Select Publications
Books
, 2004, Logics for Emerging Applications od Databases, Van Der Meyden R; Chomicki J; Saake G, (eds.), Springer-Verlag, Berlin
Book Chapters
2011, 'Two Applications of Epistemic Logic in Computer Security', in VanBenthem J; Gupta A; Parikh R (ed.), PROOF, COMPUTATION AND AGENCY: LOGIC AT THE CROSSROADS, SPRINGER, pp. 133 - 144, http://dx.doi.org/10.1007/978-94-007-0080-2_9
,2007, 'Two applications of epistemic logic in computer science', in Gupta A (ed.), Logic at the crossroads, Allied publishers, New Delhi, pp. 207 - 221
,Journal articles
2022, 'A Formal Treatment of Contract Signature', IEEE Transactions on Services Computing, 15, pp. 3101 - 3114, http://dx.doi.org/10.1109/TSC.2021.3101833
,2020, 'Undecidable Cases of Model Checking Probabilistic Temporal-Epistemic Logic', ACM Transactions on Computational Logic, 21, http://dx.doi.org/10.1145/3409250
,2018, 'An epistemic strategy logic', ACM Transactions on Computational Logic, 19, http://dx.doi.org/10.1145/3233769
,2017, 'Dynamic intransitive noninterference revisited', Formal Aspects of Computing, 29, pp. 1087 - 1120, http://dx.doi.org/10.1007/s00165-017-0430-6
,2016, 'The complexity of synchronous notions of information flow security', Theoretical Computer Science, 631, pp. 16 - 42, http://dx.doi.org/10.1016/j.tcs.2016.03.011
,2016, 'The complexity of synchronous notions of information flow security', Theoretical Computer Science, 631, pp. 16 - 42, http://dx.doi.org/10.1016/j.tcs.2016.03.011
,2015, 'Using architecture to reason about information security', ACM Transactions on Information and System Security, 18, http://dx.doi.org/10.1145/2829949
,2015, 'What, indeed, is intransitive noninterference?1', Journal of Computer Security, 23, pp. 197 - 228, http://dx.doi.org/10.3233/JCS-140516
,2013, 'Information Flow in Systems with Schedulers (Part I:Definitions)', Theoretical Computer Science, 467, pp. 68 - 88, http://dx.doi.org/10.1016/j.tcs.2012.10.047
,2013, 'Information flow in systems with schedulers, Part II: Refinement', Theoretical Computer Science, 484, pp. 70 - 92, http://dx.doi.org/10.1016/j.tcs.2013.01.002
,2012, 'Architectural Refinement and Notions of Intransitive Noninterference', Formal Aspects of Computing, 24, pp. 769 - 792, http://dx.doi.org/10.1007/s00165-012-0247-2
,2012, 'Consistent assignment of quantum probabilities', Journal of Physics A: Mathematical and Theoretical, 45, pp. 1751 - 8113, http://dx.doi.org/10.1088/1751-8113/45/7/075304
,2010, 'A comparison of semantic models for noninterference', Theoretical Computer Science, 411, pp. 4123 - 4147, http://dx.doi.org/10.1016/j.tcs.2010.08.013
,2009, 'Architectural Refinement and Notions of Intransitive Noninterference', Engineering Secure Software and Systems
,2007, 'A comparison of semantic models for noninterference', 4th international workshop on Formal aspects in security and trust
,2007, 'Algorithmic Verification of Noninterference Properties', Electronic Notes in Theoretical Computer Science, 168, pp. 61 - 75, http://dx.doi.org/10.1016/j.entcs.2006.11.002
,2006, 'Model Checking Russian Cards', Electronic Notes in Theoretical Computer Science, 149, pp. 105 - 123, http://dx.doi.org/10.1016/j.entcs.2005.07.029
,2004, 'Complete Axiomatizations for Logics of Knowledge and Time', Siam Journal on Computing, 33, pp. 674 - 703
,2003, 'A Logical Reconstruction of SPKI', Journal of Computer Security, 11,, pp. 581 - 614
,2003, 'Complete Axiomatizations for Reasoning about Knowledge and Branching Time', Studia Logica, 75, pp. 93 - 123
,2001, 'CRC for smart internet technology - An overview', Telecommunications Journal of Australia, 51, pp. 19 - 23
,2001, 'A logic for SDSI`s Linked Local Name Spaces', Journal of Computer Security, pp. 105 - 142
,2000, 'Containment and Optimization of Object Preserving Conjunctive Queries', Siam Journal on Computing, pp. 1371 - 1400
,2000, 'Knowledge In Multi-agent Systems: Initial Configurations and Broadcast', ACM Transactions on Computational Logic, 1, pp. 247 - 284
,2000, 'Predicate Boundedness of Linear Monadic Datalog is in PSPACE', International Journal of Foundations of Computer Science, 11, pp. 591 - 612
,1998, 'Common Knowledge and Update in Finite Environments', Information and Computation, 140, pp. 115 - 157, http://dx.doi.org/10.1006/inco.1997.2679
,1997, 'The Complexity of Querying Indefinite Data about Linearly Ordered Domains', Journal of Computer and System Sciences, 54, pp. 113 - 135, http://dx.doi.org/10.1006/jcss.1997.1455
,1996, 'The dynamic logic of permission', Journal of Logic and Computation, 6, pp. 465 - 479, http://dx.doi.org/10.1093/logcom/6.3.465
,1995, 'Complexity tailored design: A new design methodology for databases with incomplete information', Journal of Computer and System Sciences, 51, pp. 405 - 432, http://dx.doi.org/10.1006/jcss.1995.1079
,1993, 'Recursively indefinite databases', Theoretical Computer Science, 116, pp. 151 - 194, http://dx.doi.org/10.1016/0304-3975(93)90223-G
,Conference Papers
2024, 'A Knowledge-Based Analysis of Intersection Protocols', in Leibniz International Proceedings in Informatics, LIPIcs, http://dx.doi.org/10.4230/LIPIcs.DISC.2024.2
,2023, 'Optimal Eventual Byzantine Agreement Protocols with Omission Failures', in Proceedings of the Annual ACM Symposium on Principles of Distributed Computing, pp. 244 - 252, http://dx.doi.org/10.1145/3583668.3594573
,2021, 'Architecture for Smart SAFE Contracts', in 2021 3rd Conference on Blockchain Research and Applications for Innovative Networks and Services, BRAINS 2021, pp. 145 - 148, http://dx.doi.org/10.1109/BRAINS52497.2021.9569831
,2019, 'On the specification and verification of atomic swap smart contracts (extended abstract)', in ICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency, pp. 176 - 179, http://dx.doi.org/10.1109/BLOC.2019.8751250
,2017, 'An Epistemic Foundation for Authentication Logics (Extended Abstract)', in Lang J (ed.), Proceedings of the Conference on Theoretical Aspects of Knowledge and Rationality, Liverpool, UK, presented at Conference on Theoretical Aspects of Knowledge and Rationality, Liverpool, UK, 24 July 2017 - 26 July 2017, http://dx.doi.org/10.4204/EPTCS.251.21
,2017, 'Optimizing epistemic model checking using conditional independence (extended abstract)', in Electronic Proceedings in Theoretical Computer Science, EPTCS, Open Publishing Association, ENGLAND, Univ Liverpool, Liverpool, pp. 398 - 414, presented at 16th Conference on Theoretical Aspects of Rationality and Knowledge (TARK), ENGLAND, Univ Liverpool, Liverpool, 24 July 2017 - 26 July 2017, http://dx.doi.org/10.4204/EPTCS.251.29
,2016, 'On reductions from multi-domain noninterference to the two-level case', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 520 - 537, http://dx.doi.org/10.1007/978-3-319-45744-4_26
,2015, 'The complexity of approximations for epistemic synthesis (extended abstract)', in Cerny P; Kuncak V; Parthasarathy M (eds.), Electronic Proceedings in Theoretical Computer Science, EPTCS, Open Publishing Association, San Francisco, CA, USA, pp. 120 - 137, presented at Workshop on Synthesis, San Francisco, CA, USA, 18 July 2015 - 18 July 2015, http://dx.doi.org/10.4204/EPTCS.202.9
,2015, 'Undecidable cases of model checking probabilistic temporal-epistemic logic (extended abstract)', in Electronic Proceedings in Theoretical Computer Science, EPTCS, Open Publishing Association, PA, Carnegie Mellon Univ, Pittsburgh, pp. 264 - 282, presented at 15th Conference on Theoretical Aspects of Rationality and Knowledge (TARK), PA, Carnegie Mellon Univ, Pittsburgh, 04 June 2015 - 06 June 2015, http://dx.doi.org/10.4204/EPTCS.215.19
,2014, 'A temporal logic of strategic knowledge', in Proceedings 14th International Conference on Principles of Knowledge Representation and Reasoning, AAAI Publicatons, Vienna, Austria, presented at 14th International Conference on Principles of Knowledge Representation and Reasoning, Vienna, Austria, 20 July 2014 - 24 July 2014, http://www.cse.unsw.edu.au/~xiaoweih/papers/obs_strat.pdf
,2014, 'Symbolic Synthesis for Epistemic Specifications with Observational Semantics', in Tools and Algorithms for the Construction and Analysis of Systems, Springer Berlin Heidelberg, Grenoble, France, pp. 455 - 469, presented at 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Grenoble, France, 05 April 2014 - 13 April 2014, http://dx.doi.org/10.1007/978-3-642-54862-8_39
,2014, 'An Epistemic Strategy Logic', in Proceedings 2nd International Workshop on Strategic Reasoning, EPTCS, Grenoble, France, pp. 35 - 41, presented at 2nd International Workshop on Strategic Reasoning, Grenoble, France, 05 April 2014 - 06 April 2014, http://dx.doi.org/10.4204/EPTCS.146.5
,2014, 'Symbolic model checking epistemic strategy logic', in Proceedings of the National Conference on Artificial Intelligence, pp. 1426 - 1432
,2013, 'Synthesizing Strategies for Epistemic Goals by Epistemic Model Checking: an application to Pursuit-Evasion Games', in Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, AAAI Press, Bellevue, WAshington, USA, pp. 772 - 778, presented at Twenty-Seventh Conference on Artificial Intelligence (AAAI-13), Bellevue, WAshington, USA, 14 July 2013 - 18 July 2013, http://www.aaai.org/ocs/index.php/AAAI/AAAI12/paper/download/5117/5269
,2013, 'Symbolic Synthesis of Knowledge-based Program Implementations with Synchronous Semantics', in Burkhard C. Schipper (ed.), TARK2013 - Theoretical Aspects of Rationality and Knowledge, Proceedings of the 14th Conference, Chennai, India, pp. 121 - 130, presented at Conf on Theoretical Aspects of Knowledge and Rationality, Chennai, 07 January 2013 - 09 January 2013, http://arxiv.org/abs/1310.6423
,2012, 'Intransitive noninterference in nondeterministic systems', in ACM Conference on Computer and Communications Security, ACM, Raleigh, NC, USA, pp. 869 - 880, presented at 19th ACM Conference on Computer and Communications Security, Raleigh, NC, USA, 16 October 2012 - 18 October 2012, http://dx.doi.org/10.1145/2382196.2382288
,2011, 'Model Checking Knowledge in Pursuit-Evasion Games', in PROCEEDINGS OF THE TWENTY-SECOND INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI11), AAAI Press, Barcelona, pp. 240 - 245, presented at International Joint Conference on Artificial Intelligence, Barcelona, 16 July 2011 - 22 July 2011, http://ijcai.org/papers11/Papers/IJCAI11-051.pdf
,