{"title":"灵活的授权与逻辑程序","authors":"Mingsheng Zhang, Wu Chen, Yisong Wang, Mingyi Zhang","doi":"10.1109/NSWCTC.2009.9","DOIUrl":null,"url":null,"abstract":"Flexible authorization is a significant research realm in pervasive computing. Logic program is a worthy approach for expressing and reasoning flexible authorization not only in theory but also in practice. This paper mainly focuses on specifying flexible authorization policies using logic programs. The features of the flexible authorizations are analyzed. The conflicts resolution and dynamic authorization based on LPOD (Logic Program with Ordered Disjunction) are studied.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Flexible Authorizations with Logic Program\",\"authors\":\"Mingsheng Zhang, Wu Chen, Yisong Wang, Mingyi Zhang\",\"doi\":\"10.1109/NSWCTC.2009.9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Flexible authorization is a significant research realm in pervasive computing. Logic program is a worthy approach for expressing and reasoning flexible authorization not only in theory but also in practice. This paper mainly focuses on specifying flexible authorization policies using logic programs. The features of the flexible authorizations are analyzed. The conflicts resolution and dynamic authorization based on LPOD (Logic Program with Ordered Disjunction) are studied.\",\"PeriodicalId\":433291,\"journal\":{\"name\":\"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-04-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NSWCTC.2009.9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NSWCTC.2009.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Flexible authorization is a significant research realm in pervasive computing. Logic program is a worthy approach for expressing and reasoning flexible authorization not only in theory but also in practice. This paper mainly focuses on specifying flexible authorization policies using logic programs. The features of the flexible authorizations are analyzed. The conflicts resolution and dynamic authorization based on LPOD (Logic Program with Ordered Disjunction) are studied.