dblp.uni-trier.dewww.uni-trier.de

Sandro Etalle

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
96EEAyse Morali, Emmanuele Zambon, Sandro Etalle, Paul L. O. Re: IT confidentiality risk assessment for an architecture-based approach. BDIM 2008: 31-40
95EEFred Spiessens, Jerry den Hartog, Sandro Etalle: Know What You Trust. Formal Aspects in Security and Trust 2008: 129-142
94EEDamiano Bolzoni, Sandro Etalle: Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. OTM Conferences (2) 2008: 938-955
93EEM. A. C. Dekker, Jason Crampton, Sandro Etalle: RBAC administration in distributed systems. SACMAT 2008: 93-102
2007
92EEM. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle: Extended privilege inheritance in RBAC. ASIACCS 2007: 383-385
91EESandro Etalle, Jerry den Hartog, Stephen Marsh: Trust and punishment. Autonomics 2007: 5
90EEEmmanuele Zambon, Damiano Bolzoni, Sandro Etalle, Marco Salvato: Model-Based Mitigation of Availability Risks. BDIM 2007: 75-83
89EEMarcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough: An Introduction to the Role Based Trust Management Framework RT. FOSAD 2007: 246-281
88EEMarcin Czenko, Sandro Etalle: Core TuLiP Logic Programming for Trust Management. ICLP 2007: 380-394
87EEDamiano Bolzoni, Bruno Crispo, Sandro Etalle: ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. LISA 2007: 141-152
86EESandro Etalle, William H. Winsborough: A posteriori compliance control. SACMAT 2007: 11-20
85EEM. A. C. Dekker, Sandro Etalle: Refinement for Administrative Policies. Secure Data Management 2007: 33-46
84EESandro Etalle, Fabio Massacci, Artsiom Yautsiukhin: The Meaning of Logs. TrustBus 2007: 145-154
83EEM. A. C. Dekker, Sandro Etalle: Audit-Based Access Control for Electronic Health Records. Electr. Notes Theor. Comput. Sci. 168: 221-236 (2007)
82EESandro Etalle, Pierangela Samarati: Preface. Electr. Notes Theor. Comput. Sci. 179: 1-2 (2007)
81EEJ. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini: Audit-based compliance control. Int. J. Inf. Sec. 6(2-3): 133-151 (2007)
80EERicardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader: Timed analysis of security protocols. Journal of Computer Security 15(6): 619-645 (2007)
2006
79 Sandro Etalle, Miroslaw Truszczynski: Logic Programming, 22nd International Conference, ICLP 2006, Seattle, WA, USA, August 17-20, 2006, Proceedings Springer 2006
78EERicardo Corin, Sandro Etalle, Ari Saptawijaya: A Logic for Constraint-based Security Protocol Analysis. IEEE Symposium on Security and Privacy 2006: 155-168
77EEDamiano Bolzoni, Sandro Etalle, Pieter H. Hartel, Emmanuele Zambon: POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System. IWIA 2006: 144-156
76 Cheun Ngen Chong, Ricardo Corin, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Yee Wei Law, Andrew Tokmakoff: LicenseScript: a logical language for digital rights management. Annales des Télécommunications 61(3-4): 284-331 (2006)
75EEDamiano Bolzoni, Sandro Etalle: APHRODITE: an Anomaly-based Architecture for False Positive Reduction CoRR abs/cs/0604026: (2006)
74EEMarcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Jerry den Hartog: Nonmonotonic Trust Management for P2P Applications. Electr. Notes Theor. Comput. Sci. 157(3): 113-130 (2006)
73EEGiorgio Delzanno, Sandro Etalle, Maurizio Gabbrielli: Introduction to the Special Issue on Specification Analysis and Verification of Reactive Systems. TPLP 6(3): 225-226 (2006)
2005
72 Sandro Etalle: Logic Based Program Synthesis and Transformation, 14th International Symposium, LOPSTR 2004, Verona, Italy, August 26-28, 2004, Revised Selected Papers Springer 2005
71EERicardo Corin, Gaetano Di Caprio, Sandro Etalle, Stefania Gnesi, Gabriele Lenzini, Corrado Moiso: A Formal Security Analysis of an OSA/Parlay Authentication Interface. FMOODS 2005: 131-146
70 Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, Rieks Joosten, Geert Kleinhuis: Service Brokerage in Prolog. ICEIS (3) 2005: 409-412
69EERicardo Corin, Ari Saptawijaya, Sandro Etalle: PS-LTL for Constraint-Based Security Protocol Analysis. ICLP 2005: 439-440
68EEJ. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog: An Audit Logic for Accountability. POLICY 2005: 34-43
67EESandro Etalle, William H. Winsborough: Integrity constraints in trust management. SACMAT 2005: 1-10
66 Jieyin Cheng, Cheun Ngen Chong, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus: StreamTo: Streaming Content using a Tamper-Resistant Token. SEC 2005: 601-612
65EEJ. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog: An Audit Logic for Accountability CoRR abs/cs/0502091: (2005)
64EERicardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader: Timed Analysis of Security Protocols CoRR abs/cs/0503036: (2005)
63EESandro Etalle, William H. Winsborough: Integrity Constraints in Trust Management CoRR abs/cs/0503061: (2005)
62EEMarcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Jerry den Hartog: Nonmonotonic Trust Management for P2P Applications CoRR abs/cs/0510061: (2005)
61EEDamiano Bolzoni, Emmanuele Zambon, Sandro Etalle, Pieter H. Hartel: Poseidon: a 2-tier Anomaly-based Intrusion Detection System CoRR abs/cs/0511043: (2005)
60EESandro Etalle, Supratik Mukhopadhyay, Abhik Roychoudhury: Preface. Electr. Notes Theor. Comput. Sci. 118: 1- (2005)
59EERicardo Corin, Sandro Etalle, Pieter H. Hartel, Antonio Durante: A Trace Logic for Local Security Properties. Electr. Notes Theor. Comput. Sci. 118: 129-143 (2005)
58EERicardo Corin, Jeroen Doumen, Sandro Etalle: Analysing Password Protocol Security Against Off-line Dictionary Attacks. Electr. Notes Theor. Comput. Sci. 121: 47-63 (2005)
2004
57EEPieter H. Hartel, Pascal van Eck, Sandro Etalle, Roel Wieringa: Modelling Mobility Aspects of Security Policies. CASSIS 2004: 172-191
56EERicardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader: Timed model checking of security protocols. FMSE 2004: 23-32
55EERicardo Corin, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini, I. Staicu: A Logic for Auditing Accountability in Decentralized Systems. Formal Aspects in Security and Trust 2004: 187-201
54EEAnnalisa Bossi, Nicoletta Cocco, Sandro Etalle, Sabina Rossi: Declarative Semantics of Input Consuming Logic Programs. Program Development in Computational Logic 2004: 90-114
53EECheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin: License Protection with a Tamper-Resistant Token. WISA 2004: 223-237
52EEAnnalisa Bossi, Sandro Etalle, Sabina Rossi, Jan-Georg Smaus: Termination of simply moded logic programs with dynamic scheduling. ACM Trans. Comput. Log. 5(3): 470-507 (2004)
51EERicardo Corin, Antonio Durante, Sandro Etalle, Pieter H. Hartel: A Trace Logic for Local Security Properties CoRR cs.CR/0411010: (2004)
2003
50EECheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, Yee Wei Law: Approximating Fair Use in LicenseScript. ICADL 2003: 432-443
49EERoberto Di Pietro, Luigi V. Mancini, Yee Wei Law, Sandro Etalle, Paul J. M. Havinga: LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. ICPP Workshops 2003: 397-
48EECheun Ngen Chong, Sandro Etalle, Pieter H. Hartel: Comparing Logic-Based and XML-Based Rights Expression Languages. OTM Workshops 2003: 779-792
47EEPaul J. M. Havinga, Sandro Etalle, Holger Karl, Chiara Petrioli, Michele Zorzi, Harry Kip, Thomas Lentsch: EYES - Energy Efficient Sensor Networks. PWC 2003: 198-201
46EEYee Wei Law, Ricardo Corin, Sandro Etalle, Pieter H. Hartel: A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. PWC 2003: 27-39
45 Yee Wei Law, Sandro Etalle, Pieter H. Hartel: Assessing Security in Energy-Efficient Sensor Networks. SEC 2003: 459-463
2002
44EEAnnalisa Bossi, Nicoletta Cocco, Sandro Etalle: Transformation Systems and Nondeclarative Properties. Computational Logic: Logic Programming and Beyond 2002: 162-186
43EERicardo Corin, Sandro Etalle: An Improved Constraint-Based System for the Verification of Security Protocols. SAS 2002: 326-341
42 Annalisa Bossi, Sandro Etalle, Sabina Rossi: Properties of input-consuming derivations. TPLP 2(2): 125-154 (2002)
41 Annalisa Bossi, Nicoletta Cocco, Sandro Etalle, Sabina Rossi: On modular termination proofs of general logic programs. TPLP 2(3): 263-291 (2002)
2001
40EEAnnalisa Bossi, Sandro Etalle, Sabina Rossi, Jan-Georg Smaus: Semantics and Termination of Simply-Moded Logic Programs with Dynamic Scheduling. ESOP 2001: 402-416
39EEGiorgio Delzanno, Sandro Etalle: Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols. LOPSTR 2001: 76-90
38EESandro Etalle, Maurizio Gabbrielli, Maria Chiara Meo: Transformations of CCP programs. ACM Trans. Program. Lang. Syst. 23(3): 304-395 (2001)
37EEAnnalisa Bossi, Sandro Etalle, Sabina Rossi, Jan-Georg Smaus: Semantics and Termination of Simply-Moded Logic Programs with Dynamic Scheduling CoRR cs.LO/0101022: (2001)
36EEAnnalisa Bossi, Sandro Etalle, Sabina Rossi: Properties of Input-Consuming Derivations CoRR cs.PL/0101023: (2001)
35EESandro Etalle, Maurizio Gabbrielli, Maria Chiara Meo: Transformations of CCP programs CoRR cs.PL/0107014: (2001)
2000
34EEAnnalisa Bossi, Sandro Etalle, Sabina Rossi: Semantics of Input-Consuming Logic Programs. Computational Logic 2000: 194-208
33EESandro Etalle, Jon Mountjoy: The lazy functional side of logic programming. LOPSTR 2000
32EEAnnalisa Bossi, Nicoletta Cocco, Sandro Etalle, Sabina Rossi: On Modular Termination Proofs of General Logic Programs CoRR cs.LO/0005018: (2000)
31EESandro Etalle, Jon Mountjoy: The (Lazy) Functional Side of Logic Programming CoRR cs.PL/0003070: (2000)
30 Annalisa Bossi, Sandro Etalle, Sabina Rossi: Semantics of well-moded input-consuming logic programs. Comput. Lang. 26(1): 1-25 (2000)
1999
29 Marco Bertolino, Sandro Etalle, Catuscia Palamidessi: The Replacement Operation for CCP Programs. APPIA-GULP-PRODE 1999: 441-454
28 Sandro Etalle, Femke van Raamsdonk: Logic Programming with Requests. ICLP 1999: 558-572
27 Annalisa Bossi, Nicoletta Cocco, Sandro Etalle: Transformation of Left Terminating Programs. LOPSTR 1999: 156-175
26 Marco Bertolino, Sandro Etalle, Catuscia Palamidessi: The Replacement Operation for CCP Programs. LOPSTR 1999: 216-233
25EESandro Etalle, Jan-Georg Smaus: Preface - Workshop on Verification of Logic Programs. Electr. Notes Theor. Comput. Sci. 30(1): (1999)
24EEAnnalisa Bossi, Sandro Etalle, Sabina Rossi: Properties of Input-Consuming Derivations. Electr. Notes Theor. Comput. Sci. 30(1): (1999)
23 Sandro Etalle, Annalisa Bossi, Nicoletta Cocco: Termination of Well-Moded Programs. J. Log. Program. 38(2): 243-257 (1999)
22 Sandro Etalle, Maurizio Gabbrielli: Layered Modes. J. Log. Program. 39(1-3): 225-244 (1999)
21 Sandro Etalle, Pieter H. Hartel, Willem G. Vree: Declarative solutions to partitioned-grid problems. Softw., Pract. Exper. 29(13): 1173-1200 (1999)
1998
20EESandro Etalle, Maurizio Gabbrielli, Maria Chiara Meo: Unfold/Fold Transformations of CCP Programs. CONCUR 1998: 348-365
19 Sandro Etalle, Femke van Raamsdonk: Beyond Success and Failure. IJCSLP 1998: 190-205
18EESandro Etalle, Maurizio Gabbrielli: Partial Evaluation of Concurrent Constraint Languages. ACM Comput. Surv. 30(3es): 11 (1998)
17EESandro Etalle: A Semantics for Modular General Logic Programs. Theor. Comput. Sci. 206(1-2): 51-80 (1998)
1997
16EESandro Etalle, Maurizio Gabbrielli, Elena Marchiori: A Transformation System for CLP with Dynamic Scheduling and CCP. PEPM 1997: 137-150
1996
15 Sandro Etalle, Maurizio Gabbrielli: Layered Modes. APPIA-GULP-PRODE 1996: 41-52
14 Sandro Etalle, Frank Teusink: A Compositional Semantics for Normal Open Programs. JICSLP 1996: 468-482
13 Annalisa Bossi, Nicoletta Cocco, Sandro Etalle: Simultaneous Replacement in Normal Programs. J. Log. Comput. 6(1): 79-120 (1996)
12EESandro Etalle: Unification-free Prolog programs revisited. J. Prog. Lang. 4(4): 187-210 (1996)
11 Sandro Etalle, Maurizio Gabbrielli: On the Correctness of the Replacement Operation for CLP Modules. Journal of Functional and Logic Programming 1996(1): (1996)
10EESandro Etalle, Maurizio Gabbrielli: Transformations of CLP Modules. Theor. Comput. Sci. 166(1&2): 101-146 (1996)
1995
9 Sandro Etalle, Maurizio Gabbrielli: A Transformation System for Modular CLP Programs. ICLP 1995: 681-695
8 Annalisa Bossi, Nicoletta Cocco, Sandro Etalle: Transformation of Left Terminating Programs: the Reordering Problem. LOPSTR 1995: 33-45
7 Sandro Etalle, Maurizio Gabbrielli: The Replacement Operation for CLP Modules. PEPM 1995: 168-177
1994
6 Sandro Etalle, Maurizio Gabbrielli: Modular Transformations of CLP Programs. GULP-PRODE (1) 1994: 218-233
5 Annalisa Bossi, Sandro Etalle: More on Unfold/Fold Transformations of Normal Programs: Preservation of Fitting's Semantics. META 1994: 311-331
4EEAnnalisa Bossi, Sandro Etalle: Transforming Acyclic Programs. ACM Trans. Program. Lang. Syst. 16(4): 1081-1096 (1994)
1993
3 Krzysztof R. Apt, Sandro Etalle: On the Unification Free Prolog Programs. MFCS 1993: 1-19
1992
2 Annalisa Bossi, Nicoletta Cocco, Sandro Etalle: Transforming Normal Programs by Replacement. META 1992: 265-279
1 Annalisa Bossi, Nicoletta Cocco, Sandro Etalle: On Safe Folding. PLILP 1992: 172-186

Coauthor Index

1Krzysztof R. Apt [3]
2Marco Bertolino [26] [29]
3Damiano Bolzoni [61] [75] [77] [87] [90] [94]
4Annalisa Bossi [1] [2] [4] [5] [8] [13] [23] [24] [27] [30] [32] [34] [36] [37] [40] [41] [42] [44] [52] [54]
5Gaetano Di Caprio [71]
6J. G. Cederquist (Jan Cederquist) [65] [68] [81] [92]
7Jieyin Cheng [66]
8Cheun Ngen Chong [48] [50] [53] [66] [70] [76]
9Nicoletta Cocco [1] [2] [8] [13] [23] [27] [32] [41] [44] [54]
10Ricardo Corin [43] [46] [51] [53] [55] [56] [58] [59] [64] [65] [68] [69] [71] [76] [78] [80] [81]
11Jason Crampton [92] [93]
12Bruno Crispo [87]
13Marcin Czenko [62] [74] [88] [89]
14M. A. C. Dekker [65] [68] [81] [83] [85] [92] [93]
15Giorgio Delzanno [39] [73]
16Jeroen Doumen [53] [58] [62] [66] [74] [76]
17Antonio Durante [51] [59]
18Pascal van Eck [57]
19Maurizio Gabbrielli [6] [7] [9] [10] [11] [15] [16] [18] [20] [22] [35] [38] [73]
20Stefania Gnesi [71]
21Pieter H. Hartel [21] [45] [46] [48] [50] [51] [53] [56] [57] [59] [61] [62] [64] [66] [70] [74] [76] [77] [80]
22Jerry den Hartog (J. I. den Hartog) [55] [62] [65] [68] [74] [81] [91] [95]
23Paul J. M. Havinga [47] [49]
24Rieks Joosten [70]
25Holger Karl [47]
26Harry Kip [47]
27Geert Kleinhuis [70]
28Yee Wei Law [45] [46] [49] [50] [76]
29Thomas Lentsch [47]
30Gabriele Lenzini [55] [71] [81]
31Dongyi Li [89]
32Angelika Mader [56] [64] [80]
33Luigi V. Mancini [49]
34Elena Marchiori [16]
35Stephen Marsh [91]
36Fabio Massacci [84]
37Maria Chiara Meo [20] [35] [38]
38Corrado Moiso [71]
39Ayse Morali [96]
40Jon Mountjoy [31] [33]
41Supratik Mukhopadhyay [60]
42Stefan Nikolaus [66]
43Catuscia Palamidessi [26] [29]
44Chiara Petrioli [47]
45Roberto Di Pietro [49]
46Femke van Raamsdonk [19] [28]
47Paul L. O. Re [96]
48Bin Ren [53]
49Sabina Rossi [24] [30] [32] [34] [36] [37] [40] [41] [42] [52] [54]
50Abhik Roychoudhury [60]
51Marco Salvato [90]
52Pierangela Samarati [82]
53Ari Saptawijaya [69] [78]
54Jan-Georg Smaus [25] [37] [40] [52]
55Fred Spiessens [95]
56I. Staicu [55]
57Frank Teusink [14]
58Andrew Tokmakoff [76]
59Ha Tran [62] [74]
60Miroslaw Truszczynski [79]
61Willem G. Vree [21]
62Roel Wieringa [57]
63William H. Winsborough [63] [67] [86] [89]
64Artsiom Yautsiukhin [84]
65Emmanuele Zambon [61] [77] [90] [96]
66Michele Zorzi [47]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)