default search action
Piero A. Bonatti
Person information
- affiliation: University of Naples Federico II, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c103]Piero Andrea Bonatti, Francesco Magliocca, Luigi Sauro:
Lost in the Crowd: k-unmatchability in Anonymized Knowledge Graphs. KR 2024 - 2023
- [c102]Piero A. Bonatti, Gianluca Cima, Domenico Lembo, Lorenzo Marconi, Riccardo Rosati, Luigi Sauro, Domenico Fabio Savo:
Dynamic Controlled Query Evaluation over DL-Lite Ontologies (Extended Abstract). Description Logics 2023 - [c101]Piero A. Bonatti, Federica Di Stefano, Magdalena Ortiz, Mantas Simkus:
Circumscription in DL-Lite: Progress Report. Description Logics 2023 - [c100]Piero A. Bonatti:
A False Sense of Security (Extended Abstract). IJCAI 2023: 6858-6859 - [c99]Piero A. Bonatti, Iliana M. Petrova, Luigi Sauro:
Optimizing the Computation of Overriding in DLN (Extended Abstract). IJCAI 2023: 6860-6862 - 2022
- [j38]Piero A. Bonatti:
A false sense of security. Artif. Intell. 310: 103741 (2022) - [j37]Piero Andrea Bonatti, Iliana Mineva Petrova, Luigi Sauro:
Optimizing the computation of overriding in DLN. Artif. Intell. 311: 103764 (2022) - [c98]Piero A. Bonatti, Luigi Sauro:
Sticky Policies in OWL2: Extending PL with Fixpoints and Transitive Closure. KR 2022 - [c97]Piero A. Bonatti, Gianluca Cima, Domenico Lembo, Lorenzo Marconi, Riccardo Rosati, Luigi Sauro, Domenico Fabio Savo:
Controlled Query Evaluation in OWL 2 QL: A "Longest Honeymoon" Approach. ISWC 2022: 428-444 - [i14]Piero A. Bonatti, Gianluca Cima, Domenico Lembo, Lorenzo Marconi, Riccardo Rosati, Luigi Sauro, Domenico Fabio Savo:
CQE in OWL 2 QL: A "Longest Honeymoon" Approach (extended version). CoRR abs/2207.11155 (2022) - 2021
- [j36]Piero A. Bonatti:
Query answering in circumscribed OWL2 profiles. Ann. Math. Artif. Intell. 89(12): 1155-1173 (2021) - [c96]Piero A. Bonatti, Luigi Sauro:
Tractable Compliance Checking with Negation. Description Logics 2021 - [c95]Piero A. Bonatti, Luigi Sauro, Jonathan Langens:
Representing Consent and Policies for Compliance. EuroS&P Workshops 2021: 283-291 - 2020
- [j35]Piero A. Bonatti, Luca Ioffredo, Iliana M. Petrova, Luigi Sauro, Ida Sri Rejeki Siahaan:
Real-time reasoning in OWL2 for GDPR compliance. Artif. Intell. 289: 103389 (2020) - [j34]Piero A. Bonatti, Sabrina Kirrane, Iliana M. Petrova, Luigi Sauro:
Machine Understandable Policies and GDPR Compliance Checking. Künstliche Intell. 34(3): 303-315 (2020) - [c94]Piero A. Bonatti:
Rational Closure For All Description Logics (Extended Abstract). IJCAI 2020: 5025-5029 - [p4]Piero Andrea Bonatti, Iliana Mineva Petrova, Luigi Sauro:
Defeasible Reasoning in Description Logics: An Overview on DLN. Applications and Practices in Ontology Design, Extraction, and Reasoning 2020: 178-193 - [i13]Piero A. Bonatti, Luca Ioffredo, Iliana Mineva Petrova, Luigi Sauro, Ida Sri Rejeki Siahaan:
Real Time Reasoning in OWL2 for GDPR Compliance. CoRR abs/2001.05390 (2020) - [i12]Piero A. Bonatti, Luca Ioffredo, Iliana M. Petrova, Luigi Sauro:
Fast Compliance Checking with General Vocabularies. CoRR abs/2001.06322 (2020) - [i11]Piero A. Bonatti, Sabrina Kirrane, Iliana M. Petrova, Luigi Sauro:
Machine Understandable Policies and GDPR Compliance Checking. CoRR abs/2001.08930 (2020) - [i10]Sabrina Kirrane, Javier D. Fernández, Piero A. Bonatti, Uros Milosevic, Axel Polleres, Rigo Wenning:
The SPECIAL-K Personal Data Processing Transparency and Compliance Platform. CoRR abs/2001.09461 (2020) - [i9]Piero A. Bonatti, Iliana M. Petrova, Luigi Sauro:
Defeasible reasoning in Description Logics: an overview on DLN. CoRR abs/2009.04978 (2020)
2010 – 2019
- 2019
- [j33]Piero A. Bonatti:
Rational closure for all description logics. Artif. Intell. 274: 197-223 (2019) - [c93]Piero A. Bonatti, Sabrina Kirrane:
Big Data and Analytics in the Age of the GDPR. BigData Congress 2019: 7-16 - [c92]Piero A. Bonatti, Iliana M. Petrova, Luigi Sauro:
A Richer Policy Language for GDPR Compliance. Description Logics 2019 - 2018
- [c91]Sabrina Kirrane, Javier D. Fernández, Wouter Dullaert, Uros Milosevic, Axel Polleres, Piero A. Bonatti, Rigo Wenning, Olha Drozd, Philip Raschke:
A Scalable Consent, Transparency and Compliance Architecture. ESWC (Satellite Events) 2018: 131-136 - [c90]Piero A. Bonatti:
Fast Compliance Checking in an OWL2 Fragment. IJCAI 2018: 1746-1752 - [c89]Piero A. Bonatti, Luigi Sauro:
On the Logical Properties of the Description Logic DL^N (Extended abstract). IJCAI 2018: 5558-5562 - [c88]Piero A. Bonatti, Bert Bos, Stefan Decker, Javier D. Fernández, Sabrina Kirrane, Vassilios Peristeras, Axel Polleres, Rigo Wenning:
Data Privacy Vocabularies and Controls: Semantic Web for Transparency and Privacy. SW4SG@ISWC 2018 - [i8]Piero Andrea Bonatti, Stefan Decker, Axel Polleres, Valentina Presutti:
Knowledge Graphs: New Directions for Knowledge Representation on the Semantic Web (Dagstuhl Seminar 18371). Dagstuhl Reports 8(9): 29-111 (2018) - 2017
- [j32]Piero A. Bonatti, Luigi Sauro:
On the logical properties of the nonmonotonic description logic DLN. Artif. Intell. 248: 85-111 (2017) - [c87]Piero A. Bonatti, Marco Faella, Iliana M. Petrova, Luigi Sauro:
A New Semantics for Overriding in Description Logics (Extended Abstract). IJCAI 2017: 4975-4979 - [c86]Piero A. Bonatti, Sabrina Kirrane, Axel Polleres, Rigo Wenning:
Transparent Personal Data Processing: The Road Ahead. SAFECOMP Workshops 2017: 337-349 - [c85]Joachim Biskup, Piero A. Bonatti, Clemente Galdi, Luigi Sauro:
Inference-proof Data Filtering for a Probabilistic Setting. PrivOn@ISWC 2017 - 2016
- [c84]Piero A. Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro:
Generalized Agent-mediated Procurement Auctions. AAMAS 2016: 77-85 - 2015
- [j31]Piero A. Bonatti, Marco Faella, Iliana M. Petrova, Luigi Sauro:
A new semantics for overriding in description logics. Artif. Intell. 222: 1-48 (2015) - [j30]Piero A. Bonatti, Clemente Galdi, Davide Torres:
Event-driven RBAC. J. Comput. Secur. 23(6): 709-757 (2015) - [c83]Piero A. Bonatti, Marco Faella, Carsten Lutz, Luigi Sauro, Frank Wolter:
Decidability of Circumscribed Description Logics Revisited. Advances in Knowledge Representation, Logic Programming, and Abstract Argumentation 2015: 112-124 - [c82]Piero A. Bonatti, Iliana M. Petrova, Luigi Sauro:
Optimized Construction of Secure Knowledge-Base Views. Description Logics 2015 - [c81]Piero A. Bonatti, Iliana Mineva Petrova, Luigi Sauro:
Optimizing the Computation of Overriding. ISWC (1) 2015: 356-372 - [i7]Piero Andrea Bonatti, Iliana Mineva Petrova, Luigi Sauro:
Optimizing the computation of overriding. CoRR abs/1507.04630 (2015) - 2014
- [j29]Piero A. Bonatti, Eugénio C. Oliveira, Jordi Sabater-Mir, Carles Sierra, Francesca Toni:
On the integration of trust with negotiation, argumentation and semantics. Knowl. Eng. Rev. 29(1): 31-50 (2014) - [c80]Marco Anisetti, Claudio A. Ardagna, Piero A. Bonatti, Ernesto Damiani, Marco Faella, Clemente Galdi, Luigi Sauro:
E-Auctions for Multi-Cloud Service Provisioning. IEEE SCC 2014: 35-42 - [c79]Piero A. Bonatti, Luigi Sauro, Iliana M. Petrova:
A Mechanism for Ontology Confidentiality. CILC 2014: 147-161 - [c78]Joachim Biskup, Piero A. Bonatti, Clemente Galdi, Luigi Sauro:
Optimality and Complexity of Inference-Proof Data Filtering and CQE. ESORICS (2) 2014: 165-181 - [c77]Piero A. Bonatti, Marco Faella, Luigi Sauro:
Partial Preferences for Mediated Bargaining. SR 2014: 105-111 - [i6]Piero A. Bonatti, Carsten Lutz, Frank Wolter:
The Complexity of Circumscription in DLs. CoRR abs/1401.3476 (2014) - [i5]Piero A. Bonatti, Marco Faella, Luigi Sauro:
Defeasible Inclusions in Low-Complexity DLs. CoRR abs/1401.3901 (2014) - 2013
- [c76]Piero A. Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro:
Auctions for Partial Heterogeneous Preferences. MFCS 2013: 183-194 - [c75]Piero A. Bonatti, Clemente Galdi, Davide Torres:
ERBAC: event-driven RBAC. SACMAT 2013: 125-136 - [c74]Piero A. Bonatti, Luigi Sauro:
A Confidentiality Model for Ontologies. ISWC (1) 2013: 17-32 - [c73]Piero A. Bonatti, Luigi Sauro, Marco Faella, Clemente Galdi:
An Integrated Formal Approach to Usage Control. IEEE Symposium on Security and Privacy Workshops 2013: 8-12 - 2012
- [c72]Piero A. Bonatti:
Defaults in Description Logics: So Simple, So Difficult. Description Logics 2012 - 2011
- [j28]Piero A. Bonatti:
On the decidability of FDNC programs. Intelligenza Artificiale 5(1): 89-93 (2011) - [j27]Piero A. Bonatti, Marco Faella, Luigi Sauro:
Defeasible Inclusions in Low-Complexity DLs. J. Artif. Intell. Res. 42: 719-764 (2011) - [j26]Piero A. Bonatti, Aidan Hogan, Axel Polleres, Luigi Sauro:
Robust and scalable Linked Data reasoning incorporating provenance and trust annotations. J. Web Semant. 9(2): 165-201 (2011) - [c71]Piero A. Bonatti, Marco Faella, Luigi Sauro:
Adding Default Attributes to EL++. AAAI 2011: 171-176 - [c70]Piero A. Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro:
Towards a Mechanism for Incentivating Privacy. ESORICS 2011: 472-488 - [c69]Piero A. Bonatti, Marco Faella, Luigi Sauro:
On the Complexity of EL with Defeasible Inclusions. IJCAI 2011: 762-767 - [r1]Piero A. Bonatti:
Logic-Based Authorization Languages. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 734-736 - 2010
- [j25]Piero A. Bonatti, Juri Luca De Coi, Daniel Olmedilla, Luigi Sauro:
A Rule-Based Trust Negotiation System. IEEE Trans. Knowl. Data Eng. 22(11): 1507-1520 (2010) - [j24]Sabrina Baselice, Piero A. Bonatti:
A decidable subclass of finitary programs. Theory Pract. Log. Program. 10(4-6): 481-496 (2010) - [c68]Piero A. Bonatti:
Datalog for Security, Privacy and Trust. Datalog 2010: 21-36 - [c67]Piero A. Bonatti, Philipp Kärger, Daniel Olmedilla:
Reactive Policies for the Semantic Web. ESWC (1) 2010: 76-90 - [c66]Piero A. Bonatti, Marco Faella, Luigi Sauro:
EL\mathcal{EL} with Default Attributes and Overriding. ISWC (1) 2010: 64-79 - [p3]Piero A. Bonatti, Francesco Calimeri, Nicola Leone, Francesco Ricca:
Answer Set Programming. 25 Years GULP 2010: 159-182 - [i4]Sabrina Baselice, Piero A. Bonatti:
A decidable subclass of finitary programs. CoRR abs/1007.3663 (2010)
2000 – 2009
- 2009
- [j23]Piero A. Bonatti, Carsten Lutz, Frank Wolter:
The Complexity of Circumscription in DLs. J. Artif. Intell. Res. 35: 717-773 (2009) - [j22]Sabrina Baselice, Piero A. Bonatti, Giovanni Criscuolo:
On finitely recursive programs. Theory Pract. Log. Program. 9(2): 213-238 (2009) - [c65]Piero A. Bonatti:
A Comparison of Terminological and Rule-based Policy Languages. SPOT@ESWC 2009 - [c64]Piero A. Bonatti, Marco Faella, Luigi Sauro:
Defeasible Inclusions in Low-Complexity DLs: Preliminary Notes. IJCAI 2009: 696-701 - [c63]Sergej Zerr, Daniel Olmedilla, Juri Luca De Coi, Wolfgang Nejdl, Piero A. Bonatti, Luigi Sauro:
Policy Based Protection and Personalized Generation of Web Content. LA-WEB/CLIHC 2009: 112-119 - [p2]Piero A. Bonatti, Juri Luca De Coi, Daniel Olmedilla, Luigi Sauro:
Rule-Based Policy Representations and Reasoning. REWERSE 2009: 201-232 - [i3]Sabrina Baselice, Piero A. Bonatti, Giovanni Criscuolo:
On finitely recursive programs. CoRR abs/0901.2850 (2009) - 2008
- [j21]Piero A. Bonatti:
Erratum to: Reasoning with infinite stable models [Artificial Intelligence 156 (1) (2004) 75-111]. Artif. Intell. 172(15): 1833-1835 (2008) - [j20]Piero A. Bonatti, Carsten Lutz, Aniello Murano, Moshe Y. Vardi:
The Complexity of Enriched Mu-Calculi. Log. Methods Comput. Sci. 4(3) (2008) - [c62]Piero A. Bonatti, Enrico Pontelli, Tran Cao Son:
Credulous Resolution for Answer Set Programming. AAAI 2008: 418-423 - [c61]Piero A. Bonatti:
On the decidability of FDNC programs. Il Milione 2008 - [c60]Sabrina Baselice, Piero A. Bonatti:
Composing Normal Programs with Function Symbols. ICLP 2008: 425-439 - [c59]Piero A. Bonatti, Juri Luca De Coi, Daniel Olmedilla, Luigi Sauro:
Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security. ICLP 2008: 779-784 - [c58]Piero A. Bonatti, Fabio Mogavero:
Comparing Rule-Based Policies. POLICY 2008: 11-18 - [c57]Juri Luca De Coi, Daniel Olmedilla, Sergej Zerr, Piero A. Bonatti, Luigi Sauro:
A Trust Management Package for Policy-Driven Protection & Personalization of Web Content. POLICY 2008: 228-230 - [c56]Juri Luca De Coi, Daniel Olmedilla, Piero A. Bonatti, Luigi Sauro:
Protune: A Framework for Semantic Web Policies. ISWC (Posters & Demos) 2008 - [e2]Cristina Baroglio, Piero A. Bonatti, Jan Maluszynski, Massimo Marchiori, Axel Polleres, Sebastian Schaffert:
Reasoning Web, 4th International Summer School 2008, Venice, Italy, September 7-11, 2008, Tutorial Lectures. Lecture Notes in Computer Science 5224, Springer 2008, ISBN 978-3-540-85656-6 [contents] - [i2]Piero A. Bonatti, Carsten Lutz, Aniello Murano, Moshe Y. Vardi:
The Complexity of Enriched Mu-Calculi. CoRR abs/0809.0360 (2008) - 2007
- [j19]Joachim Biskup, Piero A. Bonatti:
Controlled query evaluation with open queries for a decidable relational submodel. Ann. Math. Artif. Intell. 50(1-2): 39-77 (2007) - [c55]Sabrina Baselice, Piero A. Bonatti, Giovanni Criscuolo:
On Finitely Recursive Programs. ICLP 2007: 89-103 - [c54]Sabrina Baselice, Piero A. Bonatti, Marco Faella:
On Interoperable Trust Negotiation Strategies. POLICY 2007: 39-50 - [c53]Piero A. Bonatti, Daniel Olmedilla:
Rule-Based Policy Representation and Reasoning for the Semantic Web. Reasoning Web 2007: 240-268 - [c52]Piero A. Bonatti:
Nonmonotonic Description Logics - Requirements, Theory, and Implementations. TABLEAUX 2007: 1 - [p1]Grigoris Antoniou, Matteo Baldoni, Piero A. Bonatti, Wolfgang Nejdl, Daniel Olmedilla:
Rule-based Policy Specification. Secure Data Management in Decentralized Systems 2007: 169-216 - 2006
- [c51]Piero A. Bonatti, Daniel Olmedilla, Joachim Peer:
Advanced Policy Explanations on the Web. ECAI 2006: 200-204 - [c50]Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, Wolfgang Nejdl, Daniel Olmedilla, Joachim Peer, Nahid Shahmehri:
Semantic Web Policies - A Discussion of Requirements and Research Issues. ESWC 2006: 712-724 - [c49]Joachim Biskup, Piero A. Bonatti:
Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel. FoIKS 2006: 43-62 - [c48]Piero A. Bonatti, Carsten Lutz, Aniello Murano, Moshe Y. Vardi:
The Complexity of Enriched µ-Calculi. ICALP (2) 2006: 540-551 - [c47]Piero A. Bonatti, Carsten Lutz, Frank Wolter:
Description Logics with Circumscription. KR 2006: 400-410 - 2005
- [c46]Sabrina Baselice, Piero A. Bonatti, Michael Gelfond:
A Preliminary Report on Integrating of Answer Set and Constraint Solving. Answer Set Programming 2005 - [c45]Marianne Winslett, Charles C. Zhang, Piero A. Bonatti:
PeerAccess: a logic for distributed authorization. CCS 2005: 168-179 - [c44]Piero A. Bonatti:
Rule Languages for Security and Privacy in Cooperative Systems. COMPSAC (1) 2005: 268-269 - [c43]Sabrina Baselice, Piero A. Bonatti, Michael Gelfond:
Towards an Integration of Answer Set and Constraint Solving. ICLP 2005: 52-66 - [c42]Piero A. Bonatti, Daniel Olmedilla:
Driving and Monitoring Provisional Trust Negotiation with Metapolicies. POLICY 2005: 14-23 - [c41]Piero A. Bonatti, Paola Festa:
On optimal service selection. WWW 2005: 530-538 - [e1]Jennifer Golbeck, Piero A. Bonatti, Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslett:
Proceedings of the ISWC*04 Workshop on Trust, Security, and Reputation on the Semantic Web, Hiroshima, Japan, November 7, 2004. CEUR Workshop Proceedings 127, CEUR-WS.org 2005 [contents] - 2004
- [j18]Piero A. Bonatti:
Reasoning with infinite stable models. Artif. Intell. 156(1): 75-111 (2004) - [j17]Piero A. Bonatti, Adriano Peron:
On the undecidability of logics with converse, nominals, recursion and counting. Artif. Intell. 158(1): 75-96 (2004) - [j16]Joachim Biskup, Piero A. Bonatti:
Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. Ann. Math. Artif. Intell. 40(1-2): 37-62 (2004) - [j15]Joachim Biskup, Piero A. Bonatti:
Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1): 14-27 (2004) - [c40]Piero A. Bonatti:
Abduction over Unbounded Domains via ASP. ECAI 2004: 288-292 - [c39]Piero A. Bonatti:
On the Decidability of Containment of Recursive Datalog Queries - Preliminary report. PODS 2004: 297-306 - 2003
- [j14]Piero A. Bonatti, Sarit Kraus, V. S. Subrahmanian:
Secure Agents. Ann. Math. Artif. Intell. 37(1-2): 169-235 (2003) - [c38]Piero A. Bonatti:
Finitary Open Logic Program. Answer Set Programming 2003 - [c37]Piero A. Bonatti, Pierangela Samarati:
Logics for Authorization and Security. Logics for Emerging Applications of Databases 2003: 277-323 - [c36]Piero A. Bonatti:
On the Undecidability of Description and Dynamic Logics with Recursion and Counting. IJCAI 2003: 331-336 - [c35]Piero A. Bonatti, Yu Deng, V. S. Subrahmanian:
An Ontology-Extended Relational Algebra. IRI 2003: 192-199 - [c34]Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati:
Towards Flexible Credential Negotiation Protocols. Security Protocols Workshop 2003: 19-23 - [c33]Piero A. Bonatti, Andrea Tettamanzi:
Some Complexity Results on Fuzzy Description Logics. WILF 2003: 19-24 - 2002
- [j13]Piero A. Bonatti, Pierangela Samarati:
A Uniform Framework for Regulating Service Access and Information Release on the Web. J. Comput. Secur. 10(3): 241-272 (2002) - [j12]Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati:
An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur. 5(1): 1-35 (2002) - [j11]Piero A. Bonatti, Nicola Olivetti:
Sequent calculi for propositional nonmonotonic logics. ACM Trans. Comput. Log. 3(2): 226-278 (2002) - [c32]Joachim Biskup, Piero A. Bonatti:
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. ESORICS 2002: 39-54 - [c31]Joachim Biskup, Piero A. Bonatti:
Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. FoIKS 2002: 49-66 - [c30]Piero A. Bonatti:
Reasoning with Infinite Stable Models II: Disjunctive Programs. ICLP 2002: 333-346 - [c29]Piero A. Bonatti:
Towards Service Description Logics. JELIA 2002: 74-85 - [c28]Piero A. Bonatti:
Abduction, ASP and open logic programs. NMR 2002: 184-190 - [i1]Piero A. Bonatti:
Abduction, ASP and Open Logic Programs. CoRR cs.AI/0207021 (2002) - 2001
- [j10]Joachim Biskup, Piero A. Bonatti:
Lying versus refusal for known potential secrets. Data Knowl. Eng. 38(2): 199-222 (2001) - [j9]Piero A. Bonatti:
Resolution for Skeptical Stable Model Semantics. J. Autom. Reason. 27(4): 391-421 (2001) - [j8]Elisa Bertino, Piero A. Bonatti, Elena Ferrari:
TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4(3): 191-233 (2001) - [c27]Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:
A Component-Based Architecture for Secure Data Publication. ACSAC 2001: 309-318 - [c26]Piero A. Bonatti:
Reasoning with infinite stable models. IJCAI 2001: 603-610 - [c25]Piero A. Bonatti:
Reasoning with Open Logic Programs. LPNMR 2001: 147-159 - [c24]Piero A. Bonatti:
Prototypes for Reasoning with Infinite Stable Models and Function Symbols. LPNMR 2001: 416-419 - [c23]Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati:
An Access Control Model for Data Archives. SEC 2001: 261-276 - 2000
- [b1]V. S. Subrahmanian, Piero A. Bonatti, Jürgen Dix, Thomas Eiter, Sarit Kraus, Fatma Ozcan, Robert B. Ross:
Heterogenous Active Agents. MIT Press 2000, ISBN 0-262-19436-8 - [j7]Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino:
Temporal Authorization Bases: From Specification to Integration. J. Comput. Secur. 8(4): 309-353 (2000) - [c22]Piero A. Bonatti, Pierangela Samarati:
Regulating service access and information release on the Web. CCS 2000: 134-143 - [c21]Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati:
A modular approach to composing access control policies. CCS 2000: 164-173 - [c20]Elisa Bertino, Piero A. Bonatti, Elena Ferrari:
TRBAC: a temporal role-based access control model. ACM Workshop on Role-Based Access Control 2000: 21-30
1990 – 1999
- 1999
- [c19]Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino:
Specifying and computing hierarchies of temporal authorizations. APPIA-GULP-PRODE 1999: 243-258 - [c18]Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino:
Specifying and Computing Hierarchies of Temporal Authorizations. DBSec 1999: 285-300 - 1998
- [c17]Piero A. Bonatti, Sarit Kraus, José Salinas, V. S. Subrahmanian:
Data-Security in Heterogeneous Agent Systems. CIA 1998: 290-305 - [c16]Sibel Adali, Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian:
A Multi-Similarity Algebra. SIGMOD Conference 1998: 402-413 - 1997
- [j6]Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian:
Merging Heterogeneous Security Orderings. J. Comput. Secur. 5(1): 3-30 (1997) - [c15]Piero A. Bonatti:
A Constructive Negation for Transition System Specifications. APPIA-GULP-PRODE 1997: 283-294 - [c14]Piero A. Bonatti, Nicola Olivetti:
A Sequent Calculus for Circumscription. CSL 1997: 98-114 - [c13]Piero A. Bonatti:
Resolution for Skeptical Stable Semantics. LPNMR 1997: 185-197 - [c12]Piero A. Bonatti, Nicola Olivetti:
A Sequent Calculus for Skeptical Default Logic. TABLEAUX 1997: 107-121 - 1996
- [j5]Piero A. Bonatti, Thomas Eiter:
Querying Disjunctive Databases Through Nonmonotonic Logics. Theor. Comput. Sci. 160(1&2): 321-363 (1996) - [c11]Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian:
Merging Heterogeneous Security Orderings. ESORICS 1996: 183-197 - [c10]Piero A. Bonatti:
Sequent Calculi for Default and Autoepistemic Logics. TABLEAUX 1996: 127-142 - 1995
- [j4]Piero A. Bonatti:
Autoepistemic Logics as a Unifying Framework for the Semantics of Logic Programs. J. Log. Program. 22(2): 91-149 (1995) - [j3]Piero A. Bonatti:
A Three-Valued Formalization of Provability. J. Log. Comput. 5(2): 173-201 (1995) - [j2]Piero A. Bonatti, Sarit Kraus, V. S. Subrahmanian:
Foundations of Secure Deductive Databases. IEEE Trans. Knowl. Data Eng. 7(3): 406-422 (1995) - [c9]Piero A. Bonatti, Laura Giordano:
Three-Valued Semantics for Extended Logic Programs. GULP-PRODE 1995: 295-306 - [c8]Piero A. Bonatti, Thomas Eiter:
Querying Disjunctive Database Through Nonmonotonic Logics. ICDT 1995: 68-81 - 1994
- [j1]Piero A. Bonatti:
Autoepistemic Logic Programming. J. Autom. Reason. 13(1): 35-67 (1994) - 1993
- [c7]Piero A. Bonatti:
Autoepistemic Logic Programming. LPNMR 1993: 151-167 - 1992
- [c6]Piero A. Bonatti, Sarit Kraus, V. S. Subrahmanian:
Declarative Foundations of Secure Deductive Databases. ICDT 1992: 391-406 - [c5]Piero A. Bonatti:
Autoepistemic Logics as a Unifying Framework for the Semantics of Logic Programs. JICSLP 1992: 417-430 - [c4]Piero A. Bonatti:
Model Theoretic Semantics for Demo. META 1992: 220-234 - 1991
- [c3]Piero A. Bonatti:
A Family of Three-Valued Autoepistemic Logics. AI*IA 1991: 28-37 - [c2]Piero A. Bonatti:
Beliefs as Stable Conjectures. LPNMR 1991: 53-68 - 1990
- [c1]Piero A. Bonatti:
A More General Solution to the Multiple Expansion Problem. LPNMR 1990: 10-18
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-19 22:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint