Follow
Piero Bonatti
Piero Bonatti
Università di Napoli Federico II
No verified email
Title
Cited by
Cited by
Year
TRBAC: A temporal role-based access control model
E Bertino, PA Bonatti, E Ferrari
Proceedings of the fifth ACM workshop on Role-based access control, 21-30, 2000
13542000
An algebra for composing access control policies
P Bonatti, S De Capitani di Vimercati, P Samarati
ACM Transactions on Information and System Security (TISSEC) 5 (1), 1-35, 2002
4532002
A uniform framework for regulating service access and information release on the web
PA Bonatti, P Samarati
Journal of Computer Security 10 (3), 241-271, 2002
3012002
Regulating service access and information release on the web
P Bonatti, P Samarati
Proceedings of the 7th ACM conference on Computer and communications …, 2000
2892000
Heterogeneous agent systems
VS Subrahmanian
MIT press, 2000
2422000
Driving and monitoring provisional trust negotiation with metapolicies
P Bonatti, D Olmedilla
Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005
2112005
On optimal service selection
PA Bonatti, P Festa
Proceedings of the 14th international conference on World Wide Web, 530-538, 2005
1742005
Knowledge graphs: New directions for knowledge representation on the semantic web (dagstuhl seminar 18371)
PA Bonatti, S Decker, A Polleres, V Presutti
Dagstuhl reports 8 (9), 2019
1702019
The complexity of circumscription in DLs
PA Bonatti, C Lutz, F Wolter
Journal of Artificial Intelligence Research 35, 717-773, 2009
1612009
Description Logics with Circumscription.
PA Bonatti, C Lutz, F Wolter
KR, 400-410, 2006
1522006
Foundations of secure deductive databases
PA Bonatti, S Kraus, VS Subrahmanian
IEEE Transactions on Knowledge and Data Engineering 7 (3), 406-422, 1995
1381995
The complexity of enriched mu-calculi
PA Bonatti, C Lutz, A Murano, MY Vardi
Logical Methods in Computer Science 4, 2008
1352008
An integration of reputation-based and policy-based trust management
P Bonatti, C Duma, D Olmedilla, N Shahmehri
W9: The Semantic Web and Policy Workshop (SWPW) 2 (14), 136, 2007
1232007
Reasoning with infinite stable models
PA Bonatti
Artificial Intelligence 156 (1), 75-111, 2004
1202004
A modular approach to composing access control policies
P Bonatti, S de Capitani di Vimercati, P Samarati
Proceedings of the 7th ACM conference on Computer and communications …, 2000
1202000
Semantic web policies–a discussion of requirements and research issues
PA Bonatti, C Duma, N Fuchs, W Nejdl, D Olmedilla, J Peer, N Shahmehri
The Semantic Web: Research and Applications: 3rd European Semantic Web …, 2006
1162006
Controlled query evaluation for enforcing confidentiality in complete information systems
J Biskup, P Bonatti
International Journal of Information Security 3, 14-27, 2004
1162004
A new semantics for overriding in description logics
PA Bonatti, M Faella, IM Petrova, L Sauro
Artificial Intelligence 222, 1-48, 2015
982015
A multi-similarity algebra
S Adali, P Bonatti, ML Sapino, VS Subrahmanian
Proceedings of the 1998 ACM SIGMOD international conference on Management of …, 1998
971998
Towards an integration of answer set and constraint solving
S Baselice, PA Bonatti, M Gelfond
Logic Programming: 21st International Conference, ICLP 2005, Sitges, Spain …, 2005
952005
The system can't perform the operation now. Try again later.
Articles 1–20