Search filters

List of works by Jorge Lobo

A Datalog Framework for Modeling Relationship-based Access Control Policies

A Negotiation Framework for Negotiation of Coalition Policies

A Role-Based Infrastructure for the Management of Dynamic Communities

A Similarity Measure for Comparing XACML Policies

A declarative approach to distributed computing: Specification, execution and analysis

A high-level Petri net for goal-directed semantics of Horn clause logic

A resolution-based procedure for default theories with extensions

A semantics for a class of non-deterministic and causal production system programs

Access control policy combining

Adversaries' Holy Grail

article published in 2011

An Algebra for Integration and Analysis of Ponder2 Policies

An algebra for fine-grained integration of XACML policies

An approach to evaluate policy similarity

scholarly article published 2007

An architecture for distributed video applications based on declarative networking

An extended Petri net model for normal logic programs

An obligation model bridging access control policies and privacy policies

Authorization and Obligation Policies in Dynamic Systems

Automating role-based provisioning by learning from examples

C2: The Case for a Network Configuration Checking Language

D-algebra for composing access control policy decisions

Declarative Distributed Computing

Declarative Framework for Specification, Simulation and Analysis of Distributed Applications

Decomposition techniques for policy refinement

Detecting distributed signature-based intrusion: The case of multi-path routing attacks

Disjunctive LP+integrity constraints= stable model semantics

Dynamic graph query primitives for SDN-based cloudnetwork management

Dynamic maintenance of the transitive closure in disjunctive graphs

EXAM: An Environment for Access Control Policy Analysis and Management

EXAM: a comprehensive environment for the analysis of access control policies

Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation

Evaluating role mining algorithms

Experimental results on the use of genetic algorithms for scaling virtualized network functions

Expressive policy analysis with enhanced system dynamicity

Extending the CIM-SPL policy language with RBAC for distributed management systems in the WBEM infrastructure

FORMALIZING AND REASONING ABOUT THE REQUIREMENTS SPECIFICATIONS OF WORKFLOW SYSTEMS

Fine-grained integration of access control policies

Firewall Configuration Policies for the Specification and Implementation of Private Zones

Formal characterization of active databases

Generalized disjunctive well-founded semantics for logic programs

Generalized well-founded semantics for logic programs

Generative Policies for Coalition Systems - A Symbolic Learning Framework

Introduction

Introduction

Issues in Designing a Policy Language for Distributed Management of IT Infrastructures

Jack Minker ? A profile

Learning Stochastic Models of Information Flow

Mining Roles with Multiple Objectives

Mining roles with noisy data

Network and Service Management for Cloud Computing and Data Centers: A Report on CNSM 2012

On Security Policy Migrations

Optimal Placement of Security Resources for the Internet of Things

Optimizing Resource Allocation for Virtualized Network Functions in a Cloud Center Using Genetic Algorithms

Policy Ratification

Policy Technologies for Security Management in Coalition Networks

Policy decomposition for collaborative access control

Policy refinement of network services for MANETs

Policy-Aware Service Composition in Sensor Networks

article

Policy-based management of networked computing systems

Polisma - A Framework for Learning Attribute-Based Access Control Policies

Practical risk aggregation in RBAC models

Privacy-Aware Role-Based Access Control

Privacy-aware role based access control

Privacy-aware role-based access control

Processing negation and disjunction in logic programs through integrity constraints

Reasoning about Policy Behavior in Logic-Based Trust Management Systems: Some Complexity Results and an Operational Framework

scholarly article published July 2015

Redundancy as a Measure of Fault-Tolerance for the Internet of Things: A Review

Refinement of History-Based Policies

Relating minimal models and pre-requisite-free normal defaults

Relationship‐based access control: More than a social network access control model

Risk-based access control systems built on fuzzy inferences

Secure Dynamic Community Establishment in Coalitions

Security policy refinement using data integration

Semantics of Horn and disjunctive logic programs

Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios

Shortfall-Based Optimal Security Provisioning for Internet of Things

The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment

Towards Collaborative Query Planning in Multi-party Database Networks

article by Mingyi Zhao et al published 2015 in Lecture Notes in Computer Science

Towards an integrated approach to role engineering

Towards making network function virtualization a cloud computing service

Usability meets access control

View updates in stratified disjunctive databases

Visualization for Access Control Policy Analysis Results Using Multi-level Grids

WF 3: A semantics for negation in normal disjunctive logic programs

Weak Generalized Closed World Assumption