Select Publications
Journal articles
2022, 'A Formal Treatment of Contract Signature', IEEE Transactions on Services Computing, 15, pp. 3101 - 3114, http://dx.doi.org/10.1109/TSC.2021.3101833
,2020, 'Undecidable Cases of Model Checking Probabilistic Temporal-Epistemic Logic', ACM Transactions on Computational Logic, 21, http://dx.doi.org/10.1145/3409250
,2018, 'An epistemic strategy logic', ACM Transactions on Computational Logic, 19, http://dx.doi.org/10.1145/3233769
,2017, 'Dynamic intransitive noninterference revisited', Formal Aspects of Computing, 29, pp. 1087 - 1120, http://dx.doi.org/10.1007/s00165-017-0430-6
,2016, 'The complexity of synchronous notions of information flow security', Theoretical Computer Science, 631, pp. 16 - 42, http://dx.doi.org/10.1016/j.tcs.2016.03.011
,2016, 'The complexity of synchronous notions of information flow security', Theoretical Computer Science, 631, pp. 16 - 42, http://dx.doi.org/10.1016/j.tcs.2016.03.011
,2015, 'Using architecture to reason about information security', ACM Transactions on Information and System Security, 18, http://dx.doi.org/10.1145/2829949
,2015, 'What, indeed, is intransitive noninterference?1', Journal of Computer Security, 23, pp. 197 - 228, http://dx.doi.org/10.3233/JCS-140516
,2013, 'Information Flow in Systems with Schedulers (Part I:Definitions)', Theoretical Computer Science, 467, pp. 68 - 88, http://dx.doi.org/10.1016/j.tcs.2012.10.047
,2013, 'Information flow in systems with schedulers, Part II: Refinement', Theoretical Computer Science, 484, pp. 70 - 92, http://dx.doi.org/10.1016/j.tcs.2013.01.002
,2012, 'Architectural Refinement and Notions of Intransitive Noninterference', Formal Aspects of Computing, 24, pp. 769 - 792, http://dx.doi.org/10.1007/s00165-012-0247-2
,2012, 'Consistent assignment of quantum probabilities', Journal of Physics A: Mathematical and Theoretical, 45, pp. 1751 - 8113, http://dx.doi.org/10.1088/1751-8113/45/7/075304
,2010, 'A comparison of semantic models for noninterference', Theoretical Computer Science, 411, pp. 4123 - 4147, http://dx.doi.org/10.1016/j.tcs.2010.08.013
,2009, 'Architectural Refinement and Notions of Intransitive Noninterference', Engineering Secure Software and Systems
,2007, 'A comparison of semantic models for noninterference', 4th international workshop on Formal aspects in security and trust
,2007, 'Algorithmic Verification of Noninterference Properties', Electronic Notes in Theoretical Computer Science, 168, pp. 61 - 75, http://dx.doi.org/10.1016/j.entcs.2006.11.002
,2006, 'Model Checking Russian Cards', Electronic Notes in Theoretical Computer Science, 149, pp. 105 - 123, http://dx.doi.org/10.1016/j.entcs.2005.07.029
,2004, 'Complete Axiomatizations for Logics of Knowledge and Time', Siam Journal on Computing, 33, pp. 674 - 703
,2003, 'A Logical Reconstruction of SPKI', Journal of Computer Security, 11,, pp. 581 - 614
,2003, 'Complete Axiomatizations for Reasoning about Knowledge and Branching Time', Studia Logica, 75, pp. 93 - 123
,2001, 'CRC for smart internet technology - An overview', Telecommunications Journal of Australia, 51, pp. 19 - 23
,2001, 'A logic for SDSI`s Linked Local Name Spaces', Journal of Computer Security, pp. 105 - 142
,2000, 'Containment and Optimization of Object Preserving Conjunctive Queries', Siam Journal on Computing, pp. 1371 - 1400
,2000, 'Knowledge In Multi-agent Systems: Initial Configurations and Broadcast', ACM Transactions on Computational Logic, 1, pp. 247 - 284
,2000, 'Predicate Boundedness of Linear Monadic Datalog is in PSPACE', International Journal of Foundations of Computer Science, 11, pp. 591 - 612
,1998, 'Common Knowledge and Update in Finite Environments', Information and Computation, 140, pp. 115 - 157, http://dx.doi.org/10.1006/inco.1997.2679
,1997, 'The Complexity of Querying Indefinite Data about Linearly Ordered Domains', Journal of Computer and System Sciences, 54, pp. 113 - 135, http://dx.doi.org/10.1006/jcss.1997.1455
,1996, 'The dynamic logic of permission', Journal of Logic and Computation, 6, pp. 465 - 479, http://dx.doi.org/10.1093/logcom/6.3.465
,1995, 'Complexity tailored design: A new design methodology for databases with incomplete information', Journal of Computer and System Sciences, 51, pp. 405 - 432, http://dx.doi.org/10.1006/jcss.1995.1079
,1993, 'Recursively indefinite databases', Theoretical Computer Science, 116, pp. 151 - 194, http://dx.doi.org/10.1016/0304-3975(93)90223-G
,