Author of the publication

Policy Analysis for Administrative Role Based Access Control.

, , , and . CSFW, page 124-138. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XPL: An extended probabilistic logic for probabilistic transition systems., and . CoRR, (2016)Alternating Fixed Points in Boolean Equation Systems as Preferred Stable Models., , and . ICLP, volume 2237 of Lecture Notes in Computer Science, page 227-241. Springer, (2001)Efficient Real-Time Model Checking Using Tabled Logic Programming and Constraints., , and . ICLP, volume 2401 of Lecture Notes in Computer Science, page 100-114. Springer, (2002)Online Justification for Tabled Logic Programs., , , , and . ICLP, volume 2916 of Lecture Notes in Computer Science, page 500-501. Springer, (2003)Model Checking and Evidence Exploration., , and . ECBS, page 214-223. IEEE Computer Society, (2003)Logic Based Modeling and Analysis of Workflows., , , and . PODS, page 25-33. ACM Press, (1998)Security policy analysis using deductive spreadsheets., , , , and . FMSE, page 42-50. ACM, (2007)A Parameterized Unfold/Fold Transformation Framework for Definite Logic Programs., , , and . PPDP, volume 1702 of Lecture Notes in Computer Science, page 396-413. Springer, (1999)Evidence Explorer: A Tool for Exploring Model-Checking Proofs., , and . CAV, volume 2725 of Lecture Notes in Computer Science, page 215-218. Springer, (2003)A Symbolic Constraint Solving Framework for Analysis of Logic Programs., , and . PEPM, page 12-23. ACM Press, (1995)