Author of the publication

Access-Control Policies via Belnap Logic: Effective and Efficient Composition and Analysis.

, and . CSF, page 163-176. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Manyopt: An Extensible Tool for Mixed, Non-Linear Optimization Through SMT Solving., and . CoRR, (2017)On model checking multiple hybrid views., and . Theor. Comput. Sci., 404 (3): 186-201 (2008)Aserbaidschan – Ressourcen, Konflikt(e), Transformationen, and . Materialen und Diskussionsgrundlagen des Faches Wirtschaftsgeographie Katholische Universität Eichstätt-Ingolstadt, (2014)Future developments in cyber risk assessment for the internet of things., , , , , , and . CoRR, (2018)Artificial Intelligence and the Internet of Things in Industry 4.0., , , , and . CCF Trans. Pervasive Comput. Interact., 3 (3): 329-338 (2021)Mapping the values of IoT., , , and . J. Inf. Technol., 33 (4): 345-360 (2018)Static Analysis for Proactive Security., and . Computing and Software Science, volume 10000 of Lecture Notes in Computer Science, Springer, (2019)Polynomial-Time Under-Approximation of Winning Regions in Parity Games., , and . MFCSIT, volume 225 of Electronic Notes in Theoretical Computer Science, page 115-139. Elsevier, (2006)Oligarchic Control of Business-to-Business Blockchains., and . EuroS&P Workshops, page 68-71. IEEE, (2017)Program synthesis in administration of higher-order permissions., , and . SACMAT, page 41-50. ACM, (2011)