dblp.uni-trier.dewww.uni-trier.de

Fabio Massacci

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
94EEFabio Massacci, Samuel T. Redwine Jr., Nicola Zannone: Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings Springer 2009
93EEFabio Massacci, Gene Tsudik, Artsiom Yautsiukhin: Logging key assurance indicators in business processes. ASIACCS 2009: 364-367
2008
92EEFabio Massacci, Katsiaryna Naliuka: Towards Practical Security Monitors of UML Policies for Mobile Applications. ARES 2008: 1112-1119
91EEFabio Massacci, Frank Piessens, Ida Siahaan: Security-By-Contract for the Future Internet. FIS 2008: 29-43
90EENataliia Bielova, Fabio Massacci: Do You Really Mean What You Actually Enforced?. Formal Aspects in Security and Trust 2008: 287-301
89EEFabio Massacci, Nicola Zannone: A Model-Driven Approach for the Specification and Analysis of Access Control Policies. OTM Conferences (2) 2008: 1087-1103
88EEFabio Massacci, Ida Siahaan: Simulating midlet's security claims with automata modulo theory. PLAS 2008: 1-9
87EEAzzedine Benameur, Fabio Massacci, Nataliya Rassadko: Security views for outsourced business processes. SWS 2008: 45-52
86EEFabio Massacci, Frank Piessens: Preface. Electr. Notes Theor. Comput. Sci. 197(1): 1-2 (2008)
85EELuca Compagna, Volkmar Lotz, Fabio Massacci: Preface. Electr. Notes Theor. Comput. Sci. 197(2): 1-2 (2008)
84EEFabio Massacci, Frank Piessens, Sjouke Mauw: Preface. Sci. Comput. Program. 74(1-2): 1 (2008)
83EEHristo Koshutanski, Fabio Massacci: Interactive access control for autonomic systems: From theory to implementation. TAAS 3(3): (2008)
2007
82EEYudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone: From Trust to Dependability through Risk Analysis. ARES 2007: 19-26
81EELieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe: A flexible security architecture to support third-party applications on mobile devices. CSAW 2007: 19-28
80EENicola Dragoni, Fabio Massacci, Katsiaryna Naliuka, Ida Siahaan: Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code. EuroPKI 2007: 297-312
79EEFabio Massacci, Artsiom Yautsiukhin: Modelling Quality of Protection in Outsourced Business Processes. IAS 2007: 247-252
78EELuca Compagna, Paul El Khoury, Fabio Massacci, Reshma Thomas, Nicola Zannone: How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. ICAIL 2007: 149-153
77EEHugo A. López, Fabio Massacci, Nicola Zannone: Goal-Equivalent Secure Business Process Re-engineering. ICSOC Workshops 2007: 212-223
76EEFabio Massacci, Katsiaryna Naliuka: Towards Practical Security Monitors of UML Policies for Mobile Applications. POLICY 2007: 278
75EEFabio Massacci, Artsiom Yautsiukhin: An algorithm for the appraisal of assurance indicators for complex business processes. QoP 2007: 22-27
74EENicola Dragoni, Fabio Massacci: Security-by-contract for web services. SWS 2007: 90-98
73EESandro Etalle, Fabio Massacci, Artsiom Yautsiukhin: The Meaning of Logs. TrustBus 2007: 145-154
72EEAlexander Pretschner, Fabio Massacci, Manuel Hilty: Usage Control in Service-Oriented Architectures. TrustBus 2007: 83-93
71EEFabio Massacci, John Mylopoulos, Nicola Zannone: Computer-aided Support for Secure Tropos. Autom. Softw. Eng. 14(3): 341-364 (2007)
70EEYücel Karabulut, Florian Kerschbaum, Fabio Massacci, Philip Robinson, Artsiom Yautsiukhin: Security and Trust in IT Business Outsourcing: a Manifesto. Electr. Notes Theor. Comput. Sci. 179: 47-58 (2007)
69EEFabio Massacci, John Mylopoulos, Nicola Zannone: From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach. International Journal of Software Engineering and Knowledge Engineering 17(2): 265-284 (2007)
68EEHristo Koshutanski, Fabio Massacci: A Negotiation Scheme for Access Rights Establishment in Autonomic Communication. J. Network Syst. Manage. 15(1): 117-136 (2007)
2006
67 Günter Karjoth, Fabio Massacci: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006 ACM 2006
66 Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio Massacci: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings Springer 2006
65EEVolha Bryl, Fabio Massacci, John Mylopoulos, Nicola Zannone: Designing Security Requirements Models Through Planning. CAiSE 2006: 33-47
64EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Detecting Conflicts of Interest. RE 2006: 308-311
63EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Requirements engineering for trust management: model, methodology, and reasoning. Int. J. Inf. Sec. 5(4): 257-274 (2006)
62EEGiampaolo Bella, Fabio Massacci, Lawrence C. Paulson: Verifying the SET Purchase Protocols. J. Autom. Reasoning 36(1-2): 5-37 (2006)
61EESimon Dobson, Spyros G. Denazis, Antonio Fernández, Dominique Gaïti, Erol Gelenbe, Fabio Massacci, Paddy Nixon, Fabrice Saffre, Nikita Schmidt, Franco Zambonelli: A survey of autonomic communications. TAAS 1(2): 223-259 (2006)
60EEFabio Massacci, John Mylopoulos, Nicola Zannone: Hierarchical hippocratic databases with minimal disclosure for virtual organizations. VLDB J. 15(4): 370-387 (2006)
2005
59EEFabio Massacci, John Mylopoulos, Nicola Zannone: Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. ESORICS 2005: 438-454
58EEPaolo Giorgini, Fabio Massacci, Nicola Zannone: Security and Trust Requirements Engineering. FOSAD 2005: 237-272
57EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. RE 2005: 167-176
56EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: ST-Tool: A CASE Tool for Security Requirements Engineering. RE 2005: 451-452
55EEGabriel M. Kuper, Fabio Massacci, Nataliya Rassadko: Generalized XML security views. SACMAT 2005: 77-84
54EENicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera: Maintaining privacy on derived objects. WPES 2005: 10-19
53EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. iTrust 2005: 161-176
52EEHristo Koshutanski, Fabio Massacci: Interactive Credential Negotiation for Stateful Business Processes. iTrust 2005: 256-272
51EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Alberto Siena, Nicola Zannone: ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. iTrust 2005: 415-419
50EEAlexey Gotsman, Fabio Massacci, Marco Pistore: Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language. Electr. Notes Theor. Comput. Sci. 135(1): 59-77 (2005)
49EEGiampaolo Bella, Fabio Massacci, Lawrence C. Paulson: An overview of the verification of SET. Int. J. Inf. Sec. 4(1-2): 17-28 (2005)
2004
48EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures. EuroPKI 2004: 98-111
47EEHristo Koshutanski, Fabio Massacci: An Interactive Trust Management and Negotiation Scheme. Formal Aspects in Security and Trust 2004: 115-128
46EEHristo Koshutanski, Fabio Massacci: A System for Interactive Authorization for Business Processes for Web Services. ICWE 2004: 521-525
45 Hristo Koshutanski, Fabio Massacci: Interactive Access Control for Web Services. SEC 2004: 151-166
44EEFabio Massacci, Nicola Zannone: Privacy Is Linking Permission to Purpose. Security Protocols Workshop 2004: 179-191
43EEFabio Massacci: Privacy is Linking Permission to Purpose (Transcript of Discussion). Security Protocols Workshop 2004: 192-198
42EEHristo Koshutanski, Fabio Massacci: E Pluribus Unum. WAC 2004: 179-190
41EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning. iTrust 2004: 176-190
2003
40EEPaolo Giorgini, Fabio Massacci, John Mylopoulos: Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard. ER 2003: 263-276
39EEGiampaolo Bella, Stefano Bistarelli, Fabio Massacci: A Protocol's Life After Attacks.... Security Protocols Workshop 2003: 3-10
38EEHristo Koshutanski, Fabio Massacci: An access control framework for business processes for web services. XML Security 2003: 15-24
37EEClaudia Fiorini, Enrico Martinelli, Fabio Massacci: How to fake an RSA signature by encoding modular root finding as a SAT problem. Discrete Applied Mathematics 130(2): 101-127 (2003)
2002
36EEGiampaolo Bella, Lawrence C. Paulson, Fabio Massacci: The verification of an industrial payment protocol: the SET purchase phase. ACM Conference on Computer and Communications Security 2002: 12-20
35EELuigia Carlucci Aiello, Fabio Massacci: Planning Attacks to Security Protocols: Case Studies in Logic Programming. Computational Logic: Logic Programming and Beyond 2002: 533-560
34 Francesco M. Donini, Paolo Liberatore, Fabio Massacci, Marco Schaerf: Solving QBF by SMV. KR 2002: 578-592
2001
33 Fabio Massacci: Decision Procedures for Expressive Description Logics with Intersection, Composition, Converse of Roles and Role Identity. IJCAI 2001: 193-198
32EELuis Fariñas del Cerro, David Fauthoux, Olivier Gasquet, Andreas Herzig, Dominique Longin, Fabio Massacci: Lotrec : The Generic Tableau Prover for Modal and Description Logics. IJCAR 2001: 453-458
31EELuigia Carlucci Aiello, Fabio Massacci: Verifying security protocols as planning in logic programming. ACM Trans. Comput. Log. 2(4): 542-580 (2001)
30EELuigia Carlucci Aiello, Fabio Massacci: Attacking fair-exchange protocols: parallel models vs trace models. Electr. Notes Theor. Comput. Sci. 55(1): (2001)
2000
29EELuigia Carlucci Aiello, Fabio Massacci: An Executable Specification Language for Planning Attacks to Security Protocols. CSFW 2000: 88-102
28EEPeter Baumgartner, Fabio Massacci: The Taming of the (X)OR. Computational Logic 2000: 508-522
27EEGiampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano: Formal Verification of Cardholder Registration in SET. ESORICS 2000: 159-174
26 Fabio Massacci: Reduction rules and universal variables for first order tableaux and DPLL. KR 2000: 186-197
25EEGiampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano: Making Sense of Specifications: The Formalization of SET. Security Protocols Workshop 2000: 74-81
24 Fabio Massacci, Francesco M. Donini: Design and Results of TANCS-2000 Non-classical (Modal) Systems Comparison. TABLEAUX 2000: 52-56
23EEFrancesco M. Donini, Fabio Massacci: EXPTIME tableaux for ALC. Artif. Intell. 124(1): 87-138 (2000)
22EEMaarit Hietalahti, Fabio Massacci, Ilkka Niemelä: DES: a Challenge Problem for Nonmonotonic Reasoning Systems CoRR cs.AI/0003039: (2000)
21 Giuseppe De Giacomo, Fabio Massacci: Combining Deduction and Model Checking into Tableaux and Algorithms for Converse-PDL. Inf. Comput. 162(1-2): 117-137 (2000)
20 Fabio Massacci, Laura Marraro: Logical Cryptanalysis as a SAT Problem. J. Autom. Reasoning 24(1/2): 165-203 (2000)
19 Fabio Massacci: Single Step Tableaux for Modal Logics. J. Autom. Reasoning 24(3): 319-364 (2000)
18EEFabio Massacci: The proof complexity of analytic and clausal tableaux. Theor. Comput. Sci. 243(1-2): 477-487 (2000)
1999
17 Fabio Massacci: Using Walk-SAT and Rel-Sat for Cryptographic Key Search. IJCAI 1999: 290-295
16 Fabio Massacci: Design and Results of the Tableaux-99 Non-classical (Modal) Systems Comparison. TABLEAUX 1999: 14-18
15 Fabio Massacci: Automated Reasoning and the Verification of Security Protocols. TABLEAUX 1999: 32-33
1998
14 Fabio Massacci: Anytime Approximate Modal Reasoning. AAAI/IAAI 1998: 274-279
13 Fabio Massacci: Cook and Reckhow are Wrong: Subexponential Tableaux Proofs for Their Family of Formulae. ECAI 1998: 408-409
12EEFabio Massacci: Simplification: A General Constraint Propagation Technique for Propositional and Modal Tableaux. TABLEAUX 1998: 217-231
11 Fabio Massacci: Tableau Methods for Formal Verification of Multi-Agent Distributed Systems. J. Log. Comput. 8(3): 373-400 (1998)
1997
10 Fabio Massacci: A Proof Theory for Tractable Approximations of Propositional Reasoning. AI*IA 1997: 219-230
9 Fabio Massacci: Breaking Security Protocols as an AI Planning Problem. ECP 1997: 286-298
8 Fabio Massacci: Reasoning About Security: A Logic and a Decision Method for Role-Based Access Control. ECSQARU-FAPR 1997: 421-435
7 Fabio Massacci: Tableaux Methods for Access Control in Distributed Systems. TABLEAUX 1997: 246-260
1996
6 Fabio Massacci: Contextual Reasoning Is NP-Complete. AAAI/IAAI, Vol. 1 1996: 621-626
5 Giuseppe De Giacomo, Fabio Massacci: Tableaux and Algorithms for Propositional Dynamic Logic with Converse. CADE 1996: 613-627
4 Giuseppe De Giacomo, Francesco M. Donini, Fabio Massacci: Exptime Tableaux for ALC. Description Logics 1996: 107-110
3 Fabio Massacci: Approximate Reasoning for Contextual Databases. ICTAI 1996: 308-315
2 Francesco M. Donini, Fabio Massacci, Daniele Nardi, Riccardo Rosati: A Uniform Tableaux Method for Nonmonotonic Modal Logics. JELIA 1996: 87-103
1994
1 Fabio Massacci: Strongly Analytic Tableaux for Normal Modal Logics. CADE 1994: 723-737

Coauthor Index

1Luigia Carlucci Aiello (Luigia Aiello) [29] [30] [31] [35]
2Yudistira Asnar [82]
3Peter Baumgartner [28]
4Giampaolo Bella [25] [27] [36] [39] [49] [62]
5Azzedine Benameur [87]
6Nataliia Bielova [90]
7Stefano Bistarelli [39]
8Volha Bryl [65]
9Luis Fariñas del Cerro [32]
10Luca Compagna [78] [85]
11Spyros G. Denazis [61]
12Lieven Desmet [81]
13Simon A. Dobson (Simon Dobson) [61]
14Francesco M. Donini [2] [4] [23] [24] [34]
15Nicola Dragoni [74] [80]
16Sandro Etalle [73]
17David Fauthoux [32]
18Antonio Fernández [61]
19Claudia Fiorini [37]
20Dominique Gaïti [61]
21Olivier Gasquet [32]
22Erol Gelenbe [61]
23Giuseppe De Giacomo [4] [5] [21]
24Paolo Giorgini [40] [41] [48] [51] [53] [56] [57] [58] [63] [64] [82]
25Alexey Gotsman [50]
26Andreas Herzig [32]
27Maarit Hietalahti [22]
28Manuel Hilty [72]
29Sushil Jajodia [54]
30Wouter Joosen [81]
31Yücel Karabulut [70]
32Günter Karjoth [67]
33Florian Kerschbaum [70]
34Paul El Khoury [78]
35Hristo Koshutanski [38] [42] [45] [46] [47] [52] [68] [83]
36Gabriel M. Kuper [55]
37Paolo Liberatore [34]
38Dominique Longin [32]
39Hugo A. López [77]
40Volkmar Lotz [85]
41Laura Marraro [20]
42Enrico Martinelli [37]
43Fabio Martinelli [66]
44Sjouke Mauw [84]
45John Mylopoulos [40] [41] [48] [51] [53] [56] [57] [59] [60] [63] [64] [65] [69] [71]
46Katsiaryna Naliuka [76] [80] [81] [92]
47Daniele Nardi [2]
48Ilkka Niemelä [22]
49Paddy Nixon (Patrick Nixon) [61]
50Lawrence C. Paulson [25] [27] [36] [49] [62]
51Pieter Philippaerts [81]
52Frank Piessens [81] [84] [86] [91]
53Marco Pistore [50]
54Alexander Pretschner [72]
55Nataliya Rassadko [55] [87]
56Samuel T. Redwine Jr. [94]
57Philip Robinson [70]
58Riccardo Rosati [2]
59Fabrice Saffre [61]
60Marco Schaerf [34]
61Nikita Schmidt [61]
62Ida Siahaan [80] [88] [91]
63Alberto Siena [51]
64Ketil Stølen [66]
65Reshma Thomas [78]
66Piero Tramontano [25] [27]
67Gene Tsudik [93]
68Dries Vanoverberghe [81]
69Duminda Wijesekera [54]
70William H. Winsborough [66]
71Artsiom Yautsiukhin [70] [73] [75] [79] [93]
72Franco Zambonelli [61]
73Nicola Zannone [41] [44] [48] [51] [53] [54] [56] [57] [58] [59] [60] [63] [64] [65] [69] [71] [77] [78] [82] [89] [94]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)