {Publisher: Oxford Academic}, ) @phdthesis(bj13, author = {Justin Blount}, year = {2013}, title = {An architecture for intentional agents}, school = {Texas Tech University}, ) @inproceedings(bgb14, author = {Justin Lane Blount and Michael Gelfond and Marcello Balduccini}, year = {2014}, title = {Towards a {Theory} of {Intentional} {Agents}}, booktitle = {2014 {AAAI} {Spring} {Symposium} {Series}}, pages = {10--17}, url = {https://www.aaai.org/ocs/index.php/SSS/SSS14/paper/viewFile/7681/7708}, ) @inproceedings(fck95, author = {David Ferraiolo and Janet Cugini and D Richard Kuhn}, year = {1995}, title = {Role-based access control ({RBAC}): {Features} and motivations}, booktitle = {Proceedings of the 11th Annual Computer Security Applications Conference}, pages = {241--48}, url = {https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=916537}, ) @article(gyw05, author = {Ji Gao and Cheng-Xiang Yuan and Jing Wang}, year = {2005}, title = {{SASA5}: {A} {Method} {System} for {Supporting} {Agent} {Social} {Activities}}, journal = {Chinese Journal of Computers}, volume = {28}, number = {5}, pages = {838--848}, url = {http://cjc.ict.ac.cn/eng/qwjse/view.asp?id=1764}, ) @inbook(gk14, author = {Michael Gelfond and Yulia Kahl}, year = {2014}, title = {Knowledge Representation, Reasoning, and the Design of Intelligent Agents}, publisher = {Cambridge University Press}, doi = {10.1017/CBO9781139342124}, ) @article(gl91, author = {Michael Gelfond and Vladimir Lifschitz}, year = {1991}, title = {{C}lassical {N}egation in {L}ogic {P}rograms and {D}isjunctive {D}atabases}, journal = {New Generation Computing}, volume = {9}, number = {3/4}, pages = {365--386}, doi = {10.1007/BF03037169}, ) @article(gl98, author = {Michael Gelfond and Vladimir Lifschitz}, year = {1998}, title = {{A}ction languages}, journal = {Electronic Transactions on AI}, volume = {3}, number = {16}, pages = {193--210}, url = {http://www.ep.liu.se/ej/etai/1998/007/}, ) @inproceedings(gl08, author = {Michael Gelfond and Jorge Lobo}, year = {2008}, title = {Authorization and {Obligation} {Policies} in {Dynamic} {Systems}}, editor = {Garcia de la Banda, Maria and Enrico Pontelli}, booktitle = {Logic {Programming}}, series = {Lecture {Notes} in {Computer} {Science}}, publisher = {Springer}, address = {Berlin, Heidelberg}, pages = {22--36}, doi = {10.1007/978-3-540-89982-2\_7}, ) @inproceedings(lhg06, author = {Bei-shui Liao and Hua-xin Huang and Ji Gao}, year = {2006}, title = {An {Extended} {BDI} {Agent} with {Policies} and {Contracts}}, editor = {Zhong-Zhi Shi and Ramakoti Sadananda}, booktitle = {Agent {Computing} and {Multi}-{Agent} {Systems}}, series = {Lecture {Notes} in {Computer} {Science}}, publisher = {Springer}, address = {Berlin, Heidelberg}, pages = {94--104}, doi = {10.1007/11802372\_12}, ) @incollection(mt99, author = {Victor W. Marek and Miroslaw Truszczynski}, year = {1999}, title = {Stable Models and an Alternative Logic Programming Paradigm}, editor = {Krzysztof R. Apt and Victor W. Marek and Mirek Truszczynski and David Scott Warren}, booktitle = {The Logic Programming Paradigm - {A} 25-Year Perspective}, series = {Artificial Intelligence}, publisher = {Springer}, pages = {375--398}, doi = {10.1007/978-3-642-60085-2\_17}, ) @inproceedings(pgawg08, author = {Yan-Bin Peng and Ji Gao and Jie-Qin Ai and Cun-Hao Wang and Hang Guo}, year = {2008}, title = {An {Extended} {Agent} {BDI} {Model} with {Norms}, {Policies} and {Contracts}}, booktitle = {2008 4th {International} {Conference} on {Wireless} {Communications}, {Networking} and {Mobile} {Computing}}, pages = {1--4}, doi = {10.1109/WiCom.2008.1197}, note = {ISSN: 2161-9654}, ) @inproceedings(rg91, author = {Anand S. Rao and Michael P. Georgeff}, year = {1991}, title = {Modeling {R}ational {A}gents within a {BDI}-{A}rchitecture}, booktitle = {Proceedings of the 2nd International Conference on Principles of Knowledge Representation and Reasoning (KR'91). Cambridge, MA, USA, April 22-25, 1991.}, pages = {473--484}, url = {https://dl.acm.org/doi/10.5555/3087158.3087205}, ) @article(so16, author = {Khair Eddin Sabri and Nadim Obeid}, year = {2016}, title = {A temporal defeasible logic for handling access control policies}, journal = {Applied Intelligence}, volume = {44}, number = {1}, pages = {30--42}, doi = {10.1007/s10489-015-0692-8}, )