Author of the publication

On the use of OWL Reasoning for Evaluating Access Control Policies.

, , , and . SEMANTiCS (Posters & Demos), volume 1481 of CEUR Workshop Proceedings, page 71-74. CEUR-WS.org, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An OWL-based XACML Policy Framework., , , and . SECRYPT, page 124-135. SciTePress, (2015)Using f-SHIN to Represent Objects: An Aid to Visual Grasping., , and . UniDL, volume 613 of CEUR Workshop Proceedings, CEUR-WS.org, (2010)Semanticizing Syntactic Patterns in NLP Processing Using SPARQL-DL Queries., , , and . OWLED, volume 849 of CEUR Workshop Proceedings, CEUR-WS.org, (2012)A Model-driven Approach for Securing Software Architectures., , , , and . SECRYPT, page 595-602. SciTePress, (2013)Using OWL Reasoning for Evaluating XACML Policies., , , and . ICETE (Selected Papers), volume 585 of Communications in Computer and Information Science, page 343-363. Springer, (2015)On the use of OWL Reasoning for Evaluating Access Control Policies., , , and . SEMANTiCS (Posters & Demos), volume 1481 of CEUR Workshop Proceedings, page 71-74. CEUR-WS.org, (2015)Generalizing T-Conorms to Face Saturation in Mamdani Fuzzy Inference Systems., and . International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 15 (1): 57-73 (2007)On the notion of redundancy in access control policies., , , and . SACMAT, page 161-172. ACM, (2013)Ontology-Based Learning Objects Search and Courses Generation., and . Appl. Artif. Intell., 23 (3): 233-260 (2009)An Application of Ontology Technologies to Robotic Agents., and . IAT, page 751-754. IEEE Computer Society, (2005)