Author of the publication

Constructing Inference-Proof Belief Mediators.

, and . DBSec, volume 9149 of Lecture Notes in Computer Science, page 188-203. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services., and . ESSoS, volume 8364 of Lecture Notes in Computer Science, page 35-44. Springer, (2014)Confidentiality enforcement by hybrid control of information flows., , and . CoRR, (2017)Inference-Proof View Update Transactions with Minimal Refusals., and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 104-121. Springer, (2011)Preserving confidentiality while reacting on iterated queries and belief revisions., and . Ann. Math. Artif. Intell., 73 (1-2): 75-123 (2015)Belief change operations under confidentiality requirements in multiagent systems.. Technical University Dortmund, Germany, (2014)Revising Belief without Revealing Secrets., and . FoIKS, volume 7153 of Lecture Notes in Computer Science, page 51-70. Springer, (2012)On the Simulation Assumption for Controlled Interaction Processing., and . Computational Models of Rationality, page 133-149. College Publications, (2016)Constructing Inference-Proof Belief Mediators., and . DBSec, volume 9149 of Lecture Notes in Computer Science, page 188-203. Springer, (2015)Policy-Based Secrecy in the Runs & Systems Framework and Controlled Query Evaluation., and . IWSEC (Short Papers), page 60-77. Information Processing Society of Japan (IPSJ), (2010)