1. Alfieri R., Cecchini R., Ciaschini V., dell’Agnello L., Frohner A., Lőrentey K., Spataro F.: From gridmap-file to voms: managing authorization in a grid environment. Futur. Gener. Comput. Syst. 21(4), 549–558 (2005)
2. Alpern B., Attanasio C., Barton J. et al.: The jalapeño virtual machine. IBM Syst. J. 39(1), 211–221 (2000)
3. Apt K.: Logic programming. In: van Leeuwen, J. (eds) Handbook of Theoretical Computer Science, Elsevier, Amsterdam (1990)
4. Barton, T., Basney, J., Freeman, T., Scavo, T., Siebenlist, F., Welch, V., Ananthakrishnan, R., Baker, B., Goode, M., Keahey, K.: Identity federation and attribute-based authorization through the globus toolkit, shibboleth, gridshib, and myproxy. In: 5th Annual PKI R&D Workshop (2006)
5. Baselice, S., Bonatti, P.A., Faella, M.: On interoperable trust negotiation strategies. In: Proceedings of IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’07), pp. 39–50. IEEE Computer Society (2007)