Jorge Lobo

According to our database1, Jorge Lobo authored at least 127 papers between 1988 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
A Comprehensive Study on Load Balancers for VNF chains Horizontal Scaling.
CoRR, 2018

Verification of Fixed-Topology Declarative Distributed Systems with External Data.
Proceedings of the 12th Alberto Mendelzon International Workshop on Foundations of Data Management, 2018

2017
Optimizing Resource Allocation for Virtualized Network Functions in a Cloud Center Using Genetic Algorithms.
IEEE Trans. Network and Service Management, 2017

Data Modelling for the Evaluation of Virtualized Network Functions Resource Allocation Algorithms.
CoRR, 2017

A Datalog Framework for Modeling Relationship-based Access Control Policies.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Shortfall-Based Optimal Security Provisioning for Internet of Things.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Declarative Framework for Specification, Simulation and Analysis of Distributed Applications.
IEEE Trans. Knowl. Data Eng., 2016

Introduction to Stochastic Computing using a Remote Lab with Reconfigurable Logic.
iJOE, 2016

2015
Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation.
IEEE Trans. Knowl. Data Eng., 2015

Experimental results on the use of genetic algorithms for scaling virtualized network functions.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2015

Detecting distributed signature-based intrusion: The case of multi-path routing attacks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Towards making network function virtualization a cloud computing service.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Towards Collaborative Query Planning in Multi-party Database Networks.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Reasoning about Policy Behavior in Logic-Based Trust Management Systems: Some Complexity Results and an Operational Framework.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
An Operational Framework to Reason about Policies Behavior in Trust Management System.
Proceedings of the 8th Alberto Mendelzon Workshop on Foundations of Data Management, 2014

2013
A declarative approach to distributed computing: Specification, execution and analysis.
TPLP, 2013

A Similarity Measure for Comparing XACML Policies.
IEEE Trans. Knowl. Data Eng., 2013

Network and Service Management for Cloud Computing and Data Centers: A Report on CNSM 2012.
J. Network Syst. Manage., 2013

2012
Interactive Demonstration of a Remote Reconfigurable Logic Laboratory for Basic Digital Design.
iJOE, 2012

Dynamic graph query primitives for SDN-based cloudnetwork management.
Proceedings of the first workshop on Hot topics in software defined networks, 2012

Practical risk aggregation in RBAC models.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Firewall Configuration Policies for the Specification and Implementation of Private Zones.
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012

Learning Stochastic Models of Information Flow.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Risk-based security decisions under uncertainty.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Distributed state machines: A declarative framework for the management of distributed systems.
Proceedings of the 8th International Conference on Network and Service Management, 2012

Declarative Distributed Computing.
Proceedings of the Correct Reasoning, 2012

Policy-Aware Service Composition in Sensor Networks.
Proceedings of the 2012 IEEE Ninth International Conference on Services Computing, 2012

2011
Fine-grained integration of access control policies.
Computers & Security, 2011

Policy refinement of network services for MANETs.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Policy refinement: Decomposition and operationalization for dynamic domains.
Proceedings of the 7th International Conference on Network and Service Management, 2011

Refinement of History-Based Policies.
Proceedings of the Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning, 2011

Adversaries' Holy Grail: access control analytics.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

2010
Privacy-aware role-based access control.
ACM Trans. Inf. Syst. Secur., 2010

Mining Roles with Multiple Objectives.
ACM Trans. Inf. Syst. Secur., 2010

EXAM: a comprehensive environment for the analysis of access control policies.
Int. J. Inf. Sec., 2010

Towards an integrated approach to role engineering.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

Mining roles with noisy data.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

A Negotiation Framework for Negotiation of Coalition Policies.
Proceedings of the POLICY 2010, 2010

Decomposition techniques for policy refinement.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Risk-based access control systems built on fuzzy inferences.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Privacy-Aware Role-Based Access Control.
IEEE Security & Privacy, 2009

Policy framework for security and privacy management.
IBM Journal of Research and Development, 2009

Analysis of privacy and security policies.
IBM Journal of Research and Development, 2009

Security policy refinement using data integration: a position paper.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009

An algebra for fine-grained integration of XACML policies.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Automating role-based provisioning by learning from examples.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Evaluating role mining algorithms.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Access control policy combining: theory meets practice.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Usability meets access control: challenges and research opportunities.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Visualization for Access Control Policy Analysis Results Using Multi-level Grids.
Proceedings of the POLICY 2009, 2009

Extending the CIM-SPL policy language with RBAC for distributed management systems in the WBEM infrastructure.
Proceedings of the Integrated Network Management, 2009

D-algebra for composing access control policy decisions.
Proceedings of the 2009 ACM Symposium on Information, 2009

Expressive policy analysis with enhanced system dynamicity.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
An obligation model bridging access control policies and privacy policies.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Mining roles with semantic meanings.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Policy decomposition for collaborative access control.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

An Algebra for Integration and Analysis of Ponder2 Policies.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

EXAM: An Environment for Access Control Policy Analysis and Management.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

C2: The Case for a Network Configuration Checking Language.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Authorization and Obligation Policies in Dynamic Systems.
Proceedings of the Logic Programming, 24th International Conference, 2008

A Role-Based Infrastructure for the Management of Dynamic Communities.
Proceedings of the Resilient Networks and Services, 2008

2007
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Privacy-aware role based access control.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

An approach to evaluate policy similarity.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Policy-Based Computing: From Systems and Applications to Theory.
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 2007

Issues in Designing a Policy Language for Distributed Management of IT Infrastructures.
Proceedings of the Integrated Network Management, 2007

Conditional Privacy-Aware Role Based Access Control.
Proceedings of the Computer Security, 2007

2006
A Basis for Comparing Characteristics of Policy Systems.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

2005
Policy-based management of networked computing systems.
IEEE Communications Magazine, 2005

Policy Ratification.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

2004
Knowledge And The Action Description Language A
CoRR, 2004

2003
Conflict Resolution Using Logic Programming.
IEEE Trans. Knowl. Data Eng., 2003

Realizing network Control Policies using Distributed Action Plans.
J. Network Syst. Manage., 2003

2001
Knowledge and the Action Description Language A.
TPLP, 2001

Formalizing and Reasoning About the Requirements Specifications of Workflow Systems.
Int. J. Cooperative Inf. Syst., 2001

Monitors for History-Based Policies.
Proceedings of the Policies for Distributed Systems and Networks, 2001

Reasoning about Policies using Logic Programs.
Proceedings of the Answer Set Programming, 2001

2000
Netmon: network management for the SARAS softswitch.
Proceedings of the Networked Planet: Management Beyond 2000, 2000

A Logic Programming Approach to Conflict Resolution in Policy Management.
Proceedings of the KR 2000, 2000

Policy Evaluation for Network Management.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

Formalizing (and Reasoning About) the Specifications of Workflows.
Proceedings of the Cooperative Information Systems, 7th International Conference, 2000

Distributed action plans in an agent based network management system.
Proceedings of the Fourth International Conference on Autonomous Agents, 2000

1999
Editorial - Logic Programming with Non-monotonic Semantics: Representing Knowledge and its Computation.
Ann. Math. Artif. Intell., 1999

A Policy-based Network Management System.
Proceedings of the International Conference on Artificial Intelligence, 1999

A Policy Description Language.
Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, 1999

1997
Minimal and Consistent Evolution of Knowledge Bases.
Journal of Applied Non-Classical Logics, 1997

Qualifying Answers According to User Needs and Preferences.
Fundam. Inform., 1997

Abductive Consequence Relations.
Artif. Intell., 1997

Defeasible Specifications in Action Theories.
Proceedings of the Fifteenth International Joint Conference on Artificial Intelligence, 1997

Formal Characterizations of Active Databases: Part II.
Proceedings of the Deductive and Object-Oriented Databases, 5th International Conference, 1997

From Action Theories to Updates, Transactions, Triggers and Agents - A Tutorial.
Proceedings of the Deductive and Object-Oriented Databases, 5th International Conference, 1997

Adding Knowledge to the Action Description Language A.
Proceedings of the Fourteenth National Conference on Artificial Intelligence and Ninth Innovative Applications of Artificial Intelligence Conference, 1997

1996
Semantics for Update Rule Programs and Implementations in a Relational Database Management System.
ACM Trans. Database Syst., 1996

A High-Level Petri Net for Goal-Directed Semantics of Horn Clause Logic.
IEEE Trans. Knowl. Data Eng., 1996

Abductive Change Operators.
Fundam. Inform., 1996

Computation of Best Bounds of Probabilities from Uncertain Data.
Computational Intelligence, 1996

Formal Characterization of Active Databases.
Proceedings of the Logic in Databases, 1996

Meta Updater: An Interactive Tool for Minimal View Updates in Knowledge Bases.
Proceedings of the Eigth International Conference on Tools with Artificial Intelligence, 1996

1995
An Extended Petri Net Model for Normal Logic Programs.
IEEE Trans. Knowl. Data Eng., 1995

Dynamic Maintenance of the Transitive Closure in Disjunctive Graphs.
Ann. Math. Artif. Intell., 1995

An Experimental Distributed Deductive Database System.
Proceedings of the Deductive and Object-Oriented Databases, 1995

1994
A Semantics for a Class of Non-Deterministic and Causal Production System Programs.
J. Autom. Reasoning, 1994

Qualified Answers That Reflect User Needs and Preferences.
Proceedings of the VLDB'94, 1994

A Resolution-based Procedure for Default Theories with Extensions.
Proceedings of the Non-Monotonic Extensions of Logic Programming (NMELP'94), 1994

Assigning Function to CDS Through Qualified Query Answering: Beyond Alignment and Motifs.
Proceedings of the Second International Conference on Intelligent Systems for Molecular Biology, 1994

1993
Processing Negation and Disjunction in Logic Programs Through Integrity Constraints.
J. Intell. Inf. Syst., 1993

View Updates in Stratified Disjunctive Databases.
J. Autom. Reasoning, 1993

Disjunctive LP + Integrity Constraints = Stable Model Semantics.
Ann. Math. Artif. Intell., 1993

A Proof Procedure for Default Theories with Extensions.
Proceedings of the Logic Programming, 1993

Using Semantic Information for Processing Negation and Disjunction in Logic Programs.
Proceedings of the Methodologies for Intelligent Systems, 7th International Symposium, 1993

1992
Relating Minimal Models and Pre-Requisite-Free Normal Defaults.
Inf. Process. Lett., 1992

Generalized Disjunctive Well-Founded Semantics for Logic Programs.
Ann. Math. Artif. Intell., 1992

A Petri Net Semantics for Logic Programs with Negation.
Proceedings of the SEKE'92, 1992

Minimizing Indefinite Information in Disjunctive Deductive Databases.
Proceedings of the Database Theory, 1992

Foundations of disjunctive logic programming.
Logic Programming, MIT Press, ISBN: 978-0-262-12165-1, 1992

1991
Semantics of Horn and Disjunctive Logic Programs.
Theor. Comput. Sci., 1991

WF³: A Semantics for Negation in Normal Disjunctive Logic Programs.
Proceedings of the Methodologies for Intelligent Systems, 6th International Symposium, 1991

Theory of Disjunctive Logic Programs.
Proceedings of the Computational Logic - Essays in Honor of Alan Robinson, 1991

1990
On Constructive Negation for Disjunctive Logic Programs.
Proceedings of the Logic Programming, Proceedings of the 1990 North American Conference, Austin, Texas, USA, October 29, 1990

Generalized Well-founded Semantics for Logic Programs (Extended Abstract).
Proceedings of the 10th International Conference on Automated Deduction, 1990

1989
Weak Generalized Closed World Assumption.
J. Autom. Reasoning, 1989

Skeptical Reasoning and Disjunctive Programs.
Proceedings of the 1st International Conference on Principles of Knowledge Representation and Reasoning (KR'89). Toronto, 1989

Extending the Semantics of Logic Programs to Disjunctive Logic Programs.
Proceedings of the Logic Programming, 1989

1988
Weak Completion Theory for Non-Horn Programs.
Proceedings of the Logic Programming, 1988

A Metaprogramming Approach to Semantically Optimize Queries in Deduktive Databases.
Expert Database Conf., 1988


  Loading...