Formal methods: Theory becoming practice, J. UCS, vol.13, issue.5, pp.619-628, 2007. ,
KLAIM: a kernel language for agents interaction and mobility, IEEE Transactions on Software Engineering, vol.24, issue.5, 1998. ,
DOI : 10.1109/32.685256
Differential privacy In Encyclopedia of Cryptography and Security, pp.338-340, 2011. ,
Communicating Sequential Processes, 1985. ,
VIP-MDBS: A Logic Multidatabase System, Proceedings [1988] International Symposium on Databases in Parallel and Distributed Systems, pp.190-201 ,
DOI : 10.1109/DPDS.1988.675015
A parallel logic language for transaction specification in multidatabase systems, Journal of Systems Integration, vol.21, issue.3, pp.219-252, 1995. ,
DOI : 10.1007/BF01974950
Information flow analysis for valued-indexed data security compartments, Trustworthy Global Computing -8th International Symposium, TGC 2013, pp.180-198, 2013. ,
A structural approach to operational semantics, J. Log. Algebr. Program, pp.60-6117, 2004. ,
On the use of linda as a framework for distributed database systems, 2002. ,
Locality-based security policies, Formal Aspects in Security and Trust, Fourth International Workshop, pp.185-201, 2006. ,
Formal methods, ACM Computing Surveys, vol.41, issue.4, 2009. ,
DOI : 10.1145/1592434.1592436
Query by example, Proceedings of the National Computer Conference and Exposition, AFIPS '75, pp.431-438, 1975. ,