From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Dynamic Logic of Permission. LICS, стр. 72-78. IEEE Computer Society, (1990)Complexity Tailored Design: A New Design Methodology for Databases With Incomplete Information., , и . J. Comput. Syst. Sci., 51 (3): 405-432 (1995)What, indeed, is intransitive noninterference?. J. Comput. Secur., 23 (2): 197-228 (2015)An Epistemic Foundation for Authentication Logics (Extended Abstract)., , и . TARK, том 251 из EPTCS, стр. 306-323. (2017)Two Applications of Epistemic Logic in Computer Security.. Proof, Computation and Agency, том 352 из Synthese library, Springer, (2011)Axioms for Logics of Knowledge and Past Time: Synchrony and Unique Initial States., , и . Advances in Modal Logic, стр. 53-72. King's College Publications, (2004)A Temporal Logic of Strategic Knowledge., и . KR, AAAI Press, (2014)On Reductions from Multi-Domain Noninterference to the Two-Level Case., и . ESORICS (1), том 9878 из Lecture Notes in Computer Science, стр. 520-537. Springer, (2016)Knowledge in quantum systems., и . TARK, стр. 104-117. ACM, (2003)Recursively Indefinite Databases.. ICDT, том 470 из Lecture Notes in Computer Science, стр. 364-378. Springer, (1990)