Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adding Organizations and Roles as Primitives to the JADE Framework., , , , , , and . Programming Multi-Agent Systems, volume 08361 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2008)Logics in access control: a conditional approach., , , and . J. Log. Comput., 24 (4): 705-762 (2014)A Logic of Privacy., and . DBSec, volume 6166 of Lecture Notes in Computer Science, page 17-32. Springer, (2010)A constructive conditional logic for access control: a preliminary report., , , and . ECAI, volume 215 of Frontiers in Artificial Intelligence and Applications, page 1073-1074. IOS Press, (2010)A Conditional Constructive Logic for Access Control and Its Sequent Calculus., , , and . TABLEAUX, volume 6793 of Lecture Notes in Computer Science, page 164-179. Springer, (2011)Towards a General Framework for Modelling Roles.. Normative Multi-agent Systems, volume 07122 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)A Constructive Conditional Logic for Access Control., , , and . CILC, volume 598 of CEUR Workshop Proceedings, CEUR-WS.org, (2010)How to Program Organizations and Roles in the JADE Framework., , , , and . MATES, volume 5244 of Lecture Notes in Computer Science, page 25-36. Springer, (2008)Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction., , and . CSF, page 139-153. IEEE Computer Society, (2012)Labeled Goal-Directed Search in Access Control Logic., , and . STM, volume 7783 of Lecture Notes in Computer Science, page 65-80. Springer, (2012)