BibTeX records: Moritz Y. Becker

download as .bib file

@inproceedings{DBLP:conf/stm/SultanaBK13,
  author       = {Nik Sultana and
                  Moritz Y. Becker and
                  Markulf Kohlweiss},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {Selective Disclosure in Datalog-Based Trust Management},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {160--175},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_11},
  doi          = {10.1007/978-3-642-41098-7\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SultanaBK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Becker12,
  author       = {Moritz Y. Becker},
  title        = {Information flow in trust management systems},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {6},
  pages        = {677--708},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0443},
  doi          = {10.3233/JCS-2012-0443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Becker12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BeckerRS12,
  author       = {Moritz Y. Becker and
                  Alessandra Russo and
                  Nik Sultana},
  title        = {Foundations of Logic-Based Trust Management},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012,
                  San Francisco, California, {USA}},
  pages        = {161--175},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SP.2012.20},
  doi          = {10.1109/SP.2012.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BeckerRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BeckerK11,
  author       = {Moritz Y. Becker and
                  Masoud Koleini},
  editor       = {Xuejia Lai and
                  Jianying Zhou and
                  Hui Li},
  title        = {Opacity Analysis in Trust Management Systems},
  booktitle    = {Information Security, 14th International Conference, {ISC} 2011, Xi'an,
                  China, October 26-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7001},
  pages        = {229--245},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24861-0\_16},
  doi          = {10.1007/978-3-642-24861-0\_16},
  timestamp    = {Tue, 20 Aug 2024 07:54:44 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BeckerK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ruleml/BeckerM11,
  author       = {Moritz Y. Becker and
                  Jason F. Mackay},
  editor       = {Frank Olken and
                  Monica Palmirani and
                  Davide Sottara},
  title        = {Relaxed Safeness in Datalog-Based Policies},
  booktitle    = {Rule-Based Modeling and Computing on the Semantic Web, 5th International
                  Symposium, RuleML 2011- America, Ft. Lauderdale, FL, Florida, USA,
                  November 3-5, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7018},
  pages        = {49--57},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24908-2\_11},
  doi          = {10.1007/978-3-642-24908-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/ruleml/BeckerM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BeckerFG10,
  author       = {Moritz Y. Becker and
                  C{\'{e}}dric Fournet and
                  Andrew D. Gordon},
  title        = {SecPAL: Design and semantics of a decentralized authorization language},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {619--665},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2009-0364},
  doi          = {10.3233/JCS-2009-0364},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/BeckerFG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BeckerN10,
  author       = {Moritz Y. Becker and
                  Sebastian Nanz},
  title        = {A logic for state-modifying authorization policies},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {20:1--20:28},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805976},
  doi          = {10.1145/1805974.1805976},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BeckerN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Becker10,
  author       = {Moritz Y. Becker},
  title        = {Information Flow in Credential Systems},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {171--185},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.19},
  doi          = {10.1109/CSF.2010.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Becker10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BeckerMB10,
  author       = {Moritz Y. Becker and
                  Alexander Malkis and
                  Laurent Bussard},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {A Practical Generic Privacy Language},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {125--139},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_10},
  doi          = {10.1007/978-3-642-17714-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/BeckerMB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Becker09,
  author       = {Moritz Y. Becker},
  title        = {Specification and Analysis of Dynamic Authorisation Policies},
  booktitle    = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009},
  pages        = {203--217},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSF.2009.14},
  doi          = {10.1109/CSF.2009.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Becker09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/BeckerMD09,
  author       = {Moritz Y. Becker and
                  Jason F. Mackay and
                  Blair Dillaway},
  title        = {Abductive Authorization Credential Gathering},
  booktitle    = {{POLICY} 2009, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, London, UK, 20-22 July 2009},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/POLICY.2009.23},
  doi          = {10.1109/POLICY.2009.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/BeckerMD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/padl/BeckerN08,
  author       = {Moritz Y. Becker and
                  Sebastian Nanz},
  editor       = {Paul Hudak and
                  David Scott Warren},
  title        = {The Role of Abduction in Declarative Authorization Policies},
  booktitle    = {Practical Aspects of Declarative Languages, 10th International Symposium,
                  {PADL} 2008, San Francisco, CA, USA, January 7-8, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4902},
  pages        = {84--99},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77442-6\_7},
  doi          = {10.1007/978-3-540-77442-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/padl/BeckerN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmi/Becker07,
  author       = {Moritz Y. Becker},
  title        = {Information governance in NHS's NPfIT: {A} case for policy specification},
  journal      = {Int. J. Medical Informatics},
  volume       = {76},
  number       = {5-6},
  pages        = {432--437},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.ijmedinf.2006.09.008},
  doi          = {10.1016/J.IJMEDINF.2006.09.008},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmi/Becker07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BeckerFG07,
  author       = {Moritz Y. Becker and
                  C{\'{e}}dric Fournet and
                  Andrew D. Gordon},
  title        = {Design and Semantics of a Decentralized Authorization Language},
  booktitle    = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8
                  July 2007, Venice, Italy},
  pages        = {3--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CSF.2007.18},
  doi          = {10.1109/CSF.2007.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BeckerFG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BeckerN07,
  author       = {Moritz Y. Becker and
                  Sebastian Nanz},
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {A Logic for State-Modifying Authorization Policies},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  pages        = {203--218},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_14},
  doi          = {10.1007/978-3-540-74835-9\_14},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BeckerN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BeckerS04,
  author       = {Moritz Y. Becker and
                  Peter Sewell},
  title        = {Cassandra: Flexible Trust Management, Applied to Electronic Health
                  Records},
  booktitle    = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004),
                  28-30 June 2004, Pacific Grove, CA, {USA}},
  pages        = {139--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.7},
  doi          = {10.1109/CSFW.2004.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BeckerS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/BeckerS04,
  author       = {Moritz Y. Becker and
                  Peter Sewell},
  title        = {Cassandra: Distributed Access Control Policies with Tunable Expressiveness},
  booktitle    = {5th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2004), 7-9 June 2004, Yorktown Heights, NY,
                  {USA}},
  pages        = {159--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/POLICY.2004.1309162},
  doi          = {10.1109/POLICY.2004.1309162},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/BeckerS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/BeckerR01,
  author       = {Moritz Y. Becker and
                  Isabel Rojas},
  title        = {A graph layout algorithm for drawing metabolic pathways},
  journal      = {Bioinform.},
  volume       = {17},
  number       = {5},
  pages        = {461--467},
  year         = {2001},
  url          = {https://doi.org/10.1093/bioinformatics/17.5.461},
  doi          = {10.1093/BIOINFORMATICS/17.5.461},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/BeckerR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}