2010

    B. Aziz, A. Arenas, G. Cortese, B. Crispo, S. Causetti, "A Secure and Scalable Grid-Based Content Management System" in Fifth International Conference on Availability, Reliability and Security, Tokyo, Los Alamitos: IEEE Computer Society, 2010, p. 404-409. - ISBN: 9780769539652. Proceedings of: ARES 2010, Krakow, 2010. - URL: http://doi.ieeecomputersociety.org/10.1109/ARES.2010.80 . - DOI: 10.1109/ARES.2010.80 - see details
  • F. Turkmen, B. Crispo, P. Mazzoleni, "A service-based context management framework for cross-enterprise collaboration" in Proceedings of the 2010 ACM Symposium on Applied Computing, New York, NY, USA: ACM, 2010, p. 2443-2450. - ISBN: 9781605586397. Proceedings of: SAC, Sierre, 2010. - URL: http://doi.acm.org/10.1145/1774088.1774595 . - DOI: 10.1145/1774088.1774595 - see details
  • M. Ion, G. Russello, B. Crispo, "An implementation of event and filter confidentiality in pub/sub systems and its application to e-health" in Proceedings of the 17th ACM conference on Computer and communications security, New York, NY, USA: ACM, 2010, p. 696-698. - ISBN: 9781450302456. Proceedings of: CCS, Chicago, 2010. - URL: http://doi.acm.org/10.1145/1866307.1866401 . - DOI: 10.1145/1866307.1866401 - see details
  • S. Ortolani, C. Giuffrida, B. Crispo, "Bait your hook: a novel detection technique for keyloggers" in Proceedings of the 13th international conference on Recent advances in intrusion detection, Berlin, Heidelberg: Springer-Verlag, 2010, p. 198-217 -(LNCS; 6307 ). - ISBN: 9783642155116. Proceedings of: RAID, Ottawa, 2010. - URL: http://portal.acm.org/citation.cfm?id=1894166.1894180 - see details
  • G. Gheorghe, P. Mori, B. Crispo, F. Martinelli, "Enforcing UCON Policies on the Enterprise Service Bus" in On the Move to Meaningful Internet Systems, OTM 2010 - Confederated International, Berlin, New York: Springer, 2010, p. 876-893 -(LNCS; 6427). - ISBN: 9783642169489. Proceedings of: OTM Conferences, Hersonissos, 2010. - URL: http://dx.doi.org/10.1007/978-3-642-16949-6 . - DOI: 10.1007/978-3-642-16949-6 - see details
  • B. Crispo, G. Gheorghe, V. D. Giacomo, D. Presenza, "MASTER as a Security Management Tool for Policy Compliance" in ServiceWave, Berlin, New York, Hidelberg: Springer, 2010, p. 213-214 -(LNCS ; 6481). - ISBN: 9783642176937. Proceedings of: SeviceWave, Ghent, 2010. - URL: http://dx.doi.org/10.1007/978-3-642-17694-4 . - DOI: 10.1007/978-3-642-17694-4 - see details
  • M. Ion, G. Russello, B. Crispo, "Providing Confidentiality in Content-based Publish/subscribe Systems" in Proceedings of the International Conference on Security and Cryptography, New York: SciTePress, 2010, p. 287-292. - ISBN: 9789898425188. Proceedings of: SECRYPT 2010, Athens, 2010 - see details
  • A. Artale, B. Crispo, F. Giunchiglia, F. Turkmen, R. Zhang, "Reasoning about Relation Based Access Control" in Proceedings of the 2010 Fourth International Conference on Network and System Security, Washington, DC, USA: IEEE Computer Society, 2010, p. 231-238. Proceedings of: NSS 2010, MELBOURNE, 2010. - URL: http://dx.doi.org/10.1109/NSS.2010.76 - see details
  • R. Zhang, F. Giunchiglia, B. Crispo, L. Song, "Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment" in WIRELESS PERSONAL COMMUNICATIONS, v. 55, (2010), p. 5-17. - DOI: 10.1007/s11277-009-9782-4 - see details
  • B. Christianson, B. Crispo, J. A. Malcom, M. Roe (edited by), "Security Protocols: 15th International Workshop: revised selected papers", Berlin; Heidelberg; New York: Springer, 2010. - (LNCS; 5964). - ISBN: 9783642177729. - URL: http://www.springerlink.com/content/978-3-642-17772-9/ . - DOI: 10.1007/978-3-642-17773-6 - see details
  • M. Ion, G. Russello, B. Crispo, "Supporting Publication and Subscription Confidentiality in Pub/Sub Networks" in Proceeding of the 6th International Conference on Security and Privacy in Communication Networks, Berlin, Heidelberg, New York: Springer , 2010, p. 272-289 -(LNICST; 50). - ISBN: 9783642161605. Proceedings of: SecureComm 2010, Singapore, 2010. - URL: http://dx.doi.org/10.1007/978-3-642-16161-2_16 . - DOI: 10.1007/978-3-642-16161-2_16 - see details
  • L. Marconi, R. D. Pietro, B. Crispo, M. Conti, "Time Warp: How Time Affects Privacy in LBSs" in 12th International Conference on Information and Communications Security , New York, Berlon, Hidelberg: Springer, 2010, p. 325-339 -(LNCS; 6476). - ISBN: 9783642176494. Proceedings of: ICICS 2010, Barcelona, 2010. - URL: http://dx.doi.org/10.1007/978-3-642-17650-0 . - DOI: 10.1007/978-3-642-17650-0 - see details
  • G. Gheorghe, S. Neuhaus, B. Crispo, "xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement" in IFIPTM, Berlin, New York, Hidelberg: Springer, 2010, p. 63-78 -(IFIP Conference Proceedings). - ISBN: 9783642134456. Proceedings of: IFIPTM 2010, Morioka, 2010. - URL: http://dx.doi.org/10.1007/978-3-642-13446-3 . - DOI: 10.1007/978-3-642-13446-3 - see details
  • F. Massacci, N. Zannone, "Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank", Social Modeling for Requirements Engineering, CHICAGO: MIT Press, 2010, p. 0-0 - see details
  • F. Massacci, D. Wallach, N. Zannone (edited by), "Proceedings of the 2nd International Symposium on Engineering Secure Software and Systems (ESSoS’10).", BERLIN: Springer Verlag 2010, 2010 - see details
  • J. Camenisch, J. Lopez, F. Massacci, M. Ciscato, T. Skordas, "Special issue on EU-funded ICT research on trust and security." in JOURNAL OF COMPUTER SECURITY, n. 18.1 (2010), p. 1-5. - URL: http://www.scopus.com/inward/record.url?eid=2-s2.0-71749106354&partnerID=40&md5=9371caab7d8966f02bf72269cb20d9d0 . - DOI: 10.3233/JCS-2010-0375. - CODEN: JCSIE - see details

2009

  • F. Giunchiglia, Rui Zhang, Bruno Crispo, "Ontology Driven Community Access Control" in Proceedings of the 1st Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009), Berlin: Springer, 2009, p. xx-xx. Proceedings of: SPOT2009, June 1, 2009 - see details
  • R. Zhang, A. Artale, F. Giunchiglia, B. Crispo, "Using Description Logics in Relation Based Access Control" in Proceedings of The 22nd International Workshop on Description Logics (DL2009), : Springer, 2009, p. - . Proceedings of: DL2009, Oxford , July 2009 - see details
  • N. Dragoni, F. Massacci, A. Saïdane, "A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems." in COMPUTER NETWORKS, v. 28, n. 28 (2009), p. 1628-1648. - URL: http://www.scopus.com/inward/record.url?eid=2-s2.0- 67349208148&partnerID=40&md5=4421864707a4c8fdb65e19065cae3083 . - DOI: DOI: 10.1016/j.comnet.2008.07.016. - CODEN: CNETD - see details
  • N. Bielova, F. Massacci, "Do you really mean what you actually enforced? EDIT AUTOMATA REVISITED" in Formal Aspects in Security and Trust, Berlin: Springer 2009, 2009, p. 287-301 -(LNCS; 5491). Proceedings of: FAST’08, February 2009 - see details
  • F. Massacci, S. Redwine, N. Zannone (edited by), "Engineering Secure Software and Systems: First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009: Proceedings", Berlin: Springer Verlag, 2009 - see details
  • G.M Kuper, F. Massacci, N. Rassadko, "Generalized XML security views" in INTERNATIONAL JOURNAL OF INFORMATION SECURITY, v. 8, n. 10 (2009), p. 173-203. - URL: http://www.scopus.com/inward/record.url?eid=2-s2.0- 67349181381&partnerID=40&md5=c5cc1c4bdb9da7bbc0aa9003cd3039b7 . - DOI: 10.1007/s10207-008-0074-x - see details
  • A. Krausova, F. Massacci, A. Saidane, "How to capture and use legal patterns in IT" in Proceedings of the 12th International Conference on Artificial Intelligence and Law, Boston: ACM Press, 2009, p. 228-229. Proceedings of: ICAIL 09, JUNE 2009. - DOI: 10.1145/1568234.1568267. - CODEN: 85OAA - see details
  • L. Compagna, P. El Khoury, A. Krausová, F. Massacci, N. Zannone, "How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns" in ARTIFICIAL INTELLIGENCE AND LAW, v. 17.1, n. 1 (2009), p. 1-30. - URL: http://www.scopus.com/inward/record.url?eid=2-s2.0- 58849148475&partnerID=40&md5=a963e843e71f411b7fd99d5755f793df . - CODEN: AINLE - see details
  • F. Massacci, G. Tsudik, A. Yautsiukhin, "Logging key assurance indicators in business processes." in Proc. of ASIACCS’09, New York: ACM Press, 2009, 2009, p. 364-367. Proceedings of: ASIACC 09, Sisney, March 2009 - see details
  • N. Bielova, N. Dragoni, F. Massacci, K. Naliukaa, I. Siahaana, "Matching in security-by-contract for mobile code" in JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, v. 78, n. 5 (2009), p. 340-358. - URL: http://www.scopus.com/inward/record.url?eid=2-s2.0- 67349233081&partnerID=40&md5=34c2226a336c7a02f08bb945eaebcf4c . - DOI: 10.1016/j.jlap.2009.02.013. - CODEN: JLAPA - see details
  • Y. Asnar, M. Felici, F. Massacci, A. Tedeschi, A. Yautsiukhin, "Quantitative assessment for organisational security & dependability" in Proc. of DEPEND 2009, Chicago: International Journal on Advanced Security, 2009, p. 40-45. Proceedings of: DEPEND 2009, Athens, 18th-23th June. - DOI: 10.1109/DEPEND.2009.12 - see details
  • D. Marino, F. Massacci, A. Micheletti, N. Rassadko, S. Neuhaus, "Satisfaction of Control Objectives by Control Processes" in Proc. of ICSOC/ServiceWave’09., New York (N.Y.): ACM Press, 2009, p. 531-545 -(LNCS; 5900). Proceedings of: ICSOC09, Stoccolma, November 2009. - URL: 3642103820 - see details
  • F. Massacci, F. Piessens, I Siahaan, "Security-by-contract for the future internet" in Proc. of FIS’09, Berlin: Springer 2009, 2009, p. 29-34. Proceedings of: FIS’09, Berlin, September 2009. - ISSN: 03029743 - see details
  • L. Desmet, W. Joosen, F. Massacci, K. Naliuka, P. Philippaerts, F. Piessens, D. Vanoverberghe, "The S3MS.NET Run Time Monitor: Tool Demonstration" in ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, v. 253, n. 5 (2009), p. 153-159. - URL: http://www.scopus.com/inward/record.url?eid=2-s2.0- 71649111935&partnerID=40&md5=1b11dd08214f939e41e219dfaac8e452 . - DOI: 10.1016/j.entcs.2009.11.021 - see details
  • N. Bielova, F. Massacci, A. Micheletti, "Towards Practical Enforcement Theories" in Identity and Privacy in the Internet Age, Berlin: Springer, 2009, p. 239-254. Proceedings of: NORDSEC09, Oslo, October 2009 - see details
  • N. Dragoni, F. Massacci, T. Walter, C. Schaefer, "What the Heck is this application doing? - A securityby- contract architecture for pervasive services" in COMPUTERS & SECURITY, v. 53, n. 28.7 (2009), p. 566-577. - DOI: 10.1016/j.cose.2009.06.005. - CODEN: CPSED - see details

2008

  • B. Crispo, D.N. Patrick Simpson, S. Andrew Tanenbaum, "A Virtual Machine Based Information Flow Control System for Policy Enforcement" in Electronic Notes in Theoretical Computer Science,, 2008, p. 3-16. Proceedings of: First International Workshop on Run Time Enforcement for Mobile and Distributed Systems - see details
  • M. Gerla, R. G. Cascella, Z. Cao, B. Crispo, R. Battiti, "An efficient weak secrecy scheme for network coding data dissemination in VANET" in Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications: IEEE, 2008. Proceedings of: PIMRC, Cannes, France, 15-18 Settembre 2008 - see details
  • B. Crispo, M. Rieback, A. S. Tanenbaum, O. Whitehouse, L. Yang, "Crimeware in Small Devices" in Z. Ramzan, M. Jakobsson (edited by), Crimeware: Understanding New Attacks and Defenses: Addison Wesley Professional, 2008. - ISBN: 0-321-50195-0 - see details
  • P. Mazzoleni, B. Crispo, S. Sivasubramanian, E. Bertino, "Efficient integration of fine-grained access control and resource brokering in grid" in THE JOURNAL OF SUPERCOMPUTING, (2008). - springer link date :Saturday, October 25, 2008 - see details
  • S. Nair, G. Geaorghe, B. Crispo, A. S. Tanenbaum, "Enforcing DRM policies across applications" in Proceedings of the 8th ACM workshop on Digital rights management: ACM Press, 2008, p. 87-94. Proceedings of: DRM 2008, Alexandria, VA, 27 October 2008. - URL: http://portal.acm.org/ft_gateway.cfm?id=1456535&type=pdf&coll=GUIDE&dl=GUIDE&CFID=13669889&CFTOKEN=2 - see details
  • B. Crispo, S. Andrew Tanenbaum, Gabriela Gheorghe, "Enforcing DRM policies across applications." in ACM Digital Rights Management Workshop 2008:: ACM Press, 2008, p. 87-94 - see details
  • S. Nair, E. Zentveld, B. Crispo, A. S. Tanenbaum, "Floodgate: A Micropayment Incentivised P2P Content Distribution Network" in Proceedings of the 17th Internation Conference on Computer Communications and Networks, New York, N.Y.: IEEE Press, 2008. Proceedings of: ICCCN, Virgin Islands, USA, August 3rd - 7th, 2008 - see details
  • F. Turkmen, P. Mazzoleni, B. Crispo, E. Bertino, "P-CDN: Extending Access Control Capabilities of P2P Systems to provide CDN Services", New York, N.Y.: IEEE Press, 2008, p. 480-486. Proceedings of: Computers and Communications, 2008. ISCC 2008. IEEE Symposium on Computers and Communications, Marrakech, Marocco, 6th-9th July 2008. - ISBN: 978-1-4244-2702-4 - see details
  • F. Turkmen, B. Crispo, "Performance evaluation of XACML PDP implementations" in Proceedings of the 5th ACM Workshop On Secure Web Services: ACM Press, 2008, p. 37-44. Proceedings of: ACM Press, Alexandria (VA), 31st October 2008. - URL: http://portal.acm.org/citation.cfm?doid=1456492.1456499 - see details
  • K. Srijith Nair, R. Gerrits, B. Crispo, "Turning Teenagers into Stores" in COMPUTER, v. 41, (2008), p. 58-62 - see details
  • S. Nair, R. Gerrits, B. Crispo, A. S. Tanenbaum, "Turning Teenagers into Stores" in COMPUTER, v. 41, n. 2 (2008), p. 58-62 - see details
  • R. G. Cascella, Z. Cao, B. Crispo, M. Gerla, R. Battiti, "Weak Data Secrecy via Obfuscation in Network Coding Based Content Distribution" in IFIP Wireless Days Conference: IEEE Press, 2008. Proceedings of: IFIP Wireless Days Conference, Dubai, UAE, 24-28 Novembre 2008 - see details
  • P. Mazzoleni, B. Crispo, S. Sivasubramanian, E. Bertino, "XACML policy integration algorithms" in ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v. 11, n. 1 (2008), p. 219-227 - see details
  • F. Massacci, N. Zannone, "A Model-Driven Approach for the Specification and Analysis of Access Control Policies" in OTM Conferences (2) 2008, 2008, p. 1087-1103. Proceedings of: Springer, Monterrey, 11-14 November 2008 - see details
  • N. Dragoni, F. Massacci, K. Naliuka, "An inline monitoring system for .NET mobile devices." in Trust Management II, Berlin: Springer, 2008, p. 363-366. - ISBN: 9780387094274. Proceedings of: IFPTM 08, Trondheim, 18th-20th June - see details
  • H. A. Lopez Acosta, F. Massacci, N. Zannone, "Goal-Equivalent Business Process Re-engineering" in In Proc. of the Workshops of the Fifth International Conference of Service Oriented Computing (ICSOC): Springer Berlin / Heidelberg, 2008. Proceedings of: 2nd International SeMSoC Workshop – Business Oriented Aspects concerning Semantics and Methodologies in Service-oriented Computing (SeMSoC), Vienna, Austria, 17/09/2007. - URL: http://sysedv.tu-berlin.de/Homepage/SYSEDV.nsf?Open&ID=8219EAD9175B5E7EC12573010034F9EF&Key=&Sel=&La - see details
  • F. Massacci, H. Koshutanski, "Interactive access control for autonomic systems: From theory to implementation" in ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, v. 3, n. 3 (2008), p. 1-31. - URL: http://www.scopus.com/inward/record.url?eid=2-s2.0- 49549085763&partnerID=40&md5=38f8576ef60c93e7ddb6aa446402cbd7 . - DOI: 10.1145/1380422.1380424 - see details
  • A. Aggarwal, M. Badra, F. Massacci (edited by), "New Technologies, Mobility and Security: 2008 NTMS'08", Chicago: IEEE Press, 2008. - ISBN: 9782953244304. - DOI: 10.1109/NTMS.2008.ECP.3 - see details
  • F. Massacci, F. Piessens, "Preface" in F. Massacci, F. Piessens (edited by), Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems (REM 2007): Dresden, Germany 27 September 2007, Amsterdam: Elsevier, 2008, p. 1-2. - (Electronic Notes Theoretical Computer Science; 197.1). - DOI: 10.1016/j.entcs.2007.11.007 - see details
  • L. Compagna, V. Lotz, F. Massacci, "Preface", Proceedings of the 3rd International Workshop on Security and Trust Management (STM 2007): Dresden, Germany 27 September 2007, Amsterdam: Elsevier , 2008, p. 1-2. - (Electronic Notes Theoretical Computer Science; 197.2). - DOI: 10.1016/j.entcs.2008.01.001 - see details
  • F. Massacci, F. Piessens, S. Mauw, "Preface" in SCIENCE OF COMPUTER PROGRAMMING, v. 74, n. 1-2 (2008), p. 1-1. - URL: http://www.scopus.com/inward/record.url?eid=2-s2.0- 56349125203&partnerID=40&md5=4b396300d9dfb277ab4b1462b6950d1c . - DOI: 10.1016/j.scico.2008.09.002. - Prefazione al numero monografico "Special Issue on Security and Trust". - CODEN: SCPGD - see details
  • F. Massacci, A. Benameur, N. Rassadko, "Security views for outsourced business processes" in Proceedings of the 5th ACM Workshop On Secure Web Services, SWS 2008, Alexandria, VA, USA, October 31, 2008. ACM 2008, CHICAGO: ACM PRESS, 2008, p. 45-52. Proceedings of: SWS 2008, Alexandria, Va, 2008. - DOI: 10.1145/1456492.1456500. - ISBN: 9781605582924 - see details
  • Azzedine Benameur, F. Massacci, Nataliya Rassadko, "Security views for outsourced business processes." in SWS 2008, 2008, p. 45-52 - see details
  • N. Dragoni, F. Martinelli, F. Massacci, P. Mori, C. Schaefer, T. Walter, E. Vetillard, "Security-by- Contract (SxC) for Software and Services of Mobile Systems" in At Your Service – Selected Papers on EU research on Software and Services, Chicago: MIT Press, 2008, p. 49-54. - ISBN: 0769528635. Proceedings of: SecPerU 2007, Instambul, 19th July. - DOI: 10.1109/SECPERU.2007.2 - see details
  • L. Desmet, W. Joosen, F. Massacci, P. Philippaerts, F. Piessens, I. Siahaan, D. Vanoverberghe, "Securityby- contract on the .NET platform." in INFORMATION SECURITY TECHNICAL REPORT, v. 13, n. 13.1 (2008), p. 25-32. - DOI: 10.1016/j.istr.2008.02.001 - see details
  • F. Massacci, R.I. S. Siahaan, "Simulating midlet's security claims with automata modulo theory" in Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, PLAS 2008, New York, N.Y.: ACM, 2008, p. 1-9. Proceedings of: PLAS 2008, Tucson, Az., 8th June 2008. - DOI: 10.1145/1375696.1375698. - ISBN: 9781595939364 - see details
  • Towards Practical Security Monitors Of Uml Policies For Mobile Applications, F. Massacci, F., Naliuka, K., "Towards Practical Security Monitors of UML Policies for Mobile Applications" in ARES 08, 2008, p. 1112-1119, Barcelona, 4-7 March 2008 - see details
  • F. Massacci, K. Naliuka, "Towards Practical Security Monitors of UML Policies for Mobile Applications" in 3rd International Conference on Availability, Security, and Reliability, Proceedings, CHICAGO: IEEE, 2008, p. 1112-1119. Proceedings of: ARES 2008, Barcelona, 4th-7th March 2008. - DOI: 10.1109/ARES.2008.191. - ISBN: 0769531024 - see details

2007

  • B. Crispo, Muhammad Torabi Dashti, S. Andrew Tanenbaum, "A Hybrid PKI-IBC Based Ephemerizer System" in Proceedings of the IFIP TC-11 22nd International Information Security Conference, 2007, p. 241-252. Proceedings of: IFIP SEC 2007 - see details
  • S. Nair, M. Dashti, B. Crispo, A. S. Tanenbaum, "A Hybrid PKI-IBC Based Ephemerizer System" in New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa: Springer, 2007 -(IFIP International Federation for Information Processing; 232). Proceedings of: SEC 2007, Sandton, 14th-16th May 2007. - ISBN: 978-0-387-72366-2 - see details
  • B. Crispo, S. Nair, P. Simpson, A. S. Tanenbaum, "A Virtual Machine Based Information Flow Control System for Policy Enforcement" in Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, 2007. Proceedings of: REM 2007, Dresden, 27th September 2007. - URL: http://www.cs.kuleuven.be/conference/ESORICS-REM2007/ - see details
  • D. Bolzoni, B. Crispo, S. Etalle, "ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems" in Proceedings of the 21st Large Installation System Administration Conference, 2007, p. 141-152. Proceedings of: USENIX LISA 2007, Dallas (TX), 11th-16th November 2007. - URL: http://www.usenix.org/events/lisa07/tech/bolzoni.html - see details
  • B. Crispo, S. Andrew Tanenbaum, Arno Bakker, "Design and implementation of a secure wide-area object middleware" in COMPUTER NETWORKS, v. 51(10), (2007), p. 2484-2513 - see details
  • I. Ion, B. Dragovic, B. Crispo, "Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices" in 23rd Annual Computer Security Applications Conference, Piscataway (NJ): IEEE Computer Society, 2007, p. 233-242. Proceedings of: ACSAC 07, Miami Beach (FL), 10th-14th December 2007. - URL: http://www.acsac.org/ . - DOI: 10.1109/ACSAC.2007.4412992 - see details
  • M.R. Rieback, B. Crispo, A.S. Tanenbaum, "RFID Crimeware" in Vari (edited by), Crimeware: Addison-Wesley, 2007. - ISBN: 978-0321501950 - see details
  • M. Rieback, N. Simpson, B. Crispo, A. S. Tanenbaum, "RFID Malware: Design Principles and Examples" in PERVASIVE AND MOBILE COMPUTING, v. Vol. 2, n. 4 (2007), p. 405-426 - see details
  • S. Nair, I. Djordjevic, B. Crispo, T. Dimitrakos, "Secure web service federation management using tpm virtualisation" in Proceedings of the 4th ACM Workshop On Secure Web Services: ACM Press, 2007, p. 73-82. Proceedings of: ACM SWS 2007, Alexandria, VA, USA, 2nd November 2007 - see details
  • B. Christianson, J. A. Malcolm, B. Crispo, M. Roe (edited by), "Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers", New York: Springer, 2007. - (Lecture Notes in Computer Science; 4631). - ISBN: 978-3-540-77155-5 - see details
  • B. Christianson, B. Crispo, J. A. Malcom, M. Roe (edited by), "Security Protocols: 12th International Workshop: revised selected papers", Berlin; Heidelberg; New York: Springer, 2007. - ISBN: 9783540409250. - URL: http://www.scopus.com/inward/record.url?eid=2-s2.0-38149030080&partnerID=40&md5=b49af39df67abe2eae17b9f7187c1b0d . - Contiene gli atti del convegno tenuto a Cambridge dal 26 al 28 aprile 2004 - see details
  • L. Desmet, W. Joosen, F. Massacci, K. Naliuka, P. Philippaerts, F. Piessens, D. Vanoverberghe, "A Flexible Security Architecture to Support Third-party Applications on Mobile Devices." in Proceedings of the 2007 ACM workshop on Computer Security Architecture, Chicago: ACM, 2007, p. 19-28. Proceedings of: CSAW '07, Fairfax, VA, 2nd November 2007 - see details
  • H. Koshutanski, F. Massacci, "A negotiation scheme for access rights establishment in autonomic communication" in JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, v. 15, n. 1 (2007), p. 117-136. - URL: http://www.scopus.com/inward/record.url?eid=2-s2.0- 33947544647&partnerID=40&md5=ea2c619a6004cd2bdbf859ced0975604 . - DOI: 10.1007/s10922-006-9057-2. - CODEN: JNSME - see details
  • N. Dragoni, F. Massacci, C. Schaefer, T. Walter, E. Vetillar, "A Security-by-Contracts Architecture for Pervasive Services" in Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing: SecPerU 2007: Proceedings, Piscataway, NJ: IEEE, 2007, p. 49-54. Proceedings of: SECPerU’07, Istanbul, 19th July 2007 - see details
  • A. Yautsiukhin, F. Massacci, "An Algorithm for the Appraisal of Assurance Indicators for Complex Business Processes" in Proceedings of the The Third Workshop on Quality of Protection, 2007. Proceedings of: QoP 2007, Alexandria (VA), 29th October 2007. - URL: http://dit.unitn.it/~qop/ - see details
  • F. Massacci, N. Zannone, J. Mylopoulos, "An Ontology for Secure Socio-Technical Systems", Handbook of Ontologies for Business Interaction, Pennsylvania: IGI Global, 2007, p. 188-206 - see details
  • F. Massacci, J. Mylopoulos, N. Zannone, "An Ontology for Secure Socio-Technical Systems", Handbook of Ontologies for Business Interaction, USA: Idea Group Inc., 2007, p. 188-206 - see details
  • F. Massacci, J. Mylopoulos, N. Zannone, "Computer-aided Support for Secure Tropos" in AUTOMATED SOFTWARE ENGINEERING, v. 14, n. 14.3 (2007), p. 341-364. - URL: http://www.scopus.com/inward/record.url?eid=2-s2.0- 34548563765&partnerID=40&md5=184cecac0dd347c6989f4b348655ee9b . - CODEN: ASOEE - see details
  • F. Massacci, J. Mylopoulos, N. Zannone, "Computer-Aided Support for Secure Tropos" in AUTOMATED SOFTWARE ENGINEERING, v. , n. 14.3 (2007), p. 341-364 - see details
  • P. Guarda, F. Massacci, N. Zannone, "E-Government and On-line Services: Security and Legal Patterns" in Proceedings of the 1st International Conference on Methodologies, Technologies and Tools enabling e-Government, Camerino: Halley, 2007, p. 29. Proceedings of: MeTTeG07, Camerino, 27-28 September 2007 - see details
  • G. Frankova, F. Massacci, M. Seguran, "From Early Requirements Analysis towards Secure Workflows" in Trust Management: Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, New Brunswick, Canada: Springer, 2007, p. 407-410 -(IFIP International Federation for Information Processing; 238). Proceedings of: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, Moncton, New Brunswick, 30th July-2 August 2007. - ISBN: 978-0-387-73654-9 - see details
  • F. Massacci, J. Mylopoulos, N. Zannone, "From Hippocratic databases to secure tropos: a computer-aided re-engineering approach" in INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, v. 17, n. 2 (2007), p. 265-284 - see details
  • W.Y. D. Asnar, P. Giorgini, F. Massacci, N. Zannone, "From Trust to Dependability through Risk Analysis" in the Second International Conference on Availability, Reliability and Security: ares 2007: Proceedings, Piscataway, NJ: IEEE, 2007, p. 19-26. - ISBN: 0769527752. Proceedings of: ARES 2007, Vienna, 10th-13th April 2007. - DOI: 10.1109/ARES.2007.93 - see details
  • L. Compagna, P. El Khoury, F. Massacci, R. Thomas, N. Zannone, "How to capture, communicate, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach" in 11th International Conference on Artificial Intelligence and Law: ICAIL 2007, New York, NY: ACM Press, 2007, p. 149-154. Proceedings of: ICAIL 2007, Stanford University, Palo Alto (CA), 4th-8th June 2007. - ISBN 978-1-59593-680-6 - see details
  • K. Koshutanski, F. Massacci, "Interactive Access Control with Trust Negotiation for Autonomic Communication", Advances in Enterprise Information Technology Security, Pennsylvania: IGI Global, 2007, p. 120-148. - DOI: 10.1145/1380422.1380424 - see details
  • F. Massacci, R.I. S. Siahaan, "Matching Midlet's Security Claims with a Platform Security Policy Using Automata Modulo Theory" in Proceedings of the 12th Nordic Workshop on Secure IT Systems, [S.l.: s.n.], 2007, p. [n.d.]-[n.d.]. Proceedings of: NordSec 2007, Reykjavík, 11th-12th October 2007. - URL: http://www.ru.is/nordsec2007/ - see details
  • A. Yautsiukhin, F. Massacci, "Modelling of quality of protection in outsourced business processes" in Proceedings of the Third International Symposium on Information Assurance and Security: IEEE Computer Society, 2007, p. 247-252. Proceedings of: IAS 2007, Manchester, 29th-31st August 2007. - URL: http://ieeexplore.ieee.org/iel5/4299731/4299732/04299782.pdf . - DOI: 10.1109/ISIAS.2007.4299782 - see details
  • L. Compagna, V. Lotz, F. Massacci (edited by), "Proc. of the ERCIM Security and Trust Management Workshop.(STM’07)", Amsterdam: Elsevier , 2007 - see details
  • W.Y. D. Asnar, P. Giorgini, F. Massacci, A. Saidane, R. Bonato, V. Meduri, C. Riccucci, "Secure and Dependable Patterns in Organizations: An Empirical Approach" in Requirements Engineering Conference, 2007. RE '07. 15th IEEE International, NJ, USA: IEEE Press, 2007, p. 287-292. - ISBN: 9780769529356. Proceedings of: Requirements Engineering Conference, 2007. RE '07. 15th IEEE International, New Delhi, India, 15th-19th October 2007. - DOI: 10.1109/RE.2007.19 - see details
  • Y. Karabulut, F. Massacci, A. Yautsiukhin, F. Kerschbaum, P. Robinson, "Security and Trust in IT Business Outsourcing: a Manifesto" in ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, v. 179, n. 179 (2007), p. 47-58. - URL: http://www.scopus.com/inward/record.url?eid=2-s2.0- 34250776507&partnerID=40&md5=18a10ad1eb25ee0745df4513749af06d . - DOI: 10.1016/j.entcs.2006.08.030 - see details
  • A. Mana, C. Rudolph, G. Spanoudakis, V. Lotz, F. Massacci, M. Melideo, J. M. Lopez-cobo, "Security Engineering for Ambient Intelligence: A Manifesto" in H. Mouratidis, P. Giorgini (edited by), Integrating Security and Software Engineering: advances and future visions, Hershey, Pa.: Idea group, 2007. - ISBN: 1-59904-147-2 - see details
  • N. Dragoni, F. Massacci, K. Naliuka, I. Siahaan, "Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code" in Public Key Infrastructure: 4th European PKI Workshop: Theory and Practice, EuroPKI 2007: Proceedings, Berlin ; Heidelberg: Springer, 2007, p. 297-312 -(Lecture Notes in Computer Science; 4582). - ISBN: 9783540734079. Proceedings of: EuroPKI 2007, Mallorca, 28th-30th June 2007. - DOI: 10.1007/978-3-540-73408-6_21 - see details
  • S. Etalle, F. Massacci, A. Yautsiukhin, "The meaning of logs" in Trust, Privacy and Security in Digital Business: 4th International Conference, TrustBus 2007: Proceedings, Berlin ; Heidelberg: Springer, 2007, p. 145-154 -(Lecture Notes in Computer Science; 4657). - ISBN: 9783540744085. Proceedings of: TrustBus 2007, Regensburg, 3rd-7th September 2007. - URL: http://www.icsd.aegean.gr/trustbus07/ . - DOI: 10.1007/978-3-540-74409-2_17. - ISBN: 9783540744085 - see details
  • F. Massacci, K. Naliuka, "Towards Practical Security Monitors of UML Policies for Mobile Applications." in Policy 2007: Eighth IEEE International Workshop on Policies for Distributed Systems and Networks: proceedings: Bologna, Italy, 13-15 June, 2007, Los Alamitos, Calif.: IEEE computer society, 2007, p. 278-278. - ISBN: 9780769527673. Proceedings of: Policy 2007, Bologna, 13th-15th June 2007. - DOI: 10.1109/POLICY.2007.46. - ISBN: 0769527671; 9780769527673 - see details
  • A. Pretschner, F. Massacci, M. Hilty, "Usage Control in Service-Oriented Architectures", Trust, Privacy and Security in Digital Business4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, Berlin: Springer Berlin / Heidelberg, 2007, p. 83-93. - (Lecture Notes in Computer Science; 4657). - ISBN: 9783540744085 - see details

2006

  • B. Crispo, N.D. Simpson, A.S.M.R. Rieback And Tanenbaum, ""RFID Malware: Design Principles and Examples"" in PERVASIVE AND MOBILE COMPUTING, v. 2, (2006), p. 405-426 - see details
  • M. Rieback, B. Crispo, A.S. Tanenbaum, ""The Evolution of RFID Security"" in IEEE PERVASIVE COMPUTING, v. 5,1, (2006), p. 62-69 - see details
  • M. Rieback, G. Gaydadjiev, B. Crispo, R. Hofman, A. S. Tanenbaum, "A Platform for RFID Security and Privacy Administration" in Proceedings of the Usenix 20th Large Installation System Administration Conference, 2006, p. 89-102. Proceedings of: USENIX LISA 2006, Washington DC, 3rd-8th December 2006. - Best Paper Award - see details
  • C. Gamage, B. Gras, B. Crispo, A. S. Tanenbaum, "An Identity-based Ring Signature Scheme with Enhanced Privacy" in Proceeding of IEEE SecureComm 2006: IEEE Press, 2006. Proceedings of: IEEE Securecomm, Baltimore, MD, USA, 28 August -1 September 2006 - see details
  • M. Rieback, B. Crispo, A. S. Tanenbaum, "Is Your Cat Infected with a Computer Virus?" in Fourth Annual IEEE International Conference on Pervasive Computing and Communications, 2006. PerCom 2006: IEEE Computer Society, 2006, p. 169-179, Pisa, 13th-17th March 2006 - see details
  • M. Rieback, B. Crispo, A. S. Tanenbaum, "Malware: Truth vs. Myth" in IEEE SECURITY & PRIVACY, v. 4, n. 4 (2006), p. 70-72 - see details
  • B. Christianson, B. Crispo, J. A. Malcolm, M. Roe (edited by), "Proceeding of the 12th Security Protocol International Workshop", Berlin: Springer, 2006. - (LNCS; 3957). - ISBN: 978-3-540-40925-0 - see details
  • M. Rieback, N. Simpson, B. Crispo, A. S. Tanenbaum, "RFID Malware: Design Principles and Examples" in PERVASIVE AND MOBILE COMPUTING, v. 2, n. 4 (2006), p. 405-426 - see details
  • C. Gamage, K. Bikakci, B. Crispo, A. S. Tanenbaum, "Security for the Mythical Air-dropped Sensor Net work" in Proceedings of the 11th IEEE Symposium on Computers and Communications: IEEE Press, 2006. Proceedings of: ISCC 2006, Cagliari, 2006 - see details
  • A. S. Tanenbaum, C. Gamage, B. Crispo, "Taking Sensor Networks from the Lab to the Jungle" in COMPUTER, v. 39, n. 8 (2006), p. 98-100 - see details
  • M. Rieback, B. Crispo, A. S. Tanenbaum, "The Evolution of RFID Security" in IEEE PERVASIVE COMPUTING, v. 5, n. 1 (2006), p. 62-69 - see details
  • P. Mazzoleni, E. Bertino, B. Crispo, "XACML Policy Integration Algorithms" in ACM Symposium on Access Control Model and Technologies, 2006 - see details
  • P. Mazzoleni, E. Bertino, B. Crispo, S. Sivasubramanian, "XACML Policy Integration Algorithms" in Proceedings of the 11th ACM Symposium on Access Control Model and Technologies: ACM Press, 2006. Proceedings of: ACM SACMAT, Lake Tahoe, CA, 2006 - see details
  • F. Massacci, J. Mylopoulos, N. Zannone, "A Privacy Model to Support Minimal Disclosure in Virtual Organizations" in Proceedings of the W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement, ROMA: ISPRA, 2006, p. 0-0. Proceedings of: W3C-06, Ispra, Italy, 17-18 October 2006. - URL: http://www.w3.org/2006/07/privacy-ws/ - see details
  • G. Bella, S. Bistarelli, F. Massacci, "A Protocol’s Life After Attacks..." in Security Protocols: 11th International Workshop: Revised Selected Papers, Berlin: Springer, 2006, p. 3-10 -(Lecture Notes in Computer Science; 3364). Proceedings of: 11th International Workshop on Security Protocols, Cambridge, 2nd-4th April 2003. - URL: http://www.springerlink.com/content/94674kp6j68p4tfn/fulltext.pdf . - ISBN 978-3-540-28389-8 DOI: 10.1007/11542322_2 - see details
  • S. Dobson, S. Denazis, A. Fernandez, D. Gaiti, E. Gelenbe, F. Massacci, P. Nixon, F. Saffre, N. Schmidt, F. Zambonelli, "A survey of autonomic communications" in ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, v. 1, n. 2 (2006), p. 223-259. - URL: http://www.scopus.com/inward/record.url?eid=2-s2.0- 33845547636&partnerID=40&md5=025d69b149806e9c7d38ceba663dbe6e . - DOI: 10.1145/1186778.1186782. - Available in .pdf at http://www.simondobson.org/files/personal/dict/softcopy/ac-survey-06.pdf - see details
  • V. Bryl, F. Massacci, J. Mylopoulos, N. Zannone, "Designing Security Requirements Models through Planning" in 18th Conference on Advanced Information Systems Engineering (CAiSE'06), Berlin, Heidelberg: Springer, 2006, p. 33-47 -(LNCS; 4001). Proceedings of: 18th Conference on Advanced Information Systems Engineering (CAiSE'06), Luxembourg, 5-9 June 2006. - ISBN 3-540-34652-X - see details
  • F. Massacci, N. Zannone, "Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank" in P. Giorgini, N. Maiden, J. Mylopoulos, E. Yu (edited by), Social Modeling for Requirements Engineering, Cambridge, Mass. ; London: MIT press, 2006, p. 341-364 - see details
  • P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone, "Detecting Conflicts of Interest" in 14th IEEE International Requirements Engineering Conference: RE'06: proceedings: Minneapolis/St. Paul, Minnesota, USA, September 11-15, 2006: IEEE Computer Society Press, 2006, p. 308-311. Proceedings of: 14th IEEE International Requirements Engineering Conference, Minneapolis/St. Paul, Minnesota, US, 11th-15th, September 2006. - URL: http://ieeexplore.ieee.org/iel5/11170/35962/01704085.pdf?isnumber=35962&prod=CNF&arnumber=1704085&arSt=+308&ared=+311&arAuthor= . - ISBN 0-7695-2555-5 - see details
  • F. Massacci, J. Mylopoulos, N. Zannone, "From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach" in INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, n. 17.2 (2006), p. 265-284. - DOI: 10.1142/S0218194007003239 - see details
  • F. Massacci, J. Mylopoulos, N. Zannone, "Hierarchical Hippocratic Databases with Minimal Disclosure for Virtual Organizations" in VLDB JOURNAL, v. 15, n. 4 (2006), p. 370-387. - Available in .pdf at http://springer.metapress.com/content/6885442330n7874m/fulltext.pdf - see details
  • F. Massacci, N. Zannone, "Privacy is linking permission to purpose" in Security Protocols: 12th International Workshop, Cambridge: Revised Selected Papers, BERLIN: Springer, 2006, p. 179-194 -(Lecture Notes in Computer Science; 3957). Proceedings of: 12th International Workshop on Security Protocols, Cambridge, 26th-28th April 2004. - URL: http://www.springerlink.com/content/l7776lv37385rm34/fulltext.pdf . - ISBN: 978-3-540-40925-0 - see details
  • G. Karjoth, F. Massacci (edited by), "Proceedings of the 2nd ACM workshop on Quality of protection", New York, N.Y.: ACM press, 2006, 64 p. - ISBN: 1-59593-553-3 - see details
  • D. Gollmann, F. Massacci, A. Yautsiukhin (edited by), "Quality of protection: security measurements and metrics", Berlin: Springer, 2006. - ISBN: 978-0-387-29016-4 - see details
  • P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone, "Requirements Engineering for Trust Management: Model, Methodology, and Reasoning" in INTERNATIONAL JOURNAL OF INFORMATION SECURITY, v. 5, n. 4 (2006), p. 257-274. - DOI: 10.1007/s10207-006-0005-7. - Available in .pdf at http://springer.metapress.com/content/n8086113173t17q6/fulltext.pdf - see details
  • G. Bella, S. Bistarelli, F. Massacci, "Retaliation: Can We Live with Flaws?" in Proceedings of the NATO Adavnced Research Workshop on Information Assurance and Computer Security 2005, Amsterdam: IOS Press, 2006, p. 3-14. Proceedings of: NATO ARW Information Security Assurance and Security 2005, Tetuan, Morocco, 3rd-4th June 2005 - see details
  • K. Stølen, W. H. Winsborough, F.Martinelli, F. Massacci (edited by), "Trust Management, Proceedings of the 4th International Conference, iTrust 2006", BERLIN: SPRINGER, 2006 - see details
  • K. Stoelen, W. H. Winsborough, F. Martinelli, F. Massacci (edited by), "Trust Management: 4th International Conference: iTrust 2006", Berlin: Springer, 2006. - (Lecture Notes in Computer Science; 3986). - ISBN: 978-3-540-34295-3. - Includes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006, held in Pisa, Italy, in May 2006. - see details
  • G. Bella, F. Massacci, L. C. Paulson, "Verifying the SET Purchase Protocols" in JOURNAL OF AUTOMATED REASONING, v. 36, n. 1-2 (2006), p. 5-37. - DOI: 10.1007/s10817-005-9018-6. - Available in .pdf at: http://springerlink.metapress.com/content/m84r731288743242/fulltext.pdf - see details

2005

  • C. Gamage, J. Leiwo, K. Bicakci, B. Crispo, A. S. Tanenbaum, "A Cost-Efficient Counter-Intrusion Scheme for One-Time Sensor Networks" in Proceedings of the 2005 Intelligent Sensors, Sensor Networks & Information Processing Conference, Piscataway (NJ): IEEE Operations Center, 2005. Proceedings of: ISSNIP, Melbourne, 5th-8th December 2005. - ISBN 0-7803-9399-6 - see details
  • K. Bicakci, B. Crispo, A. S. Tanenbaum, "Counting Abuses Using Flexible Off-line Credentials" in Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings: Springer, 2005, p. 548-559, Brisbane, 4th-6th July 2005 - see details
  • B. Popescu, B. Crispo, A. S. Tanenbaum, M. Zeeman, "Describing Security Policies for Replicated Globe Objects" in Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers.: Springer, 2005 -(LNCS, 3364). Proceedings of: 11th Security Protocols International Workshop, Cambridge, UK, April, 2-4 2003. - ISBN 3-540-28389-7 - see details
  • P. Mazzoleni, B. Crispo, S. Sivasubramanian, E. Bertino, "Efficient Integration of Fine-grained Access Control in Large-scale Grid Services" in Proceedings of the 2005 IEEE International Conference on Services Computing, Los Alamitos (CA): IEEE Computer Society, 2005. Proceedings of: SCC 2005, Orlando (FL), 11th-15th July 2005. - ISBN 0-7695-2408-7 - see details
  • S. Nair, B. Popescu, C. Gamage, B. Crispo, A. S. Tanenbaum, "Enabling DRM-preserving Digital Content Redistribution" in CEC 2005: seventh IEEE International Conference on E-commerce Technology: 19-22 July 2005: Munich, Germany: IEEE Computer Society, 2005, Munich, 19th-22nd July 2005 - see details
  • P. Mazzoleni, B. Crispo, S. Sivasubramanian, E. Bertino, "Enabling Fine-grained Access Control requires Security-aware Resource Broker", 2005. Proceedings of: CCGrid 2005, Cardiff, 9th-12th May 2005. - URL: http://dsg.port.ac.uk/events/conferences/ccgrid05/wip/schedule/Paper6.pdf . - Work-in-progess paper - see details
  • K. Bicakci, B. Crispo, A. S. Tanenbaum, "How to Incorporate Revocation Status Information into the Trust Metrics for Public-Key Certification" in Applied computing 2005: the 20th annual ACM Symposium on Applied Computing: proceedings of the 2005 ACM Symposium on Applied Computing: Sante Fe, New Mexico, March 13-17, 2005: Association for Computing Machinery (ACM), 2005. Proceedings of: ACM SAC 2005, Santa Fe, 13th-17th March 2005 - see details
  • M. Rieback, B. Crispo, A. S. Tanenbaum, "Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags" in Proceedings of the 13th Security Protocol International Workshop: LNCS, 2005. Proceedings of: SPW 2005, Cambridge, 2005. - (in corso di stampa) - see details
  • K. Bicakci, C. Gamage, B. Crispo, A. S. Tanenbaum, "One-Time Sensors: A Novel Concept to Mitigate Node-Capture Attacks" in Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Berlin: Springer, 2005, p. 80-90 -(LNCS; 3813). Proceedings of: ESAS 2005, Visegrad, 13th-14th July 2005. - ISBN 3-540-30912-8 - see details
  • B. Crispo, S. Sivasubramanian, P. Mazzoleni, E. Bertino, "P-Hera: scalable fine-grained access control for P2P" in Proceedings of the 11th International Conference on Parallel and Distributed Systems: July 20 - 22, 2005, Fukuoka Institute of Technology (FIT), Fukuoka, Japan: IEEE Computer Society, 2005. Proceedings of: ICPADS 2005, Fukuoka, 20-22 July 2005. - ISBN 0-7695-2281-5 - see details
  • M. Rieback, B. Crispo, A. S. Tanenbaum, "RFID Guardian: A Battery-Powered Mobile Device for Personal RFID Privacy Management" in Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings, Berlin: Springer, 2005, p. 184-194 -(LNCS; 3574). Proceedings of: ACISP 2005, Brisbane, 4th-6th July 2005. - ISBN 3-540-26547-3 - see details
  • B. Popescu, B. Crispo, A. S. Tanenbaum, "Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System" in Proceedings of the 12th Security Protocol International Workshop: Springer, 2005. Proceedings of: SPW 2004, Cambridge, 26th-28th April 2004 - see details
  • B. Popescu, M. Van Steen, B. Crispo, A. S. Tanenbaum, S. Jan, K. Ihor, "Securely Replicated Web Documents." in Proceedings of the 19th International Parallel and Distributed Processing Symposium: IEEE Computer Society, 2005. Proceedings of: IPDPS 2005, Denver (CA), 4th-8th April 2005. - ISBN 0-7695-2312-9 + 1 CD-ROM - see details
  • B. Christianson, B. Crispo, J. A. Malcolm, M. Roe (edited by), "Security Protocol International Workshop proceedings, 11 ed.", Berlin: Springer, 2005. - (LNCS; 3364). - ISBN: 3-540-28389-7 - see details
  • B. Popescu, B. Crispo, A. S. Tanenbaum, "Support for multi-level security policies in DRM architectures" in Proceedings of the 2004 workshop on New security paradigms, New York, N.Y.: ACM press, 2005, p. 3-9. Proceedings of: NSPW 2004, Nova Scotia, 20th-23rd September 2004. - .pdf available at: http://delivery.acm.org/10.1145/1070000/1065909/p3-popescu.pdf?key1=1065909&key2=7550389311&coll=ACM&dl=ACM&CFID=64855959&CFTOKEN=88020170 - see details
  • G. Bella, F. Massacci, C.L. Paulson, "An Overview of the Verification of SET" in INTERNATIONAL JOURNAL OF INFORMATION SECURITY, v. 4(1-2), (2005), p. 17-28 - see details
  • G. Kuper, F. Massacci, N. Rassadko, "Generalized XML Security Views" in SACMAT 2005: proceedings of Tenth ACM Symposium on Access Control Models and Technologies, CHICAGO: ACM Press, 2005, p. 77-84. Proceedings of: SACMAT '05, Stockholm, 1st–3rd June 2005. - URL: www.sacmat.org . - DOI: 10.1145/1063979.1063994. - ISBN 1-595-93045-0 - see details
  • H. Koshutanski, F. Massacci, "Interactive Access Control and Trust Negotiation for Autonomic Communication" in ERCIM NEWS, n. 63 (2005), p. 36-37. - Special issue: Security and Trust Management - see details
  • H. Koshutanski, F. Massacci, "Interactive credential negotiation for stateful business processes" in Trust Management , BERLIN: SPRINGER, 2005, p. 256-272. Proceedings of: (iTrust-05), Rocquencourt, France, May 2005. - ISSN: 03029743 - see details
  • N. Zannone, S. Jajodia, F. Massacci, D. Wijesekera, "Maintaining Privacy on Derived Objects" in Workshop on Privacy in the Electronic Society (WPES'05): ACM Press, 2005, p. 10-19. Proceedings of: Workshop on Privacy in the Electronic Society (WPES'05), Alexandria (VA), 7th November 2005. - ISBN 1-59593-228-3 - see details
  • F. Massacci, J. Mylopoulos, N. Zannone, "Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation" in Computer Security: ESORICS 2005, Berlin: Springer, 2005, p. 438-454 -(Lecture Notes in Computer Science; 3679). Proceedings of: 10th European Symposium on Research in Computer Security, Milano, 12th-14th September 2005. - ISBN 3-540-28963-1 - see details
  • P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone, "Modeling Security Requirements Models through Planning" in Proceedings. 13th IEEE International Conference on Requirements Engineering, CHICAGO: IEEE, 2005, p. 167-176. Proceedings of: RE'05, PARIS, 29 AUGUST- 2 SEPTEMBER. - ISSN: 1090705X - see details
  • P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone, "Modeling security requirements through ownership, permission and delegation" in Proceedings of the 13th IEEE International Comference on Requirements Engineering: Paris, France, 29 August - 2 September 2005: IEEE, 2005, p. 167-176. Proceedings of: IEEE Computer Society, Paris, 29 Aug-2 Sep 2005. - ISBN 0-7695-2425-7 - see details
  • P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone, "Modelling Security Requirements Through Ownership, Permissions and Delegations" in 13th IEEE International Requirements Engineering Conference, USA: IEEE, 2005, p. 167-176. Proceedings of: RE’05, PARIS, AUGUST-SEPTEMBER - see details
  • P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone, "Modelling Social and Individual Trust in Requirements Engineering Methodologies" in 3rd International Conference on Trust Management (iTrust 2005), Berlin: Springer, 2005, p. 161-176 -(LNCS; 3477). Proceedings of: 3rd international conference on trust management (iTrust 2005), Rocquencourt, France, 23-26 May 2005. - ISBN 3-540-26042-0 - see details
  • G. Bella, F. Massacci, L. C. Paulson, "Overview of the Verification of SET" in INTERNATIONAL JOURNAL OF INFORMATION SECURITY, v. 4, n. 1-2 (2005), p. 17-28. - URL: http://www.scopus.com/inward/record.url?eid=2-s2.0- 14844323149&partnerID=40&md5=8336a228480e0585f4e2dae57659dadd . - DOI: 10.1007/s10207-004-0047-7 - see details
  • P. Giorgini, F. Massacci, N. Zannone, "Security and Trust Requirements Engineering" in A. Aldini, R. Gorrieri, F. Martinelli (edited by), Foundations of Security Analysis and Design III: Tutorial Lectures, Berlin: Springer, 2005, p. 237-272. - ISBN: 3-540-28955-0 - see details
  • P. Giorgini, F. Massacci, N. Zannone, "Security and Trust Requirements Engineering", Foundations of Security Analysis and Design III: Tutorial Lectures, Berlin: SPRINGER, 2005, p. 237-272 - see details
  • P. Giorgini, F. Massacci, J. Mylopoulos, A. Siena, N. Zannone, "ST-Tool: a case tool for modeling and analyzing trust requirements" in 3rd international conference on trust management (iTrust 2005), 2005, p. 415-419. Proceedings of: Springer, Rocquencourt, 23rd-26th May 2005. - ISBN: 3-540-26042-0 - see details
  • P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone, "ST-Tool: A CASE Tool for Security Requirements Engineering" in Proceedings of the 13th IEEE International Conference on Requirements Engineering: Paris, France, 29 August - 2 September 2005, 2005, p. 451-452. Proceedings of: IEEE Computer Society, Paris, 29th August-2nd September 2005. - ISBN 0-7695-2425-7 - see details
  • F. Massacci, M. Pistore, A. Gotsman, "Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language" in Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA 2005), Amsterdam: Elsevier, 2005, p. 59-77 -(Electronic Notes in Theoretical Computer Science; 135.1). Proceedings of: ARSPA 2005, Lisbon, 16th July 2005. - DOI: 10.1016/j.entcs.2005.06.004 - see details
  • F. Massacci, M. Prest, N. Zannone, "Using a Security Requirements Engineering Methodology in Practice: the compliance with the Italian Data Protection Legislation" in COMPUTER STANDARDS & INTERFACES, v. 27, n. 5 (2005), p. 445-455 - see details

2004

  • B. Popescu, B. Crispo, F. Kamperman, A. S. Tanenbaum, "A DRM security architecture for home networks" in DRM '04 : proceedings of the fourth ACM Workshop on Digital Rights Management, New York, N.Y.: Association for Computing Machinery, 2004. Proceedings of: DRM 2004, Washington DC, 25 October 2004. - ISBN 1581139691 - see details
  • E. Bertino, B. Crispo, J. Joshi, K. D. Wengliang, R. S. Sandhu, "Panel: security for grid-based computing systems issues and challenges" in Proceedings of the 9th ACM Symposium on Access Control Models and Technologies: ACM, 2004. Proceedings of: ACM SACMAT: 9th ACM Symposium on Access Control Models and Technologies, Yorktown Heights, NY, 2nd-4th June 2004 - see details
  • B. Crispo, E. Bertino, P. Mazzoleni, "Support Multi-Dimensional Trustworthiness for Grid Workflow" in Proceedings of the DELOS Workshop: Digital Library Architecture: Edizioni Libreria Progetto, 2004, p. 195-204. Proceedings of: DELOS Workshop: Digital Library Architectures 2004, Cagliari, 24th-25th June 2004 - see details
  • B. Crispo, B. Popescu, A. S. Tanenbaum, "Symmetric Key Authentication Services Revisited" in Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, Berlin: Springer, 2004, p. 248-261 -(Lecture Notes in Computer Science; 3108). Proceedings of: ACISP 2004, Sidney, 13th-15th July 2004. - ISBN 3-540-22379-7 - see details
  • B. Christianson, B. Crispo, J. A. Malcolm, M. Roe (edited by), "The Security Protocol International Workshop proceedings, 10 ed.", Berlin: Springer, 2004. - (LNCS series; 2845) - see details
  • E. Bertino, P. Mazzoleni, B. Crispo, S. Sivasubramanian, E. Ferrari, "Towards supporting fine-grained access control for Grid Resource" in Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, FTDCS 2004 : 26 - 28 May 2004, Suzhou, China: IEEE Computer Society, 2004. Proceedings of: IEEE FTDCS 2004, Suzhou, 26th-28th May 2004. - ISBN 0-7695-2118-5 - see details
  • H. Koshutanski, F. Massacci, "An Interactive Trust Management and Negotiation Scheme" in Formal Aspects in Security and Trust: IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, 2004, Toulouse, France: Springer, 2005, p. 139-152 -(IFIP International Federation for Information Processing; 173). Proceedings of: Formal Aspects of Security and Trust (FAST 2004), Toulouse, 22nd-27th August 2004. - URL: http://www.iit.cnr.it/FAST2004/ . - ISBN 0-387-24050-0 - see details
  • H. Koshutanski, F. Massacci, "A System for Interactive Authorization for Business Processes for Web Services" in 4th International Conference on Web Engineering (ICWE), Berlin: Springer Verlag, 2004, p. 521-525. Proceedings of: Springer, Munich, 28th-30th July 2004 - see details
  • H. Koshutanski, F. Massacci, "E Pluribus Unum: Deduction, Abduction and Induction, the Reasoning Services for Access Control in Autonomic Communication", 2004. Proceedings of: 1st IFIP TC6 WG6.6 International Workshop on Autonomic Communication (WAC 2004), Berlin, Germany, 18-19 October 2004. - URL: http://www.autonomic-communication.org/wac/ - see details
  • P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone, "Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures" in Public Key Infrastructure - EuroPKI 2004, Heidelberg: Springer, 2004, p. 98-111 -(Lecture Notes in Computer Science; 3093). Proceedings of: 1st European PKI Workshop Research and Applications (1st EuroPKI), Samos Island (Greece), 25th-26th June 2004. - ISBN: 3-540-22216-2 - see details
  • H. Koshutanski, F. Massacci, "Interactive Access Control for Web Services" in Security and protection in information processing systems: IFIP 18th world computer congress: TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France, Boston: Kluwer Academic Publishers, 2004, p. 150-166 -(IFIP International Federation for Information Processing; 147). Proceedings of: 19th IFIP International Information Security Conference (SEC 2004), Toulouse, 22nd-27th August 2004. - URL: http://www.laas.fr/sec2004/ . - ISBN 1402081421 (cased)ISBN 140208143X (e-book) - see details
  • P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone, "Requirements engineering meets trust management: model, methodology, and reasoning" in Proceedings of the 2nd International Conference on Trust Management (iTrust 2004), Heidelberg: Springer, 2004, p. 176-190 -(Lecture Notes in Computer Science; 2995). Proceedings of: 2nd International Conference on Trust Management, Oxford, 29 March - 1 April 2004. - ISBN 3-540-21312-0 - see details

2003

  • B. Popescu, B. Crispo, A. S. Tanenbaum, "A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System" in 8th IEEE symposium on computers and communications, 2003. Proceedings of: IEEE Computer Society, Kemer-Antalya, 30th June-3rd July 2003. - ISBN 076951961X - 2 Vol. - see details
  • B. Popescu, B. Crispo, A. S. Tanenbaum, "Secure Data Replication on Un-Trusted Host" in Proceedings of HotOS IX : The 9th Workshop on Hot Topics in Operating Systems, Lihue, Hawaii, USA, May 18 - 21, 2003, [S.L]: Usenix Association, 2003, Lihue (HI), 18th-21st May 2003 - see details
  • H. Koshutanski, F. Massacci, "An access control framework for business processes for web services" in Proceedings of the 2003 ACM workshop on XML security, 2003, p. 15-24, October, 2003 - see details
  • H. Koshutanski, F. Massacci, "A Logical Model for Security of Web Services" in Formal Aspects of Security and Trust: CNR, 2003, p. 1-8 -(Technical report; 01/10/2003). Proceedings of: 1st International Workshop on Formal Aspects of Security and Trust (FAST 2003), Instituto di Informatica e Telematica, Pisa, Italy, 8-9 September 2003. - URL: http://www.iit.cnr.it/FAST2003/ - see details
  • G. Bella, S. Bistarelli, F. Massacci, "A Protocol's Life after Attacks" in Proceedings of the 11th International Workshop on Security Protocols: Springer, 2003 -(Lecture Notes in Computer Science). Proceedings of: Proceedings of the 11th International Workshop on Security Protocols, Cambridge, UK, 2003. - ISSN 0302-9743. - In print - see details
  • N. Chetcuti-sperandio, F. Massacci, "A semantics and a calculi for reasoning about credential-based systems", 2003, p. 61-76. Proceedings of: Proceedings of the International Workshop Methods for Modalities (M4M'03), Nancy, France, September 2003 - see details
  • H. Koshutanski, F. Massacci, "An Access Control System for Business Processes for Web Services" in NORDSEC 2003: proceedings of the Seventh [i.e. Eighth] Nordic Workshop on Secure IT Systems - Encouraging Cooperation: 15th-17th October 2003, Gjøvik, Norway: [Norwegian University of Science and Technology], Department of Telematics, 2003, p. 143-150. Proceedings of: NORDSEC 2003, Gjøvik University College, 15th-17th October 2003. - URL: http://www2.hig.no/esorics2003/nordsec2003/ . - ISBN 82-993980-4-5 - see details
  • L. Carlucci Aiello, F. Massacci, "Attacking Fair-Exchange Protocols: Parallel Models vs. Trace Models" in ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, v. 55(1), (2003) - see details
  • C. Fiorini, F. Massacci, E. Martinelli, "How to fake an RSA signature by encoding modular root finding as a SAT problem" in DISCRETE APPLIED MATHEMATICS AND COMBINATORIAL OPERATIONS RESEARCH, v. 130, n. 2 (2003), p. 101-127. - DOI: 10.1016/S0166-218X(02)00400-6. - CODEN: DAMAD - see details
  • N. Chetcuti-sperandio, F. Massacci, "Reasoning about Credential-based Systems" in Proceedings 1st International Workshop on Formal Aspects in Security and Trust (FAST'03), Pisa, September 2003: Istituto di Informatica e Telematica, 2003, p. 23-38. Proceedings of: Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust (FAST’03), Pisa, 8-9 September 2003. - Technical Report IIT TR-10/2003 - see details
  • P. Giorgini, F. Massacci, J. Mylopoulos, "Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard" in Conceptual modeling - ER 2003: 22nd International Conference on Conceptual Modeling, Chicago, IL, USA, October 13-16, 2003: proceedings, Berlin: Springer, 2003, p. 263-276 -(Lecture Notes in Computer Science; 2813). Proceedings of: 22nd international conference on conceptual modeling (ER 2003), Chicago (IL), 13th-16th October 2003. - URL: http://www.er.byu.edu/er2003/ . - ISBN 3-540-20299-4 - see details
  • G. Bella, F. Massacci, L. C. Paulson, "Verifying the SET registration protocols" in IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, v. 21, n. 1 (2003), p. 77-87 - see details

2002

  • F. Bergadano, D. Cavagnino, B. Crispo, "Individual Authentication in Multiparty Communications" in COMPUTERS & SECURITY, v. 21,8, (2002), p. 719-735 - see details
  • F. Massacci, "Formal Verification of SET by VISA and MasterCard: Lessons for Formal Methods in Security", 2002, p. 2-4. Proceedings of: Second verification workshop VERiFY 2002 affiliated with the 18 Conference on Automated deduction (CADE) at FLOC '02, Copenhagen, July, 25-26 2002. - URL: http://diku.dk/publikationer/tekniske.rapporter/2002/02-07.pdf - see details
  • L. Carlucci Aiello, F. Massacci, "Planning attacks to security protocols: case studies in logic programming" in A. Kakas, F. Sadri (edited by), Computational logic: logic programming and beyond : essays in honor of Robert A. Kowalski, Berlin: Springer, 2002, p. 533-560. - ISBN: 3-540-43959-5 - see details
  • F. M. Donini, P. Liberatore, F. Massacci, M. Schaerf, "Solving QBF with SMV" in Proceedings of the 2002 Intl. Workshop on Description Logics (DL2002), Toulouse, France, April 19-21, 2002.: CEUR, 2002, p. 578-589 -(CEUR-WS; 56). Proceedings of: Proceedings of the 8th International Conference on Principles of Knowledge Representation and Reasoning (KR’02), Toulouse, France, 19-21 April 2002. - URL: http://CEUR-WS.org/Vol-53 - see details
  • G. Bella, F. Massacci, C.L. Paulson, "The Verification of an Industrial Payment Protocol: The SET Purchase Phas" in Proc. of the 9th ACM Conf. on Communications and Computer Security CCS-2002, 2002, p. 12-20 - see details
  • G. Bella, L. C. Paulson, F. Massacci, "The verification of an industrial payment protocol: the SET purchase phase": ACM Press, 2002, p. 12-20. Proceedings of: 9th ACM conference on computer and communications security ACM CCS-2002, Washington, DC, 18-22 November 2002. - URL: http://www.acm.org/sigs/sigsac/ccs/CCS2002/ . - ISBN 1-58113-612-9 - see details

2001

  • B. Crispo, "Delegation Protocols for Electronic Commerce" in 6th IEEE Symposium on Computers and Communications, 2001 - see details
  • B. Crispo, G. Ruffo, "Reasoning about Accountability within Delegation" in 3rd International Conference on Information and Communications, 2001 - see details
  • L. Carlucci Aiello, F. Massacci, "Attacking fair-exchange protocols: parallel models vs trace models" in International Workshop on Logical Aspects of Cryptographic Protocols Verification: Elsevier, 2001 -(Electronic Notes in Theoretical Computer Science; 55). Proceedings of: International Workshop on Logical Aspects of Cryptographic Protocols Verification, Paris, 2001 - see details
  • F. Massacci, "Decision Procedures for Expressive Description Logics with Intersection, Composition, Converse of Roles and Role Identity" in IJCAI-01 : proceedings of the seventeenth International Joint Conference on Artificial Intelligence, Seattle, Washington August 4-10, 2001: Kaufmann, 2001, p. 193-198 -(ISBN 1-55860-777-3; 1). Proceedings of: Proceedings of the 17th International Joint Conference on Artificial Intelligence (IJCAI’01), Seattle, Washington, 2001 - see details
  • A. Fioravanti, F. Massacci, "How to model (and simplify) the SET payment phase for automated verification" in Proceedings of IJCAR-2001 Verification Workshop - VERIFY'01: Università di Siena, 2001, p. 34-44 -(Technical Report; 01/08/2001). Proceedings of: Proceedings of IJCAR-2001 Verification Workshop - VERIFY'01, Siena, June, 18-23 2001 - see details
  • L. Farinas Del Cerro, D. Fauthoux, O. Gasquet, A. Herzig, D. Longin, F. Massacci, "Lotrec : The Generic Tableau Prover for Modal and Description Logics": Springer Heidelberg, 2001, p. 453-458 -(Lecture Notes in Artificial Intelligence; 2083). Proceedings of: Proceedings of International Joint Conference on Automated Reasoning, IJCAR-01, 2001. - ISBN 3-540-42254-4 - see details
  • L. Carlucci Aiello, F. Massacci, "Verifying security protocols as planning in logic programming" in ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, v. 2, n. 4 (2001), p. 542-580 - see details

2000

  • F. Bergadano, D. Cavagnino, B. Crispo, "Chained Stream Authentication" in 7th Annual Workshop on Selected Areas in Cryptography, 2000 - see details
  • L. Carlucci Aiello, F. Massacci, "An Executable Specification Language for Planning Attacks to Security Protocols" in Proc. of the 13th IEEE Computer Security Foundations Workshop (CSFW'00), 2000, p. 88-102 - see details
  • G. De Giacomo, F. Massacci, "Combining deduction and model checking into tableaux and algorithms for Converse-PDL." in INFORMATION AND COMPUTATION, v. 162, (2000), p. 117-137 - see details
  • F. M. Donini, F. Massacci, "EXPTIME Tableaux for ALC" in ARTIFICIAL INTELLIGENCE, v. 124(1), (2000), p. 87-138 - see details
  • G. Bella, F. Massacci, L. C. Paulson, P. Tramontano, "Formal verification of cardholder registration in SET", Berlin, Heidelberg, NewYork: Springer Verlag, 2000, p. 159-174 -(LNCS; 1895). Proceedings of: 6th European symposium on research in computer security (ESORICS-2000), Toulouse, 2000 - see details
  • F. Massacci, L. Marraro, "Logical Cryptanalysis as a SAT-Problem: Encoding and Analysis of the U.S. Data Encryption Standard" in JOURNAL OF AUTOMATED REASONING, v. 24, n. 1-2 (2000), p. 165-203 - see details
  • F. Massacci, "Reduction Rules and Universal Variables for First Order Tableaux and DPLL" in Proc. of the 7th Int. Conf. on Principles of Knowledge Repr. and Reasoning (KR), 2000, p. 186-197 - see details
  • F. Massacci, L. Marraro, "Single Step Tableaux for Modal Logics" in JOURNAL OF AUTOMATED REASONING, v. 24, n. 3 (2000), p. 319-364 - see details
  • F. Massacci, "Single Step Tableaux for Modal Logics: methodology, computations, algorithms" in JOURNAL OF AUTOMATED REASONING, v. 24(3), (2000), p. 319-364 - see details
  • F. Massacci, "The Complexity of Analytic and Clausal Tableaux" in THEORETICAL COMPUTER SCIENCE, v. 243, n. 1-2 (2000), p. 477-487 - see details
  • P. Baumgartner, F. Massacci, "The Taming of the XOR" in Computational Logic -- CL 2000, First International Conference, 2000, p. 508 - see details

1999

  • R. J. Anderson, B. Crispo, J. Lee, C. Manifavas, V. Matyas, F. Petitcolas, The Global Internet Trust Register, Cambridge, Mass. ; London: MIT press, 1999, 150 p. - ISBN: 0-262-51105-3 - see details
  • F. Massacci, "Using Walk-SAT and Rel-SAT for Cryptographic Key Search" in Proc. of the 16th Internat. Joint Conf. on Artificial Intelligence (IJCAI-99), 1999, p. 290-295 - see details

1998

  • R.J. Anderson, F. Bergadano, B. Crispo, J.H. Lee, C. Manifavas, R.M. Needham, "A New Family of Authentication Protocols" in OPERATING SYSTEMS REVIEW, v. 32,4, (1998), p. 9-20 - see details
  • F. Bergadano, B. Crispo, G. Ruffo, "High Dictionary Compression for Proactive Password Checking" in ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v. 1,1, (1998) - see details
  • F. Massacci, "Anytime Approximate Modal Reasoning" in Proc. of 15th National (U.S.) Conference on Artificial Intelligence (AAAI-98), 1998, p. 274-279 - see details
  • F. Massacci, "Breaking security protocols as an AI planning problem" in Proc. of the 4th European Conference on Planning (ECP-97), 1998, p. 286-298 - see details
  • F. Massacci, "Tableaux Methods for Formal Verification in Multi-agent Distributed Systems" in JOURNAL OF LOGIC AND COMPUTATION, v. 8, (1998), p. 373-400 - see details

1997

  • F. Bergadano, B. Crispo, M. Lomas, "Strong Authentication and Privacy with Standard Browsers" in JOURNAL OF COMPUTER SECURITY, v. 5,3, (1997), p. 191-212 - see details
  • F. Massacci, "Reasoning about security: a logic and a decision methods for role-based access control" in Proc. of ECSQARU-FAPR'97, 1997, p. 421-435 - see details

1996

  • M.F. Donini, F. Massacci, D. Nardi, R. Rosati, "A uniform tableaux method for nonmonotonic modal logics" in Proc. of 6th European Workshop on Logics in Artificial Intelligence (JELIA-96), 1996, p. 87 - see details
  • G. De Giacomo, F. Massacci, "Tableaux and Algorithms for Propositional Dynamic Logic with Converse" in Proc. of the 13th International Conference on Automated Deduction (CADE-97), 1996, p. 613-628 - see details

1994

  • F. Massacci, "Strongly Analytic Tableaux for Normal Modal Logics" in Proc. of the 12th Int. Conf. on Automated Deduction, 1994, p. 723-737 - see details

DISI Security Group

Dipartimento di Ingegneria e Scienza dell'Informazione

Via Sommarive, 14
I-38123 POVO di Trento, Italy
tel: (+39) 0461 88 2092
fax: (+39) 0461 88 2093

E-mail: security@disi.unitn.it