Sandra Alves & Maribel Fernandez (2017):
A graph-based framework for the analysis of access control policies.
Theoretical Computer Science 685,
pp. 3–22,
doi:10.1016/j.tcs.2016.10.018.
Marcello Balduccini & Michael Gelfond (2008):
The AAA Architecture: An Overview.
In: Architectures for Intelligent Theory-Based Agents, Papers from the 2008 AAAI Spring Symposium, 2008.
AAAI Press,
pp. 1–6.
Available at https://www.aaai.org/Library/Symposia/Spring/2008/ss08-02-001.php.
Steve Barker (2012):
Logical Approaches to Authorization Policies.
In: Alexander Artikis, Robert Craven, Nihan Kesim Cicekli, Babak Sadighi & Kostas Stathis: Logic Programs, Norms and Action - Essays in Honor of Marek J. Sergot on the Occasion of His 60th Birthday,
Lecture Notes in Computer Science 7360.
Springer,
pp. 349–373,
doi:10.1007/978-3-642-29414-3_19.
Steve Barker, Guido Boella, Dov Gabbay & Valerio Genovese (2014):
Reasoning about delegation and revocation schemes in answer set programming.
Journal of Logic and Computation 24(1),
pp. 89–116,
doi:10.1093/logcom/exs014.
Publisher: Oxford Academic.
Justin Blount (2013):
An architecture for intentional agents.
Texas Tech University.
David Ferraiolo, Janet Cugini & D Richard Kuhn (1995):
Role-based access control (RBAC): Features and motivations.
In: Proceedings of the 11th Annual Computer Security Applications Conference,
pp. 241–48.
Available at https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=916537.
Ji Gao, Cheng-Xiang Yuan & Jing Wang (2005):
SASA5: A Method System for Supporting Agent Social Activities.
Chinese Journal of Computers 28(5),
pp. 838–848.
Available at http://cjc.ict.ac.cn/eng/qwjse/view.asp?id=1764.
Michael Gelfond & Yulia Kahl (2014):
Knowledge Representation, Reasoning, and the Design of Intelligent Agents.
Cambridge University Press,
doi:10.1017/CBO9781139342124.
Michael Gelfond & Vladimir Lifschitz (1991):
Classical Negation in Logic Programs and Disjunctive Databases.
New Generation Computing 9(3/4),
pp. 365–386,
doi:10.1007/BF03037169.
Michael Gelfond & Vladimir Lifschitz (1998):
Action languages.
Electronic Transactions on AI 3(16),
pp. 193–210.
Available at http://www.ep.liu.se/ej/etai/1998/007/.
Michael Gelfond & Jorge Lobo (2008):
Authorization and Obligation Policies in Dynamic Systems.
In: Maria Garcia de la Banda & Enrico Pontelli: Logic Programming,
Lecture Notes in Computer Science.
Springer,
Berlin, Heidelberg,
pp. 22–36,
doi:10.1007/978-3-540-89982-2_7.
Bei-shui Liao, Hua-xin Huang & Ji Gao (2006):
An Extended BDI Agent with Policies and Contracts.
In: Zhong-Zhi Shi & Ramakoti Sadananda: Agent Computing and Multi-Agent Systems,
Lecture Notes in Computer Science.
Springer,
Berlin, Heidelberg,
pp. 94–104,
doi:10.1007/11802372_12.
Victor W. Marek & Miroslaw Truszczynski (1999):
Stable Models and an Alternative Logic Programming Paradigm.
In: Krzysztof R. Apt, Victor W. Marek, Mirek Truszczynski & David Scott Warren: The Logic Programming Paradigm - A 25-Year Perspective,
Artificial Intelligence.
Springer,
pp. 375–398,
doi:10.1007/978-3-642-60085-2_17.
Yan-Bin Peng, Ji Gao, Jie-Qin Ai, Cun-Hao Wang & Hang Guo (2008):
An Extended Agent BDI Model with Norms, Policies and Contracts.
In: 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing,
pp. 1–4,
doi:10.1109/WiCom.2008.1197.
ISSN: 2161-9654.
Anand S. Rao & Michael P. Georgeff (1991):
Modeling Rational Agents within a BDI-Architecture.
In: Proceedings of the 2nd International Conference on Principles of Knowledge Representation and Reasoning (KR'91). Cambridge, MA, USA, April 22-25, 1991.,
pp. 473–484.
Available at https://dl.acm.org/doi/10.5555/3087158.3087205.
Khair Eddin Sabri & Nadim Obeid (2016):
A temporal defeasible logic for handling access control policies.
Applied Intelligence 44(1),
pp. 30–42,
doi:10.1007/s10489-015-0692-8.