RBAC-Based Secure Interoperation Using Constraint Logic Programming.
Jinwei HuRuixuan LiZhengding LuPublished in: CSE (2) (2009)
Keyphrases
- constraint logic programming
- access control
- role based access control
- constraint solving
- security mechanisms
- rbac model
- logic programming language
- answer set programming
- logic programming
- constraint programming
- access control mechanism
- security requirements
- temporal reasoning
- data security
- global constraints
- security issues
- constraint satisfaction problems
- programming paradigms
- proof theoretic
- constraint propagation
- security model
- logic programs
- data sources
- artificial intelligence
- sensitive data
- information security
- information sharing