2009 |
94 | EE | Fabio Massacci,
Samuel T. Redwine Jr.,
Nicola Zannone:
Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings
Springer 2009 |
93 | EE | Fabio Massacci,
Gene Tsudik,
Artsiom Yautsiukhin:
Logging key assurance indicators in business processes.
ASIACCS 2009: 364-367 |
2008 |
92 | EE | Fabio Massacci,
Katsiaryna Naliuka:
Towards Practical Security Monitors of UML Policies for Mobile Applications.
ARES 2008: 1112-1119 |
91 | EE | Fabio Massacci,
Frank Piessens,
Ida Siahaan:
Security-By-Contract for the Future Internet.
FIS 2008: 29-43 |
90 | EE | Nataliia Bielova,
Fabio Massacci:
Do You Really Mean What You Actually Enforced?.
Formal Aspects in Security and Trust 2008: 287-301 |
89 | EE | Fabio Massacci,
Nicola Zannone:
A Model-Driven Approach for the Specification and Analysis of Access Control Policies.
OTM Conferences (2) 2008: 1087-1103 |
88 | EE | Fabio Massacci,
Ida Siahaan:
Simulating midlet's security claims with automata modulo theory.
PLAS 2008: 1-9 |
87 | EE | Azzedine Benameur,
Fabio Massacci,
Nataliya Rassadko:
Security views for outsourced business processes.
SWS 2008: 45-52 |
86 | EE | Fabio Massacci,
Frank Piessens:
Preface.
Electr. Notes Theor. Comput. Sci. 197(1): 1-2 (2008) |
85 | EE | Luca Compagna,
Volkmar Lotz,
Fabio Massacci:
Preface.
Electr. Notes Theor. Comput. Sci. 197(2): 1-2 (2008) |
84 | EE | Fabio Massacci,
Frank Piessens,
Sjouke Mauw:
Preface.
Sci. Comput. Program. 74(1-2): 1 (2008) |
83 | EE | Hristo Koshutanski,
Fabio Massacci:
Interactive access control for autonomic systems: From theory to implementation.
TAAS 3(3): (2008) |
2007 |
82 | EE | Yudistira Asnar,
Paolo Giorgini,
Fabio Massacci,
Nicola Zannone:
From Trust to Dependability through Risk Analysis.
ARES 2007: 19-26 |
81 | EE | Lieven Desmet,
Wouter Joosen,
Fabio Massacci,
Katsiaryna Naliuka,
Pieter Philippaerts,
Frank Piessens,
Dries Vanoverberghe:
A flexible security architecture to support third-party applications on mobile devices.
CSAW 2007: 19-28 |
80 | EE | Nicola Dragoni,
Fabio Massacci,
Katsiaryna Naliuka,
Ida Siahaan:
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code.
EuroPKI 2007: 297-312 |
79 | EE | Fabio Massacci,
Artsiom Yautsiukhin:
Modelling Quality of Protection in Outsourced Business Processes.
IAS 2007: 247-252 |
78 | EE | Luca Compagna,
Paul El Khoury,
Fabio Massacci,
Reshma Thomas,
Nicola Zannone:
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach.
ICAIL 2007: 149-153 |
77 | EE | Hugo A. López,
Fabio Massacci,
Nicola Zannone:
Goal-Equivalent Secure Business Process Re-engineering.
ICSOC Workshops 2007: 212-223 |
76 | EE | Fabio Massacci,
Katsiaryna Naliuka:
Towards Practical Security Monitors of UML Policies for Mobile Applications.
POLICY 2007: 278 |
75 | EE | Fabio Massacci,
Artsiom Yautsiukhin:
An algorithm for the appraisal of assurance indicators for complex business processes.
QoP 2007: 22-27 |
74 | EE | Nicola Dragoni,
Fabio Massacci:
Security-by-contract for web services.
SWS 2007: 90-98 |
73 | EE | Sandro Etalle,
Fabio Massacci,
Artsiom Yautsiukhin:
The Meaning of Logs.
TrustBus 2007: 145-154 |
72 | EE | Alexander Pretschner,
Fabio Massacci,
Manuel Hilty:
Usage Control in Service-Oriented Architectures.
TrustBus 2007: 83-93 |
71 | EE | Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Computer-aided Support for Secure Tropos.
Autom. Softw. Eng. 14(3): 341-364 (2007) |
70 | EE | Yücel Karabulut,
Florian Kerschbaum,
Fabio Massacci,
Philip Robinson,
Artsiom Yautsiukhin:
Security and Trust in IT Business Outsourcing: a Manifesto.
Electr. Notes Theor. Comput. Sci. 179: 47-58 (2007) |
69 | EE | Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach.
International Journal of Software Engineering and Knowledge Engineering 17(2): 265-284 (2007) |
68 | EE | Hristo Koshutanski,
Fabio Massacci:
A Negotiation Scheme for Access Rights Establishment in Autonomic Communication.
J. Network Syst. Manage. 15(1): 117-136 (2007) |
2006 |
67 | | Günter Karjoth,
Fabio Massacci:
Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006
ACM 2006 |
66 | | Ketil Stølen,
William H. Winsborough,
Fabio Martinelli,
Fabio Massacci:
Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings
Springer 2006 |
65 | EE | Volha Bryl,
Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Designing Security Requirements Models Through Planning.
CAiSE 2006: 33-47 |
64 | EE | Paolo Giorgini,
Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Detecting Conflicts of Interest.
RE 2006: 308-311 |
63 | EE | Paolo Giorgini,
Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Requirements engineering for trust management: model, methodology, and reasoning.
Int. J. Inf. Sec. 5(4): 257-274 (2006) |
62 | EE | Giampaolo Bella,
Fabio Massacci,
Lawrence C. Paulson:
Verifying the SET Purchase Protocols.
J. Autom. Reasoning 36(1-2): 5-37 (2006) |
61 | EE | Simon Dobson,
Spyros G. Denazis,
Antonio Fernández,
Dominique Gaïti,
Erol Gelenbe,
Fabio Massacci,
Paddy Nixon,
Fabrice Saffre,
Nikita Schmidt,
Franco Zambonelli:
A survey of autonomic communications.
TAAS 1(2): 223-259 (2006) |
60 | EE | Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Hierarchical hippocratic databases with minimal disclosure for virtual organizations.
VLDB J. 15(4): 370-387 (2006) |
2005 |
59 | EE | Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation.
ESORICS 2005: 438-454 |
58 | EE | Paolo Giorgini,
Fabio Massacci,
Nicola Zannone:
Security and Trust Requirements Engineering.
FOSAD 2005: 237-272 |
57 | EE | Paolo Giorgini,
Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Modeling Security Requirements Through Ownership, Permission and Delegation.
RE 2005: 167-176 |
56 | EE | Paolo Giorgini,
Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
ST-Tool: A CASE Tool for Security Requirements Engineering.
RE 2005: 451-452 |
55 | EE | Gabriel M. Kuper,
Fabio Massacci,
Nataliya Rassadko:
Generalized XML security views.
SACMAT 2005: 77-84 |
54 | EE | Nicola Zannone,
Sushil Jajodia,
Fabio Massacci,
Duminda Wijesekera:
Maintaining privacy on derived objects.
WPES 2005: 10-19 |
53 | EE | Paolo Giorgini,
Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Modeling Social and Individual Trust in Requirements Engineering Methodologies.
iTrust 2005: 161-176 |
52 | EE | Hristo Koshutanski,
Fabio Massacci:
Interactive Credential Negotiation for Stateful Business Processes.
iTrust 2005: 256-272 |
51 | EE | Paolo Giorgini,
Fabio Massacci,
John Mylopoulos,
Alberto Siena,
Nicola Zannone:
ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements.
iTrust 2005: 415-419 |
50 | EE | Alexey Gotsman,
Fabio Massacci,
Marco Pistore:
Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language.
Electr. Notes Theor. Comput. Sci. 135(1): 59-77 (2005) |
49 | EE | Giampaolo Bella,
Fabio Massacci,
Lawrence C. Paulson:
An overview of the verification of SET.
Int. J. Inf. Sec. 4(1-2): 17-28 (2005) |
2004 |
48 | EE | Paolo Giorgini,
Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures.
EuroPKI 2004: 98-111 |
47 | EE | Hristo Koshutanski,
Fabio Massacci:
An Interactive Trust Management and Negotiation Scheme.
Formal Aspects in Security and Trust 2004: 115-128 |
46 | EE | Hristo Koshutanski,
Fabio Massacci:
A System for Interactive Authorization for Business Processes for Web Services.
ICWE 2004: 521-525 |
45 | | Hristo Koshutanski,
Fabio Massacci:
Interactive Access Control for Web Services.
SEC 2004: 151-166 |
44 | EE | Fabio Massacci,
Nicola Zannone:
Privacy Is Linking Permission to Purpose.
Security Protocols Workshop 2004: 179-191 |
43 | EE | Fabio Massacci:
Privacy is Linking Permission to Purpose (Transcript of Discussion).
Security Protocols Workshop 2004: 192-198 |
42 | EE | Hristo Koshutanski,
Fabio Massacci:
E Pluribus Unum.
WAC 2004: 179-190 |
41 | EE | Paolo Giorgini,
Fabio Massacci,
John Mylopoulos,
Nicola Zannone:
Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning.
iTrust 2004: 176-190 |
2003 |
40 | EE | Paolo Giorgini,
Fabio Massacci,
John Mylopoulos:
Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard.
ER 2003: 263-276 |
39 | EE | Giampaolo Bella,
Stefano Bistarelli,
Fabio Massacci:
A Protocol's Life After Attacks....
Security Protocols Workshop 2003: 3-10 |
38 | EE | Hristo Koshutanski,
Fabio Massacci:
An access control framework for business processes for web services.
XML Security 2003: 15-24 |
37 | EE | Claudia Fiorini,
Enrico Martinelli,
Fabio Massacci:
How to fake an RSA signature by encoding modular root finding as a SAT problem.
Discrete Applied Mathematics 130(2): 101-127 (2003) |
2002 |
36 | EE | Giampaolo Bella,
Lawrence C. Paulson,
Fabio Massacci:
The verification of an industrial payment protocol: the SET purchase phase.
ACM Conference on Computer and Communications Security 2002: 12-20 |
35 | EE | Luigia Carlucci Aiello,
Fabio Massacci:
Planning Attacks to Security Protocols: Case Studies in Logic Programming.
Computational Logic: Logic Programming and Beyond 2002: 533-560 |
34 | | Francesco M. Donini,
Paolo Liberatore,
Fabio Massacci,
Marco Schaerf:
Solving QBF by SMV.
KR 2002: 578-592 |
2001 |
33 | | Fabio Massacci:
Decision Procedures for Expressive Description Logics with Intersection, Composition, Converse of Roles and Role Identity.
IJCAI 2001: 193-198 |
32 | EE | Luis Fariñas del Cerro,
David Fauthoux,
Olivier Gasquet,
Andreas Herzig,
Dominique Longin,
Fabio Massacci:
Lotrec : The Generic Tableau Prover for Modal and Description Logics.
IJCAR 2001: 453-458 |
31 | EE | Luigia Carlucci Aiello,
Fabio Massacci:
Verifying security protocols as planning in logic programming.
ACM Trans. Comput. Log. 2(4): 542-580 (2001) |
30 | EE | Luigia Carlucci Aiello,
Fabio Massacci:
Attacking fair-exchange protocols: parallel models vs trace models.
Electr. Notes Theor. Comput. Sci. 55(1): (2001) |
2000 |
29 | EE | Luigia Carlucci Aiello,
Fabio Massacci:
An Executable Specification Language for Planning Attacks to Security Protocols.
CSFW 2000: 88-102 |
28 | EE | Peter Baumgartner,
Fabio Massacci:
The Taming of the (X)OR.
Computational Logic 2000: 508-522 |
27 | EE | Giampaolo Bella,
Fabio Massacci,
Lawrence C. Paulson,
Piero Tramontano:
Formal Verification of Cardholder Registration in SET.
ESORICS 2000: 159-174 |
26 | | Fabio Massacci:
Reduction rules and universal variables for first order tableaux and DPLL.
KR 2000: 186-197 |
25 | EE | Giampaolo Bella,
Fabio Massacci,
Lawrence C. Paulson,
Piero Tramontano:
Making Sense of Specifications: The Formalization of SET.
Security Protocols Workshop 2000: 74-81 |
24 | | Fabio Massacci,
Francesco M. Donini:
Design and Results of TANCS-2000 Non-classical (Modal) Systems Comparison.
TABLEAUX 2000: 52-56 |
23 | EE | Francesco M. Donini,
Fabio Massacci:
EXPTIME tableaux for ALC.
Artif. Intell. 124(1): 87-138 (2000) |
22 | EE | Maarit Hietalahti,
Fabio Massacci,
Ilkka Niemelä:
DES: a Challenge Problem for Nonmonotonic Reasoning Systems
CoRR cs.AI/0003039: (2000) |
21 | | Giuseppe De Giacomo,
Fabio Massacci:
Combining Deduction and Model Checking into Tableaux and Algorithms for Converse-PDL.
Inf. Comput. 162(1-2): 117-137 (2000) |
20 | | Fabio Massacci,
Laura Marraro:
Logical Cryptanalysis as a SAT Problem.
J. Autom. Reasoning 24(1/2): 165-203 (2000) |
19 | | Fabio Massacci:
Single Step Tableaux for Modal Logics.
J. Autom. Reasoning 24(3): 319-364 (2000) |
18 | EE | Fabio Massacci:
The proof complexity of analytic and clausal tableaux.
Theor. Comput. Sci. 243(1-2): 477-487 (2000) |
1999 |
17 | | Fabio Massacci:
Using Walk-SAT and Rel-Sat for Cryptographic Key Search.
IJCAI 1999: 290-295 |
16 | | Fabio Massacci:
Design and Results of the Tableaux-99 Non-classical (Modal) Systems Comparison.
TABLEAUX 1999: 14-18 |
15 | | Fabio Massacci:
Automated Reasoning and the Verification of Security Protocols.
TABLEAUX 1999: 32-33 |
1998 |
14 | | Fabio Massacci:
Anytime Approximate Modal Reasoning.
AAAI/IAAI 1998: 274-279 |
13 | | Fabio Massacci:
Cook and Reckhow are Wrong: Subexponential Tableaux Proofs for Their Family of Formulae.
ECAI 1998: 408-409 |
12 | EE | Fabio Massacci:
Simplification: A General Constraint Propagation Technique for Propositional and Modal Tableaux.
TABLEAUX 1998: 217-231 |
11 | | Fabio Massacci:
Tableau Methods for Formal Verification of Multi-Agent Distributed Systems.
J. Log. Comput. 8(3): 373-400 (1998) |
1997 |
10 | | Fabio Massacci:
A Proof Theory for Tractable Approximations of Propositional Reasoning.
AI*IA 1997: 219-230 |
9 | | Fabio Massacci:
Breaking Security Protocols as an AI Planning Problem.
ECP 1997: 286-298 |
8 | | Fabio Massacci:
Reasoning About Security: A Logic and a Decision Method for Role-Based Access Control.
ECSQARU-FAPR 1997: 421-435 |
7 | | Fabio Massacci:
Tableaux Methods for Access Control in Distributed Systems.
TABLEAUX 1997: 246-260 |
1996 |
6 | | Fabio Massacci:
Contextual Reasoning Is NP-Complete.
AAAI/IAAI, Vol. 1 1996: 621-626 |
5 | | Giuseppe De Giacomo,
Fabio Massacci:
Tableaux and Algorithms for Propositional Dynamic Logic with Converse.
CADE 1996: 613-627 |
4 | | Giuseppe De Giacomo,
Francesco M. Donini,
Fabio Massacci:
Exptime Tableaux for ALC.
Description Logics 1996: 107-110 |
3 | | Fabio Massacci:
Approximate Reasoning for Contextual Databases.
ICTAI 1996: 308-315 |
2 | | Francesco M. Donini,
Fabio Massacci,
Daniele Nardi,
Riccardo Rosati:
A Uniform Tableaux Method for Nonmonotonic Modal Logics.
JELIA 1996: 87-103 |
1994 |
1 | | Fabio Massacci:
Strongly Analytic Tableaux for Normal Modal Logics.
CADE 1994: 723-737 |