Author of the publication

Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets.

, and . IEEE Trans. Dependable Sec. Comput., 8 (6): 852-865 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Termination of Rewriting with Local Strategies., , and . Electr. Notes Theor. Comput. Sci., 58 (2): 155-188 (2001)A Constraint Solver in Finite Algebras and Its Combination with Unification Algorithms., and . JICSLP, page 225-239. MIT Press, (1992)Labelled Port Graph - A Formal Structure for Models and Computations., , and . Electr. Notes Theor. Comput. Sci., (2018)Rn- and Gn-Logics., , and . HOA, volume 1074 of Lecture Notes in Computer Science, page 90-108. Springer, (1995)Narrowing Based Inductive Proof Search., , and . Programming Logics, volume 7797 of Lecture Notes in Computer Science, page 216-238. Springer, (2013)Editorial: Strategies in Automated Deduction., , and . Ann. Math. Artif. Intell., (2000)Rewriting techniques and applications, RTA'91., and . SIGACT News, 22 (3): 24-30 (1991)Algebraic Manipulations as a Unification and Matching Strategy for Linear Equations in Signed Binary Trees., , and . IJCAI, page 1016-1023. William Kaufmann, (1981)Semi-automatic Synthesis of Security Policies by Invariant-Guided Abduction., and . Formal Aspects in Security and Trust, volume 6561 of Lecture Notes in Computer Science, page 157-175. Springer, (2010)Simplification and termination of strategies in rule-based languages., , and . PPDP, page 124-135. ACM, (2003)