Author of the publication

Analyzing Security-Enhanced Linux Policy Specifications.

, , and . POLICY, page 158-. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ContextErlang: introducing context-oriented programming in the actor model., , and . AOSD, page 191-202. ACM, (2012)Bounded Reachability for Temporal Logic over Constraint Systems., , , , , and . TIME, page 43-50. IEEE Computer Society, (2010)SMT-based Verification of LTL Specification with Integer Constraints and its Application to Runtime Checking of Service Substitutability., , , , and . SEFM, page 244-254. IEEE Computer Society, (2010)Logic Characterization of Invisibly Structured Languages: The Case of Floyd Languages., , and . SOFSEM, volume 7741 of Lecture Notes in Computer Science, page 307-318. Springer, (2013)A formal approach for designing CORBA based applications., , , and . ICSE, page 188-197. ACM, (2000)An Automatic Approach to Enable Replacement of Conversational Services., , and . ICSOC/ServiceWave, volume 5900 of Lecture Notes in Computer Science, page 159-174. (2009)Picture languages: Tiling systems versus tile rewriting grammars., , , and . Theor. Comput. Sci., 356 (1-2): 90-103 (2006)Deterministic recognizability of picture languages by Wang automata., and . ICTCS, page 150-154. (2009)Deterministic recognizability of picture languages with Wang automata, and . Discrete Mathematics & Theoretical Computer Science, 12 (4): 73--94 (2010)Comments on temporal logics for real-time system specification., , and . ACM Comput. Surv., 41 (2): 13:1-13:5 (2009)