dblp.uni-trier.dewww.uni-trier.de

Piero A. Bonatti

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
89EESabrina Baselice, Piero A. Bonatti, Giovanni Criscuolo: On finitely recursive programs CoRR abs/0901.2850: (2009)
88EESabrina Baselice, Piero A. Bonatti, Giovanni Criscuolo: On finitely recursive programs. TPLP 9(2): 213-238 (2009)
2008
87 Cristina Baroglio, Piero A. Bonatti, Jan Maluszynski, Massimo Marchiori, Axel Polleres, Sebastian Schaffert: Reasoning Web, 4th International Summer School 2008, Venice, Italy, September 7-11, 2008, Tutorial Lectures Springer 2008
86 Piero A. Bonatti, Enrico Pontelli, Tran Cao Son: Credulous Resolution for Answer Set Programming. AAAI 2008: 418-423
85EESabrina Baselice, Piero A. Bonatti: Composing Normal Programs with Function Symbols. ICLP 2008: 425-439
84EEPiero A. Bonatti, Juri Luca De Coi, Daniel Olmedilla, Luigi Sauro: Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security. ICLP 2008: 779-784
83EEJuri Luca De Coi, Daniel Olmedilla, Piero A. Bonatti, Luigi Sauro: Protune: A Framework for Semantic Web Policies. International Semantic Web Conference (Posters & Demos) 2008
82EEPiero A. Bonatti, F. Mogavero: Comparing Rule-Based Policies. POLICY 2008: 11-18
81EEJuri Luca De Coi, Daniel Olmedilla, Sergej Zerr, Piero A. Bonatti, Luigi Sauro: A Trust Management Package for Policy-Driven Protection & Personalization of Web Content. POLICY 2008: 228-230
80EEPiero A. Bonatti: Erratum to: Reasoning with infinite stable models [Artificial Intelligence 156 (1) (2004) 75-111]. Artif. Intell. 172(15): 1833-1835 (2008)
79EEPiero A. Bonatti, Carsten Lutz, Aniello Murano, Moshe Y. Vardi: The Complexity of Enriched Mu-Calculi CoRR abs/0809.0360: (2008)
2007
78EESabrina Baselice, Piero A. Bonatti, Giovanni Criscuolo: On Finitely Recursive Programs. ICLP 2007: 89-103
77EESabrina Baselice, Piero A. Bonatti, Marco Faella: On Interoperable Trust Negotiation Strategies. POLICY 2007: 39-50
76EEPiero A. Bonatti, Daniel Olmedilla: Rule-Based Policy Representation and Reasoning for the Semantic Web. Reasoning Web 2007: 240-268
75EEPiero A. Bonatti: Nonmonotonic Description Logics - Requirements, Theory, and Implementations. TABLEAUX 2007: 1
74EEGrigoris Antoniou, Matteo Baldoni, Piero A. Bonatti, Wolfgang Nejdl, Daniel Olmedilla: Rule-based Policy Specification. Secure Data Management in Decentralized Systems 2007: 169-216
73EEJoachim Biskup, Piero A. Bonatti: Controlled query evaluation with open queries for a decidable relational submodel. Ann. Math. Artif. Intell. 50(1-2): 39-77 (2007)
2006
72 Piero A. Bonatti, Daniel Olmedilla, Joachim Peer: Advanced Policy Explanations on the Web. ECAI 2006: 200-204
71EEPiero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, Wolfgang Nejdl, Daniel Olmedilla, Joachim Peer, Nahid Shahmehri: Semantic Web Policies - A Discussion of Requirements and Research Issues. ESWC 2006: 712-724
70EEJoachim Biskup, Piero A. Bonatti: Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel. FoIKS 2006: 43-62
69EEPiero A. Bonatti, Carsten Lutz, Aniello Murano, Moshe Y. Vardi: The Complexity of Enriched µ-Calculi. ICALP (2) 2006: 540-551
68 Piero A. Bonatti, Carsten Lutz, Frank Wolter: Description Logics with Circumscription. KR 2006: 400-410
2005
67EEMarianne Winslett, Charles C. Zhang, Piero A. Bonatti: PeerAccess: a logic for distributed authorization. ACM Conference on Computer and Communications Security 2005: 168-179
66EESabrina Baselice, Piero A. Bonatti, Michael Gelfond: A Preliminary Report on Integrating of Answer Set and Constraint Solving. Answer Set Programming 2005
65EEPiero A. Bonatti: Rule Languages for Security and Privacy in Cooperative Systems. COMPSAC (1) 2005: 268-269
64EESabrina Baselice, Piero A. Bonatti, Michael Gelfond: Towards an Integration of Answer Set and Constraint Solving. ICLP 2005: 52-66
63EEPiero A. Bonatti, Daniel Olmedilla: Driving and Monitoring Provisional Trust Negotiation with Metapolicies. POLICY 2005: 14-23
62EEPiero A. Bonatti, P. Festa: On optimal service selection. WWW 2005: 530-538
2004
61 Jennifer Golbeck, Piero A. Bonatti, Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslett: Proceedings of the ISWC*04 Workshop on Trust, Security, and Reputation on the Semantic Web, Hiroshima, Japan, November 7, 2004 CEUR-WS.org 2004
60 Piero A. Bonatti: Abduction over Unbounded Domains via ASP. ECAI 2004: 288-292
59EEPiero A. Bonatti: On the Decidability of Containment of Recursive Datalog Queries - Preliminary report. PODS 2004: 297-306
58 Joachim Biskup, Piero A. Bonatti: Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. Ann. Math. Artif. Intell. 40(1-2): 37-62 (2004)
57EEPiero A. Bonatti: Reasoning with infinite stable models. Artif. Intell. 156(1): 75-111 (2004)
56EEPiero A. Bonatti, Adriano Peron: On the undecidability of logics with converse, nominals, recursion and counting. Artif. Intell. 158(1): 75-96 (2004)
55EEJoachim Biskup, Piero A. Bonatti: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1): 14-27 (2004)
2003
54EEPiero A. Bonatti: Finitary Open Logic Program. Answer Set Programming 2003
53 Piero A. Bonatti: On the Undecidability of Description and Dynamic Logics with Recursion and Counting. IJCAI 2003: 331-336
52 Piero A. Bonatti, Yu Deng, V. S. Subrahmanian: An Ontology-Extended Relational Algebra. IRI 2003: 192-199
51 Piero A. Bonatti, Pierangela Samarati: Logics for Authorization and Security. Logics for Emerging Applications of Databases 2003: 277-323
50EEPiero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati: Towards Flexible Credential Negotiation Protocols. Security Protocols Workshop 2003: 19-23
49EEPiero A. Bonatti, Andrea Tettamanzi: Some Complexity Results on Fuzzy Description Logics. WILF 2003: 19-24
48 Piero A. Bonatti, Sarit Kraus, V. S. Subrahmanian: Secure Agents. Ann. Math. Artif. Intell. 37(1-2): 169-235 (2003)
2002
47EEJoachim Biskup, Piero A. Bonatti: Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. ESORICS 2002: 39-54
46EEJoachim Biskup, Piero A. Bonatti: Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. FoIKS 2002: 49-66
45EEPiero A. Bonatti: Reasoning with Infinite Stable Models II: Disjunctive Programs. ICLP 2002: 333-346
44EEPiero A. Bonatti: Towards Service Description Logics. JELIA 2002: 74-85
43 Piero A. Bonatti: Abduction, ASP and open logic programs. NMR 2002: 184-190
42EEPiero A. Bonatti, Nicola Olivetti: Sequent calculi for propositional nonmonotonic logics. ACM Trans. Comput. Log. 3(2): 226-278 (2002)
41EEPiero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati: An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur. 5(1): 1-35 (2002)
40EEPiero A. Bonatti: Abduction, ASP and Open Logic Programs CoRR cs.AI/0207021: (2002)
39 Piero A. Bonatti, Pierangela Samarati: A Uniform Framework for Regulating Service Access and Information Release on the Web. Journal of Computer Security 10(3): 241-272 (2002)
2001
38EEPiero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati: A Component-Based Architecture for Secure Data Publication. ACSAC 2001: 309-318
37 Piero A. Bonatti: Reasoning with infinite stable models. IJCAI 2001: 603-610
36EEPiero A. Bonatti: Reasoning with Open Logic Programs. LPNMR 2001: 147-159
35EEPiero A. Bonatti: Prototypes for Reasoning with Infinite Stable Models and Function Symbols. LPNMR 2001: 416-419
34 Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati: An Access Control Model for Data Archives. SEC 2001: 261-276
33EEElisa Bertino, Piero A. Bonatti, Elena Ferrari: TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4(3): 191-233 (2001)
32EEJoachim Biskup, Piero A. Bonatti: Lying versus refusal for known potential secrets. Data Knowl. Eng. 38(2): 199-222 (2001)
31 Piero A. Bonatti: Resolution for Skeptical Stable Model Semantics. J. Autom. Reasoning 27(4): 391-421 (2001)
2000
30 V. S. Subrahmanian, Piero A. Bonatti, Jürgen Dix, Thomas Eiter, Sarit Kraus, Fatma Ozcan, Robert B. Ross: Heterogenous Active Agents MIT Press 2000
29EEPiero A. Bonatti, Pierangela Samarati: Regulating service access and information release on the Web. ACM Conference on Computer and Communications Security 2000: 134-143
28EEPiero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati: A modular approach to composing access control policies. ACM Conference on Computer and Communications Security 2000: 164-173
27EEElisa Bertino, Piero A. Bonatti, Elena Ferrari: TRBAC: a temporal role-based access control model. ACM Workshop on Role-Based Access Control 2000: 21-30
26 Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino: Temporal Authorization Bases: From Specification to Integration. Journal of Computer Security 8(4): (2000)
1999
25 Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino: Specifying and computing hierarchies of temporal authorizations. APPIA-GULP-PRODE 1999: 243-258
24 Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino: Specifying and Computing Hierarchies of Temporal Authorizations. DBSec 1999: 285-300
1998
23EEPiero A. Bonatti, Sarit Kraus, José Salinas, V. S. Subrahmanian: Data-Security in Heterogeneous Agent Systems. CIA 1998: 290-305
22EESibel Adali, Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian: A Multi-Similarity Algebra. SIGMOD Conference 1998: 402-413
1997
21 Piero A. Bonatti: A Constructive Negation for Transition System Specifications. APPIA-GULP-PRODE 1997: 283-294
20 Piero A. Bonatti, Nicola Olivetti: A Sequent Calculus for Circumscription. CSL 1997: 98-114
19 Piero A. Bonatti: Resolution for Skeptical Stable Semantics. LPNMR 1997: 185-197
18 Piero A. Bonatti, Nicola Olivetti: A Sequent Calculus for Skeptical Default Logic. TABLEAUX 1997: 107-121
17 Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian: Merging Heterogeneous Security Orderings. Journal of Computer Security 5(1): 3-30 (1997)
1996
16EEPiero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian: Merging Heterogeneous Security Orderings. ESORICS 1996: 183-197
15 Piero A. Bonatti: Sequent Calculi for Default and Autoepistemic Logics. TABLEAUX 1996: 127-142
14EEPiero A. Bonatti, Thomas Eiter: Querying Disjunctive Databases Through Nonmonotonic Logics. Theor. Comput. Sci. 160(1&2): 321-363 (1996)
1995
13 Piero A. Bonatti, Laura Giordano: Three-Valued Semantics for Extended Logic Programs. GULP-PRODE 1995: 295-306
12EEPiero A. Bonatti, Thomas Eiter: Querying Disjunctive Database Through Nonmonotonic Logics. ICDT 1995: 68-81
11EEPiero A. Bonatti, Sarit Kraus, V. S. Subrahmanian: Foundations of Secure Deductive Databases. IEEE Trans. Knowl. Data Eng. 7(3): 406-422 (1995)
10 Piero A. Bonatti: A Three-Valued Formalization of Provability. J. Log. Comput. 5(2): 173-201 (1995)
9 Piero A. Bonatti: Autoepistemic Logics as a Unifying Framework for the Semantics of Logic Programs. J. Log. Program. 22(2): 91-149 (1995)
1994
8 Piero A. Bonatti: Autoepistemic Logic Programming. J. Autom. Reasoning 13(1): 35-67 (1994)
1993
7 Piero A. Bonatti: Autoepistemic Logic Programming. LPNMR 1993: 151-167
1992
6EEPiero A. Bonatti, Sarit Kraus, V. S. Subrahmanian: Declarative Foundations of Secure Deductive Databases. ICDT 1992: 391-406
5 Piero A. Bonatti: Autoepistemic Logics as a Unifying Framework for the Semantics of Logic Programs. JICSLP 1992: 417-430
4 Piero A. Bonatti: Model Theoretic Semantics for Demo. META 1992: 220-234
1991
3 Piero A. Bonatti: A Family of Three-Valued Autoepistemic Logics. AI*IA 1991: 28-37
2 Piero A. Bonatti: Beliefs as Stable Conjectures. LPNMR 1991: 53-68
1990
1 Piero A. Bonatti: A More General Solution to the Multiple Expansion Problem. LPNMR 1990: 10-18

Coauthor Index

1Sibel Adali [22]
2Grigoris Antoniou [74]
3Matteo Baldoni [74]
4Cristina Baroglio [87]
5Sabrina Baselice [64] [66] [77] [78] [85] [88] [89]
6Elisa Bertino [24] [25] [26] [27] [33]
7Joachim Biskup [32] [46] [47] [55] [58] [70] [73]
8Juri Luca De Coi [81] [83] [84]
9Giovanni Criscuolo [78] [88] [89]
10Ernesto Damiani [34] [38]
11Yu Deng [52]
12Jürgen Dix [30]
13Claudiu Duma [71]
14Thomas Eiter [12] [14] [30]
15Marco Faella [77]
16Elena Ferrari [24] [25] [26] [27] [33]
17P. Festa [62]
18Norbert E. Fuchs [71]
19Michael Gelfond [64] [66]
20Laura Giordano [13]
21Jennifer Golbeck [61]
22Sarit Kraus [6] [11] [23] [30] [48]
23Carsten Lutz [68] [69] [79]
24Jan Maluszynski [87]
25Massimo Marchiori [87]
26F. Mogavero [82]
27Aniello Murano [69] [79]
28Wolfgang Nejdl [61] [71] [74]
29Nicola Olivetti [18] [20] [42]
30Daniel Olmedilla [61] [63] [71] [72] [74] [76] [81] [83] [84]
31Fatma Özcan (Fatma Ozcan) [30]
32Joachim Peer [71] [72]
33Adriano Peron [56]
34Axel Polleres [87]
35Enrico Pontelli [86]
36Robert B. Ross [30]
37José Salinas [23]
38Pierangela Samarati [28] [29] [34] [38] [39] [41] [50] [51]
39Maria Luisa Sapino [16] [17] [22] [24] [25] [26]
40Luigi Sauro [81] [83] [84]
41Sebastian Schaffert [87]
42Nahid Shahmehri [71]
43Tran Cao Son [86]
44V. S. Subrahmanian [6] [11] [16] [17] [22] [23] [30] [48] [52]
45Andrea Tettamanzi [49]
46Moshe Y. Vardi [69] [79]
47Sabrina De Capitani di Vimercati [28] [34] [38] [41] [50]
48Marianne Winslett [61] [67]
49Frank Wolter [68]
50Sergej Zerr [81]
51Charles C. Zhang [67]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)