2Halpern J Y, Weissman V. Using first-order logic to reason about policies//Proceedings of the IEEE Computer Security Foundations Workshop. NY, 2003:187-201.
3Damiani E, Di Vimercati S C, Paraboschi S, Samarati P. A fine-grained access control system for XML documents. ACM Transactions on Information and System Security, 2002, 5(2), 169-202.
4Jajodia S, Samarati P, Subrahmanian V S. A logical language for expressing authorizations//Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, 1997:31- 43.
5Pucella R, Weissmann V. Reasoning about dynamic policies//Proceedings of FoSSaCS-7, 2004: 453-467.
6Dougherty D J, Fisler K, Krishnamurthi S. Specifying and reasoning about dynamic access-control policies//Bhalla S ed. Lecture Notes in Computer Science 4130. Springer, 2006:632-646.
7DeTreville J. Binder, a logic-based security language//Proceedings of the IEEE Symposium on Security and Privacy. Berkeley, CA, 2002:105- 113.
8Jajodia S, Samarati P, Sapino M L, Subrahmanian V. Flexible support for multiple access control policies. ACM Transactions on Database Systems, 2006, 26(2): 214-260.
9Li N, Mitchell J C, Winsborough W H. Design of a rolebased trust-management framework//Proceedings of the IEEE Symposium on Security and Privacy. Berkeley, CA, 2002:114-130.
10Barker S. Security policy specification in logic//Proceedings of the International Conference on Artificial Intelligence. Las Vegas, Nevada, USA, 2000:143-148.