From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a Mechanism for Incentivating Privacy., , , и . ESORICS, том 6879 из Lecture Notes in Computer Science, стр. 472-488. Springer, (2011)An algebra for composing access control policies., , и . ACM Trans. Inf. Syst. Secur., 5 (1): 1-35 (2002)TRBAC: A temporal role-based access control model., , и . ACM Trans. Inf. Syst. Secur., 4 (3): 191-233 (2001)Autoepistemic Logics as a Unifying Framework for the Semantics of Logic Programs.. J. Log. Program., 22 (2): 91-149 (1995)preliminary version: ICLP 1992: 417-430.Autoepistemic Logic Programming.. J. Autom. Reason., 13 (1): 35-67 (1994)Resolution for Skeptical Stable Model Semantics.. J. Autom. Reason., 27 (4): 391-421 (2001)A modular approach to composing access control policies., , и . ACM Conference on Computer and Communications Security, стр. 164-173. ACM, (2000)A new semantics for overriding in description logics., , , и . Artif. Intell., (2015)On the logical properties of the nonmonotonic description logic DLN., и . Artif. Intell., (2017)A Constructive Negation for Transition System Specifications.. APPIA-GULP-PRODE, стр. 283-294. (1997)