References

  1. Sandra Alves & Maribel Fernandez (2017): A graph-based framework for the analysis of access control policies. Theoretical Computer Science 685, pp. 3–22, doi:10.1016/j.tcs.2016.10.018.
  2. Marcello Balduccini & Michael Gelfond (2008): The AAA Architecture: An Overview. In: Architectures for Intelligent Theory-Based Agents, Papers from the 2008 AAAI Spring Symposium, 2008. AAAI Press, pp. 1–6. Available at https://www.aaai.org/Library/Symposia/Spring/2008/ss08-02-001.php.
  3. Steve Barker (2012): Logical Approaches to Authorization Policies. In: Alexander Artikis, Robert Craven, Nihan Kesim Cicekli, Babak Sadighi & Kostas Stathis: Logic Programs, Norms and Action - Essays in Honor of Marek J. Sergot on the Occasion of His 60th Birthday, Lecture Notes in Computer Science 7360. Springer, pp. 349–373, doi:10.1007/978-3-642-29414-3_19.
  4. Steve Barker, Guido Boella, Dov Gabbay & Valerio Genovese (2014): Reasoning about delegation and revocation schemes in answer set programming. Journal of Logic and Computation 24(1), pp. 89–116, doi:10.1093/logcom/exs014. Publisher: Oxford Academic.
  5. Justin Blount (2013): An architecture for intentional agents. Texas Tech University.
  6. Justin Lane Blount, Michael Gelfond & Marcello Balduccini (2014): Towards a Theory of Intentional Agents. In: 2014 AAAI Spring Symposium Series, pp. 10–17. Available at https://www.aaai.org/ocs/index.php/SSS/SSS14/paper/viewFile/7681/7708.
  7. David Ferraiolo, Janet Cugini & D Richard Kuhn (1995): Role-based access control (RBAC): Features and motivations. In: Proceedings of the 11th Annual Computer Security Applications Conference, pp. 241–48. Available at https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=916537.
  8. Ji Gao, Cheng-Xiang Yuan & Jing Wang (2005): SASA5: A Method System for Supporting Agent Social Activities. Chinese Journal of Computers 28(5), pp. 838–848. Available at http://cjc.ict.ac.cn/eng/qwjse/view.asp?id=1764.
  9. Michael Gelfond & Yulia Kahl (2014): Knowledge Representation, Reasoning, and the Design of Intelligent Agents. Cambridge University Press, doi:10.1017/CBO9781139342124.
  10. Michael Gelfond & Vladimir Lifschitz (1991): Classical Negation in Logic Programs and Disjunctive Databases. New Generation Computing 9(3/4), pp. 365–386, doi:10.1007/BF03037169.
  11. Michael Gelfond & Vladimir Lifschitz (1998): Action languages. Electronic Transactions on AI 3(16), pp. 193–210. Available at http://www.ep.liu.se/ej/etai/1998/007/.
  12. Michael Gelfond & Jorge Lobo (2008): Authorization and Obligation Policies in Dynamic Systems. In: Maria Garcia de la Banda & Enrico Pontelli: Logic Programming, Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, pp. 22–36, doi:10.1007/978-3-540-89982-2_7.
  13. Bei-shui Liao, Hua-xin Huang & Ji Gao (2006): An Extended BDI Agent with Policies and Contracts. In: Zhong-Zhi Shi & Ramakoti Sadananda: Agent Computing and Multi-Agent Systems, Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, pp. 94–104, doi:10.1007/11802372_12.
  14. Victor W. Marek & Miroslaw Truszczynski (1999): Stable Models and an Alternative Logic Programming Paradigm. In: Krzysztof R. Apt, Victor W. Marek, Mirek Truszczynski & David Scott Warren: The Logic Programming Paradigm - A 25-Year Perspective, Artificial Intelligence. Springer, pp. 375–398, doi:10.1007/978-3-642-60085-2_17.
  15. Yan-Bin Peng, Ji Gao, Jie-Qin Ai, Cun-Hao Wang & Hang Guo (2008): An Extended Agent BDI Model with Norms, Policies and Contracts. In: 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1–4, doi:10.1109/WiCom.2008.1197. ISSN: 2161-9654.
  16. Anand S. Rao & Michael P. Georgeff (1991): Modeling Rational Agents within a BDI-Architecture. In: Proceedings of the 2nd International Conference on Principles of Knowledge Representation and Reasoning (KR'91). Cambridge, MA, USA, April 22-25, 1991., pp. 473–484. Available at https://dl.acm.org/doi/10.5555/3087158.3087205.
  17. Khair Eddin Sabri & Nadim Obeid (2016): A temporal defeasible logic for handling access control policies. Applied Intelligence 44(1), pp. 30–42, doi:10.1007/s10489-015-0692-8.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org