2010 | ||
---|---|---|
106 | Fabio Massacci, Dan S. Wallach, Nicola Zannone: Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings Springer 2010 | |
2009 | ||
105 | Fabio Massacci, Samuel T. Redwine Jr., Nicola Zannone: Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings Springer 2009 | |
104 | Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin: Logging key assurance indicators in business processes. ASIACCS 2009: 364-367 | |
103 | Alzbeta Krausová, Fabio Massacci, Ayda Saïdane: How to capture and use legal patterns in IT. ICAIL 2009: 228-229 | |
102 | Daniela Marino, Fabio Massacci, Andrea Micheletti, Nataliya Rassadko, Stephan Neuhaus: Satisfaction of Control Objectives by Control Processes. ICSOC/ServiceWave 2009: 531-545 | |
101 | Nataliia Bielova, Fabio Massacci, Andrea Micheletti: Towards Practical Enforcement Theories. NordSec 2009: 239-254 | |
100 | Luca Compagna, Paul El Khoury, Alzbeta Krausová, Fabio Massacci, Nicola Zannone: How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artif. Intell. Law 17(1): 1-30 (2009) | |
99 | Nicola Dragoni, Fabio Massacci, Ayda Saïdane: A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems. Computer Networks 53(10): 1628-1648 (2009) | |
98 | Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe: The S3MS.NET Run Time Monitor: Tool Demonstration. Electr. Notes Theor. Comput. Sci. 253(5): 153-159 (2009) | |
97 | Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadko: Generalized XML security views. Int. J. Inf. Sec. 8(3): 173-203 (2009) | |
96 | Nataliia Bielova, Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka, Ida Siahaan: Matching in security-by-contract for mobile code. J. Log. Algebr. Program. 78(5): 340-358 (2009) | |
2008 | ||
95 | Akshai Aggarwal, Mohamad Badra, Fabio Massacci: NTMS 2008, 2nd International Conference on New Technologies, Mobility and Security, November 5-7, 2008, Tangier, Marrocco IEEE 2008 | |
94 | Fabio Massacci, Katsiaryna Naliuka: Towards Practical Security Monitors of UML Policies for Mobile Applications. ARES 2008: 1112-1119 | |
93 | Fabio Massacci, Frank Piessens, Ida Siahaan: Security-By-Contract for the Future Internet. FIS 2008: 29-43 | |
92 | Nataliia Bielova, Fabio Massacci: Do You Really Mean What You Actually Enforced?. Formal Aspects in Security and Trust 2008: 287-301 | |
91 | Fabio Massacci, Nicola Zannone: A Model-Driven Approach for the Specification and Analysis of Access Control Policies. OTM Conferences (2) 2008: 1087-1103 | |
90 | Fabio Massacci, Ida Siahaan: Simulating midlet's security claims with automata modulo theory. PLAS 2008: 1-9 | |
89 | Azzedine Benameur, Fabio Massacci, Nataliya Rassadko: Security views for outsourced business processes. SWS 2008: 45-52 | |
88 | Fabio Massacci, Frank Piessens: Preface. Electr. Notes Theor. Comput. Sci. 197(1): 1-2 (2008) | |
87 | Luca Compagna, Volkmar Lotz, Fabio Massacci: Preface. Electr. Notes Theor. Comput. Sci. 197(2): 1-2 (2008) | |
86 | Fabio Massacci, Frank Piessens, Sjouke Mauw: Preface. Sci. Comput. Program. 74(1-2): 1 (2008) | |
85 | Hristo Koshutanski, Fabio Massacci: Interactive access control for autonomic systems: From theory to implementation. TAAS 3(3): (2008) | |
84 | Volkmar Lotz, Emmanuel Pigout, Peter M. Fischer, Donald Kossmann, Fabio Massacci, Alexander Pretschner: Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach. Wirtschaftsinformatik 50(5): 383-391 (2008) | |
2007 | ||
83 | Yudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone: From Trust to Dependability through Risk Analysis. ARES 2007: 19-26 | |
82 | Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe: A flexible security architecture to support third-party applications on mobile devices. CSAW 2007: 19-28 | |
81 | Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka, Ida Siahaan: Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code. EuroPKI 2007: 297-312 | |
80 | Fabio Massacci, Artsiom Yautsiukhin: Modelling Quality of Protection in Outsourced Business Processes. IAS 2007: 247-252 | |
79 | Luca Compagna, Paul El Khoury, Fabio Massacci, Reshma Thomas, Nicola Zannone: How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. ICAIL 2007: 149-153 | |
78 | Hugo A. López, Fabio Massacci, Nicola Zannone: Goal-Equivalent Secure Business Process Re-engineering. ICSOC Workshops 2007: 212-223 | |
77 | Fabio Massacci, Katsiaryna Naliuka: Towards Practical Security Monitors of UML Policies for Mobile Applications. POLICY 2007: 278 | |
76 | Fabio Massacci, Artsiom Yautsiukhin: An algorithm for the appraisal of assurance indicators for complex business processes. QoP 2007: 22-27 | |
75 | Nicola Dragoni, Fabio Massacci: Security-by-contract for web services. SWS 2007: 90-98 | |
74 | Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin: The Meaning of Logs. TrustBus 2007: 145-154 | |
73 | Alexander Pretschner, Fabio Massacci, Manuel Hilty: Usage Control in Service-Oriented Architectures. TrustBus 2007: 83-93 | |
72 | Fabio Massacci, John Mylopoulos, Nicola Zannone: Computer-aided Support for Secure Tropos. Autom. Softw. Eng. 14(3): 341-364 (2007) | |
71 | Yücel Karabulut, Florian Kerschbaum, Fabio Massacci, Philip Robinson, Artsiom Yautsiukhin: Security and Trust in IT Business Outsourcing: a Manifesto. Electr. Notes Theor. Comput. Sci. 179: 47-58 (2007) | |
70 | Fabio Massacci, John Mylopoulos, Nicola Zannone: From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach. International Journal of Software Engineering and Knowledge Engineering 17(2): 265-284 (2007) | |
69 | Hristo Koshutanski, Fabio Massacci: A Negotiation Scheme for Access Rights Establishment in Autonomic Communication. J. Network Syst. Manage. 15(1): 117-136 (2007) | |
2006 | ||
68 | Günter Karjoth, Fabio Massacci: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006 ACM 2006 | |
67 | Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio Massacci: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings Springer 2006 | |
66 | Volha Bryl, Fabio Massacci, John Mylopoulos, Nicola Zannone: Designing Security Requirements Models Through Planning. CAiSE 2006: 33-47 | |
65 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Detecting Conflicts of Interest. RE 2006: 308-311 | |
64 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Requirements engineering for trust management: model, methodology, and reasoning. Int. J. Inf. Sec. 5(4): 257-274 (2006) | |
63 | Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson: Verifying the SET Purchase Protocols. J. Autom. Reasoning 36(1-2): 5-37 (2006) | |
62 | Simon Dobson, Spyros G. Denazis, Antonio Fernández, Dominique Gaïti, Erol Gelenbe, Fabio Massacci, Paddy Nixon, Fabrice Saffre, Nikita Schmidt, Franco Zambonelli: A survey of autonomic communications. TAAS 1(2): 223-259 (2006) | |
61 | Fabio Massacci, John Mylopoulos, Nicola Zannone: Hierarchical hippocratic databases with minimal disclosure for virtual organizations. VLDB J. 15(4): 370-387 (2006) | |
2005 | ||
60 | Fabio Massacci, John Mylopoulos, Nicola Zannone: Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. ESORICS 2005: 438-454 | |
59 | Paolo Giorgini, Fabio Massacci, Nicola Zannone: Security and Trust Requirements Engineering. FOSAD 2005: 237-272 | |
58 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. RE 2005: 167-176 | |
57 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: ST-Tool: A CASE Tool for Security Requirements Engineering. RE 2005: 451-452 | |
56 | Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadko: Generalized XML security views. SACMAT 2005: 77-84 | |
55 | Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera: Maintaining privacy on derived objects. WPES 2005: 10-19 | |
54 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. iTrust 2005: 161-176 | |
53 | Hristo Koshutanski, Fabio Massacci: Interactive Credential Negotiation for Stateful Business Processes. iTrust 2005: 256-272 | |
52 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Alberto Siena, Nicola Zannone: ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. iTrust 2005: 415-419 | |
51 | Fabio Massacci, Marco Prest, Nicola Zannone: Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation. Computer Standards & Interfaces 27(5): 445-455 (2005) | |
50 | Alexey Gotsman, Fabio Massacci, Marco Pistore: Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language. Electr. Notes Theor. Comput. Sci. 135(1): 59-77 (2005) | |
49 | Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson: An overview of the verification of SET. Int. J. Inf. Sec. 4(1-2): 17-28 (2005) | |
2004 | ||
48 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures. EuroPKI 2004: 98-111 | |
47 | Hristo Koshutanski, Fabio Massacci: An Interactive Trust Management and Negotiation Scheme. Formal Aspects in Security and Trust 2004: 115-128 | |
46 | Hristo Koshutanski, Fabio Massacci: A System for Interactive Authorization for Business Processes for Web Services. ICWE 2004: 521-525 | |
45 | Hristo Koshutanski, Fabio Massacci: Interactive Access Control for Web Services. SEC 2004: 151-166 | |
44 | Fabio Massacci, Nicola Zannone: Privacy Is Linking Permission to Purpose. Security Protocols Workshop 2004: 179-191 | |
43 | Fabio Massacci: Privacy is Linking Permission to Purpose (Transcript of Discussion). Security Protocols Workshop 2004: 192-198 | |
42 | Hristo Koshutanski, Fabio Massacci: E Pluribus Unum. WAC 2004: 179-190 | |
41 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning. iTrust 2004: 176-190 | |
2003 | ||
40 | Paolo Giorgini, Fabio Massacci, John Mylopoulos: Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard. ER 2003: 263-276 | |
39 | Giampaolo Bella, Stefano Bistarelli, Fabio Massacci: A Protocol's Life After Attacks.... Security Protocols Workshop 2003: 3-10 | |
38 | Hristo Koshutanski, Fabio Massacci: An access control framework for business processes for web services. XML Security 2003: 15-24 | |
37 | Claudia Fiorini, Enrico Martinelli, Fabio Massacci: How to fake an RSA signature by encoding modular root finding as a SAT problem. Discrete Applied Mathematics 130(2): 101-127 (2003) | |
2002 | ||
36 | Giampaolo Bella, Lawrence C. Paulson, Fabio Massacci: The verification of an industrial payment protocol: the SET purchase phase. ACM Conference on Computer and Communications Security 2002: 12-20 | |
35 | Luigia Carlucci Aiello, Fabio Massacci: Planning Attacks to Security Protocols: Case Studies in Logic Programming. Computational Logic: Logic Programming and Beyond 2002: 533-560 | |
34 | Francesco M. Donini, Paolo Liberatore, Fabio Massacci, Marco Schaerf: Solving QBF by SMV. KR 2002: 578-592 | |
2001 | ||
33 | Fabio Massacci: Decision Procedures for Expressive Description Logics with Intersection, Composition, Converse of Roles and Role Identity. IJCAI 2001: 193-198 | |
32 | Luis Fariñas del Cerro, David Fauthoux, Olivier Gasquet, Andreas Herzig, Dominique Longin, Fabio Massacci: Lotrec : The Generic Tableau Prover for Modal and Description Logics. IJCAR 2001: 453-458 | |
31 | Luigia Carlucci Aiello, Fabio Massacci: Verifying security protocols as planning in logic programming. ACM Trans. Comput. Log. 2(4): 542-580 (2001) | |
30 | Luigia Carlucci Aiello, Fabio Massacci: Attacking fair-exchange protocols: parallel models vs trace models. Electr. Notes Theor. Comput. Sci. 55(1): (2001) | |
2000 | ||
29 | Luigia Carlucci Aiello, Fabio Massacci: An Executable Specification Language for Planning Attacks to Security Protocols. CSFW 2000: 88-102 | |
28 | Peter Baumgartner, Fabio Massacci: The Taming of the (X)OR. Computational Logic 2000: 508-522 | |
27 | Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano: Formal Verification of Cardholder Registration in SET. ESORICS 2000: 159-174 | |
26 | Fabio Massacci: Reduction rules and universal variables for first order tableaux and DPLL. KR 2000: 186-197 | |
25 | Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano: Making Sense of Specifications: The Formalization of SET. Security Protocols Workshop 2000: 74-81 | |
24 | Fabio Massacci, Francesco M. Donini: Design and Results of TANCS-2000 Non-classical (Modal) Systems Comparison. TABLEAUX 2000: 52-56 | |
23 | Francesco M. Donini, Fabio Massacci: EXPTIME tableaux for ALC. Artif. Intell. 124(1): 87-138 (2000) | |
22 | Maarit Hietalahti, Fabio Massacci, Ilkka Niemelä: DES: a Challenge Problem for Nonmonotonic Reasoning Systems CoRR cs.AI/0003039: (2000) | |
21 | Giuseppe De Giacomo, Fabio Massacci: Combining Deduction and Model Checking into Tableaux and Algorithms for Converse-PDL. Inf. Comput. 162(1-2): 117-137 (2000) | |
20 | Fabio Massacci, Laura Marraro: Logical Cryptanalysis as a SAT Problem. J. Autom. Reasoning 24(1/2): 165-203 (2000) | |
19 | Fabio Massacci: Single Step Tableaux for Modal Logics. J. Autom. Reasoning 24(3): 319-364 (2000) | |
18 | Fabio Massacci: The proof complexity of analytic and clausal tableaux. Theor. Comput. Sci. 243(1-2): 477-487 (2000) | |
1999 | ||
17 | Fabio Massacci: Using Walk-SAT and Rel-Sat for Cryptographic Key Search. IJCAI 1999: 290-295 | |
16 | Fabio Massacci: Design and Results of the Tableaux-99 Non-classical (Modal) Systems Comparison. TABLEAUX 1999: 14-18 | |
15 | Fabio Massacci: Automated Reasoning and the Verification of Security Protocols. TABLEAUX 1999: 32-33 | |
1998 | ||
14 | Fabio Massacci: Anytime Approximate Modal Reasoning. AAAI/IAAI 1998: 274-279 | |
13 | Fabio Massacci: Cook and Reckhow are Wrong: Subexponential Tableaux Proofs for Their Family of Formulae. ECAI 1998: 408-409 | |
12 | Fabio Massacci: Simplification: A General Constraint Propagation Technique for Propositional and Modal Tableaux. TABLEAUX 1998: 217-231 | |
11 | Fabio Massacci: Tableau Methods for Formal Verification of Multi-Agent Distributed Systems. J. Log. Comput. 8(3): 373-400 (1998) | |
1997 | ||
10 | Fabio Massacci: A Proof Theory for Tractable Approximations of Propositional Reasoning. AI*IA 1997: 219-230 | |
9 | Fabio Massacci: Breaking Security Protocols as an AI Planning Problem. ECP 1997: 286-298 | |
8 | Fabio Massacci: Reasoning About Security: A Logic and a Decision Method for Role-Based Access Control. ECSQARU-FAPR 1997: 421-435 | |
7 | Fabio Massacci: Tableaux Methods for Access Control in Distributed Systems. TABLEAUX 1997: 246-260 | |
1996 | ||
6 | Fabio Massacci: Contextual Reasoning Is NP-Complete. AAAI/IAAI, Vol. 1 1996: 621-626 | |
5 | Giuseppe De Giacomo, Fabio Massacci: Tableaux and Algorithms for Propositional Dynamic Logic with Converse. CADE 1996: 613-627 | |
4 | Giuseppe De Giacomo, Francesco M. Donini, Fabio Massacci: Exptime Tableaux for ALC. Description Logics 1996: 107-110 | |
3 | Fabio Massacci: Approximate Reasoning for Contextual Databases. ICTAI 1996: 308-315 | |
2 | Francesco M. Donini, Fabio Massacci, Daniele Nardi, Riccardo Rosati: A Uniform Tableaux Method for Nonmonotonic Modal Logics. JELIA 1996: 87-103 | |
1994 | ||
1 | Fabio Massacci: Strongly Analytic Tableaux for Normal Modal Logics. CADE 1994: 723-737 |