Search the dblp DataBase
Fabio Massacci :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Fabio Massacci Contextual Reasoning Is NP-Complete. [Citation Graph (0, 0)][DBLP ] AAAI/IAAI, Vol. 1, 1996, pp:621-626 [Conf ] Fabio Massacci Anytime Approximate Modal Reasoning. [Citation Graph (0, 0)][DBLP ] AAAI/IAAI, 1998, pp:274-279 [Conf ] Fabio Massacci A Proof Theory for Tractable Approximations of Propositional Reasoning. [Citation Graph (0, 0)][DBLP ] AI*IA, 1997, pp:219-230 [Conf ] Luigia Carlucci Aiello , Fabio Massacci Planning Attacks to Security Protocols: Case Studies in Logic Programming. [Citation Graph (0, 0)][DBLP ] Computational Logic: Logic Programming and Beyond, 2002, pp:533-560 [Conf ] Luis Fariñas del Cerro , David Fauthoux , Olivier Gasquet , Andreas Herzig , Dominique Longin , Fabio Massacci Lotrec : The Generic Tableau Prover for Modal and Description Logics. [Citation Graph (0, 0)][DBLP ] IJCAR, 2001, pp:453-458 [Conf ] Giuseppe De Giacomo , Fabio Massacci Tableaux and Algorithms for Propositional Dynamic Logic with Converse. [Citation Graph (0, 0)][DBLP ] CADE, 1996, pp:613-627 [Conf ] Fabio Massacci Strongly Analytic Tableaux for Normal Modal Logics. [Citation Graph (0, 0)][DBLP ] CADE, 1994, pp:723-737 [Conf ] Volha Bryl , Fabio Massacci , John Mylopoulos , Nicola Zannone Designing Security Requirements Models Through Planning. [Citation Graph (0, 0)][DBLP ] CAiSE, 2006, pp:33-47 [Conf ] Giampaolo Bella , Lawrence C. Paulson , Fabio Massacci The verification of an industrial payment protocol: the SET purchase phase. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:12-20 [Conf ] Peter Baumgartner , Fabio Massacci The Taming of the (X)OR. [Citation Graph (0, 0)][DBLP ] Computational Logic, 2000, pp:508-522 [Conf ] Luigia Carlucci Aiello , Fabio Massacci An Executable Specification Language for Planning Attacks to Security Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:88-102 [Conf ] Giuseppe De Giacomo , Francesco M. Donini , Fabio Massacci Exptime Tableaux for ALC. [Citation Graph (0, 0)][DBLP ] Description Logics, 1996, pp:107-110 [Conf ] Fabio Massacci Cook and Reckhow are Wrong: Subexponential Tableaux Proofs for Their Family of Formulae. [Citation Graph (0, 0)][DBLP ] ECAI, 1998, pp:408-409 [Conf ] Fabio Massacci Breaking Security Protocols as an AI Planning Problem. [Citation Graph (0, 0)][DBLP ] ECP, 1997, pp:286-298 [Conf ] Fabio Massacci Reasoning About Security: A Logic and a Decision Method for Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] ECSQARU-FAPR, 1997, pp:421-435 [Conf ] Paolo Giorgini , Fabio Massacci , John Mylopoulos Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard. [Citation Graph (0, 0)][DBLP ] ER, 2003, pp:263-276 [Conf ] Giampaolo Bella , Fabio Massacci , Lawrence C. Paulson , Piero Tramontano Formal Verification of Cardholder Registration in SET. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:159-174 [Conf ] Fabio Massacci , John Mylopoulos , Nicola Zannone Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. [Citation Graph (0, 0)][DBLP ] ESORICS, 2005, pp:438-454 [Conf ] Paolo Giorgini , Fabio Massacci , John Mylopoulos , Nicola Zannone Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2004, pp:98-111 [Conf ] Paolo Giorgini , Fabio Massacci , Nicola Zannone Security and Trust Requirements Engineering. [Citation Graph (0, 0)][DBLP ] FOSAD, 2005, pp:237-272 [Conf ] Fabio Massacci Approximate Reasoning for Contextual Databases. [Citation Graph (0, 0)][DBLP ] ICTAI, 1996, pp:308-315 [Conf ] Hristo Koshutanski , Fabio Massacci A System for Interactive Authorization for Business Processes for Web Services. [Citation Graph (0, 0)][DBLP ] ICWE, 2004, pp:521-525 [Conf ] Hristo Koshutanski , Fabio Massacci An Interactive Trust Management and Negotiation Scheme. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2004, pp:115-128 [Conf ] Fabio Massacci Decision Procedures for Expressive Description Logics with Intersection, Composition, Converse of Roles and Role Identity. [Citation Graph (0, 0)][DBLP ] IJCAI, 2001, pp:193-198 [Conf ] Fabio Massacci Using Walk-SAT and Rel-Sat for Cryptographic Key Search. [Citation Graph (0, 0)][DBLP ] IJCAI, 1999, pp:290-295 [Conf ] Hristo Koshutanski , Fabio Massacci Interactive Credential Negotiation for Stateful Business Processes. [Citation Graph (0, 0)][DBLP ] iTrust, 2005, pp:256-272 [Conf ] Paolo Giorgini , Fabio Massacci , John Mylopoulos , A. Siena , Nicola Zannone ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. [Citation Graph (0, 0)][DBLP ] iTrust, 2005, pp:415-419 [Conf ] Paolo Giorgini , Fabio Massacci , John Mylopoulos , Nicola Zannone Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning. [Citation Graph (0, 0)][DBLP ] iTrust, 2004, pp:176-190 [Conf ] Paolo Giorgini , Fabio Massacci , John Mylopoulos , Nicola Zannone Modeling Social and Individual Trust in Requirements Engineering Methodologies. [Citation Graph (0, 0)][DBLP ] iTrust, 2005, pp:161-176 [Conf ] Francesco M. Donini , Fabio Massacci , Daniele Nardi , Riccardo Rosati A Uniform Tableaux Method for Nonmonotonic Modal Logics. [Citation Graph (0, 0)][DBLP ] JELIA, 1996, pp:87-103 [Conf ] Francesco M. Donini , Paolo Liberatore , Fabio Massacci , Marco Schaerf Solving QBF by SMV. [Citation Graph (0, 0)][DBLP ] KR, 2002, pp:578-592 [Conf ] Fabio Massacci Reduction rules and universal variables for first order tableaux and DPLL. [Citation Graph (0, 0)][DBLP ] KR, 2000, pp:186-197 [Conf ] Paolo Giorgini , Fabio Massacci , John Mylopoulos , Nicola Zannone Modeling Security Requirements Through Ownership, Permission and Delegation. [Citation Graph (0, 0)][DBLP ] RE, 2005, pp:167-176 [Conf ] Paolo Giorgini , Fabio Massacci , John Mylopoulos , Nicola Zannone ST-Tool: A CASE Tool for Security Requirements Engineering. [Citation Graph (0, 0)][DBLP ] RE, 2005, pp:451-452 [Conf ] Paolo Giorgini , Fabio Massacci , John Mylopoulos , Nicola Zannone Detecting Conflicts of Interest. [Citation Graph (0, 0)][DBLP ] RE, 2006, pp:308-311 [Conf ] Gabriel M. Kuper , Fabio Massacci , Nataliya Rassadko Generalized XML security views. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:77-84 [Conf ] Hristo Koshutanski , Fabio Massacci Interactive Access Control for Web Services. [Citation Graph (0, 0)][DBLP ] SEC, 2004, pp:151-166 [Conf ] Giampaolo Bella , Stefano Bistarelli , Fabio Massacci A Protocol's Life After Attacks.... [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:3-10 [Conf ] Giampaolo Bella , Fabio Massacci , Lawrence C. Paulson , Piero Tramontano Making Sense of Specifications: The Formalization of SET. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:74-81 [Conf ] Fabio Massacci , Nicola Zannone Privacy Is Linking Permission to Purpose. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:179-191 [Conf ] Fabio Massacci Privacy is Linking Permission to Purpose (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:192-198 [Conf ] Fabio Massacci Tableaux Methods for Access Control in Distributed Systems. [Citation Graph (0, 0)][DBLP ] TABLEAUX, 1997, pp:246-260 [Conf ] Fabio Massacci Simplification: A General Constraint Propagation Technique for Propositional and Modal Tableaux. [Citation Graph (0, 0)][DBLP ] TABLEAUX, 1998, pp:217-231 [Conf ] Fabio Massacci Design and Results of the Tableaux-99 Non-classical (Modal) Systems Comparison. [Citation Graph (0, 0)][DBLP ] TABLEAUX, 1999, pp:14-18 [Conf ] Fabio Massacci Automated Reasoning and the Verification of Security Protocols. [Citation Graph (0, 0)][DBLP ] TABLEAUX, 1999, pp:32-33 [Conf ] Fabio Massacci , Francesco M. Donini Design and Results of TANCS-2000 Non-classical (Modal) Systems Comparison. [Citation Graph (0, 0)][DBLP ] TABLEAUX, 2000, pp:52-56 [Conf ] Hristo Koshutanski , Fabio Massacci E Pluribus Unum. [Citation Graph (0, 0)][DBLP ] WAC, 2004, pp:179-190 [Conf ] Nicola Zannone , Sushil Jajodia , Fabio Massacci , Duminda Wijesekera Maintaining privacy on derived objects. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:10-19 [Conf ] Francesco M. Donini , Fabio Massacci EXPTIME tableaux for ALC. [Citation Graph (0, 0)][DBLP ] Artif. Intell., 2000, v:124, n:1, pp:87-138 [Journal ] Maarit Hietalahti , Fabio Massacci , Ilkka Niemelä DES: a Challenge Problem for Nonmonotonic Reasoning Systems [Citation Graph (0, 0)][DBLP ] CoRR, 2000, v:0, n:, pp:- [Journal ] Claudia Fiorini , Enrico Martinelli , Fabio Massacci How to fake an RSA signature by encoding modular root finding as a SAT problem. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2003, v:130, n:2, pp:101-127 [Journal ] Luigia Carlucci Aiello , Fabio Massacci Attacking fair-exchange protocols: parallel models vs trace models. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2001, v:55, n:1, pp:- [Journal ] Alexey Gotsman , Fabio Massacci , Marco Pistore Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:135, n:1, pp:59-77 [Journal ] Giuseppe De Giacomo , Fabio Massacci Combining Deduction and Model Checking into Tableaux and Algorithms for Converse-PDL. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2000, v:162, n:1-2, pp:117-137 [Journal ] Giampaolo Bella , Fabio Massacci , Lawrence C. Paulson An overview of the verification of SET. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:17-28 [Journal ] Paolo Giorgini , Fabio Massacci , John Mylopoulos , Nicola Zannone Requirements engineering for trust management: model, methodology, and reasoning. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2006, v:5, n:4, pp:257-274 [Journal ] Fabio Massacci Single Step Tableaux for Modal Logics. [Citation Graph (0, 0)][DBLP ] J. Autom. Reasoning, 2000, v:24, n:3, pp:319-364 [Journal ] Fabio Massacci , Laura Marraro Logical Cryptanalysis as a SAT Problem. [Citation Graph (0, 0)][DBLP ] J. Autom. Reasoning, 2000, v:24, n:1/2, pp:165-203 [Journal ] Giampaolo Bella , Fabio Massacci , Lawrence C. Paulson Verifying the SET Purchase Protocols. [Citation Graph (0, 0)][DBLP ] J. Autom. Reasoning, 2006, v:36, n:1-2, pp:5-37 [Journal ] Hristo Koshutanski , Fabio Massacci A Negotiation Scheme for Access Rights Establishment in Autonomic Communication. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 2007, v:15, n:1, pp:117-136 [Journal ] Fabio Massacci Tableau Methods for Formal Verification of Multi-Agent Distributed Systems. [Citation Graph (0, 0)][DBLP ] J. Log. Comput., 1998, v:8, n:3, pp:373-400 [Journal ] Fabio Massacci The proof complexity of analytic and clausal tableaux. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2000, v:243, n:1-2, pp:477-487 [Journal ] Luigia Carlucci Aiello , Fabio Massacci Verifying security protocols as planning in logic programming. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Log., 2001, v:2, n:4, pp:542-580 [Journal ] Fabio Massacci , John Mylopoulos , Nicola Zannone Hierarchical hippocratic databases with minimal disclosure for virtual organizations. [Citation Graph (0, 0)][DBLP ] VLDB J., 2006, v:15, n:4, pp:370-387 [Journal ] Nicola Dragoni , Fabio Massacci , Katsiaryna Naliuka , I. Siahaan Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2007, pp:297-312 [Conf ] Luca Compagna , Paul El Khoury , Fabio Massacci , Reshma Thomas , Nicola Zannone How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. [Citation Graph (0, 0)][DBLP ] ICAIL, 2007, pp:149-153 [Conf ] Fabio Massacci , Katsiaryna Naliuka Towards Practical Security Monitors of UML Policies for Mobile Applications. [Citation Graph (0, 0)][DBLP ] POLICY, 2007, pp:278- [Conf ] Sandro Etalle , Fabio Massacci , Artsiom Yautsiukhin The Meaning of Logs. [Citation Graph (0, 0)][DBLP ] TrustBus, 2007, pp:145-154 [Conf ] Alexander Pretschner , Fabio Massacci , Manuel Hilty Usage Control in Service-Oriented Architectures. [Citation Graph (0, 0)][DBLP ] TrustBus, 2007, pp:83-93 [Conf ] Yücel Karabulut , Florian Kerschbaum , Fabio Massacci , Philip Robinson , Artsiom Yautsiukhin Security and Trust in IT Business Outsourcing: a Manifesto. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:179, n:, pp:47-58 [Journal ] Simon Dobson , Spyros Denazis , Antonio Fernández , Dominique Gaïti , Erol Gelenbe , Fabio Massacci , Paddy Nixon , Fabrice Saffre , Nikita Schmidt , Franco Zambonelli A survey of autonomic communications. [Citation Graph (0, 0)][DBLP ] TAAS, 2006, v:1, n:2, pp:223-259 [Journal ] From Trust to Dependability through Risk Analysis. [Citation Graph (, )][DBLP ] Towards Practical Security Monitors of UML Policies for Mobile Applications. [Citation Graph (, )][DBLP ] A flexible security architecture to support third-party applications on mobile devices. [Citation Graph (, )][DBLP ] An algorithm for the appraisal of assurance indicators for complex business processes. [Citation Graph (, )][DBLP ] Logging key assurance indicators in business processes. [Citation Graph (, )][DBLP ] How to capture and use legal patterns in IT. [Citation Graph (, )][DBLP ] Goal-Equivalent Secure Business Process Re-engineering. [Citation Graph (, )][DBLP ] Satisfaction of Control Objectives by Control Processes. [Citation Graph (, )][DBLP ] Do You Really Mean What You Actually Enforced?. [Citation Graph (, )][DBLP ] A Model-Driven Approach for the Specification and Analysis of Access Control Policies. [Citation Graph (, )][DBLP ] Simulating midlet's security claims with automata modulo theory. [Citation Graph (, )][DBLP ] Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? [Citation Graph (, )][DBLP ] An access control framework for business processes for web services. [Citation Graph (, )][DBLP ] Security-by-contract for web services. [Citation Graph (, )][DBLP ] Security views for outsourced business processes. [Citation Graph (, )][DBLP ] Modelling Quality of Protection in Outsourced Business Processes. [Citation Graph (, )][DBLP ] Extending Security-by-Contract with Quantitative Trust on Mobile Devices. [Citation Graph (, )][DBLP ] Security-By-Contract for the Future Internet. [Citation Graph (, )][DBLP ] Towards Practical Enforcement Theories. [Citation Graph (, )][DBLP ] How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. [Citation Graph (, )][DBLP ] Computer-aided Support for Secure Tropos. [Citation Graph (, )][DBLP ] A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems. [Citation Graph (, )][DBLP ] What the heck is this application doing? - A security-by-contract architecture for pervasive services. [Citation Graph (, )][DBLP ] Evolving Embedded Systems. [Citation Graph (, )][DBLP ] Preface. [Citation Graph (, )][DBLP ] Preface. [Citation Graph (, )][DBLP ] The S3MS.NET Run Time Monitor: Tool Demonstration. [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.011secs