Author of the publication

Towards Controlled Query Evaluation for Incomplete First-Order Databases.

, , and . FoIKS, volume 5956 of Lecture Notes in Computer Science, page 230-247. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services., and . ESSoS, volume 8364 of Lecture Notes in Computer Science, page 35-44. Springer, (2014)On the Simulation Assumption for Controlled Interaction Processing., and . Computational Models of Rationality, page 133-149. College Publications, (2016)Revising Belief without Revealing Secrets., and . FoIKS, volume 7153 of Lecture Notes in Computer Science, page 51-70. Springer, (2012)Constructing Inference-Proof Belief Mediators., and . DBSec, volume 9149 of Lecture Notes in Computer Science, page 188-203. Springer, (2015)Belief change operations under confidentiality requirements in multiagent systems.. Technical University Dortmund, Germany, (2014)Confidentiality enforcement by hybrid control of information flows., , and . CoRR, (2017)Preserving confidentiality while reacting on iterated queries and belief revisions., and . Ann. Math. Artif. Intell., 73 (1-2): 75-123 (2015)Inference-Proof View Update Transactions with Minimal Refusals., and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 104-121. Springer, (2011)Policy-Based Secrecy in the Runs & Systems Framework and Controlled Query Evaluation., and . IWSEC (Short Papers), page 60-77. Information Processing Society of Japan (IPSJ), (2010)