2009 |
89 | EE | Sabrina Baselice,
Piero A. Bonatti,
Giovanni Criscuolo:
On finitely recursive programs
CoRR abs/0901.2850: (2009) |
88 | EE | Sabrina Baselice,
Piero A. Bonatti,
Giovanni Criscuolo:
On finitely recursive programs.
TPLP 9(2): 213-238 (2009) |
2008 |
87 | | Cristina Baroglio,
Piero A. Bonatti,
Jan Maluszynski,
Massimo Marchiori,
Axel Polleres,
Sebastian Schaffert:
Reasoning Web, 4th International Summer School 2008, Venice, Italy, September 7-11, 2008, Tutorial Lectures
Springer 2008 |
86 | | Piero A. Bonatti,
Enrico Pontelli,
Tran Cao Son:
Credulous Resolution for Answer Set Programming.
AAAI 2008: 418-423 |
85 | EE | Sabrina Baselice,
Piero A. Bonatti:
Composing Normal Programs with Function Symbols.
ICLP 2008: 425-439 |
84 | EE | Piero A. Bonatti,
Juri Luca De Coi,
Daniel Olmedilla,
Luigi Sauro:
Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security.
ICLP 2008: 779-784 |
83 | EE | Juri Luca De Coi,
Daniel Olmedilla,
Piero A. Bonatti,
Luigi Sauro:
Protune: A Framework for Semantic Web Policies.
International Semantic Web Conference (Posters & Demos) 2008 |
82 | EE | Piero A. Bonatti,
F. Mogavero:
Comparing Rule-Based Policies.
POLICY 2008: 11-18 |
81 | EE | Juri Luca De Coi,
Daniel Olmedilla,
Sergej Zerr,
Piero A. Bonatti,
Luigi Sauro:
A Trust Management Package for Policy-Driven Protection & Personalization of Web Content.
POLICY 2008: 228-230 |
80 | EE | Piero A. Bonatti:
Erratum to: Reasoning with infinite stable models [Artificial Intelligence 156 (1) (2004) 75-111].
Artif. Intell. 172(15): 1833-1835 (2008) |
79 | EE | Piero A. Bonatti,
Carsten Lutz,
Aniello Murano,
Moshe Y. Vardi:
The Complexity of Enriched Mu-Calculi
CoRR abs/0809.0360: (2008) |
2007 |
78 | EE | Sabrina Baselice,
Piero A. Bonatti,
Giovanni Criscuolo:
On Finitely Recursive Programs.
ICLP 2007: 89-103 |
77 | EE | Sabrina Baselice,
Piero A. Bonatti,
Marco Faella:
On Interoperable Trust Negotiation Strategies.
POLICY 2007: 39-50 |
76 | EE | Piero A. Bonatti,
Daniel Olmedilla:
Rule-Based Policy Representation and Reasoning for the Semantic Web.
Reasoning Web 2007: 240-268 |
75 | EE | Piero A. Bonatti:
Nonmonotonic Description Logics - Requirements, Theory, and Implementations.
TABLEAUX 2007: 1 |
74 | EE | Grigoris Antoniou,
Matteo Baldoni,
Piero A. Bonatti,
Wolfgang Nejdl,
Daniel Olmedilla:
Rule-based Policy Specification.
Secure Data Management in Decentralized Systems 2007: 169-216 |
73 | EE | Joachim Biskup,
Piero A. Bonatti:
Controlled query evaluation with open queries for a decidable relational submodel.
Ann. Math. Artif. Intell. 50(1-2): 39-77 (2007) |
2006 |
72 | | Piero A. Bonatti,
Daniel Olmedilla,
Joachim Peer:
Advanced Policy Explanations on the Web.
ECAI 2006: 200-204 |
71 | EE | Piero A. Bonatti,
Claudiu Duma,
Norbert E. Fuchs,
Wolfgang Nejdl,
Daniel Olmedilla,
Joachim Peer,
Nahid Shahmehri:
Semantic Web Policies - A Discussion of Requirements and Research Issues.
ESWC 2006: 712-724 |
70 | EE | Joachim Biskup,
Piero A. Bonatti:
Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel.
FoIKS 2006: 43-62 |
69 | EE | Piero A. Bonatti,
Carsten Lutz,
Aniello Murano,
Moshe Y. Vardi:
The Complexity of Enriched µ-Calculi.
ICALP (2) 2006: 540-551 |
68 | | Piero A. Bonatti,
Carsten Lutz,
Frank Wolter:
Description Logics with Circumscription.
KR 2006: 400-410 |
2005 |
67 | EE | Marianne Winslett,
Charles C. Zhang,
Piero A. Bonatti:
PeerAccess: a logic for distributed authorization.
ACM Conference on Computer and Communications Security 2005: 168-179 |
66 | EE | Sabrina Baselice,
Piero A. Bonatti,
Michael Gelfond:
A Preliminary Report on Integrating of Answer Set and Constraint Solving.
Answer Set Programming 2005 |
65 | EE | Piero A. Bonatti:
Rule Languages for Security and Privacy in Cooperative Systems.
COMPSAC (1) 2005: 268-269 |
64 | EE | Sabrina Baselice,
Piero A. Bonatti,
Michael Gelfond:
Towards an Integration of Answer Set and Constraint Solving.
ICLP 2005: 52-66 |
63 | EE | Piero A. Bonatti,
Daniel Olmedilla:
Driving and Monitoring Provisional Trust Negotiation with Metapolicies.
POLICY 2005: 14-23 |
62 | EE | Piero A. Bonatti,
P. Festa:
On optimal service selection.
WWW 2005: 530-538 |
2004 |
61 | | Jennifer Golbeck,
Piero A. Bonatti,
Wolfgang Nejdl,
Daniel Olmedilla,
Marianne Winslett:
Proceedings of the ISWC*04 Workshop on Trust, Security, and Reputation on the Semantic Web, Hiroshima, Japan, November 7, 2004
CEUR-WS.org 2004 |
60 | | Piero A. Bonatti:
Abduction over Unbounded Domains via ASP.
ECAI 2004: 288-292 |
59 | EE | Piero A. Bonatti:
On the Decidability of Containment of Recursive Datalog Queries - Preliminary report.
PODS 2004: 297-306 |
58 | | Joachim Biskup,
Piero A. Bonatti:
Controlled Query Evaluation for Known Policies by Combining Lying and Refusal.
Ann. Math. Artif. Intell. 40(1-2): 37-62 (2004) |
57 | EE | Piero A. Bonatti:
Reasoning with infinite stable models.
Artif. Intell. 156(1): 75-111 (2004) |
56 | EE | Piero A. Bonatti,
Adriano Peron:
On the undecidability of logics with converse, nominals, recursion and counting.
Artif. Intell. 158(1): 75-96 (2004) |
55 | EE | Joachim Biskup,
Piero A. Bonatti:
Controlled query evaluation for enforcing confidentiality in complete information systems.
Int. J. Inf. Sec. 3(1): 14-27 (2004) |
2003 |
54 | EE | Piero A. Bonatti:
Finitary Open Logic Program.
Answer Set Programming 2003 |
53 | | Piero A. Bonatti:
On the Undecidability of Description and Dynamic Logics with Recursion and Counting.
IJCAI 2003: 331-336 |
52 | | Piero A. Bonatti,
Yu Deng,
V. S. Subrahmanian:
An Ontology-Extended Relational Algebra.
IRI 2003: 192-199 |
51 | | Piero A. Bonatti,
Pierangela Samarati:
Logics for Authorization and Security.
Logics for Emerging Applications of Databases 2003: 277-323 |
50 | EE | Piero A. Bonatti,
Sabrina De Capitani di Vimercati,
Pierangela Samarati:
Towards Flexible Credential Negotiation Protocols.
Security Protocols Workshop 2003: 19-23 |
49 | EE | Piero A. Bonatti,
Andrea Tettamanzi:
Some Complexity Results on Fuzzy Description Logics.
WILF 2003: 19-24 |
48 | | Piero A. Bonatti,
Sarit Kraus,
V. S. Subrahmanian:
Secure Agents.
Ann. Math. Artif. Intell. 37(1-2): 169-235 (2003) |
2002 |
47 | EE | Joachim Biskup,
Piero A. Bonatti:
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation.
ESORICS 2002: 39-54 |
46 | EE | Joachim Biskup,
Piero A. Bonatti:
Controlled Query Evaluation for Known Policies by Combining Lying and Refusal.
FoIKS 2002: 49-66 |
45 | EE | Piero A. Bonatti:
Reasoning with Infinite Stable Models II: Disjunctive Programs.
ICLP 2002: 333-346 |
44 | EE | Piero A. Bonatti:
Towards Service Description Logics.
JELIA 2002: 74-85 |
43 | | Piero A. Bonatti:
Abduction, ASP and open logic programs.
NMR 2002: 184-190 |
42 | EE | Piero A. Bonatti,
Nicola Olivetti:
Sequent calculi for propositional nonmonotonic logics.
ACM Trans. Comput. Log. 3(2): 226-278 (2002) |
41 | EE | Piero A. Bonatti,
Sabrina De Capitani di Vimercati,
Pierangela Samarati:
An algebra for composing access control policies.
ACM Trans. Inf. Syst. Secur. 5(1): 1-35 (2002) |
40 | EE | Piero A. Bonatti:
Abduction, ASP and Open Logic Programs
CoRR cs.AI/0207021: (2002) |
39 | | Piero A. Bonatti,
Pierangela Samarati:
A Uniform Framework for Regulating Service Access and Information Release on the Web.
Journal of Computer Security 10(3): 241-272 (2002) |
2001 |
38 | EE | Piero A. Bonatti,
Ernesto Damiani,
Sabrina De Capitani di Vimercati,
Pierangela Samarati:
A Component-Based Architecture for Secure Data Publication.
ACSAC 2001: 309-318 |
37 | | Piero A. Bonatti:
Reasoning with infinite stable models.
IJCAI 2001: 603-610 |
36 | EE | Piero A. Bonatti:
Reasoning with Open Logic Programs.
LPNMR 2001: 147-159 |
35 | EE | Piero A. Bonatti:
Prototypes for Reasoning with Infinite Stable Models and Function Symbols.
LPNMR 2001: 416-419 |
34 | | Piero A. Bonatti,
Ernesto Damiani,
Sabrina De Capitani di Vimercati,
Pierangela Samarati:
An Access Control Model for Data Archives.
SEC 2001: 261-276 |
33 | EE | Elisa Bertino,
Piero A. Bonatti,
Elena Ferrari:
TRBAC: A temporal role-based access control model.
ACM Trans. Inf. Syst. Secur. 4(3): 191-233 (2001) |
32 | EE | Joachim Biskup,
Piero A. Bonatti:
Lying versus refusal for known potential secrets.
Data Knowl. Eng. 38(2): 199-222 (2001) |
31 | | Piero A. Bonatti:
Resolution for Skeptical Stable Model Semantics.
J. Autom. Reasoning 27(4): 391-421 (2001) |
2000 |
30 | | V. S. Subrahmanian,
Piero A. Bonatti,
Jürgen Dix,
Thomas Eiter,
Sarit Kraus,
Fatma Ozcan,
Robert B. Ross:
Heterogenous Active Agents
MIT Press 2000 |
29 | EE | Piero A. Bonatti,
Pierangela Samarati:
Regulating service access and information release on the Web.
ACM Conference on Computer and Communications Security 2000: 134-143 |
28 | EE | Piero A. Bonatti,
Sabrina De Capitani di Vimercati,
Pierangela Samarati:
A modular approach to composing access control policies.
ACM Conference on Computer and Communications Security 2000: 164-173 |
27 | EE | Elisa Bertino,
Piero A. Bonatti,
Elena Ferrari:
TRBAC: a temporal role-based access control model.
ACM Workshop on Role-Based Access Control 2000: 21-30 |
26 | | Elisa Bertino,
Piero A. Bonatti,
Elena Ferrari,
Maria Luisa Sapino:
Temporal Authorization Bases: From Specification to Integration.
Journal of Computer Security 8(4): (2000) |
1999 |
25 | | Elisa Bertino,
Piero A. Bonatti,
Elena Ferrari,
Maria Luisa Sapino:
Specifying and computing hierarchies of temporal authorizations.
APPIA-GULP-PRODE 1999: 243-258 |
24 | | Elisa Bertino,
Piero A. Bonatti,
Elena Ferrari,
Maria Luisa Sapino:
Specifying and Computing Hierarchies of Temporal Authorizations.
DBSec 1999: 285-300 |
1998 |
23 | EE | Piero A. Bonatti,
Sarit Kraus,
José Salinas,
V. S. Subrahmanian:
Data-Security in Heterogeneous Agent Systems.
CIA 1998: 290-305 |
22 | EE | Sibel Adali,
Piero A. Bonatti,
Maria Luisa Sapino,
V. S. Subrahmanian:
A Multi-Similarity Algebra.
SIGMOD Conference 1998: 402-413 |
1997 |
21 | | Piero A. Bonatti:
A Constructive Negation for Transition System Specifications.
APPIA-GULP-PRODE 1997: 283-294 |
20 | | Piero A. Bonatti,
Nicola Olivetti:
A Sequent Calculus for Circumscription.
CSL 1997: 98-114 |
19 | | Piero A. Bonatti:
Resolution for Skeptical Stable Semantics.
LPNMR 1997: 185-197 |
18 | | Piero A. Bonatti,
Nicola Olivetti:
A Sequent Calculus for Skeptical Default Logic.
TABLEAUX 1997: 107-121 |
17 | | Piero A. Bonatti,
Maria Luisa Sapino,
V. S. Subrahmanian:
Merging Heterogeneous Security Orderings.
Journal of Computer Security 5(1): 3-30 (1997) |
1996 |
16 | EE | Piero A. Bonatti,
Maria Luisa Sapino,
V. S. Subrahmanian:
Merging Heterogeneous Security Orderings.
ESORICS 1996: 183-197 |
15 | | Piero A. Bonatti:
Sequent Calculi for Default and Autoepistemic Logics.
TABLEAUX 1996: 127-142 |
14 | EE | Piero A. Bonatti,
Thomas Eiter:
Querying Disjunctive Databases Through Nonmonotonic Logics.
Theor. Comput. Sci. 160(1&2): 321-363 (1996) |
1995 |
13 | | Piero A. Bonatti,
Laura Giordano:
Three-Valued Semantics for Extended Logic Programs.
GULP-PRODE 1995: 295-306 |
12 | EE | Piero A. Bonatti,
Thomas Eiter:
Querying Disjunctive Database Through Nonmonotonic Logics.
ICDT 1995: 68-81 |
11 | EE | Piero A. Bonatti,
Sarit Kraus,
V. S. Subrahmanian:
Foundations of Secure Deductive Databases.
IEEE Trans. Knowl. Data Eng. 7(3): 406-422 (1995) |
10 | | Piero A. Bonatti:
A Three-Valued Formalization of Provability.
J. Log. Comput. 5(2): 173-201 (1995) |
9 | | Piero A. Bonatti:
Autoepistemic Logics as a Unifying Framework for the Semantics of Logic Programs.
J. Log. Program. 22(2): 91-149 (1995) |
1994 |
8 | | Piero A. Bonatti:
Autoepistemic Logic Programming.
J. Autom. Reasoning 13(1): 35-67 (1994) |
1993 |
7 | | Piero A. Bonatti:
Autoepistemic Logic Programming.
LPNMR 1993: 151-167 |
1992 |
6 | EE | Piero A. Bonatti,
Sarit Kraus,
V. S. Subrahmanian:
Declarative Foundations of Secure Deductive Databases.
ICDT 1992: 391-406 |
5 | | Piero A. Bonatti:
Autoepistemic Logics as a Unifying Framework for the Semantics of Logic Programs.
JICSLP 1992: 417-430 |
4 | | Piero A. Bonatti:
Model Theoretic Semantics for Demo.
META 1992: 220-234 |
1991 |
3 | | Piero A. Bonatti:
A Family of Three-Valued Autoepistemic Logics.
AI*IA 1991: 28-37 |
2 | | Piero A. Bonatti:
Beliefs as Stable Conjectures.
LPNMR 1991: 53-68 |
1990 |
1 | | Piero A. Bonatti:
A More General Solution to the Multiple Expansion Problem.
LPNMR 1990: 10-18 |