2009 | ||
---|---|---|
93 | Piero A. Bonatti, Marco Faella, Luigi Sauro: Defeasible Inclusions in Low-Complexity DLs: Preliminary Notes. IJCAI 2009: 696-701 | |
92 | Sergej Zerr, Daniel Olmedilla, Juri Luca De Coi, Wolfgang Nejdl, Piero A. Bonatti, Luigi Sauro: Policy Based Protection and Personalized Generation of Web Content. LA-WEB/CLIHC 2009: 112-119 | |
91 | Piero A. Bonatti, Juri Luca De Coi, Daniel Olmedilla, Luigi Sauro: Rule-Based Policy Representations and Reasoning. REWERSE 2009: 201-232 | |
90 | Sabrina Baselice, Piero A. Bonatti, Giovanni Criscuolo: On finitely recursive programs CoRR abs/0901.2850: (2009) | |
89 | Sabrina Baselice, Piero A. Bonatti, Giovanni Criscuolo: On finitely recursive programs. TPLP 9(2): 213-238 (2009) | |
2008 | ||
88 | Cristina Baroglio, Piero A. Bonatti, Jan Maluszynski, Massimo Marchiori, Axel Polleres, Sebastian Schaffert: Reasoning Web, 4th International Summer School 2008, Venice, Italy, September 7-11, 2008, Tutorial Lectures Springer 2008 | |
87 | Piero A. Bonatti, Enrico Pontelli, Tran Cao Son: Credulous Resolution for Answer Set Programming. AAAI 2008: 418-423 | |
86 | Sabrina Baselice, Piero A. Bonatti: Composing Normal Programs with Function Symbols. ICLP 2008: 425-439 | |
85 | Piero A. Bonatti, Juri Luca De Coi, Daniel Olmedilla, Luigi Sauro: Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security. ICLP 2008: 779-784 | |
84 | Juri Luca De Coi, Daniel Olmedilla, Piero A. Bonatti, Luigi Sauro: Protune: A Framework for Semantic Web Policies. International Semantic Web Conference (Posters & Demos) 2008 | |
83 | Piero A. Bonatti, Fabio Mogavero: Comparing Rule-Based Policies. POLICY 2008: 11-18 | |
82 | Juri Luca De Coi, Daniel Olmedilla, Sergej Zerr, Piero A. Bonatti, Luigi Sauro: A Trust Management Package for Policy-Driven Protection & Personalization of Web Content. POLICY 2008: 228-230 | |
81 | Piero A. Bonatti: Erratum to: Reasoning with infinite stable models [Artificial Intelligence 156 (1) (2004) 75-111]. Artif. Intell. 172(15): 1833-1835 (2008) | |
80 | Piero A. Bonatti, Carsten Lutz, Aniello Murano, Moshe Y. Vardi: The Complexity of Enriched Mu-Calculi CoRR abs/0809.0360: (2008) | |
79 | Piero A. Bonatti, Carsten Lutz, Aniello Murano, Moshe Y. Vardi: The Complexity of Enriched Mu-Calculi. Logical Methods in Computer Science 4(3): (2008) | |
2007 | ||
78 | Sabrina Baselice, Piero A. Bonatti, Giovanni Criscuolo: On Finitely Recursive Programs. ICLP 2007: 89-103 | |
77 | Sabrina Baselice, Piero A. Bonatti, Marco Faella: On Interoperable Trust Negotiation Strategies. POLICY 2007: 39-50 | |
76 | Piero A. Bonatti, Daniel Olmedilla: Rule-Based Policy Representation and Reasoning for the Semantic Web. Reasoning Web 2007: 240-268 | |
75 | Piero A. Bonatti: Nonmonotonic Description Logics - Requirements, Theory, and Implementations. TABLEAUX 2007: 1 | |
74 | Grigoris Antoniou, Matteo Baldoni, Piero A. Bonatti, Wolfgang Nejdl, Daniel Olmedilla: Rule-based Policy Specification. Secure Data Management in Decentralized Systems 2007: 169-216 | |
73 | Joachim Biskup, Piero A. Bonatti: Controlled query evaluation with open queries for a decidable relational submodel. Ann. Math. Artif. Intell. 50(1-2): 39-77 (2007) | |
2006 | ||
72 | Piero A. Bonatti, Daniel Olmedilla, Joachim Peer: Advanced Policy Explanations on the Web. ECAI 2006: 200-204 | |
71 | Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, Wolfgang Nejdl, Daniel Olmedilla, Joachim Peer, Nahid Shahmehri: Semantic Web Policies - A Discussion of Requirements and Research Issues. ESWC 2006: 712-724 | |
70 | Joachim Biskup, Piero A. Bonatti: Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel. FoIKS 2006: 43-62 | |
69 | Piero A. Bonatti, Carsten Lutz, Aniello Murano, Moshe Y. Vardi: The Complexity of Enriched µ-Calculi. ICALP (2) 2006: 540-551 | |
68 | Piero A. Bonatti, Carsten Lutz, Frank Wolter: Description Logics with Circumscription. KR 2006: 400-410 | |
2005 | ||
67 | Marianne Winslett, Charles C. Zhang, Piero A. Bonatti: PeerAccess: a logic for distributed authorization. ACM Conference on Computer and Communications Security 2005: 168-179 | |
66 | Sabrina Baselice, Piero A. Bonatti, Michael Gelfond: A Preliminary Report on Integrating of Answer Set and Constraint Solving. Answer Set Programming 2005 | |
65 | Piero A. Bonatti: Rule Languages for Security and Privacy in Cooperative Systems. COMPSAC (1) 2005: 268-269 | |
64 | Sabrina Baselice, Piero A. Bonatti, Michael Gelfond: Towards an Integration of Answer Set and Constraint Solving. ICLP 2005: 52-66 | |
63 | Piero A. Bonatti, Daniel Olmedilla: Driving and Monitoring Provisional Trust Negotiation with Metapolicies. POLICY 2005: 14-23 | |
62 | Piero A. Bonatti, P. Festa: On optimal service selection. WWW 2005: 530-538 | |
2004 | ||
61 | Jennifer Golbeck, Piero A. Bonatti, Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslett: Proceedings of the ISWC*04 Workshop on Trust, Security, and Reputation on the Semantic Web, Hiroshima, Japan, November 7, 2004 CEUR-WS.org 2004 | |
60 | Piero A. Bonatti: Abduction over Unbounded Domains via ASP. ECAI 2004: 288-292 | |
59 | Piero A. Bonatti: On the Decidability of Containment of Recursive Datalog Queries - Preliminary report. PODS 2004: 297-306 | |
58 | Joachim Biskup, Piero A. Bonatti: Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. Ann. Math. Artif. Intell. 40(1-2): 37-62 (2004) | |
57 | Piero A. Bonatti: Reasoning with infinite stable models. Artif. Intell. 156(1): 75-111 (2004) | |
56 | Piero A. Bonatti, Adriano Peron: On the undecidability of logics with converse, nominals, recursion and counting. Artif. Intell. 158(1): 75-96 (2004) | |
55 | Joachim Biskup, Piero A. Bonatti: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1): 14-27 (2004) | |
2003 | ||
54 | Piero A. Bonatti: Finitary Open Logic Program. Answer Set Programming 2003 | |
53 | Piero A. Bonatti: On the Undecidability of Description and Dynamic Logics with Recursion and Counting. IJCAI 2003: 331-336 | |
52 | Piero A. Bonatti, Yu Deng, V. S. Subrahmanian: An Ontology-Extended Relational Algebra. IRI 2003: 192-199 | |
51 | Piero A. Bonatti, Pierangela Samarati: Logics for Authorization and Security. Logics for Emerging Applications of Databases 2003: 277-323 | |
50 | Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati: Towards Flexible Credential Negotiation Protocols. Security Protocols Workshop 2003: 19-23 | |
49 | Piero A. Bonatti, Andrea Tettamanzi: Some Complexity Results on Fuzzy Description Logics. WILF 2003: 19-24 | |
48 | Piero A. Bonatti, Sarit Kraus, V. S. Subrahmanian: Secure Agents. Ann. Math. Artif. Intell. 37(1-2): 169-235 (2003) | |
2002 | ||
47 | Joachim Biskup, Piero A. Bonatti: Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. ESORICS 2002: 39-54 | |
46 | Joachim Biskup, Piero A. Bonatti: Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. FoIKS 2002: 49-66 | |
45 | Piero A. Bonatti: Reasoning with Infinite Stable Models II: Disjunctive Programs. ICLP 2002: 333-346 | |
44 | Piero A. Bonatti: Towards Service Description Logics. JELIA 2002: 74-85 | |
43 | Piero A. Bonatti: Abduction, ASP and open logic programs. NMR 2002: 184-190 | |
42 | Piero A. Bonatti, Nicola Olivetti: Sequent calculi for propositional nonmonotonic logics. ACM Trans. Comput. Log. 3(2): 226-278 (2002) | |
41 | Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati: An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur. 5(1): 1-35 (2002) | |
40 | Piero A. Bonatti: Abduction, ASP and Open Logic Programs CoRR cs.AI/0207021: (2002) | |
39 | Piero A. Bonatti, Pierangela Samarati: A Uniform Framework for Regulating Service Access and Information Release on the Web. Journal of Computer Security 10(3): 241-272 (2002) | |
2001 | ||
38 | Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati: A Component-Based Architecture for Secure Data Publication. ACSAC 2001: 309-318 | |
37 | Piero A. Bonatti: Reasoning with infinite stable models. IJCAI 2001: 603-610 | |
36 | Piero A. Bonatti: Reasoning with Open Logic Programs. LPNMR 2001: 147-159 | |
35 | Piero A. Bonatti: Prototypes for Reasoning with Infinite Stable Models and Function Symbols. LPNMR 2001: 416-419 | |
34 | Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati: An Access Control Model for Data Archives. SEC 2001: 261-276 | |
33 | Elisa Bertino, Piero A. Bonatti, Elena Ferrari: TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4(3): 191-233 (2001) | |
32 | Joachim Biskup, Piero A. Bonatti: Lying versus refusal for known potential secrets. Data Knowl. Eng. 38(2): 199-222 (2001) | |
31 | Piero A. Bonatti: Resolution for Skeptical Stable Model Semantics. J. Autom. Reasoning 27(4): 391-421 (2001) | |
2000 | ||
30 | V. S. Subrahmanian, Piero A. Bonatti, Jürgen Dix, Thomas Eiter, Sarit Kraus, Fatma Ozcan, Robert B. Ross: Heterogenous Active Agents MIT Press 2000 | |
29 | Piero A. Bonatti, Pierangela Samarati: Regulating service access and information release on the Web. ACM Conference on Computer and Communications Security 2000: 134-143 | |
28 | Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati: A modular approach to composing access control policies. ACM Conference on Computer and Communications Security 2000: 164-173 | |
27 | Elisa Bertino, Piero A. Bonatti, Elena Ferrari: TRBAC: a temporal role-based access control model. ACM Workshop on Role-Based Access Control 2000: 21-30 | |
26 | Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino: Temporal Authorization Bases: From Specification to Integration. Journal of Computer Security 8(4): (2000) | |
1999 | ||
25 | Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino: Specifying and computing hierarchies of temporal authorizations. APPIA-GULP-PRODE 1999: 243-258 | |
24 | Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino: Specifying and Computing Hierarchies of Temporal Authorizations. DBSec 1999: 285-300 | |
1998 | ||
23 | Piero A. Bonatti, Sarit Kraus, José Salinas, V. S. Subrahmanian: Data-Security in Heterogeneous Agent Systems. CIA 1998: 290-305 | |
22 | Sibel Adali, Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian: A Multi-Similarity Algebra. SIGMOD Conference 1998: 402-413 | |
1997 | ||
21 | Piero A. Bonatti: A Constructive Negation for Transition System Specifications. APPIA-GULP-PRODE 1997: 283-294 | |
20 | Piero A. Bonatti, Nicola Olivetti: A Sequent Calculus for Circumscription. CSL 1997: 98-114 | |
19 | Piero A. Bonatti: Resolution for Skeptical Stable Semantics. LPNMR 1997: 185-197 | |
18 | Piero A. Bonatti, Nicola Olivetti: A Sequent Calculus for Skeptical Default Logic. TABLEAUX 1997: 107-121 | |
17 | Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian: Merging Heterogeneous Security Orderings. Journal of Computer Security 5(1): 3-30 (1997) | |
1996 | ||
16 | Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian: Merging Heterogeneous Security Orderings. ESORICS 1996: 183-197 | |
15 | Piero A. Bonatti: Sequent Calculi for Default and Autoepistemic Logics. TABLEAUX 1996: 127-142 | |
14 | Piero A. Bonatti, Thomas Eiter: Querying Disjunctive Databases Through Nonmonotonic Logics. Theor. Comput. Sci. 160(1&2): 321-363 (1996) | |
1995 | ||
13 | Piero A. Bonatti, Laura Giordano: Three-Valued Semantics for Extended Logic Programs. GULP-PRODE 1995: 295-306 | |
12 | Piero A. Bonatti, Thomas Eiter: Querying Disjunctive Database Through Nonmonotonic Logics. ICDT 1995: 68-81 | |
11 | Piero A. Bonatti, Sarit Kraus, V. S. Subrahmanian: Foundations of Secure Deductive Databases. IEEE Trans. Knowl. Data Eng. 7(3): 406-422 (1995) | |
10 | Piero A. Bonatti: A Three-Valued Formalization of Provability. J. Log. Comput. 5(2): 173-201 (1995) | |
9 | Piero A. Bonatti: Autoepistemic Logics as a Unifying Framework for the Semantics of Logic Programs. J. Log. Program. 22(2): 91-149 (1995) | |
1994 | ||
8 | Piero A. Bonatti: Autoepistemic Logic Programming. J. Autom. Reasoning 13(1): 35-67 (1994) | |
1993 | ||
7 | Piero A. Bonatti: Autoepistemic Logic Programming. LPNMR 1993: 151-167 | |
1992 | ||
6 | Piero A. Bonatti, Sarit Kraus, V. S. Subrahmanian: Declarative Foundations of Secure Deductive Databases. ICDT 1992: 391-406 | |
5 | Piero A. Bonatti: Autoepistemic Logics as a Unifying Framework for the Semantics of Logic Programs. JICSLP 1992: 417-430 | |
4 | Piero A. Bonatti: Model Theoretic Semantics for Demo. META 1992: 220-234 | |
1991 | ||
3 | Piero A. Bonatti: A Family of Three-Valued Autoepistemic Logics. AI*IA 1991: 28-37 | |
2 | Piero A. Bonatti: Beliefs as Stable Conjectures. LPNMR 1991: 53-68 | |
1990 | ||
1 | Piero A. Bonatti: A More General Solution to the Multiple Expansion Problem. LPNMR 1990: 10-18 |