From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Semantic Web Policies - A Discussion of Requirements and Research Issues., , , , , , и . ESWC, том 4011 из Lecture Notes in Computer Science, стр. 712-724. Springer, (2006)A modular approach to composing access control policies., , и . ACM Conference on Computer and Communications Security, стр. 164-173. ACM, (2000)A Family of Three-Valued Autoepistemic Logics.. AI*IA, том 549 из Lecture Notes in Computer Science, стр. 28-37. Springer, (1991)Towards Flexible Credential Negotiation Protocols., , и . Security Protocols Workshop, том 3364 из Lecture Notes in Computer Science, стр. 19-23. Springer, (2003)A Sequent Calculus for Skeptical Default Logic., и . TABLEAUX, том 1227 из Lecture Notes in Computer Science, стр. 107-121. Springer, (1997)Reasoning with infinite stable models.. IJCAI, стр. 603-610. Morgan Kaufmann, (2001)Towards a Mechanism for Incentivating Privacy., , , и . ESORICS, том 6879 из Lecture Notes in Computer Science, стр. 472-488. Springer, (2011)On the Logical Properties of the Description Logic DL^N (Extended abstract)., и . IJCAI, стр. 5558-5562. ijcai.org, (2018)Inference-proof Data Filtering for a Probabilistic Setting., , , и . PrivOn@ISWC, том 1951 из CEUR Workshop Proceedings, CEUR-WS.org, (2017)On the decidability of FDNC programs.. Il Milione, том 487 из CEUR Workshop Proceedings, CEUR-WS.org, (2008)