BibTeX records: Steve Barker

download as .bib file

@article{DBLP:journals/jcsc/NagulapalliHBTL20,
  author       = {Rajasekhar Nagulapalli and
                  Khaled Hayatleh and
                  Steve Barker and
                  Amr A. Tammam and
                  F. John Lidgey and
                  Nabil Yassine},
  title        = {A High-Sensitivity and Low-Power Circuit for the Measurement of Abnormal
                  Blood Cell Levels},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {29},
  number       = {4},
  pages        = {2050061:1--2050061:14},
  year         = {2020},
  url          = {https://doi.org/10.1142/S0218126620500619},
  doi          = {10.1142/S0218126620500619},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsc/NagulapalliHBTL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/NagulapalliHB20,
  author       = {Rajasekhar Nagulapalli and
                  Khaled Hayatleh and
                  Steve Barker},
  title        = {A {VGA} Linearity Improvement Technique for {ECG} Analog Front-End
                  in 65nm {CMOS}},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {29},
  number       = {7},
  pages        = {2050113:1--2050113:11},
  year         = {2020},
  url          = {https://doi.org/10.1142/S0218126620501133},
  doi          = {10.1142/S0218126620501133},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/NagulapalliHB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/NagulapalliHB20a,
  author       = {Rajasekhar Nagulapalli and
                  Khaled Hayatleh and
                  Steve Barker},
  title        = {A Positive Feedback-Based Op-Amp Gain Enhancement Technique for High-Precision
                  Applications},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {29},
  number       = {14},
  pages        = {2050220:1--2050220:12},
  year         = {2020},
  url          = {https://doi.org/10.1142/S0218126620502205},
  doi          = {10.1142/S0218126620502205},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsc/NagulapalliHB20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/NagulapalliHBR20,
  author       = {Rajasekhar Nagulapalli and
                  Khaled Hayatleh and
                  Steve Barker and
                  B. Naresh Kumar Reddy},
  title        = {A Single {BJT} 10.2 ppm/{\textdegree}C Bandgap Reference in 45nm {CMOS}
                  Technology},
  booktitle    = {11th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2020, Kharagpur, India, July 1-3, 2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCCNT49239.2020.9225362},
  doi          = {10.1109/ICCCNT49239.2020.9225362},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccnt/NagulapalliHBR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/NagulapalliHBR20a,
  author       = {Rajasekhar Nagulapalli and
                  Khaled Hayatleh and
                  Steve Barker and
                  B. Naresh Kumar Reddy},
  title        = {A two-stage opamp frequency Compensation technique by splitting the
                  2\({}^{\mbox{nd}}\) stage},
  booktitle    = {11th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2020, Kharagpur, India, July 1-3, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCCNT49239.2020.9225666},
  doi          = {10.1109/ICCCNT49239.2020.9225666},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccnt/NagulapalliHBR20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/NagulapalliHBGL19,
  author       = {Rajasekhar Nagulapalli and
                  Khaled Hayatleh and
                  Steve Barker and
                  Pantelis Georgiou and
                  F. J. Lidgey},
  title        = {A High Value, Linear and Tunable {CMOS} Pseudo-Resistor for Biomedical
                  Applications},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {28},
  number       = {6},
  pages        = {1950096:1--1950096:11},
  year         = {2019},
  url          = {https://doi.org/10.1142/S0218126619500968},
  doi          = {10.1142/S0218126619500968},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/NagulapalliHBGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/HayatlehZNBYGL19,
  author       = {Khaled Hayatleh and
                  Saddam Zourob and
                  Rajasekhar Nagulapalli and
                  Steve Barker and
                  Nabil Yassine and
                  Pantelis Georgiou and
                  F. J. Lidgey},
  title        = {A High-Performance Skin Impedance Measurement Circuit for Biomedical
                  Applications},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {28},
  number       = {7},
  pages        = {1950110:1--1950110:15},
  year         = {2019},
  url          = {https://doi.org/10.1142/S021812661950110X},
  doi          = {10.1142/S021812661950110X},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/HayatlehZNBYGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/NagulapalliHBTG19,
  author       = {Rajasekhar Nagulapalli and
                  Khaled Hayatleh and
                  Steve Barker and
                  Amr A. Tammam and
                  Pantelis Georgiou and
                  F. J. Lidgey},
  title        = {A 0.55 {V} Bandgap Reference with a 59 ppm/{\textdegree}C Temperature
                  Coefficient},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {28},
  number       = {7},
  pages        = {1950120:1--1950120:12},
  year         = {2019},
  url          = {https://doi.org/10.1142/S0218126619501202},
  doi          = {10.1142/S0218126619501202},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/NagulapalliHBTG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/NagulapalliHBTY19,
  author       = {Rajasekhar Nagulapalli and
                  Khaled Hayatleh and
                  Steve Barker and
                  Amr A. Tammam and
                  Nabil Yassine and
                  Bilal Yassine and
                  Mohamed Ben{-}Esmael},
  title        = {A Low Noise Amplifier Suitable for Biomedical Recording Analog Front-End
                  in 65nm {CMOS} Technology},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {28},
  number       = {8},
  pages        = {1950137:1--1950137:12},
  year         = {2019},
  url          = {https://doi.org/10.1142/S0218126619501378},
  doi          = {10.1142/S0218126619501378},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/NagulapalliHBTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/NagulapalliHBYZ19,
  author       = {Rajasekhar Nagulapalli and
                  Khaled Hayatleh and
                  Steve Barker and
                  Bilal Yassine and
                  Saddam Zourob and
                  Sumathi Raparthy and
                  Nabil Yassine},
  title        = {A Start-up Assisted Fully Differential Folded Cascode Opamp},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {28},
  number       = {10},
  pages        = {1950164:1--1950164:12},
  year         = {2019},
  url          = {https://doi.org/10.1142/S0218126619501640},
  doi          = {10.1142/S0218126619501640},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/NagulapalliHBYZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/NagulapalliHBRS19,
  author       = {Rajasekhar Nagulapalli and
                  Khaled Hayatleh and
                  Steve Barker and
                  B. Naresh Kumar Reddy and
                  B. Seetharamulu},
  title        = {A Low Power Miller Compensation Technique for Two Stage Op-amp in
                  65nm {CMOS} Technology},
  booktitle    = {10th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2019, Kanpur, India, July 6-8, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCCNT45670.2019.8944553},
  doi          = {10.1109/ICCCNT45670.2019.8944553},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccnt/NagulapalliHBRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/NagulapalliHBRS19a,
  author       = {Rajasekhar Nagulapalli and
                  Khaled Hayatleh and
                  Steve Barker and
                  B. Naresh Kumar Reddy and
                  B. Seetharamulu},
  title        = {A High Frequency {CMRR} improvement technique for Differential Amplifiers
                  in 45nm {CMOS}},
  booktitle    = {10th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2019, Kanpur, India, July 6-8, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCCNT45670.2019.8944785},
  doi          = {10.1109/ICCCNT45670.2019.8944785},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccnt/NagulapalliHBRS19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/NagulapalliHBRY18,
  author       = {Rajasekhar Nagulapalli and
                  Khaled Hayatleh and
                  Steve Barker and
                  Sumathi Raparthy and
                  Nabil Yassine and
                  John Lidgey},
  title        = {A 0.6 {V} MOS-Only Voltage Reference for Biomedical Applications with
                  40 ppm/{\(\circ\)}C Temperature Drift},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {27},
  number       = {8},
  pages        = {1850128:1--1850128:13},
  year         = {2018},
  url          = {https://doi.org/10.1142/S0218126618501281},
  doi          = {10.1142/S0218126618501281},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/NagulapalliHBRY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/NagulapalliHBZY18,
  author       = {Rajasekhar Nagulapalli and
                  Khaled Hayatleh and
                  Steve Barker and
                  Saddam Zourob and
                  Nabil Yassine and
                  B. Naresh Kumar Reddy},
  title        = {A Technique to Reduce the Capacitor Size in Two Stage Miller Compensated
                  Opamp},
  booktitle    = {9th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2018, Bengaluru, India, July 10-12, 2018},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCCNT.2018.8493494},
  doi          = {10.1109/ICCCNT.2018.8493494},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icccnt/NagulapalliHBZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/NagulapalliHBZY18a,
  author       = {Rajasekhar Nagulapalli and
                  Khaled Hayatleh and
                  Steve Barker and
                  Saddam Zourob and
                  Nabil Yassine and
                  B. Naresh Kumar Reddy},
  title        = {High Performance Circuit Techniques for Nueral Front-End Design in
                  65nm {CMOS}},
  booktitle    = {9th International Conference on Computing, Communication and Networking
                  Technologies, {ICCCNT} 2018, Bengaluru, India, July 10-12, 2018},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCCNT.2018.8493806},
  doi          = {10.1109/ICCCNT.2018.8493806},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccnt/NagulapalliHBZY18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vdat/NagulapalliHBZY18,
  author       = {Rajasekhar Nagulapalli and
                  Khaled Hayatleh and
                  Steve Barker and
                  Saddam Zourob and
                  Nabil Yassine and
                  B. Naresh Kumar Reddy},
  editor       = {S. Rajaram and
                  N. B. Balamurugan and
                  D. Gracia Nirmala Rani and
                  Virendra Singh},
  title        = {A 31 ppm/{\textdegree} {C} Pure {CMOS} Bandgap Reference by Exploiting
                  Beta-Multiplier},
  booktitle    = {{VLSI} Design and Test - 22nd International Symposium, {VDAT} 2018,
                  Madurai, India, June 28-30, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {892},
  pages        = {100--108},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-13-5950-7\_9},
  doi          = {10.1007/978-981-13-5950-7\_9},
  timestamp    = {Wed, 04 May 2022 16:21:48 +0200},
  biburl       = {https://dblp.org/rec/conf/vdat/NagulapalliHBZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ro-man/BarkerICHRHF17,
  author       = {Steve Barker and
                  Hooshang Izadi and
                  Nigel T. Crook and
                  Khaled Hayatleh and
                  Matthias Rolf and
                  Philip Hughes and
                  Neil Fellows},
  title        = {Natural head movement for {HRI} with a muscular-skeletal head and
                  neck robot},
  booktitle    = {26th {IEEE} International Symposium on Robot and Human Interactive
                  Communication, {RO-MAN} 2017, Lisbon, Portugal, August 28 - Sept.
                  1, 2017},
  pages        = {587--592},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ROMAN.2017.8172362},
  doi          = {10.1109/ROMAN.2017.8172362},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ro-man/BarkerICHRHF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/robio/BarkerFHFSC15,
  author       = {Steve Barker and
                  Luis A. Fuente and
                  Khaled Hayatleh and
                  Neil Fellows and
                  Jochen J. Steil and
                  Nigel T. Crook},
  title        = {Design of a biologically inspired humanoid neck},
  booktitle    = {2015 {IEEE} International Conference on Robotics and Biomimetics,
                  {ROBIO} 2015, Zhuhai, China, December 6-9, 2015},
  pages        = {25--30},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ROBIO.2015.7407034},
  doi          = {10.1109/ROBIO.2015.7407034},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/robio/BarkerFHFSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/TerzopoulosHSLBTB14,
  author       = {Nikolaos Terzopoulos and
                  Khaled Hayatleh and
                  Cristiana Sebu and
                  F. J. Lidgey and
                  Mohamed Ben{-}Esmael and
                  Amr A. Tammam and
                  Steve Barker},
  title        = {Analysis and Design of a High Precision-High output impedance Tissue
                  Current Driver for Medical Applications},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {23},
  number       = {8},
  year         = {2014},
  url          = {https://doi.org/10.1142/S021812661450114X},
  doi          = {10.1142/S021812661450114X},
  timestamp    = {Tue, 14 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/TerzopoulosHSLBTB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/logcom/BarkerBGG14,
  author       = {Steve Barker and
                  Guido Boella and
                  Dov M. Gabbay and
                  Valerio Genovese},
  title        = {Reasoning about delegation and revocation schemes in answer set programming},
  journal      = {J. Log. Comput.},
  volume       = {24},
  number       = {1},
  pages        = {89--116},
  year         = {2014},
  url          = {https://doi.org/10.1093/logcom/exs014},
  doi          = {10.1093/LOGCOM/EXS014},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/logcom/BarkerBGG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BarkerG12,
  author       = {Steve Barker and
                  Valerio Genovese},
  title        = {Access Control with Privacy Enhancements a Unified Approach},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {5},
  pages        = {670--683},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.22},
  doi          = {10.1109/TDSC.2012.22},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BarkerG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/BarkerJKKLMMS12,
  author       = {Steve Barker and
                  Andrew J. I. Jones and
                  Antonis C. Kakas and
                  Robert A. Kowalski and
                  Alessio Lomuscio and
                  Rob Miller and
                  Stephen H. Muggleton and
                  Giovanni Sartor},
  editor       = {Alexander Artikis and
                  Robert Craven and
                  Nihan Kesim Cicekli and
                  Babak Sadighi and
                  Kostas Stathis},
  title        = {The Scientific Contribution of Marek Sergot},
  booktitle    = {Logic Programs, Norms and Action - Essays in Honor of Marek J. Sergot
                  on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {7360},
  pages        = {4--11},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29414-3\_2},
  doi          = {10.1007/978-3-642-29414-3\_2},
  timestamp    = {Sat, 30 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/BarkerJKKLMMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Barker12,
  author       = {Steve Barker},
  editor       = {Alexander Artikis and
                  Robert Craven and
                  Nihan Kesim Cicekli and
                  Babak Sadighi and
                  Kostas Stathis},
  title        = {Logical Approaches to Authorization Policies},
  booktitle    = {Logic Programs, Norms and Action - Essays in Honor of Marek J. Sergot
                  on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {7360},
  pages        = {349--373},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29414-3\_19},
  doi          = {10.1007/978-3-642-29414-3\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Barker12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AucherBBGT11,
  author       = {Guillaume Aucher and
                  Steve Barker and
                  Guido Boella and
                  Valerio Genovese and
                  Leendert W. N. van der Torre},
  editor       = {Yingjiu Li},
  title        = {Dynamics in Delegation and Revocation Schemes: {A} Logical Approach},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {90--105},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_9},
  doi          = {10.1007/978-3-642-22348-8\_9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AucherBBGT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BarkerG11,
  author       = {Steve Barker and
                  Valerio Genovese},
  editor       = {Vijay Atluri and
                  Claudia D{\'{\i}}az},
  title        = {Socially Constructed Trust for Distributed Authorization},
  booktitle    = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
                  in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6879},
  pages        = {262--277},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23822-2\_15},
  doi          = {10.1007/978-3-642-23822-2\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BarkerG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lpnmr/BarkerG11,
  author       = {Steve Barker and
                  Valerio Genovese},
  editor       = {James P. Delgrande and
                  Wolfgang Faber},
  title        = {Secommunity: {A} Framework for Distributed Access Control},
  booktitle    = {Logic Programming and Nonmonotonic Reasoning - 11th International
                  Conference, {LPNMR} 2011, Vancouver, Canada, May 16-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6645},
  pages        = {297--303},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20895-9\_34},
  doi          = {10.1007/978-3-642-20895-9\_34},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/lpnmr/BarkerG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/BarkerL11,
  author       = {Steve Barker and
                  Gillian Lowen},
  title        = {{GPF:} {A} General Policy Framework},
  booktitle    = {{POLICY} 2011, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, Pisa, Italy, 6-8 June 2011},
  pages        = {117--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/POLICY.2011.31},
  doi          = {10.1109/POLICY.2011.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/BarkerL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BarkerG10,
  author       = {Steve Barker and
                  Valerio Genovese},
  editor       = {Sara Foresti and
                  Sushil Jajodia},
  title        = {A Logic of Privacy},
  booktitle    = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
                  {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6166},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13739-6\_2},
  doi          = {10.1007/978-3-642-13739-6\_2},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/BarkerG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Barker10,
  author       = {Steve Barker},
  editor       = {James B. D. Joshi and
                  Barbara Carminati},
  title        = {Personalizing access control by generalizing access control},
  booktitle    = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings},
  pages        = {149--158},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1809842.1809866},
  doi          = {10.1145/1809842.1809866},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/Barker10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sLogica/BarkerBGG09,
  author       = {Steve Barker and
                  Guido Boella and
                  Dov M. Gabbay and
                  Valerio Genovese},
  title        = {A Meta-model of Access Control in a Fibred Security Language},
  journal      = {Stud Logica},
  volume       = {92},
  number       = {3},
  pages        = {437--477},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11225-009-9203-4},
  doi          = {10.1007/S11225-009-9203-4},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sLogica/BarkerBGG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Barker09,
  author       = {Steve Barker},
  editor       = {Barbara Carminati and
                  James Joshi},
  title        = {The next 700 access control models or a unifying meta-model?},
  booktitle    = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2009, Stresa, Italy, June 3-5, 2009, Proceedings},
  pages        = {187--196},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1542207.1542238},
  doi          = {10.1145/1542207.1542238},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/Barker09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lisp/BarkerLV08,
  author       = {Steve Barker and
                  Michael Leuschel and
                  Mauricio Varea},
  title        = {Efficient and flexible access control via Jones-optimal logic program
                  specialisation},
  journal      = {High. Order Symb. Comput.},
  volume       = {21},
  number       = {1-2},
  pages        = {5--35},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10990-008-9030-8},
  doi          = {10.1007/S10990-008-9030-8},
  timestamp    = {Thu, 05 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/lisp/BarkerLV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BarkerSW08,
  author       = {Steve Barker and
                  Marek J. Sergot and
                  Duminda Wijesekera},
  title        = {Status-Based Access Control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {1:1--1:47},
  year         = {2008},
  url          = {https://doi.org/10.1145/1410234.1410235},
  doi          = {10.1145/1410234.1410235},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BarkerSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Barker08,
  author       = {Steve Barker},
  editor       = {Vijay Atluri},
  title        = {Dynamic Meta-level Access Control in {SQL}},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_1},
  doi          = {10.1007/978-3-540-70567-3\_1},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Barker08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BarkerCCLT08,
  author       = {Steve Barker and
                  David W. Chadwick and
                  Jason Crampton and
                  Emil Lupu and
                  Bhavani Thuraisingham},
  editor       = {Vijay Atluri},
  title        = {Panel Session: What Are the Key Challenges in Distributed Security?},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {219--221},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_17},
  doi          = {10.1007/978-3-540-70567-3\_17},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BarkerCCLT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Barker08,
  author       = {Steve Barker},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Access control by action control},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {143--152},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377858},
  doi          = {10.1145/1377836.1377858},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/Barker08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BarkerBF09,
  author       = {Steve Barker and
                  Clara Bertolissi and
                  Maribel Fern{\'{a}}ndez},
  editor       = {Daniel J. Dougherty and
                  Santiago Escobar},
  title        = {Action Control by Term Rewriting},
  booktitle    = {Proceedings of the Third International Workshop on Security and Rewriting
                  Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {234},
  pages        = {19--36},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.02.070},
  doi          = {10.1016/J.ENTCS.2009.02.070},
  timestamp    = {Thu, 09 Mar 2023 12:59:09 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BarkerBF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BarkerL09,
  author       = {Steve Barker and
                  Gill Lowen},
  editor       = {Demis Ballis and
                  Santiago Escobar},
  title        = {Event-oriented Web-based E-trading},
  booktitle    = {Proceedings of the 4th International Workshop on Automated Specification
                  and Verification of Web Systems, {WWV} 2008, Siena, Italy, July 4,
                  2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {235},
  pages        = {35--53},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.03.004},
  doi          = {10.1016/J.ENTCS.2009.03.004},
  timestamp    = {Thu, 09 Mar 2023 13:11:35 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BarkerL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BertolissiFB07,
  author       = {Clara Bertolissi and
                  Maribel Fern{\'{a}}ndez and
                  Steve Barker},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Dynamic Event-Based Access Control as Term Rewriting},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {195--210},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_15},
  doi          = {10.1007/978-3-540-73538-0\_15},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/BertolissiFB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/BarkerD07,
  author       = {Steve Barker and
                  Paul Douglas},
  editor       = {Jorge Cardoso and
                  Jos{\'{e}} Cordeiro and
                  Joaquim Filipe},
  title        = {Secure knowledge exchange by policy algebra and erml},
  booktitle    = {{ICEIS} 2007 - Proceedings of the Ninth International Conference on
                  Enterprise Information Systems, Volume DISI, Funchal, Madeira, Portugal,
                  June 12-16, 2007},
  pages        = {212--217},
  year         = {2007},
  timestamp    = {Thu, 03 Feb 2022 09:27:49 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/BarkerD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Barker07,
  author       = {Steve Barker},
  editor       = {Volkmar Lotz and
                  Bhavani Thuraisingham},
  title        = {Action-status access control},
  booktitle    = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings},
  pages        = {195--204},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1266840.1266873},
  doi          = {10.1145/1266840.1266873},
  timestamp    = {Wed, 29 Jun 2022 15:37:42 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/Barker07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2007,
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0},
  doi          = {10.1007/978-3-540-73538-0},
  isbn         = {978-3-540-73533-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BarkerF06,
  author       = {Steve Barker and
                  Maribel Fern{\'{a}}ndez},
  editor       = {Ernesto Damiani and
                  Peng Liu},
  title        = {Term Rewriting for Access Control},
  booktitle    = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Sophia Antipolis, France,
                  July 31-August 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4127},
  pages        = {179--193},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11805588\_13},
  doi          = {10.1007/11805588\_13},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/BarkerF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/DouglasB05,
  author       = {Paul Douglas and
                  Steve Barker},
  title        = {An E-learning tool for Database Administration},
  booktitle    = {International Symposium on Information Technology: Coding and Computing
                  {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}},
  pages        = {453--458},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITCC.2005.73},
  doi          = {10.1109/ITCC.2005.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/DouglasB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/BarkerD05,
  author       = {Steve Barker and
                  Paul Douglas},
  title        = {An Intelligent Tutoring System for Program Semantics},
  booktitle    = {International Symposium on Information Technology: Coding and Computing
                  {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}},
  pages        = {482--487},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITCC.2005.82},
  doi          = {10.1109/ITCC.2005.82},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/BarkerD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Barker04,
  author       = {Steve Barker},
  editor       = {Csilla Farkas and
                  Pierangela Samarati},
  title        = {Web Resource Usage Control in {RSCLP}},
  booktitle    = {Research Directions in Data and Applications Security XVIII, {IFIP}
                  {TC11/WG} 11.3 Eighteenth Annual Conference on Data and Applications
                  Security, July 25-28, 2004, Sitges, Catalonia, Spain},
  series       = {{IFIP}},
  volume       = {144},
  pages        = {281--294},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8128-6\_19},
  doi          = {10.1007/1-4020-8128-6\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Barker04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/BarkerD04,
  author       = {Steve Barker and
                  Paul Douglas},
  title        = {An Intelligent Tutoring System for Database Transaction Processing},
  booktitle    = {{ICEIS} 2004, Proceedings of the 6th International Conference on Enterprise
                  Information Systems, Porto, Portugal, April 14-17, 2004},
  pages        = {197--203},
  year         = {2004},
  timestamp    = {Thu, 02 Feb 2017 12:56:49 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/BarkerD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclp/Barker04,
  author       = {Steve Barker},
  editor       = {Bart Demoen and
                  Vladimir Lifschitz},
  title        = {Labeled Logic Programs},
  booktitle    = {Logic Programming, 20th International Conference, {ICLP} 2004, Saint-Malo,
                  France, September 6-10, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3132},
  pages        = {448--449},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27775-0\_32},
  doi          = {10.1007/978-3-540-27775-0\_32},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iclp/Barker04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/Barker04,
  author       = {Steve Barker},
  title        = {Access Policy Specification for Web Applications},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {45--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286588},
  doi          = {10.1109/ITCC.2004.1286588},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/Barker04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/DouglasB04,
  author       = {Paul Douglas and
                  Steve Barker},
  title        = {Dependency Theory E-Learning Tool},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {151--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286442},
  doi          = {10.1109/ITCC.2004.1286442},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/DouglasB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/BarkerD04,
  author       = {Steve Barker and
                  Paul Douglas},
  title        = {Protecting Federated Databases Using {A} Practical Implementation
                  of a Formal {RBAC} Policy},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {523--527},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286510},
  doi          = {10.1109/ITCC.2004.1286510},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/BarkerD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pepm/BarkerLV04,
  author       = {Steve Barker and
                  Michael Leuschel and
                  Mauricio Varea},
  editor       = {Nevin Heintze and
                  Peter Sestoft},
  title        = {Efficient and flexible access control via logic program specialisation},
  booktitle    = {Proceedings of the 2004 {ACM} {SIGPLAN} Workshop on Partial Evaluation
                  and Semantics-based Program Manipulation, 2004, Verona, Italy, August
                  24-25, 2004},
  pages        = {190--199},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1014007.1014026},
  doi          = {10.1145/1014007.1014026},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pepm/BarkerLV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BarkerS03,
  author       = {Steve Barker and
                  Peter J. Stuckey},
  title        = {Flexible access control policy specification with constraint logic
                  programming},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {501--546},
  year         = {2003},
  url          = {https://doi.org/10.1145/950191.950194},
  doi          = {10.1145/950191.950194},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BarkerS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BarkerD03,
  author       = {Steve Barker and
                  Paul Douglas},
  editor       = {Sabrina De Capitani di Vimercati and
                  Indrakshi Ray and
                  Indrajit Ray},
  title        = {{RBAC} Policy Implementation for {SQL} Databases},
  booktitle    = {Data and Applications Security {XVII:} Status and Prospects, {IFIP}
                  {TC-11} {WG} 11.3 Seventeenth Annual Working Conference on Data and
                  Application Security, August4-6, 2003, Estes Park, Colorado, {USA}},
  series       = {{IFIP}},
  volume       = {142},
  pages        = {288--301},
  publisher    = {Kluwer/Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/1-4020-8070-0\_21},
  doi          = {10.1007/1-4020-8070-0\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BarkerD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/BarkerD03,
  author       = {Steve Barker and
                  Paul Douglas},
  title        = {Extended Protected Databases: {A} Practical Implementation},
  booktitle    = {{ICEIS} 2003, Proceedings of the 5th International Conference on Enterprise
                  Information Systems, Angers, France, April 22-26, 2003},
  pages        = {456--459},
  year         = {2003},
  timestamp    = {Thu, 02 Feb 2017 12:57:29 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/BarkerD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/BarkerD03,
  author       = {Steve Barker and
                  Paul Douglas},
  title        = {An E-Learning Tool for Understanding Schedule Properties},
  booktitle    = {2003 International Symposium on Information Technology {(ITCC} 2003),
                  28-30 April 2003, Las Vegas, NV, {USA}},
  pages        = {53},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ITCC.2003.1197499},
  doi          = {10.1109/ITCC.2003.1197499},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/BarkerD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Barker03,
  author       = {Steve Barker},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Distributed Access Control: {A} Logic-Based Approach},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {217--228},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_18},
  doi          = {10.1007/978-3-540-45215-7\_18},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Barker03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/Barker02,
  author       = {Steve Barker},
  title        = {Protecting deductive databases from unauthorized retrieval and update
                  requests},
  journal      = {Data Knowl. Eng.},
  volume       = {43},
  number       = {3},
  pages        = {293--315},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0169-023X(02)00126-X},
  doi          = {10.1016/S0169-023X(02)00126-X},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/Barker02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BarkerDF02,
  author       = {Steve Barker and
                  Paul Douglas and
                  Terry Fanning},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Implementing {RBAC} Policies},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {27--36},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 07:52:21 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BarkerDF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Barker02,
  author       = {Steve Barker},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Deductive Database Security},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {103--114},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Barker02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclp/Barker02,
  author       = {Steve Barker},
  editor       = {Peter J. Stuckey},
  title        = {Access Control for Deductive Databases by Logic Programming},
  booktitle    = {Logic Programming, 18th International Conference, {ICLP} 2002, Copenhagen,
                  Denmark, July 29 - August 1, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2401},
  pages        = {54--69},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45619-8\_5},
  doi          = {10.1007/3-540-45619-8\_5},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iclp/Barker02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BarkerR01,
  author       = {Steve Barker and
                  Arnon Rosenthal},
  editor       = {Martin S. Olivier and
                  David L. Spooner},
  title        = {Flexible Security Policies in {SQL}},
  booktitle    = {Database and Application Security XV, {IFIP} {TC11/WG11.3} Fifteenth
                  Annual Working Conference on Database and Application Security, July
                  15-18, 2001, Niagara on the Lake, Ontario, Canada},
  series       = {{IFIP} Conference Proceedings},
  volume       = {215},
  pages        = {167--180},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Tue, 07 May 2002 13:50:19 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BarkerR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Barker01,
  author       = {Steve Barker},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {{TRBAC:} {A} Temporal Authorization Model},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {178--188},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_19},
  doi          = {10.1007/3-540-45116-1\_19},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Barker01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/padl/Barker01,
  author       = {Steve Barker},
  editor       = {I. V. Ramakrishnan},
  title        = {Secure Deductive Databases},
  booktitle    = {Practical Aspects of Declarative Languages, Third International Symposium,
                  {PADL} 2001, Las Vegas, Nevada, USA, March 11-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1990},
  pages        = {123--137},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45241-9\_9},
  doi          = {10.1007/3-540-45241-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/padl/Barker01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cl/Barker00,
  author       = {Steve Barker},
  editor       = {John W. Lloyd and
                  Ver{\'{o}}nica Dahl and
                  Ulrich Furbach and
                  Manfred Kerber and
                  Kung{-}Kiu Lau and
                  Catuscia Palamidessi and
                  Lu{\'{\i}}s Moniz Pereira and
                  Yehoshua Sagiv and
                  Peter J. Stuckey},
  title        = {Data Protection by Logic Programming},
  booktitle    = {Computational Logic - {CL} 2000, First International Conference, London,
                  UK, 24-28 July, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1861},
  pages        = {1300--1314},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44957-4\_87},
  doi          = {10.1007/3-540-44957-4\_87},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cl/Barker00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Barker00,
  author       = {Steve Barker},
  editor       = {Bhavani Thuraisingham and
                  Reind P. van de Riet and
                  Klaus R. Dittrich and
                  Zahir Tari},
  title        = {Protecting Deductive Databases from Unauthorized Retrievals},
  booktitle    = {Data and Application Security, Development and Directions, {IFIP}
                  {TC11/} {WG11.3} Fourteenth Annual Working Conference on Database
                  Security, Schoorl, The Netherlands, August 21-23, 2000},
  series       = {{IFIP} Conference Proceedings},
  volume       = {201},
  pages        = {185--196},
  publisher    = {Kluwer},
  year         = {2000},
  url          = {https://doi.org/10.1007/0-306-47008-X\_17},
  doi          = {10.1007/0-306-47008-X\_17},
  timestamp    = {Wed, 29 Jun 2022 15:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Barker00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/Barker00,
  author       = {Steve Barker},
  title        = {Information Security: {A} Logic Based Approach},
  booktitle    = {{ICEIS} 2000, Proceedings of the Second International Conference on
                  Enterprise Information Systems, Stafford, UK, July 4-7, 2000},
  pages        = {9--14},
  publisher    = {{ICEIS} Secretariat, Escola Superior de Tecnologia de Set{\'{u}}bal,
                  Portugal},
  year         = {2000},
  timestamp    = {Thu, 02 Feb 2017 12:59:58 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/Barker00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Barker99,
  author       = {Steve Barker},
  editor       = {Vijayalakshmi Atluri and
                  John Hale},
  title        = {Temporal Authorization in the Simplified Event Calculus},
  booktitle    = {Research Advances in Database and Information Systems Security, {IFIP}
                  {WG} 11.3 Thirteenth International Conference on Database Security,
                  July 26-28, 1999, Seattle, Washington, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {171},
  pages        = {271--284},
  publisher    = {Kluwer},
  year         = {1999},
  timestamp    = {Thu, 03 Jan 2002 11:56:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Barker99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icai/Barker99,
  author       = {Steve Barker},
  editor       = {Hamid R. Arabnia},
  title        = {An Expert System for Intelligent Database Design},
  booktitle    = {Proceedings of the International Conference on Artificial Intelligence,
                  {IC-AI} '99, June 28 - July 1, 1999, Las Vegas, Nevada, USA, Volume
                  1},
  pages        = {143--148},
  publisher    = {{CSREA} Press},
  year         = {1999},
  timestamp    = {Fri, 26 Mar 2004 13:51:06 +0100},
  biburl       = {https://dblp.org/rec/conf/icai/Barker99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics