Piero A. Bonatti

According to our database1, Piero A. Bonatti authored at least 135 papers between 1990 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Data Privacy Vocabularies and Controls: Semantic Web for Transparency and Privacy.
Proceedings of the Workshop on Semantic Web for Social Good co-located with 17th International Semantic Web Conference, 2018

On the Logical Properties of the Description Logic DL^N (Extended abstract).
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Fast Compliance Checking in an OWL2 Fragment.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

A Scalable Consent, Transparency and Compliance Architecture.
Proceedings of the Semantic Web: ESWC 2018 Satellite Events, 2018

2017
On the logical properties of the nonmonotonic description logic DLN.
Artif. Intell., 2017

Inference-proof Data Filtering for a Probabilistic Setting.
Proceedings of the 5th Workshop on Society, 2017

Transparent Personal Data Processing: The Road Ahead.
Proceedings of the Computer Safety, Reliability, and Security, 2017

A New Semantics for Overriding in Description Logics (Extended Abstract).
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

2016
Generalized Agent-mediated Procurement Auctions.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

2015
Event-driven RBAC.
Journal of Computer Security, 2015

Optimizing the computation of overriding.
CoRR, 2015

A new semantics for overriding in description logics.
Artif. Intell., 2015

Optimizing the Computation of Overriding.
Proceedings of the Semantic Web - ISWC 2015, 2015

Optimized Construction of Secure Knowledge-Base Views.
Proceedings of the 28th International Workshop on Description Logics, 2015

Decidability of Circumscribed Description Logics Revisited.
Proceedings of the Advances in Knowledge Representation, Logic Programming, and Abstract Argumentation, 2015

2014
On the integration of trust with negotiation, argumentation and semantics.
Knowledge Eng. Review, 2014

The Complexity of Circumscription in DLs.
CoRR, 2014

Partial Preferences for Mediated Bargaining.
Proceedings of the Proceedings 2nd International Workshop on Strategic Reasoning, 2014

Defeasible Inclusions in Low-Complexity DLs.
CoRR, 2014

Optimality and Complexity of Inference-Proof Data Filtering and CQE.
Proceedings of the Computer Security - ESORICS 2014, 2014

A Mechanism for Ontology Confidentiality.
Proceedings of the 29th Italian Conference on Computational Logic, 2014

E-Auctions for Multi-Cloud Service Provisioning.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
An Integrated Formal Approach to Usage Control.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

A Confidentiality Model for Ontologies.
Proceedings of the Semantic Web - ISWC 2013, 2013

ERBAC: event-driven RBAC.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Auctions for Partial Heterogeneous Preferences.
Proceedings of the Mathematical Foundations of Computer Science 2013, 2013

2012
Defaults in Description Logics: So Simple, So Difficult.
Proceedings of the 2012 International Workshop on Description Logics, 2012

2011
Logic-Based Authorization Languages.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Robust and scalable Linked Data reasoning incorporating provenance and trust annotations.
J. Web Sem., 2011

Defeasible Inclusions in Low-Complexity DLs.
J. Artif. Intell. Res., 2011

On the decidability of FDNC programs.
Intelligenza Artificiale, 2011

On the Complexity of EL with Defeasible Inclusions.
Proceedings of the IJCAI 2011, 2011

Towards a Mechanism for Incentivating Privacy.
Proceedings of the Computer Security - ESORICS 2011, 2011

Adding Default Attributes to EL++.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

2010
A decidable subclass of finitary programs.
TPLP, 2010

A Rule-Based Trust Negotiation System.
IEEE Trans. Knowl. Data Eng., 2010

A decidable subclass of finitary programs
CoRR, 2010

EL\mathcal{EL} with Default Attributes and Overriding.
Proceedings of the Semantic Web - ISWC 2010 - 9th International Semantic Web Conference, 2010

Reactive Policies for the Semantic Web.
Proceedings of the Semantic Web: Research and Applications, 2010

Datalog for Security, Privacy and Trust.
Proceedings of the Datalog Reloaded - First International Workshop, 2010

Answer Set Programming.
Proceedings of the A 25-Year Perspective on Logic Programming: Achievements of the Italian Association for Logic Programming, 2010

2009
Rule-Based Policy Representations and Reasoning.
Proceedings of the Semantic Techniques for the Web, The REWERSE Perspective, 2009

On finitely recursive programs.
TPLP, 2009

The Complexity of Circumscription in DLs.
J. Artif. Intell. Res., 2009

On finitely recursive programs
CoRR, 2009

Policy Based Protection and Personalized Generation of Web Content.
Proceedings of the 2009 Latin American Web Congress, 2009

Defeasible Inclusions in Low-Complexity DLs: Preliminary Notes.
Proceedings of the IJCAI 2009, 2009

A Comparison of Terminological and Rule-based Policy Languages.
Proceedings of the ESWC2009 Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009) Heraklion, 2009

2008
The Complexity of Enriched Mu-Calculi.
Logical Methods in Computer Science, 2008

The Complexity of Enriched Mu-Calculi
CoRR, 2008

Erratum to: Reasoning with infinite stable models [Artificial Intelligence 156 (1) (2004) 75-111].
Artif. Intell., 2008

Protune: A Framework for Semantic Web Policies.
Proceedings of the Poster and Demonstration Session at the 7th International Semantic Web Conference (ISWC2008), 2008

A Trust Management Package for Policy-Driven Protection & Personalization of Web Content.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Comparing Rule-Based Policies.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security.
Proceedings of the Logic Programming, 24th International Conference, 2008

Composing Normal Programs with Function Symbols.
Proceedings of the Logic Programming, 24th International Conference, 2008

On the decidability of FDNC programs.
Proceedings of the Il Milione (i.e. 2ˆ6), 2008

Credulous Resolution for Answer Set Programming.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

2007
Rule-based Policy Specification.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Controlled query evaluation with open queries for a decidable relational submodel.
Ann. Math. Artif. Intell., 2007

Nonmonotonic Description Logics - Requirements, Theory, and Implementations.
Proceedings of the Automated Reasoning with Analytic Tableaux and Related Methods, 2007

Rule-Based Policy Representation and Reasoning for the Semantic Web.
Proceedings of the Reasoning Web, 2007

On Interoperable Trust Negotiation Strategies.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

On Finitely Recursive Programs.
Proceedings of the Logic Programming, 23rd International Conference, 2007

2006
Description Logics with Circumscription.
Proceedings of the Proceedings, 2006

The Complexity of Enriched µ-Calculi.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

Controlled Query Evaluation with Open Queries for a Decidable Relational Submodel.
Proceedings of the Foundations of Information and Knowledge Systems, 2006

Semantic Web Policies - A Discussion of Requirements and Research Issues.
Proceedings of the Semantic Web: Research and Applications, 2006

Advanced Policy Explanations on the Web.
Proceedings of the ECAI 2006, 17th European Conference on Artificial Intelligence, August 29, 2006

2005
On optimal service selection.
Proceedings of the 14th international conference on World Wide Web, 2005

Driving and Monitoring Provisional Trust Negotiation with Metapolicies.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

Towards an Integration of Answer Set and Constraint Solving.
Proceedings of the Logic Programming, 21st International Conference, 2005

Rule Languages for Security and Privacy in Cooperative Systems.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

PeerAccess: a logic for distributed authorization.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

A Preliminary Report on Integrating of Answer Set and Constraint Solving.
Proceedings of the Answer Set Programming, 2005

2004
Controlled query evaluation for enforcing confidentiality in complete information systems.
Int. J. Inf. Sec., 2004

Controlled Query Evaluation for Known Policies by Combining Lying and Refusal.
Ann. Math. Artif. Intell., 2004

On the undecidability of logics with converse, nominals, recursion and counting.
Artif. Intell., 2004

Reasoning with infinite stable models.
Artif. Intell., 2004

On the Decidability of Containment of Recursive Datalog Queries - Preliminary report.
Proceedings of the Twenty-third ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2004

Abduction over Unbounded Domains via ASP.
Proceedings of the 16th Eureopean Conference on Artificial Intelligence, 2004

2003
Secure Agents.
Ann. Math. Artif. Intell., 2003

Some Complexity Results on Fuzzy Description Logics.
Proceedings of the Fuzzy Logic and Applications, 5th International Workshop, 2003

Towards Flexible Credential Negotiation Protocols.
Proceedings of the Security Protocols, 2003

An Ontology-Extended Relational Algebra.
Proceedings of the 2003 IEEE International Conference on Information Reuse and Integration, 2003

On the Undecidability of Description and Dynamic Logics with Recursion and Counting.
Proceedings of the IJCAI-03, 2003

Logics for Authorization and Security.
Proceedings of the Logics for Emerging Applications of Databases [outcome of a Dagstuhl seminar], 2003

Finitary Open Logic Program.
Proceedings of the Answer Set Programming, 2003

2002
Sequent calculi for propositional nonmonotonic logics.
ACM Trans. Comput. Log., 2002

An algebra for composing access control policies.
ACM Trans. Inf. Syst. Secur., 2002

A Uniform Framework for Regulating Service Access and Information Release on the Web.
Journal of Computer Security, 2002

Abduction, ASP and Open Logic Programs
CoRR, 2002

Abduction, ASP and open logic programs.
Proceedings of the 9th International Workshop on Non-Monotonic Reasoning (NMR 2002), 2002

Towards Service Description Logics.
Proceedings of the Logics in Artificial Intelligence, European Conference, 2002

Reasoning with Infinite Stable Models II: Disjunctive Programs.
Proceedings of the Logic Programming, 18th International Conference, 2002

Controlled Query Evaluation for Known Policies by Combining Lying and Refusal.
Proceedings of the Foundations of Information and Knowledge Systems, 2002

Confidentiality Policies and Their Enforcement for Controlled Query Evaluation.
Proceedings of the Computer Security, 2002

2001
TRBAC: A temporal role-based access control model.
ACM Trans. Inf. Syst. Secur., 2001

Resolution for Skeptical Stable Model Semantics.
J. Autom. Reasoning, 2001

Lying versus refusal for known potential secrets.
Data Knowl. Eng., 2001

An Access Control Model for Data Archives.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Prototypes for Reasoning with Infinite Stable Models and Function Symbols.
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 2001

Reasoning with Open Logic Programs.
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 2001

Reasoning with infinite stable models.
Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence, 2001

A Component-Based Architecture for Secure Data Publication.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Temporal Authorization Bases: From Specification to Integration.
Journal of Computer Security, 2000

TRBAC: a temporal role-based access control model.
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000

A modular approach to composing access control policies.
Proceedings of the CCS 2000, 2000

Regulating service access and information release on the Web.
Proceedings of the CCS 2000, 2000

Heterogenous Active Agents
MIT Press, ISBN: 0-262-19436-8, 2000

1999
Specifying and Computing Hierarchies of Temporal Authorizations.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

Specifying and computing hierarchies of temporal authorizations.
Proceedings of the 1999 Joint Conference on Declarative Programming, 1999

1998
A Multi-Similarity Algebra.
Proceedings of the SIGMOD 1998, 1998

Data-Security in Heterogeneous Agent Systems.
Proceedings of the Cooperative Information Agents II, 1998

1997
Merging Heterogeneous Security Orderings.
Journal of Computer Security, 1997

A Sequent Calculus for Skeptical Default Logic.
Proceedings of the Automated Reasoning with Analytic Tableaux and Related Methods, 1997

Resolution for Skeptical Stable Semantics.
Proceedings of the Logic Programming and Nonmonotonic Reasoning, 1997

A Sequent Calculus for Circumscription.
Proceedings of the Computer Science Logic, 11th International Workshop, 1997

A Constructive Negation for Transition System Specifications.
Proceedings of the 1997 Joint Conf. on Declarative Programming, 1997

1996
Querying Disjunctive Databases Through Nonmonotonic Logics.
Theor. Comput. Sci., 1996

Sequent Calculi for Default and Autoepistemic Logics.
Proceedings of the Theorem Proving with Analytic Tableaux and Related Methods, 1996

Merging Heterogeneous Security Orderings.
Proceedings of the Computer Security, 1996

1995
Foundations of Secure Deductive Databases.
IEEE Trans. Knowl. Data Eng., 1995

A Three-Valued Formalization of Provability.
J. Log. Comput., 1995

Autoepistemic Logics as a Unifying Framework for the Semantics of Logic Programs.
J. Log. Program., 1995

Querying Disjunctive Database Through Nonmonotonic Logics.
Proceedings of the Database Theory, 1995

Three-Valued Semantics for Extended Logic Programs.
Proceedings of the 1995 Joint Conference on Declarative Programming, 1995

1994
Autoepistemic Logic Programming.
J. Autom. Reasoning, 1994

1993
Autoepistemic Logic Programming.
Proceedings of the Logic Programming and Non-monotonic Reasoning, 1993

1992
Model Theoretic Semantics for Demo.
Proceedings of the Meta-Programming in Logic, 3rd International Workshop, 1992

Autoepistemic Logics as a Unifying Framework for the Semantics of Logic Programs.
Proceedings of the Logic Programming, 1992

Declarative Foundations of Secure Deductive Databases.
Proceedings of the Database Theory, 1992

1991
Beliefs as Stable Conjectures.
Proceedings of the Logic Programming and Non-monotonic Reasoning, 1991

A Family of Three-Valued Autoepistemic Logics.
Proceedings of the Trends in Artificial Intelligence, 1991

1990
A More General Solution to the Multiple Expansion Problem.
Proceedings of the Workshop Logic Programming and Non-Monotonic Logic, 1990


  Loading...