Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unwinding and the LOCK Proof Referees Study., , and . CSFW, page 9-21. IEEE Computer Society, (1992)Two Automated Methods in Implementation Proofs., and . CADE, volume 310 of Lecture Notes in Computer Science, page 622-642. Springer, (1988)Almost Product Evaluation of Hankel Determinants., , and . Electr. J. Comb., (2008)From a Polynomial Riemann Hypothesis to Alternating Sign Matrices., , and . Electron. J. Comb., (2001)FDMM: A Formalism for Describing ADOxx Meta Models and Models., , and . ICEIS (3), page 133-144. SciTePress, (2012)A Framework for Composition of Security Models., and . CSFW, page 157-166. IEEE Computer Society, (1992)Noninterference and Intrusion Detection., and . S&P, page 177-187. IEEE Computer Society, (2002)Ontology Repositories and Semantic Artefact Catalogues with the OntoPortal Technology., , , , , , , , , and 1 other author(s). ISWC, volume 14266 of Lecture Notes in Computer Science, page 38-58. Springer, (2023)A Model-Theoretic Approach to Specifying, Verifying and Hooking Up Security Policies., and . CSFW, page 127-138. MITRE Corporation Press, (1988)An Open Source Database Backend for the OWL API and Protege 4.. OWLED, volume 614 of CEUR Workshop Proceedings, CEUR-WS.org, (2010)