| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
Artif. Intell.
|
| 2025 | J | jnl |
CoRR
|
| 2023 | A* | conf |
IJCAI
|
| 2023 | — | conf |
Description Logics
|
| 2023 | — | conf |
Description Logics
|
| 2023 | A* | conf |
IJCAI
|
| 2022 | J | jnl |
Artif. Intell.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | Misc | conf |
ISWC
|
| 2022 | A* | conf |
KR
|
| 2021 | J | jnl |
Ann. Math. Artif. Intell.
|
| 2021 | — | conf |
EuroS&P Workshops
|
| 2021 | — | conf |
Description Logics
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
Künstliche Intell.
|
| 2020 | A* | conf |
IJCAI
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
Artif. Intell.
|
| 2020 | J | jnl |
CoRR
|
| 2019 | — | conf |
Description Logics
|
| 2019 | — | conf |
BigData Congress
|
| 2019 | J | jnl |
Artif. Intell.
|
| 2018 | — | conf |
ESWC (Satellite Events)
|
| 2018 | — | conf |
SW4SG@ISWC
|
| 2018 | A* | conf |
IJCAI
|
| 2018 | A* | conf |
IJCAI
|
| 2017 | A* | conf |
IJCAI
|
| 2017 | — | conf |
PrivOn@ISWC
|
| 2017 | J | jnl |
Artif. Intell.
|
| 2017 | — | conf |
SAFECOMP Workshops
|
| 2016 | A | conf |
AAMAS
|
| 2015 | J | jnl |
Artif. Intell.
|
| 2015 | — | conf |
Advances in Knowledge Representation, Logic Programming, and Abstract Argumentation
|
| 2015 | J | jnl |
J. Comput. Secur.
|
| 2015 | — | conf |
Description Logics
|
| 2015 | — | conf |
ISWC (1)
|
| 2014 | — | conf |
CILC
|
| 2014 | J | jnl |
CoRR
|
| 2014 | — | conf |
IEEE SCC
|
| 2014 | J | jnl |
Knowl. Eng. Rev.
|
| 2014 | — | conf |
ESORICS (2)
|
| 2014 | — | conf |
SR
|
| 2014 | J | jnl |
CoRR
|
| 2013 | — | conf |
ISWC (1)
|
| 2013 | — | conf |
IEEE Symposium on Security and Privacy Workshops
|
| 2013 | B | conf |
MFCS
|
| 2013 | C | conf |
SACMAT
|
| 2012 | — | conf |
Description Logics
|
| 2011 | A* | conf |
AAAI
|
| 2011 | J | jnl |
J. Artif. Intell. Res.
|
| 2011 | — | ch. |
Encyclopedia of Cryptography and Security (2nd Ed.)
|
| 2011 | A* | conf |
IJCAI
|
| 2011 | J | jnl |
Intelligenza Artificiale
|
| 2011 | J | jnl |
J. Web Semant.
|
| 2011 | A | conf |
ESORICS
|
| 2010 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 2010 | J | jnl |
CoRR
|
| 2010 | J | jnl |
Theory Pract. Log. Program.
|
| 2010 | — | ch. |
25 Years GULP
|
| 2010 | — | conf |
Datalog
|
| 2010 | — | conf |
ESWC (1)
|
| 2009 | — | conf |
SPOT@ESWC
|
| 2009 | A* | conf |
IJCAI
|
| 2009 | J | jnl |
CoRR
|
| 2009 | J | jnl |
Theory Pract. Log. Program.
|
| 2009 | — | conf |
LA-WEB/CLIHC
|
| 2009 | — | ch. |
REWERSE
|
| 2009 | J | jnl |
J. Artif. Intell. Res.
|
| 2008 | — | conf |
POLICY
|
| 2008 | — | conf |
POLICY
|
| 2008 | B | conf |
ICLP
|
| 2008 | A* | conf |
AAAI
|
| 2008 | J | jnl |
Artif. Intell.
|
| 2008 | — | conf |
Il Milione
|
| 2008 | B | conf |
ICLP
|
| 2008 | — | conf |
ISWC (Posters & Demos)
|
| 2008 | — | ed. |
Reasoning Web
|
| 2008 | J | jnl |
CoRR
|
| 2008 | J | jnl |
Log. Methods Comput. Sci.
|
| 2007 | J | jnl |
Ann. Math. Artif. Intell.
|
| 2007 | B | conf |
TABLEAUX
|
| 2007 | B | conf |
ICLP
|
| 2007 | — | conf |
POLICY
|
| 2007 | — | conf |
Reasoning Web
|
| 2007 | — | ch. |
Secure Data Management in Decentralized Systems
|
| 2006 | A | conf |
ECAI
|
| 2006 | — | conf |
FoIKS
|
| 2006 | A* | conf |
KR
|
| 2006 | B | conf |
ESWC
|
| 2006 | — | conf |
ICALP (2)
|
| 2005 | — | conf |
Answer Set Programming
|
| 2005 | — | conf |
POLICY
|
| 2005 | A* | conf |
WWW
|
| 2005 | A* | conf |
CCS
|
| 2005 | — | ed. |
Trust@ISWC
|
| 2005 | — | conf |
COMPSAC (1)
|
| 2005 | B | conf |
ICLP
|
| 2004 | A | conf |
ECAI
|
| 2004 | J | jnl |
Ann. Math. Artif. Intell.
|
| 2004 | J | jnl |
Int. J. Inf. Sec.
|
| 2004 | A* | conf |
PODS
|
| 2004 | J | jnl |
Artif. Intell.
|
| 2004 | J | jnl |
Artif. Intell.
|
| 2003 | Misc | conf |
IRI
|
| 2003 | — | conf |
Answer Set Programming
|
| 2003 | — | conf |
Logics for Emerging Applications of Databases
|
| 2003 | A* | conf |
IJCAI
|
| 2003 | J | jnl |
Ann. Math. Artif. Intell.
|
| 2003 | — | conf |
WILF
|
| 2003 | — | conf |
Security Protocols Workshop
|
| 2002 | J | jnl |
J. Comput. Secur.
|
| 2002 | J | jnl |
CoRR
|
| 2002 | — | conf |
NMR
|
| 2002 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2002 | A | conf |
ESORICS
|
| 2002 | — | conf |
FoIKS
|
| 2002 | B | conf |
ICLP
|
| 2002 | J | jnl |
ACM Trans. Comput. Log.
|
| 2002 | B | conf |
JELIA
|
| 2001 | A | conf |
ACSAC
|
| 2001 | Misc | conf |
SEC
|
| 2001 | J | jnl |
Data Knowl. Eng.
|
| 2001 | B | conf |
LPNMR
|
| 2001 | B | conf |
LPNMR
|
| 2001 | A* | conf |
IJCAI
|
| 2001 | J | jnl |
J. Autom. Reason.
|
| 2001 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2000 | A* | conf |
CCS
|
| 2000 | — | book |
Heterogenous Active Agents
|
| 2000 | A* | conf |
CCS
|
| 2000 | — | conf |
ACM Workshop on Role-Based Access Control
|
| 2000 | J | jnl |
J. Comput. Secur.
|
| 1999 | B | conf |
DBSec
|
| 1999 | — | conf |
APPIA-GULP-PRODE
|
| 1998 | — | conf |
SIGMOD Conference
|
| 1998 | — | conf |
CIA
|
| 1997 | — | conf |
APPIA-GULP-PRODE
|
| 1997 | B | conf |
CSL
|
| 1997 | B | conf |
TABLEAUX
|
| 1997 | J | jnl |
J. Comput. Secur.
|
| 1997 | B | conf |
LPNMR
|
| 1996 | A | conf |
ESORICS
|
| 1996 | J | jnl |
Theor. Comput. Sci.
|
| 1996 | B | conf |
TABLEAUX
|
| 1995 | J | jnl |
J. Log. Comput.
|
| 1995 | J | jnl |
J. Log. Program.
|
| 1995 | J | jnl |
IEEE Trans. Knowl. Data Eng.
|
| 1995 | A | conf |
ICDT
|
| 1995 | — | conf |
GULP-PRODE
|
| 1994 | J | jnl |
J. Autom. Reason.
|
| 1993 | B | conf |
LPNMR
|
| 1992 | — | conf |
JICSLP
|
| 1992 | A | conf |
ICDT
|
| 1992 | — | conf |
META
|
| 1991 | — | conf |
AI*IA
|
| 1991 | B | conf |
LPNMR
|
| 1990 | B | conf |
LPNMR
|