Author of the publication

An Automata-Based Approach to Evolving Privacy Policies for Social Networks.

, , , and . RV, volume 10012 of Lecture Notes in Computer Science, page 285-301. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Model-Based Approach to Combining Static and Dynamic Verification Techniques., , and . ISoLA (1), volume 9952 of Lecture Notes in Computer Science, page 416-430. (2016)On Observing Contracts: Deontic Contracts Meet Smart Contracts., , and . JURIX, volume 313 of Frontiers in Artificial Intelligence and Applications, page 21-30. IOS Press, (2018)Comprehensive Monitor-Oriented Compensation Programming., and . FESCA, volume 147 of EPTCS, page 47-61. (2014)Control-Flow Residual Analysis for Symbolic Automata., , and . PrePost@iFM, volume 254 of EPTCS, page 29-43. (2017)A Controlled Language for the Specification of Contracts., and . CNL (Pre-Proceedings), volume 448 of CEUR Workshop Proceedings, CEUR-WS.org, (2009)Runtime Verification using LARVA., and . RV-CuBES, volume 3 of Kalpa Publications in Computing, page 55-63. EasyChair, (2017)Active External Calls for Blockchain and Distributed Ledger Technologies: Debunking cited inability of Blockchain and DLT to make external calls., and . CoRR, (2023)Recovery within long-running transactions., and . ACM Comput. Surv., 45 (3): 28:1-28:35 (2013)CLARVA: Model-based Residual Verification of Java Programs., , and . MODELSWARD, page 352-359. SCITEPRESS, (2020)Contracts for Interacting Two-Party Systems, and . FLACOS, volume 94 of EPTCS, page 21-30. (2012)