Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms., , , , , , , and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 1-27. Springer, (2011)An Authorization Logic With Explicit Time., , and . CSF, page 133-145. IEEE Computer Society, (2008)Linear Logical Voting Protocols., and . VOTE-ID, volume 7187 of Lecture Notes in Computer Science, page 53-70. Springer, (2011)Experiences in the logical specification of the HIPAA and GLBA privacy laws., , , , and . WPES, page 73-82. ACM, (2010)Polarized Subtyping., , , , and . CoRR, (2022)Cut Reduction in Linear Logic as Asynchronous Session-Typed Communication., , , and . CSL, volume 16 of LIPIcs, page 228-242. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2012)Substructural Proofs as Automata., and . APLAS, volume 10017 of Lecture Notes in Computer Science, page 3-22. (2016)