Author of the publication

Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction.

, , and . CSF, page 139-153. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Logics in access control: a conditional approach., , , and . J. Log. Comput., 24 (4): 705-762 (2014)Adding Organizations and Roles as Primitives to the JADE Framework., , , , , , and . Programming Multi-Agent Systems, volume 08361 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2008)Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction., , and . CSF, page 139-153. IEEE Computer Society, (2012)A Constructive Conditional Logic for Access Control., , , and . CILC, volume 598 of CEUR Workshop Proceedings, CEUR-WS.org, (2010)Towards a General Framework for Modelling Roles.. Normative Multi-agent Systems, volume 07122 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)A constructive conditional logic for access control: a preliminary report., , , and . ECAI, volume 215 of Frontiers in Artificial Intelligence and Applications, page 1073-1074. IOS Press, (2010)A Conditional Constructive Logic for Access Control and Its Sequent Calculus., , , and . TABLEAUX, volume 6793 of Lecture Notes in Computer Science, page 164-179. Springer, (2011)A Logic of Privacy., and . DBSec, volume 6166 of Lecture Notes in Computer Science, page 17-32. Springer, (2010)How to Program Organizations and Roles in the JADE Framework., , , , and . MATES, volume 5244 of Lecture Notes in Computer Science, page 25-36. Springer, (2008)Adding Organizations and Roles as Primitives to JADE Framework., , , and . NORMAS, page 95-111. (2008)