Author of the publication

Trust Domains: An Algebraic, Logical, and Utility-Theoretic Approach.

, , and . TRUST, volume 7904 of Lecture Notes in Computer Science, page 232-249. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Stable Variational Autoencoder for Text Modelling., , , , and . INLG, page 594-599. Association for Computational Linguistics, (2019)Errata for Formal Aspects of Computing (2006) 18: 495-517 and their consequences., , and . Formal Asp. Comput., 19 (4): 551-554 (2007)Semantics for structured systems modelling and simulation., , and . SimuTools, page 34. ICST/ACM, (2010)Bunched polymorphism., , and . Math. Struct. Comput. Sci., 18 (6): 1091-1132 (2008)A Quantitative Field Study of a Persuasive Security Technology in the Wild., , and . SocInfo, volume 13618 of Lecture Notes in Computer Science, page 211-232. Springer, (2022)Security Analysis Using Subjective Attack Trees., , and . SECITC, volume 12596 of Lecture Notes in Computer Science, page 288-301. Springer, (2020)A Subjective Network Approach for Cybersecurity Risk Assessment., , and . SIN, page 1:1-1:8. ACM, (2020)Algebra and logic for access control., and . Formal Aspects Comput., 22 (2): 83-104 (2010)Bunching for Regions and Locations., and . MFPS, volume 158 of Electronic Notes in Theoretical Computer Science, page 171-197. Elsevier, (2006)A Logical and Computational Theory of Located Resource., , and . J. Log. Comput., 19 (6): 1207-1244 (2009)