Author of the publication

Security of multi-agent systems: A case study on comparison shopping.

, , , and . J. Applied Logic, 5 (2): 303-332 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Unifying Approach to the Security of Distributed and Multi-Threaded Programs., and . Journal of Computer Security, 11 (4): 615-676 (2003)A Case Study in the Mechanical Verification of Fault Tolerance., and . FLAIRS Conference, page 341-345. AAAI Press, (2000)Preserving Information Flow Properties under Refinement.. IEEE Symposium on Security and Privacy, page 78-91. IEEE Computer Society, (2001)On the Composition of Secure Systems.. IEEE Symposium on Security and Privacy, page 88-101. IEEE Computer Society, (2002)A Formalization of Strong Security., , , and . Archive of Formal Proofs, (2014)Simultaneous Quantifier Elimination., , and . KI, volume 1504 of Lecture Notes in Computer Science, page 141-152. Springer, (1998)Who Can Declassify?., and . Formal Aspects in Security and Trust, volume 5491 of Lecture Notes in Computer Science, page 35-49. Springer, (2008)Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis., , , and . LOPSTR, volume 9527 of Lecture Notes in Computer Science, page 201-217. Springer, (2015)A Uniform Information-Flow Security Benchmark Suite for Source Code and Bytecode., , , , , and . NordSec, volume 11252 of Lecture Notes in Computer Science, page 437-453. Springer, (2018)The framework of selective interleaving functions and the modular assembly kit.. FMSE, page 53-62. ACM, (2005)