Skip to main content

Datalog for Security, Privacy and Trust

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6702))

Abstract

Logic-based policy languages are appreciated because of their clean semantics and expressiveness. Datalog has been used for a long time as a foundation of many security models and policy languages. Recently, Description Logics (DLs for short) have been adopted as policy languages, too. In this paper we carry out a comparison of Datalog and Description Logics as policy languages, based both on expressiveness analysis and on an assessment of the current maturity of the two fields, expressly related to the representation and reasoning tasks involved in policy authoring, enforcement, and management. We shall argue that Datalog-based approaches are currently more powerful and mature than those based on pure DLs, although the ongoing research on the latter might change the picture in a near future. The potential of hybrid approaches will be briefly discussed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, D., Al-Shaer, E., Kagal, L., Lobo, J. (eds.): 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), June 2-4. IEEE Computer Society, Palisades (2008)

    Google Scholar 

  2. Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Verifiable agent interaction in abductive logic programming: The SCIFF framework. ACM Trans. Comput. Log. 9(4) (2008)

    Google Scholar 

  3. Apt, K.R.: Logic programming. In: Handbook of Theoretical Computer Science. Formal Models and Semantics (B), vol. B, pp. 493–574 (1990)

    Google Scholar 

  4. Armando, A., Baumgartner, P., Dowek, G. (eds.): IJCAR 2008. LNCS (LNAI), vol. 5195. Springer, Heidelberg (2008)

    Google Scholar 

  5. Baader, F., Brandt, S., Lutz, C.: Pushing the EL envelope. In: Proc. of the Nineteenth International Joint Conference on Artificial Intelligence, IJCAI 2005, pp. 364–369. Professional Book Center (2005)

    Google Scholar 

  6. Baader, F., Lutz, C., Suntisrivaraporn, B.: CEL - a polynomial-time reasoner for life science ontologies. In: Furbach, U., Shankar, N. (eds.) IJCAR 2006. LNCS (LNAI), vol. 4130, pp. 287–291. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Baader, F., McGuiness, D.L., Nardi, D., Patel-Schneider, P.: The Description Logic Handbook: Theory, implementation and applications. Cambridge University Press, Cambridge (2003)

    MATH  Google Scholar 

  8. Bacon, J., Moody, K., Yao, W.: A model of OASIS role-based access control and its support for active security. ACM Trans. Inf. Syst. Secur. 5(4), 492–540 (2002)

    Article  Google Scholar 

  9. Barzilay, R., McCullough, D., Rambow, O., DeChristofaro, J., Korelsky, T., Lavoie, B.: A new approach to expert system explanations. In: 9thInternational Workshop on Natural Language Generation, pp. 78–87 (1998)

    Google Scholar 

  10. Becker, M.Y., Fournet, C., Gordon, A.D.: SecPAL: Design and semantics of a decentralized authorization language. Journal of Computer Security 18(4), 619–665 (2010)

    Article  Google Scholar 

  11. Becker, M.Y., Nanz, S.: The role of abduction in declarative authorization policies. In: Hudak, P., Warren, D.S. (eds.) PADL 2008. LNCS, vol. 4902, pp. 84–99. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  12. Becker, M.Y., Sewell, P.: Cassandra: Distributed access control policies with tunable expressiveness. In: POLICY 2004, pp. 159–168. IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

  13. Bonatti, P., Coi, J.D., Olmedilla, D., Sauro, L.: A rule-based trust negotiation system. IEEE Transactions on Knowledge and Data Engineering 99(PrePrints) (2010)

    Google Scholar 

  14. Bonatti, P., Eiter, T., Faella, M.: Automated negotiation mechanisms. Technical Report I2-D6, REWERSE (April 2006), http://rewerse.net/deliverables/m24/i2-d6.pdf

  15. Bonatti, P.A.: On the decidability of containment of recursive datalog queries - preliminary report. In: Deutsch, A. (ed.) PODS, pp. 297–306. ACM, New York (2004)

    Google Scholar 

  16. Bonatti, P.A., Coi, J.L.D., Olmedilla, D., Sauro, L.: Rule-based policy representations and reasoning. In: Bry, F., Małuszyński, J. (eds.) Semantic Techniques for the Web. LNCS, vol. 5500, pp. 201–232. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  17. Bonatti, P.A., di Vimercati, S.D.C., Samarati, P.: An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur. 5(1), 1–35 (2002)

    Article  Google Scholar 

  18. Bonatti, P.A., Eiter, T.: Querying disjunctive databases through nonmonotonic logics. Theor. Comput. Sci. 160(1&2), 321–363 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  19. Bonatti, P.A., Faella, M., Sauro, L.: Defeasible inclusions in low-complexity DLs: Preliminary notes. In: Boutilier (ed.) [26], pp. 696–701

    Google Scholar 

  20. Bonatti, P.A., Lutz, C., Wolter, F.: Description logics with circumscription. In: Proc. of the Tenth International Conference on Principles of Knowledge Representation and Reasoning, KR 2006, pp. 400–410. AAAI Press, Menlo Park (2006)

    Google Scholar 

  21. Bonatti, P.A., Mogavero, F.: Comparing rule-based policies. In: Agrawal, et al. (eds.) [1], pp. 11–18

    Google Scholar 

  22. Bonatti, P.A., Olmedilla, D.: Driving and monitoring provisional trust negotiation with metapolicies. In: 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), pp. 14–23. IEEE Computer Society, Los Alamitos (2005)

    Chapter  Google Scholar 

  23. Bonatti, P.A., Olmedilla, D., Peer, J.: Advanced policy explanations on the web. In: 17th European Conference on Artificial Intelligence (ECAI 2006), pp. 200–204. IOS Press, Riva del Garda (2006)

    Google Scholar 

  24. Bonatti, P.A., Samarati, P.: A uniform framework for regulating service access and information release on the web. Journal of Computer Security 10(3), 241–272 (2002)

    Article  Google Scholar 

  25. Bonatti, P.A., Samarati, P.: Logics for authorization and security. In: Chomicki, J., van der Meyden, R., Saake, G. (eds.) Logics for Emerging Applications of Databases, pp. 277–323. Springer, Heidelberg (2003)

    Google Scholar 

  26. Boutilier, C. (ed.): Proceedings of the 21st International Joint Conference on Artificial Intelligence, IJCAI 2009, Pasadena, California, USA, July 11-17 (2009)

    Google Scholar 

  27. Calvanese, D., Giacomo, G.D., Lenzerini, M.: On the decidability of query containment under constraints. In: PODS, pp. 149–158. ACM Press, New York (1998)

    Google Scholar 

  28. Calvanese, D., Giacomo, G.D., Vardi, M.Y.: Decidable containment of recursive queries. Theor. Comput. Sci. 336(1), 33–56 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  29. Casini, G., Straccia, U.: Rational closure for defeasible description logics. In: Janhunen, T., Niemelä, I. (eds.) JELIA 2010. LNCS, vol. 6341, pp. 77–90. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  30. Chalupsky, H., Russ, T.A.: Whynot: debugging failed queries in large knowledge bases. In: 14th National Conference on Artificial Intelligence, pp. 870–877 (2002)

    Google Scholar 

  31. Colucci, S., Noia, T.D., Sciascio, E.D., Donini, F.M., Mongiello, M.: A uniform tableaux-based method for concept abduction and contraction in description logics. In: de Mántaras, R.L., Saitta, L. (eds.) ECAI, pp. 975–976. IOS Press, Amsterdam (2004)

    Google Scholar 

  32. Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D.: Securing context-aware applications using environment roles. In: SACMAT 2001: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, pp. 10–20. ACM, New York (2001)

    Google Scholar 

  33. Dantsin, E., Eiter, T., Gottlob, G., Voronkov, A.: Complexity and expressive power of logic programming. ACM Comput. Surv. 33(3), 374–425 (2001)

    Article  Google Scholar 

  34. de Bruijn, J., Eiter, T., Polleres, A., Tompits, H.: Embedding non-ground logic programs into autoepistemic logic for knowledge-base combination. In: Veloso (ed.) [86], pp. 304–309

    Google Scholar 

  35. Donini, F.M., Nardi, D., Rosati, R.: Description logics of minimal knowledge and negation as failure. ACM Trans. Comput. Log. 3(2), 177–225 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  36. Duma, C., Herzog, A., Shahmehri, N.: Privacy in the semantic web: What policy languages have to offer. In: POLICY 2007, pp. 109–118. IEEE Computer Society, Los Alamitos (2007)

    Google Scholar 

  37. Eiter, T., Faber, W., Leone, N., Pfeifer, G.: The diagnosis frontend of the DLV system. AI Commun. 12(1-2), 99–111 (1999)

    MathSciNet  Google Scholar 

  38. Eiter, T., Ianni, G., Krennwallner, T., Polleres, A.: Rules and ontologies for the semantic web. In: Baroglio, C., Bonatti, P.A., Małuszyński, J., Marchiori, M., Polleres, A., Schaffert, S. (eds.) Reasoning Web. LNCS, vol. 5224, pp. 1–53. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  39. Eiter, T., Leone, N., Mateis, C., Pfeifer, G., Scarcello, F.: A deductive system for non-monotonic reasoning. In: Fuhrbach, U., Dix, J., Nerode, A. (eds.) LPNMR 1997. LNCS, vol. 1265, pp. 364–375. Springer, Heidelberg (1997)

    Google Scholar 

  40. Eiter, T., Lukasiewicz, T., Schindlauer, R., Tompits, H.: Combining answer set programming with description logics for the semantic web. In: Dubois, D., Welty, C.A., Williams, M.-A. (eds.) KR, pp. 141–151. AAAI Press, Menlo Park (2004)

    Google Scholar 

  41. Eiter, T., Lutz, C., Ortiz, M., Simkus, M.: Query answering in description logics with transitive roles. In: Boutilier (ed.) [26], pp. 759–764

    Google Scholar 

  42. Elsenbroich, C., Kutz, O., Sattler, U.: A case for abductive reasoning over ontologies. In: Grau, B.C., Hitzler, P., Shankey, C., Wallace, E. (eds.) OWLED. CEUR Workshop Proceedings, vol. 216. CEUR-WS.org (2006)

    Google Scholar 

  43. Eshghi, K.: Abductive planning with event calculus. In: ICLP/SLP, pp. 562–579 (1988)

    Google Scholar 

  44. Finin, T.W., Joshi, A., Kagal, L., Niu, J., Sandhu, R.S., Winsborough, W.H., Thuraisingham, B.M.: ROWLBAC: representing role based access control in OWL. In: Ray, I., Li, N. (eds.) SACMAT, pp. 73–82. ACM, New York (2008)

    Chapter  Google Scholar 

  45. Gavriloaie, R., Nejdl, W., Olmedilla, D., Seamons, K.E., Winslett, M.: No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In: Bussler, C.J., Davies, J., Fensel, D., Studer, R. (eds.) ESWS 2004. LNCS, vol. 3053, pp. 342–356. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  46. Giordano, L., Gliozzi, V., Olivetti, N., Pozzato, G.: Reasoning about typicality in preferential description logics. In: Hölldobler, S., Lutz, C., Wansing, H. (eds.) JELIA 2008. LNCS (LNAI), vol. 5293, pp. 192–205. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  47. Giuri, L., Iglio, P.: Role templates for content-based access control. In: RBAC 1997: Proceedings of the Second ACM Workshop on Role-based Access Control, pp. 153–159. ACM, New York (1997)

    Google Scholar 

  48. Glimm, B., Lutz, C., Horrocks, I., Sattler, U.: Conjunctive query answering for the description logic shiq. J. Artif. Intell. Res. (JAIR) 31, 157–204 (2008)

    MathSciNet  MATH  Google Scholar 

  49. Grimm, S., Hitzler, P.: A preferential tableaux calculus for circumscriptive ALCO. In: Polleres, A., Swift, T. (eds.) RR 2009. LNCS, vol. 5837, pp. 40–54. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  50. Heymans, S., Nieuwenborgh, D.V., Vermeir, D.: Open answer set programming for the semantic web. J. Applied Logic 5(1), 144–169 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  51. Hilty, M., Pretschner, A., Basin, D.A., Schaefer, C., Walter, T.: A policy language for distributed usage control. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 531–546. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  52. Huang, X.: Reconstructing proofs at the assertion level. In: Bundy, A. (ed.) CADE 1994. LNCS, vol. 814, pp. 738–752. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  53. Iannella, R., Guth, S. (eds.): Proceedings of the First International Workshop on the Open Digital Rights Language (ODRL), Vienna, Austria, April 22-23 (2004)

    Google Scholar 

  54. Immerman, N.: Relational queries computable in polynomial time. Information and Control 68(1-3), 86–104 (1986)

    Article  MathSciNet  MATH  Google Scholar 

  55. Immerman, N.: Descriptive and computational complexity. In: Csirik, J., Demetrovics, J., Gécseg, F. (eds.) FCT 1989. LNCS, vol. 380, pp. 244–245. Springer, Heidelberg (1989)

    Chapter  Google Scholar 

  56. Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Trans. Database Syst. 26(2), 214–260 (2001)

    Article  MATH  Google Scholar 

  57. Johnson, M., Intlekofer, K., Jung, H., Bradshaw, J.M., Allen, J., Suri, N., Carvalho, M.: Coordinated operations in mixed teams of humans and robots. In: First IEEE Conference on Distributed Human-Machine Systems, DHMS 2008 (2008) (in press)

    Google Scholar 

  58. Kagal, L., Finin, T.W., Joshi, A.: A policy language for a pervasive computing environment. In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), p. 63. IEEE Computer Society, Lake Como (2003)

    Google Scholar 

  59. Kagal, L., Hanson, C., Weitzner, D.J.: Using dependency tracking to provide explanations for policy management. In: Agrawal, et al. (eds.) [1], pp. 54–61

    Google Scholar 

  60. Kolaitis, P.G.: The expressive power of stratified programs. Inf. Comput. 90(1), 50–66 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  61. Kolovski, V., Hendler, J.A., Parsia, B.: Analyzing web access control policies. In: Williamson, C.L., Zurko, M.E., Patel-Schneider, P.F., Shenoy, P.J. (eds.) WWW, pp. 677–686. ACM, New York (2007)

    Chapter  Google Scholar 

  62. Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust-management framework. In: IEEE Symposium on Security and Privacy, pp. 114–130 (2002)

    Google Scholar 

  63. Lowe, H., Cumming, A., Smyth, M.: Lessons from experience: Making theorem provers more co-operative. In: 2nd Workshop on User Interfaces for Theorem Provers (July 1996)

    Google Scholar 

  64. Lupu, E., Sloman, M.: Reconciling role based management and role based access control. In: ACM Workshop on Role-Based Access Control, pp. 135–141 (1997)

    Google Scholar 

  65. Lutz, C.: Adding numbers to the SHIQ description logic—First results. In: Proceedings of the Eighth International Conference on Principles of Knowledge Representation and Reasoning (KR 2002), pp. 191–202. Morgan Kaufmann, San Francisco (2002)

    Google Scholar 

  66. Mancarella, P., Terreni, G., Sadri, F., Toni, F., Endriss, U.: The CIFF proof procedure for abductive logic programming with constraints: Theory, implementation and experiments. TPLP 9(6), 691–750 (2009)

    MathSciNet  MATH  Google Scholar 

  67. McGuinness, D.L., da Silva, P.P.: Explaining answers from the semantic web: The Inference Web approach. Journal of Web Semantics 1(4), 397–413 (2004)

    Article  Google Scholar 

  68. Moreau, L., Bradshaw, J.M., Breedy, M.R., Bunch, L., Hayes, P.J., Johnson, M., Kulkarni, S., Lott, J., Suri, N., Uszok, A.: Behavioural specification of grid services with the KAoS policy language. In: CCGRID, pp. 816–823. IEEE Computer Society, Los Alamitos (2005)

    Google Scholar 

  69. Motik, B., Rosati, R.: A faithful integration of description logics with logic programming. In: Veloso (ed.) [86], pp. 477–482

    Google Scholar 

  70. Niemelä, I., Simons, P.: Smodels — an implementation of the stable model and well-founded semantics for normal lp. In: Fuhrbach, U., Dix, J., Nerode, A. (eds.) LPNMR 1997. LNCS, vol. 1265, pp. 421–430. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  71. Noia, T.D., Sciascio, E.D., Donini, F.M., Mongiello, M.: Abductive matchmaking using description logics. In: Gottlob, G., Walsh, T. (eds.) IJCAI, pp. 337–342. Morgan Kaufmann, San Francisco (2003)

    Google Scholar 

  72. Papadimitriou, C.H.: A note the expressive power of Prolog. Bulletin of the EATCS 26, 21–22 (1985)

    MathSciNet  Google Scholar 

  73. Park, J., Sandhu, R.S.: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128–174 (2004)

    Article  Google Scholar 

  74. Pérez-Urbina, H., Motik, B., Horrocks, I.: Tractable query answering and rewriting under description logic constraints. J. Applied Logic 8(2), 186–209 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  75. Pretschner, A., Hilty, M., Basin, D.: Distributed usage control. Commun. ACM 49(9), 39–44 (2006)

    Article  Google Scholar 

  76. Ray, O., Kakas, A.: ProLogICA: a practical system for abductive logic programming. In: Proceedings of the 11th International Workshop on Non-monotonic Reasoning, pp. 304–312 (2006)

    Google Scholar 

  77. Sadeh, N.M., Hong, J.I., Cranor, L.F., Fette, I., Kelley, P.G., Prabaker, M.K., Rao, J.: Understanding and capturing people’s privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13(6), 401–412 (2009)

    Article  Google Scholar 

  78. Sagonas, K., Swift, T., Warren, D.: XSB as an efficient deductive database engine. In: Proceedings of the 1994 ACM SIGMOD International Conference on Management of Data, pp. 442–453. ACM Press, Minneapolis (1994)

    Chapter  Google Scholar 

  79. Sattler, U., Vardi, M.Y.: The hybrid μ-calculus. In: Goré, R.P., Leitsch, A., Nipkow, T. (eds.) IJCAR 2001. LNCS (LNAI), vol. 2083, pp. 76–91. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  80. Seamons, K.E., Winslett, M., Yu, T., Smith, B., Child, E., Jacobson, J., Mills, H., Yu, L.: Requirements for policy languages for trust negotiation. In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY), pp. 68–79. IEEE Computer Society, Monterey (2002)

    Chapter  Google Scholar 

  81. Shmueli, O.: Equivalence of DATALOG queries is undecidable. J. Log. Program 15(3), 231–241 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  82. Shvaiko, P., Giunchiglia, F., da Silva, P.P., McGuinness, D.L.: Web explanations for semantic heterogeneity discovery. In: Gómez-Pérez, A., Euzenat, J. (eds.) ESWC 2005. LNCS, vol. 3532, pp. 303–317. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  83. Sterling, L., Shapiro, E.Y.: The Art of Prolog - Advanced Programming Techniques, 2nd edn. MIT Press, Cambridge (1994)

    MATH  Google Scholar 

  84. Tanner, M.C., Keuneke, A.M.: Explanations in knowledge systems: The roles of the task structure and domain functional models. IEEE Expert: Intelligent Systems and Their Applications 6(3), 50–57 (1991)

    Article  Google Scholar 

  85. Uszok, A., Bradshaw, J.M., Jeffers, R., Suri, N., Hayes, P.J., Breedy, M.R., Bunch, L., Johnson, M., Kulkarni, S., Lott, J.: KAoS policy and domain services: Towards a description-logic approach to policy representation, deconfliction, and enforcement. In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), pp. 93–96. IEEE Computer Society, Lake Como (2003)

    Google Scholar 

  86. Veloso, M.M. (ed.): Proceedings of the 20th International Joint Conference on Artificial Intelligence, IJCAI 2007, Hyderabad, India, January 6-12 (2007)

    Google Scholar 

  87. W3C. Platform for Privacy Preferences (P3P) Specification, http://www.w3.org/TR/WD-P3P/Overview.html

  88. Wang, K., Billington, D., Blee, J., Antoniou, G.: Combining description logic and defeasible logic for the semantic web. In: Antoniou, G., Boley, H. (eds.) RuleML 2004. LNCS, vol. 3323, pp. 170–181. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  89. Wick, M.R.: Second generation expert system explanation. In: David, J.-M., Krivine, J.-P., Simmons, R. (eds.) Second Generation Expert Systems, pp. 614–640. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  90. Winsborough, W., Seamons, K., Jones, V.: Automated trust negotiation. In: Proceedings of DARPA Information Survivability Conference and Exposition, DISCEX 2000, pp. 88–102. IEEE Computer Society, Los Alamitos (2000)

    Google Scholar 

  91. Woo, T.Y.C., Lam, S.S.: Authorizations in distributed systems: A new approach. Journal of Computer Security 2(2-3), 107–136 (1993)

    Article  Google Scholar 

  92. Zhang, R., Artale, A., Giunchiglia, F., Crispo, B.: Using description logics in relation based access control. In: Grau, B.C., Horrocks, I., Motik, B., Sattler, U. (eds.) Description Logics. CEUR Workshop Proceedings, vol. 477. CEUR-WS.org (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bonatti, P.A. (2011). Datalog for Security, Privacy and Trust. In: de Moor, O., Gottlob, G., Furche, T., Sellers, A. (eds) Datalog Reloaded. Datalog 2.0 2010. Lecture Notes in Computer Science, vol 6702. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24206-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24206-9_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24205-2

  • Online ISBN: 978-3-642-24206-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics