Search the dblp DataBase
Piero A. Bonatti :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Piero A. Bonatti , Sarit Kraus , V. S. Subrahmanian Declarative Foundations of Secure Deductive Databases. [Citation Graph (3, 3)][DBLP ] ICDT, 1992, pp:391-406 [Conf ] Piero A. Bonatti , Thomas Eiter Querying Disjunctive Databases Through Nonmonotonic Logics. [Citation Graph (3, 0)][DBLP ] Theor. Comput. Sci., 1996, v:160, n:1&2, pp:321-363 [Journal ] Piero A. Bonatti Autoepistemic Logics as a Unifying Framework for the Semantics of Logic Programs. [Citation Graph (1, 0)][DBLP ] JICSLP, 1992, pp:417-430 [Conf ] Piero A. Bonatti , Sarit Kraus , V. S. Subrahmanian Foundations of Secure Deductive Databases. [Citation Graph (1, 15)][DBLP ] IEEE Trans. Knowl. Data Eng., 1995, v:7, n:3, pp:406-422 [Journal ] Piero A. Bonatti , Ernesto Damiani , Sabrina De Capitani di Vimercati , Pierangela Samarati A Component-Based Architecture for Secure Data Publication. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:309-318 [Conf ] Piero A. Bonatti A Constructive Negation for Transition System Specifications. [Citation Graph (0, 0)][DBLP ] APPIA-GULP-PRODE, 1997, pp:283-294 [Conf ] Piero A. Bonatti , Laura Giordano Three-Valued Semantics for Extended Logic Programs. [Citation Graph (0, 0)][DBLP ] GULP-PRODE, 1995, pp:295-306 [Conf ] Elisa Bertino , Piero A. Bonatti , Elena Ferrari , Maria Luisa Sapino Specifying and computing hierarchies of temporal authorizations. [Citation Graph (0, 0)][DBLP ] APPIA-GULP-PRODE, 1999, pp:243-258 [Conf ] Piero A. Bonatti A Family of Three-Valued Autoepistemic Logics. [Citation Graph (0, 0)][DBLP ] AI*IA, 1991, pp:28-37 [Conf ] Sabrina Baselice , Piero A. Bonatti , Michael Gelfond A Preliminary Report on Integrating of Answer Set and Constraint Solving. [Citation Graph (0, 0)][DBLP ] Answer Set Programming, 2005, pp:- [Conf ] Piero A. Bonatti Finitary Open Logic Program. [Citation Graph (0, 0)][DBLP ] Answer Set Programming, 2003, pp:- [Conf ] Piero A. Bonatti , Pierangela Samarati Regulating service access and information release on the Web. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:134-143 [Conf ] Piero A. Bonatti , Sabrina De Capitani di Vimercati , Pierangela Samarati A modular approach to composing access control policies. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:164-173 [Conf ] Marianne Winslett , Charles C. Zhang , Piero A. Bonatti PeerAccess: a logic for distributed authorization. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:168-179 [Conf ] Piero A. Bonatti , Sarit Kraus , José Salinas , V. S. Subrahmanian Data-Security in Heterogeneous Agent Systems. [Citation Graph (0, 0)][DBLP ] CIA, 1998, pp:290-305 [Conf ] Piero A. Bonatti Rule Languages for Security and Privacy in Cooperative Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC (1), 2005, pp:268-269 [Conf ] Piero A. Bonatti , Nicola Olivetti A Sequent Calculus for Circumscription. [Citation Graph (0, 0)][DBLP ] CSL, 1997, pp:98-114 [Conf ] Piero A. Bonatti , Pierangela Samarati Logics for Authorization and Security. [Citation Graph (0, 0)][DBLP ] Logics for Emerging Applications of Databases, 2003, pp:277-323 [Conf ] Elisa Bertino , Piero A. Bonatti , Elena Ferrari , Maria Luisa Sapino Specifying and Computing Hierarchies of Temporal Authorizations. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:285-300 [Conf ] Piero A. Bonatti Abduction over Unbounded Domains via ASP. [Citation Graph (0, 0)][DBLP ] ECAI, 2004, pp:288-292 [Conf ] Piero A. Bonatti , Daniel Olmedilla , Joachim Peer Advanced Policy Explanations on the Web. [Citation Graph (0, 0)][DBLP ] ECAI, 2006, pp:200-204 [Conf ] Joachim Biskup , Piero A. Bonatti Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. [Citation Graph (0, 0)][DBLP ] ESORICS, 2002, pp:39-54 [Conf ] Piero A. Bonatti , Maria Luisa Sapino , V. S. Subrahmanian Merging Heterogeneous Security Orderings. [Citation Graph (0, 0)][DBLP ] ESORICS, 1996, pp:183-197 [Conf ] Piero A. Bonatti , Claudiu Duma , Norbert E. Fuchs , Wolfgang Nejdl , Daniel Olmedilla , Joachim Peer , Nahid Shahmehri Semantic Web Policies - A Discussion of Requirements and Research Issues. [Citation Graph (0, 0)][DBLP ] ESWC, 2006, pp:712-724 [Conf ] Joachim Biskup , Piero A. Bonatti Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. [Citation Graph (0, 0)][DBLP ] FoIKS, 2002, pp:49-66 [Conf ] Joachim Biskup , Piero A. Bonatti Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel. [Citation Graph (0, 0)][DBLP ] FoIKS, 2006, pp:43-62 [Conf ] Piero A. Bonatti , Carsten Lutz , Aniello Murano , Moshe Y. Vardi The Complexity of Enriched µ -Calculi. [Citation Graph (0, 0)][DBLP ] ICALP (2), 2006, pp:540-551 [Conf ] Piero A. Bonatti , Thomas Eiter Querying Disjunctive Database Through Nonmonotonic Logics. [Citation Graph (0, 19)][DBLP ] ICDT, 1995, pp:68-81 [Conf ] Sabrina Baselice , Piero A. Bonatti , Michael Gelfond Towards an Integration of Answer Set and Constraint Solving. [Citation Graph (0, 0)][DBLP ] ICLP, 2005, pp:52-66 [Conf ] Piero A. Bonatti Reasoning with Infinite Stable Models II: Disjunctive Programs. [Citation Graph (0, 0)][DBLP ] ICLP, 2002, pp:333-346 [Conf ] Piero A. Bonatti Reasoning with infinite stable models. [Citation Graph (0, 0)][DBLP ] IJCAI, 2001, pp:603-610 [Conf ] Piero A. Bonatti On the Undecidability of Description and Dynamic Logics with Recursion and Counting. [Citation Graph (0, 0)][DBLP ] IJCAI, 2003, pp:331-336 [Conf ] Piero A. Bonatti , Yu Deng , V. S. Subrahmanian An Ontology-Extended Relational Algebra. [Citation Graph (0, 0)][DBLP ] IRI, 2003, pp:192-199 [Conf ] Piero A. Bonatti Towards Service Description Logics. [Citation Graph (0, 0)][DBLP ] JELIA, 2002, pp:74-85 [Conf ] Piero A. Bonatti , Carsten Lutz , Frank Wolter Description Logics with Circumscription. [Citation Graph (0, 0)][DBLP ] KR, 2006, pp:400-410 [Conf ] Piero A. Bonatti Reasoning with Open Logic Programs. [Citation Graph (0, 0)][DBLP ] LPNMR, 2001, pp:147-159 [Conf ] Piero A. Bonatti Prototypes for Reasoning with Infinite Stable Models and Function Symbols. [Citation Graph (0, 0)][DBLP ] LPNMR, 2001, pp:416-419 [Conf ] Piero A. Bonatti A More General Solution to the Multiple Expansion Problem. [Citation Graph (0, 0)][DBLP ] LPNMR, 1990, pp:10-18 [Conf ] Piero A. Bonatti Beliefs as Stable Conjectures. [Citation Graph (0, 0)][DBLP ] LPNMR, 1991, pp:53-68 [Conf ] Piero A. Bonatti Autoepistemic Logic Programming. [Citation Graph (0, 0)][DBLP ] LPNMR, 1993, pp:151-167 [Conf ] Piero A. Bonatti Resolution for Skeptical Stable Semantics. [Citation Graph (0, 0)][DBLP ] LPNMR, 1997, pp:185-197 [Conf ] Piero A. Bonatti Model Theoretic Semantics for Demo. [Citation Graph (0, 0)][DBLP ] META, 1992, pp:220-234 [Conf ] Piero A. Bonatti Abduction, ASP and open logic programs. [Citation Graph (0, 0)][DBLP ] NMR, 2002, pp:184-190 [Conf ] Piero A. Bonatti On the Decidability of Containment of Recursive Datalog Queries - Preliminary report. [Citation Graph (0, 0)][DBLP ] PODS, 2004, pp:297-306 [Conf ] Piero A. Bonatti , Daniel Olmedilla Driving and Monitoring Provisional Trust Negotiation with Metapolicies. [Citation Graph (0, 0)][DBLP ] POLICY, 2005, pp:14-23 [Conf ] Elisa Bertino , Piero A. Bonatti , Elena Ferrari TRBAC: a temporal role-based access control model. [Citation Graph (0, 0)][DBLP ] ACM Workshop on Role-Based Access Control, 2000, pp:21-30 [Conf ] Piero A. Bonatti , Ernesto Damiani , Sabrina De Capitani di Vimercati , Pierangela Samarati An Access Control Model for Data Archives. [Citation Graph (0, 0)][DBLP ] SEC, 2001, pp:261-276 [Conf ] Sibel Adali , Piero A. Bonatti , Maria Luisa Sapino , V. S. Subrahmanian A Multi-Similarity Algebra. [Citation Graph (0, 11)][DBLP ] SIGMOD Conference, 1998, pp:402-413 [Conf ] Piero A. Bonatti , Sabrina De Capitani di Vimercati , Pierangela Samarati Towards Flexible Credential Negotiation Protocols. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:19-23 [Conf ] Piero A. Bonatti Sequent Calculi for Default and Autoepistemic Logics. [Citation Graph (0, 0)][DBLP ] TABLEAUX, 1996, pp:127-142 [Conf ] Piero A. Bonatti , Nicola Olivetti A Sequent Calculus for Skeptical Default Logic. [Citation Graph (0, 0)][DBLP ] TABLEAUX, 1997, pp:107-121 [Conf ] Piero A. Bonatti , Andrea Tettamanzi Some Complexity Results on Fuzzy Description Logics. [Citation Graph (0, 0)][DBLP ] WILF, 2003, pp:19-24 [Conf ] Piero A. Bonatti , P. Festa On optimal service selection. [Citation Graph (0, 0)][DBLP ] WWW, 2005, pp:530-538 [Conf ] Piero A. Bonatti , Adriano Peron On the undecidability of logics with converse, nominals, recursion and counting. [Citation Graph (0, 0)][DBLP ] Artif. Intell., 2004, v:158, n:1, pp:75-96 [Journal ] Piero A. Bonatti Reasoning with infinite stable models. [Citation Graph (0, 0)][DBLP ] Artif. Intell., 2004, v:156, n:1, pp:75-111 [Journal ] Piero A. Bonatti , Sarit Kraus , V. S. Subrahmanian Secure Agents. [Citation Graph (0, 0)][DBLP ] Ann. Math. Artif. Intell., 2003, v:37, n:1-2, pp:169-235 [Journal ] Joachim Biskup , Piero A. Bonatti Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. [Citation Graph (0, 0)][DBLP ] Ann. Math. Artif. Intell., 2004, v:40, n:1-2, pp:37-62 [Journal ] Piero A. Bonatti Abduction, ASP and Open Logic Programs [Citation Graph (0, 0)][DBLP ] CoRR, 2002, v:0, n:, pp:- [Journal ] Joachim Biskup , Piero A. Bonatti Lying versus refusal for known potential secrets. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2001, v:38, n:2, pp:199-222 [Journal ] Joachim Biskup , Piero A. Bonatti Controlled query evaluation for enforcing confidentiality in complete information systems. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:3, n:1, pp:14-27 [Journal ] Piero A. Bonatti Resolution for Skeptical Stable Model Semantics. [Citation Graph (0, 0)][DBLP ] J. Autom. Reasoning, 2001, v:27, n:4, pp:391-421 [Journal ] Piero A. Bonatti Autoepistemic Logic Programming. [Citation Graph (0, 0)][DBLP ] J. Autom. Reasoning, 1994, v:13, n:1, pp:35-67 [Journal ] Elisa Bertino , Piero A. Bonatti , Elena Ferrari , Maria Luisa Sapino Temporal Authorization Bases: From Specification to Integration. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2000, v:8, n:4, pp:- [Journal ] Piero A. Bonatti , Pierangela Samarati A Uniform Framework for Regulating Service Access and Information Release on the Web. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2002, v:10, n:3, pp:241-272 [Journal ] Piero A. Bonatti , Maria Luisa Sapino , V. S. Subrahmanian Merging Heterogeneous Security Orderings. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1997, v:5, n:1, pp:3-30 [Journal ] Piero A. Bonatti Autoepistemic Logics as a Unifying Framework for the Semantics of Logic Programs. [Citation Graph (0, 0)][DBLP ] J. Log. Program., 1995, v:22, n:2, pp:91-149 [Journal ] Piero A. Bonatti A Three-Valued Formalization of Provability. [Citation Graph (0, 0)][DBLP ] J. Log. Comput., 1995, v:5, n:2, pp:173-201 [Journal ] Elisa Bertino , Piero A. Bonatti , Elena Ferrari TRBAC: A temporal role-based access control model. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2001, v:4, n:3, pp:191-233 [Journal ] Piero A. Bonatti , Sabrina De Capitani di Vimercati , Pierangela Samarati An algebra for composing access control policies. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:1, pp:1-35 [Journal ] Piero A. Bonatti , Nicola Olivetti Sequent calculi for propositional nonmonotonic logics. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Log., 2002, v:3, n:2, pp:226-278 [Journal ] Sabrina Baselice , Piero A. Bonatti , Giovanni Criscuolo On Finitely Recursive Programs. [Citation Graph (0, 0)][DBLP ] ICLP, 2007, pp:89-103 [Conf ] Sabrina Baselice , Piero A. Bonatti , Marco Faella On Interoperable Trust Negotiation Strategies. [Citation Graph (0, 0)][DBLP ] POLICY, 2007, pp:39-50 [Conf ] Piero A. Bonatti , Daniel Olmedilla Rule-Based Policy Representation and Reasoning for the Semantic Web. [Citation Graph (0, 0)][DBLP ] Reasoning Web, 2007, pp:240-268 [Conf ] Piero A. Bonatti Nonmonotonic Description Logics - Requirements, Theory, and Implementations. [Citation Graph (0, 0)][DBLP ] TABLEAUX, 2007, pp:1- [Conf ] Joachim Biskup , Piero A. Bonatti Controlled query evaluation with open queries for a decidable relational submodel. [Citation Graph (0, 0)][DBLP ] Ann. Math. Artif. Intell., 2007, v:50, n:1-2, pp:39-77 [Journal ] Credulous Resolution for Answer Set Programming. [Citation Graph (, )][DBLP ] Answer Set Programming. [Citation Graph (, )][DBLP ] Reactive Policies for the Semantic Web. [Citation Graph (, )][DBLP ] Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security. [Citation Graph (, )][DBLP ] Composing Normal Programs with Function Symbols. [Citation Graph (, )][DBLP ] Defeasible Inclusions in Low-Complexity DLs: Preliminary Notes. [Citation Graph (, )][DBLP ] Policy Based Protection and Personalized Generation of Web Content. [Citation Graph (, )][DBLP ] A Trust Management Package for Policy-Driven Protection & Personalization of Web Content. [Citation Graph (, )][DBLP ] Comparing Rule-Based Policies. [Citation Graph (, )][DBLP ] Protune: A Framework for Semantic Web Policies. [Citation Graph (, )][DBLP ] Erratum to: Reasoning with infinite stable models [Artificial Intelligence 156 (1) (2004) 75-111]. [Citation Graph (, )][DBLP ] The Complexity of Enriched Mu-Calculi [Citation Graph (, )][DBLP ] On finitely recursive programs [Citation Graph (, )][DBLP ] A decidable subclass of finitary programs [Citation Graph (, )][DBLP ] Search in 0.125secs, Finished in 0.128secs