The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Piero A. Bonatti: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Piero A. Bonatti, Sarit Kraus, V. S. Subrahmanian
    Declarative Foundations of Secure Deductive Databases. [Citation Graph (3, 3)][DBLP]
    ICDT, 1992, pp:391-406 [Conf]
  2. Piero A. Bonatti, Thomas Eiter
    Querying Disjunctive Databases Through Nonmonotonic Logics. [Citation Graph (3, 0)][DBLP]
    Theor. Comput. Sci., 1996, v:160, n:1&2, pp:321-363 [Journal]
  3. Piero A. Bonatti
    Autoepistemic Logics as a Unifying Framework for the Semantics of Logic Programs. [Citation Graph (1, 0)][DBLP]
    JICSLP, 1992, pp:417-430 [Conf]
  4. Piero A. Bonatti, Sarit Kraus, V. S. Subrahmanian
    Foundations of Secure Deductive Databases. [Citation Graph (1, 15)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1995, v:7, n:3, pp:406-422 [Journal]
  5. Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
    A Component-Based Architecture for Secure Data Publication. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:309-318 [Conf]
  6. Piero A. Bonatti
    A Constructive Negation for Transition System Specifications. [Citation Graph (0, 0)][DBLP]
    APPIA-GULP-PRODE, 1997, pp:283-294 [Conf]
  7. Piero A. Bonatti, Laura Giordano
    Three-Valued Semantics for Extended Logic Programs. [Citation Graph (0, 0)][DBLP]
    GULP-PRODE, 1995, pp:295-306 [Conf]
  8. Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino
    Specifying and computing hierarchies of temporal authorizations. [Citation Graph (0, 0)][DBLP]
    APPIA-GULP-PRODE, 1999, pp:243-258 [Conf]
  9. Piero A. Bonatti
    A Family of Three-Valued Autoepistemic Logics. [Citation Graph (0, 0)][DBLP]
    AI*IA, 1991, pp:28-37 [Conf]
  10. Sabrina Baselice, Piero A. Bonatti, Michael Gelfond
    A Preliminary Report on Integrating of Answer Set and Constraint Solving. [Citation Graph (0, 0)][DBLP]
    Answer Set Programming, 2005, pp:- [Conf]
  11. Piero A. Bonatti
    Finitary Open Logic Program. [Citation Graph (0, 0)][DBLP]
    Answer Set Programming, 2003, pp:- [Conf]
  12. Piero A. Bonatti, Pierangela Samarati
    Regulating service access and information release on the Web. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:134-143 [Conf]
  13. Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati
    A modular approach to composing access control policies. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:164-173 [Conf]
  14. Marianne Winslett, Charles C. Zhang, Piero A. Bonatti
    PeerAccess: a logic for distributed authorization. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:168-179 [Conf]
  15. Piero A. Bonatti, Sarit Kraus, José Salinas, V. S. Subrahmanian
    Data-Security in Heterogeneous Agent Systems. [Citation Graph (0, 0)][DBLP]
    CIA, 1998, pp:290-305 [Conf]
  16. Piero A. Bonatti
    Rule Languages for Security and Privacy in Cooperative Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:268-269 [Conf]
  17. Piero A. Bonatti, Nicola Olivetti
    A Sequent Calculus for Circumscription. [Citation Graph (0, 0)][DBLP]
    CSL, 1997, pp:98-114 [Conf]
  18. Piero A. Bonatti, Pierangela Samarati
    Logics for Authorization and Security. [Citation Graph (0, 0)][DBLP]
    Logics for Emerging Applications of Databases, 2003, pp:277-323 [Conf]
  19. Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino
    Specifying and Computing Hierarchies of Temporal Authorizations. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:285-300 [Conf]
  20. Piero A. Bonatti
    Abduction over Unbounded Domains via ASP. [Citation Graph (0, 0)][DBLP]
    ECAI, 2004, pp:288-292 [Conf]
  21. Piero A. Bonatti, Daniel Olmedilla, Joachim Peer
    Advanced Policy Explanations on the Web. [Citation Graph (0, 0)][DBLP]
    ECAI, 2006, pp:200-204 [Conf]
  22. Joachim Biskup, Piero A. Bonatti
    Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:39-54 [Conf]
  23. Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian
    Merging Heterogeneous Security Orderings. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:183-197 [Conf]
  24. Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, Wolfgang Nejdl, Daniel Olmedilla, Joachim Peer, Nahid Shahmehri
    Semantic Web Policies - A Discussion of Requirements and Research Issues. [Citation Graph (0, 0)][DBLP]
    ESWC, 2006, pp:712-724 [Conf]
  25. Joachim Biskup, Piero A. Bonatti
    Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. [Citation Graph (0, 0)][DBLP]
    FoIKS, 2002, pp:49-66 [Conf]
  26. Joachim Biskup, Piero A. Bonatti
    Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel. [Citation Graph (0, 0)][DBLP]
    FoIKS, 2006, pp:43-62 [Conf]
  27. Piero A. Bonatti, Carsten Lutz, Aniello Murano, Moshe Y. Vardi
    The Complexity of Enriched µ-Calculi. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:540-551 [Conf]
  28. Piero A. Bonatti, Thomas Eiter
    Querying Disjunctive Database Through Nonmonotonic Logics. [Citation Graph (0, 19)][DBLP]
    ICDT, 1995, pp:68-81 [Conf]
  29. Sabrina Baselice, Piero A. Bonatti, Michael Gelfond
    Towards an Integration of Answer Set and Constraint Solving. [Citation Graph (0, 0)][DBLP]
    ICLP, 2005, pp:52-66 [Conf]
  30. Piero A. Bonatti
    Reasoning with Infinite Stable Models II: Disjunctive Programs. [Citation Graph (0, 0)][DBLP]
    ICLP, 2002, pp:333-346 [Conf]
  31. Piero A. Bonatti
    Reasoning with infinite stable models. [Citation Graph (0, 0)][DBLP]
    IJCAI, 2001, pp:603-610 [Conf]
  32. Piero A. Bonatti
    On the Undecidability of Description and Dynamic Logics with Recursion and Counting. [Citation Graph (0, 0)][DBLP]
    IJCAI, 2003, pp:331-336 [Conf]
  33. Piero A. Bonatti, Yu Deng, V. S. Subrahmanian
    An Ontology-Extended Relational Algebra. [Citation Graph (0, 0)][DBLP]
    IRI, 2003, pp:192-199 [Conf]
  34. Piero A. Bonatti
    Towards Service Description Logics. [Citation Graph (0, 0)][DBLP]
    JELIA, 2002, pp:74-85 [Conf]
  35. Piero A. Bonatti, Carsten Lutz, Frank Wolter
    Description Logics with Circumscription. [Citation Graph (0, 0)][DBLP]
    KR, 2006, pp:400-410 [Conf]
  36. Piero A. Bonatti
    Reasoning with Open Logic Programs. [Citation Graph (0, 0)][DBLP]
    LPNMR, 2001, pp:147-159 [Conf]
  37. Piero A. Bonatti
    Prototypes for Reasoning with Infinite Stable Models and Function Symbols. [Citation Graph (0, 0)][DBLP]
    LPNMR, 2001, pp:416-419 [Conf]
  38. Piero A. Bonatti
    A More General Solution to the Multiple Expansion Problem. [Citation Graph (0, 0)][DBLP]
    LPNMR, 1990, pp:10-18 [Conf]
  39. Piero A. Bonatti
    Beliefs as Stable Conjectures. [Citation Graph (0, 0)][DBLP]
    LPNMR, 1991, pp:53-68 [Conf]
  40. Piero A. Bonatti
    Autoepistemic Logic Programming. [Citation Graph (0, 0)][DBLP]
    LPNMR, 1993, pp:151-167 [Conf]
  41. Piero A. Bonatti
    Resolution for Skeptical Stable Semantics. [Citation Graph (0, 0)][DBLP]
    LPNMR, 1997, pp:185-197 [Conf]
  42. Piero A. Bonatti
    Model Theoretic Semantics for Demo. [Citation Graph (0, 0)][DBLP]
    META, 1992, pp:220-234 [Conf]
  43. Piero A. Bonatti
    Abduction, ASP and open logic programs. [Citation Graph (0, 0)][DBLP]
    NMR, 2002, pp:184-190 [Conf]
  44. Piero A. Bonatti
    On the Decidability of Containment of Recursive Datalog Queries - Preliminary report. [Citation Graph (0, 0)][DBLP]
    PODS, 2004, pp:297-306 [Conf]
  45. Piero A. Bonatti, Daniel Olmedilla
    Driving and Monitoring Provisional Trust Negotiation with Metapolicies. [Citation Graph (0, 0)][DBLP]
    POLICY, 2005, pp:14-23 [Conf]
  46. Elisa Bertino, Piero A. Bonatti, Elena Ferrari
    TRBAC: a temporal role-based access control model. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:21-30 [Conf]
  47. Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
    An Access Control Model for Data Archives. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:261-276 [Conf]
  48. Sibel Adali, Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian
    A Multi-Similarity Algebra. [Citation Graph (0, 11)][DBLP]
    SIGMOD Conference, 1998, pp:402-413 [Conf]
  49. Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati
    Towards Flexible Credential Negotiation Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:19-23 [Conf]
  50. Piero A. Bonatti
    Sequent Calculi for Default and Autoepistemic Logics. [Citation Graph (0, 0)][DBLP]
    TABLEAUX, 1996, pp:127-142 [Conf]
  51. Piero A. Bonatti, Nicola Olivetti
    A Sequent Calculus for Skeptical Default Logic. [Citation Graph (0, 0)][DBLP]
    TABLEAUX, 1997, pp:107-121 [Conf]
  52. Piero A. Bonatti, Andrea Tettamanzi
    Some Complexity Results on Fuzzy Description Logics. [Citation Graph (0, 0)][DBLP]
    WILF, 2003, pp:19-24 [Conf]
  53. Piero A. Bonatti, P. Festa
    On optimal service selection. [Citation Graph (0, 0)][DBLP]
    WWW, 2005, pp:530-538 [Conf]
  54. Piero A. Bonatti, Adriano Peron
    On the undecidability of logics with converse, nominals, recursion and counting. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 2004, v:158, n:1, pp:75-96 [Journal]
  55. Piero A. Bonatti
    Reasoning with infinite stable models. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 2004, v:156, n:1, pp:75-111 [Journal]
  56. Piero A. Bonatti, Sarit Kraus, V. S. Subrahmanian
    Secure Agents. [Citation Graph (0, 0)][DBLP]
    Ann. Math. Artif. Intell., 2003, v:37, n:1-2, pp:169-235 [Journal]
  57. Joachim Biskup, Piero A. Bonatti
    Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. [Citation Graph (0, 0)][DBLP]
    Ann. Math. Artif. Intell., 2004, v:40, n:1-2, pp:37-62 [Journal]
  58. Piero A. Bonatti
    Abduction, ASP and Open Logic Programs [Citation Graph (0, 0)][DBLP]
    CoRR, 2002, v:0, n:, pp:- [Journal]
  59. Joachim Biskup, Piero A. Bonatti
    Lying versus refusal for known potential secrets. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2001, v:38, n:2, pp:199-222 [Journal]
  60. Joachim Biskup, Piero A. Bonatti
    Controlled query evaluation for enforcing confidentiality in complete information systems. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:3, n:1, pp:14-27 [Journal]
  61. Piero A. Bonatti
    Resolution for Skeptical Stable Model Semantics. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 2001, v:27, n:4, pp:391-421 [Journal]
  62. Piero A. Bonatti
    Autoepistemic Logic Programming. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 1994, v:13, n:1, pp:35-67 [Journal]
  63. Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino
    Temporal Authorization Bases: From Specification to Integration. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:4, pp:- [Journal]
  64. Piero A. Bonatti, Pierangela Samarati
    A Uniform Framework for Regulating Service Access and Information Release on the Web. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2002, v:10, n:3, pp:241-272 [Journal]
  65. Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian
    Merging Heterogeneous Security Orderings. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:1, pp:3-30 [Journal]
  66. Piero A. Bonatti
    Autoepistemic Logics as a Unifying Framework for the Semantics of Logic Programs. [Citation Graph (0, 0)][DBLP]
    J. Log. Program., 1995, v:22, n:2, pp:91-149 [Journal]
  67. Piero A. Bonatti
    A Three-Valued Formalization of Provability. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 1995, v:5, n:2, pp:173-201 [Journal]
  68. Elisa Bertino, Piero A. Bonatti, Elena Ferrari
    TRBAC: A temporal role-based access control model. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:3, pp:191-233 [Journal]
  69. Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati
    An algebra for composing access control policies. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:1, pp:1-35 [Journal]
  70. Piero A. Bonatti, Nicola Olivetti
    Sequent calculi for propositional nonmonotonic logics. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Log., 2002, v:3, n:2, pp:226-278 [Journal]
  71. Sabrina Baselice, Piero A. Bonatti, Giovanni Criscuolo
    On Finitely Recursive Programs. [Citation Graph (0, 0)][DBLP]
    ICLP, 2007, pp:89-103 [Conf]
  72. Sabrina Baselice, Piero A. Bonatti, Marco Faella
    On Interoperable Trust Negotiation Strategies. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:39-50 [Conf]
  73. Piero A. Bonatti, Daniel Olmedilla
    Rule-Based Policy Representation and Reasoning for the Semantic Web. [Citation Graph (0, 0)][DBLP]
    Reasoning Web, 2007, pp:240-268 [Conf]
  74. Piero A. Bonatti
    Nonmonotonic Description Logics - Requirements, Theory, and Implementations. [Citation Graph (0, 0)][DBLP]
    TABLEAUX, 2007, pp:1- [Conf]
  75. Joachim Biskup, Piero A. Bonatti
    Controlled query evaluation with open queries for a decidable relational submodel. [Citation Graph (0, 0)][DBLP]
    Ann. Math. Artif. Intell., 2007, v:50, n:1-2, pp:39-77 [Journal]

  76. Credulous Resolution for Answer Set Programming. [Citation Graph (, )][DBLP]


  77. Answer Set Programming. [Citation Graph (, )][DBLP]


  78. Reactive Policies for the Semantic Web. [Citation Graph (, )][DBLP]


  79. Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security. [Citation Graph (, )][DBLP]


  80. Composing Normal Programs with Function Symbols. [Citation Graph (, )][DBLP]


  81. Defeasible Inclusions in Low-Complexity DLs: Preliminary Notes. [Citation Graph (, )][DBLP]


  82. Policy Based Protection and Personalized Generation of Web Content. [Citation Graph (, )][DBLP]


  83. A Trust Management Package for Policy-Driven Protection & Personalization of Web Content. [Citation Graph (, )][DBLP]


  84. Comparing Rule-Based Policies. [Citation Graph (, )][DBLP]


  85. Protune: A Framework for Semantic Web Policies. [Citation Graph (, )][DBLP]


  86. Erratum to: Reasoning with infinite stable models [Artificial Intelligence 156 (1) (2004) 75-111]. [Citation Graph (, )][DBLP]


  87. The Complexity of Enriched Mu-Calculi [Citation Graph (, )][DBLP]


  88. On finitely recursive programs [Citation Graph (, )][DBLP]


  89. A decidable subclass of finitary programs [Citation Graph (, )][DBLP]


Search in 0.125secs, Finished in 0.128secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002