TRBAC: A temporal role-based access control model E Bertino, PA Bonatti, E Ferrari Proceedings of the fifth ACM workshop on Role-based access control, 21-30, 2000 | 1354 | 2000 |
An algebra for composing access control policies P Bonatti, S De Capitani di Vimercati, P Samarati ACM Transactions on Information and System Security (TISSEC) 5 (1), 1-35, 2002 | 453 | 2002 |
A uniform framework for regulating service access and information release on the web PA Bonatti, P Samarati Journal of Computer Security 10 (3), 241-271, 2002 | 301 | 2002 |
Regulating service access and information release on the web P Bonatti, P Samarati Proceedings of the 7th ACM conference on Computer and communications …, 2000 | 289 | 2000 |
Heterogeneous agent systems VS Subrahmanian MIT press, 2000 | 242 | 2000 |
Driving and monitoring provisional trust negotiation with metapolicies P Bonatti, D Olmedilla Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005 | 211 | 2005 |
On optimal service selection PA Bonatti, P Festa Proceedings of the 14th international conference on World Wide Web, 530-538, 2005 | 174 | 2005 |
Knowledge graphs: New directions for knowledge representation on the semantic web (dagstuhl seminar 18371) PA Bonatti, S Decker, A Polleres, V Presutti Dagstuhl reports 8 (9), 2019 | 170 | 2019 |
The complexity of circumscription in DLs PA Bonatti, C Lutz, F Wolter Journal of Artificial Intelligence Research 35, 717-773, 2009 | 161 | 2009 |
Description Logics with Circumscription. PA Bonatti, C Lutz, F Wolter KR, 400-410, 2006 | 152 | 2006 |
Foundations of secure deductive databases PA Bonatti, S Kraus, VS Subrahmanian IEEE Transactions on Knowledge and Data Engineering 7 (3), 406-422, 1995 | 138 | 1995 |
The complexity of enriched mu-calculi PA Bonatti, C Lutz, A Murano, MY Vardi Logical Methods in Computer Science 4, 2008 | 135 | 2008 |
An integration of reputation-based and policy-based trust management P Bonatti, C Duma, D Olmedilla, N Shahmehri W9: The Semantic Web and Policy Workshop (SWPW) 2 (14), 136, 2007 | 123 | 2007 |
Reasoning with infinite stable models PA Bonatti Artificial Intelligence 156 (1), 75-111, 2004 | 120 | 2004 |
A modular approach to composing access control policies P Bonatti, S de Capitani di Vimercati, P Samarati Proceedings of the 7th ACM conference on Computer and communications …, 2000 | 120 | 2000 |
Semantic web policies–a discussion of requirements and research issues PA Bonatti, C Duma, N Fuchs, W Nejdl, D Olmedilla, J Peer, N Shahmehri The Semantic Web: Research and Applications: 3rd European Semantic Web …, 2006 | 116 | 2006 |
Controlled query evaluation for enforcing confidentiality in complete information systems J Biskup, P Bonatti International Journal of Information Security 3, 14-27, 2004 | 116 | 2004 |
A new semantics for overriding in description logics PA Bonatti, M Faella, IM Petrova, L Sauro Artificial Intelligence 222, 1-48, 2015 | 98 | 2015 |
A multi-similarity algebra S Adali, P Bonatti, ML Sapino, VS Subrahmanian Proceedings of the 1998 ACM SIGMOD international conference on Management of …, 1998 | 97 | 1998 |
Towards an integration of answer set and constraint solving S Baselice, PA Bonatti, M Gelfond Logic Programming: 21st International Conference, ICLP 2005, Sitges, Spain …, 2005 | 95 | 2005 |