The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Fabio Massacci: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Fabio Massacci
    Contextual Reasoning Is NP-Complete. [Citation Graph (0, 0)][DBLP]
    AAAI/IAAI, Vol. 1, 1996, pp:621-626 [Conf]
  2. Fabio Massacci
    Anytime Approximate Modal Reasoning. [Citation Graph (0, 0)][DBLP]
    AAAI/IAAI, 1998, pp:274-279 [Conf]
  3. Fabio Massacci
    A Proof Theory for Tractable Approximations of Propositional Reasoning. [Citation Graph (0, 0)][DBLP]
    AI*IA, 1997, pp:219-230 [Conf]
  4. Luigia Carlucci Aiello, Fabio Massacci
    Planning Attacks to Security Protocols: Case Studies in Logic Programming. [Citation Graph (0, 0)][DBLP]
    Computational Logic: Logic Programming and Beyond, 2002, pp:533-560 [Conf]
  5. Luis Fariñas del Cerro, David Fauthoux, Olivier Gasquet, Andreas Herzig, Dominique Longin, Fabio Massacci
    Lotrec : The Generic Tableau Prover for Modal and Description Logics. [Citation Graph (0, 0)][DBLP]
    IJCAR, 2001, pp:453-458 [Conf]
  6. Giuseppe De Giacomo, Fabio Massacci
    Tableaux and Algorithms for Propositional Dynamic Logic with Converse. [Citation Graph (0, 0)][DBLP]
    CADE, 1996, pp:613-627 [Conf]
  7. Fabio Massacci
    Strongly Analytic Tableaux for Normal Modal Logics. [Citation Graph (0, 0)][DBLP]
    CADE, 1994, pp:723-737 [Conf]
  8. Volha Bryl, Fabio Massacci, John Mylopoulos, Nicola Zannone
    Designing Security Requirements Models Through Planning. [Citation Graph (0, 0)][DBLP]
    CAiSE, 2006, pp:33-47 [Conf]
  9. Giampaolo Bella, Lawrence C. Paulson, Fabio Massacci
    The verification of an industrial payment protocol: the SET purchase phase. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:12-20 [Conf]
  10. Peter Baumgartner, Fabio Massacci
    The Taming of the (X)OR. [Citation Graph (0, 0)][DBLP]
    Computational Logic, 2000, pp:508-522 [Conf]
  11. Luigia Carlucci Aiello, Fabio Massacci
    An Executable Specification Language for Planning Attacks to Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:88-102 [Conf]
  12. Giuseppe De Giacomo, Francesco M. Donini, Fabio Massacci
    Exptime Tableaux for ALC. [Citation Graph (0, 0)][DBLP]
    Description Logics, 1996, pp:107-110 [Conf]
  13. Fabio Massacci
    Cook and Reckhow are Wrong: Subexponential Tableaux Proofs for Their Family of Formulae. [Citation Graph (0, 0)][DBLP]
    ECAI, 1998, pp:408-409 [Conf]
  14. Fabio Massacci
    Breaking Security Protocols as an AI Planning Problem. [Citation Graph (0, 0)][DBLP]
    ECP, 1997, pp:286-298 [Conf]
  15. Fabio Massacci
    Reasoning About Security: A Logic and a Decision Method for Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    ECSQARU-FAPR, 1997, pp:421-435 [Conf]
  16. Paolo Giorgini, Fabio Massacci, John Mylopoulos
    Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard. [Citation Graph (0, 0)][DBLP]
    ER, 2003, pp:263-276 [Conf]
  17. Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano
    Formal Verification of Cardholder Registration in SET. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:159-174 [Conf]
  18. Fabio Massacci, John Mylopoulos, Nicola Zannone
    Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:438-454 [Conf]
  19. Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone
    Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:98-111 [Conf]
  20. Paolo Giorgini, Fabio Massacci, Nicola Zannone
    Security and Trust Requirements Engineering. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2005, pp:237-272 [Conf]
  21. Fabio Massacci
    Approximate Reasoning for Contextual Databases. [Citation Graph (0, 0)][DBLP]
    ICTAI, 1996, pp:308-315 [Conf]
  22. Hristo Koshutanski, Fabio Massacci
    A System for Interactive Authorization for Business Processes for Web Services. [Citation Graph (0, 0)][DBLP]
    ICWE, 2004, pp:521-525 [Conf]
  23. Hristo Koshutanski, Fabio Massacci
    An Interactive Trust Management and Negotiation Scheme. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:115-128 [Conf]
  24. Fabio Massacci
    Decision Procedures for Expressive Description Logics with Intersection, Composition, Converse of Roles and Role Identity. [Citation Graph (0, 0)][DBLP]
    IJCAI, 2001, pp:193-198 [Conf]
  25. Fabio Massacci
    Using Walk-SAT and Rel-Sat for Cryptographic Key Search. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1999, pp:290-295 [Conf]
  26. Hristo Koshutanski, Fabio Massacci
    Interactive Credential Negotiation for Stateful Business Processes. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:256-272 [Conf]
  27. Paolo Giorgini, Fabio Massacci, John Mylopoulos, A. Siena, Nicola Zannone
    ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:415-419 [Conf]
  28. Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone
    Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning. [Citation Graph (0, 0)][DBLP]
    iTrust, 2004, pp:176-190 [Conf]
  29. Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone
    Modeling Social and Individual Trust in Requirements Engineering Methodologies. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:161-176 [Conf]
  30. Francesco M. Donini, Fabio Massacci, Daniele Nardi, Riccardo Rosati
    A Uniform Tableaux Method for Nonmonotonic Modal Logics. [Citation Graph (0, 0)][DBLP]
    JELIA, 1996, pp:87-103 [Conf]
  31. Francesco M. Donini, Paolo Liberatore, Fabio Massacci, Marco Schaerf
    Solving QBF by SMV. [Citation Graph (0, 0)][DBLP]
    KR, 2002, pp:578-592 [Conf]
  32. Fabio Massacci
    Reduction rules and universal variables for first order tableaux and DPLL. [Citation Graph (0, 0)][DBLP]
    KR, 2000, pp:186-197 [Conf]
  33. Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone
    Modeling Security Requirements Through Ownership, Permission and Delegation. [Citation Graph (0, 0)][DBLP]
    RE, 2005, pp:167-176 [Conf]
  34. Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone
    ST-Tool: A CASE Tool for Security Requirements Engineering. [Citation Graph (0, 0)][DBLP]
    RE, 2005, pp:451-452 [Conf]
  35. Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone
    Detecting Conflicts of Interest. [Citation Graph (0, 0)][DBLP]
    RE, 2006, pp:308-311 [Conf]
  36. Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadko
    Generalized XML security views. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:77-84 [Conf]
  37. Hristo Koshutanski, Fabio Massacci
    Interactive Access Control for Web Services. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:151-166 [Conf]
  38. Giampaolo Bella, Stefano Bistarelli, Fabio Massacci
    A Protocol's Life After Attacks.... [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:3-10 [Conf]
  39. Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano
    Making Sense of Specifications: The Formalization of SET. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:74-81 [Conf]
  40. Fabio Massacci, Nicola Zannone
    Privacy Is Linking Permission to Purpose. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:179-191 [Conf]
  41. Fabio Massacci
    Privacy is Linking Permission to Purpose (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:192-198 [Conf]
  42. Fabio Massacci
    Tableaux Methods for Access Control in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    TABLEAUX, 1997, pp:246-260 [Conf]
  43. Fabio Massacci
    Simplification: A General Constraint Propagation Technique for Propositional and Modal Tableaux. [Citation Graph (0, 0)][DBLP]
    TABLEAUX, 1998, pp:217-231 [Conf]
  44. Fabio Massacci
    Design and Results of the Tableaux-99 Non-classical (Modal) Systems Comparison. [Citation Graph (0, 0)][DBLP]
    TABLEAUX, 1999, pp:14-18 [Conf]
  45. Fabio Massacci
    Automated Reasoning and the Verification of Security Protocols. [Citation Graph (0, 0)][DBLP]
    TABLEAUX, 1999, pp:32-33 [Conf]
  46. Fabio Massacci, Francesco M. Donini
    Design and Results of TANCS-2000 Non-classical (Modal) Systems Comparison. [Citation Graph (0, 0)][DBLP]
    TABLEAUX, 2000, pp:52-56 [Conf]
  47. Hristo Koshutanski, Fabio Massacci
    E Pluribus Unum. [Citation Graph (0, 0)][DBLP]
    WAC, 2004, pp:179-190 [Conf]
  48. Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera
    Maintaining privacy on derived objects. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:10-19 [Conf]
  49. Francesco M. Donini, Fabio Massacci
    EXPTIME tableaux for ALC. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 2000, v:124, n:1, pp:87-138 [Journal]
  50. Maarit Hietalahti, Fabio Massacci, Ilkka Niemelä
    DES: a Challenge Problem for Nonmonotonic Reasoning Systems [Citation Graph (0, 0)][DBLP]
    CoRR, 2000, v:0, n:, pp:- [Journal]
  51. Claudia Fiorini, Enrico Martinelli, Fabio Massacci
    How to fake an RSA signature by encoding modular root finding as a SAT problem. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2003, v:130, n:2, pp:101-127 [Journal]
  52. Luigia Carlucci Aiello, Fabio Massacci
    Attacking fair-exchange protocols: parallel models vs trace models. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:55, n:1, pp:- [Journal]
  53. Alexey Gotsman, Fabio Massacci, Marco Pistore
    Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:135, n:1, pp:59-77 [Journal]
  54. Giuseppe De Giacomo, Fabio Massacci
    Combining Deduction and Model Checking into Tableaux and Algorithms for Converse-PDL. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2000, v:162, n:1-2, pp:117-137 [Journal]
  55. Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson
    An overview of the verification of SET. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:17-28 [Journal]
  56. Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone
    Requirements engineering for trust management: model, methodology, and reasoning. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:4, pp:257-274 [Journal]
  57. Fabio Massacci
    Single Step Tableaux for Modal Logics. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 2000, v:24, n:3, pp:319-364 [Journal]
  58. Fabio Massacci, Laura Marraro
    Logical Cryptanalysis as a SAT Problem. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 2000, v:24, n:1/2, pp:165-203 [Journal]
  59. Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson
    Verifying the SET Purchase Protocols. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 2006, v:36, n:1-2, pp:5-37 [Journal]
  60. Hristo Koshutanski, Fabio Massacci
    A Negotiation Scheme for Access Rights Establishment in Autonomic Communication. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2007, v:15, n:1, pp:117-136 [Journal]
  61. Fabio Massacci
    Tableau Methods for Formal Verification of Multi-Agent Distributed Systems. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 1998, v:8, n:3, pp:373-400 [Journal]
  62. Fabio Massacci
    The proof complexity of analytic and clausal tableaux. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2000, v:243, n:1-2, pp:477-487 [Journal]
  63. Luigia Carlucci Aiello, Fabio Massacci
    Verifying security protocols as planning in logic programming. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Log., 2001, v:2, n:4, pp:542-580 [Journal]
  64. Fabio Massacci, John Mylopoulos, Nicola Zannone
    Hierarchical hippocratic databases with minimal disclosure for virtual organizations. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2006, v:15, n:4, pp:370-387 [Journal]
  65. Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka, I. Siahaan
    Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:297-312 [Conf]
  66. Luca Compagna, Paul El Khoury, Fabio Massacci, Reshma Thomas, Nicola Zannone
    How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. [Citation Graph (0, 0)][DBLP]
    ICAIL, 2007, pp:149-153 [Conf]
  67. Fabio Massacci, Katsiaryna Naliuka
    Towards Practical Security Monitors of UML Policies for Mobile Applications. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:278- [Conf]
  68. Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin
    The Meaning of Logs. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:145-154 [Conf]
  69. Alexander Pretschner, Fabio Massacci, Manuel Hilty
    Usage Control in Service-Oriented Architectures. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:83-93 [Conf]
  70. Yücel Karabulut, Florian Kerschbaum, Fabio Massacci, Philip Robinson, Artsiom Yautsiukhin
    Security and Trust in IT Business Outsourcing: a Manifesto. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:179, n:, pp:47-58 [Journal]
  71. Simon Dobson, Spyros Denazis, Antonio Fernández, Dominique Gaïti, Erol Gelenbe, Fabio Massacci, Paddy Nixon, Fabrice Saffre, Nikita Schmidt, Franco Zambonelli
    A survey of autonomic communications. [Citation Graph (0, 0)][DBLP]
    TAAS, 2006, v:1, n:2, pp:223-259 [Journal]

  72. From Trust to Dependability through Risk Analysis. [Citation Graph (, )][DBLP]


  73. Towards Practical Security Monitors of UML Policies for Mobile Applications. [Citation Graph (, )][DBLP]


  74. A flexible security architecture to support third-party applications on mobile devices. [Citation Graph (, )][DBLP]


  75. An algorithm for the appraisal of assurance indicators for complex business processes. [Citation Graph (, )][DBLP]


  76. Logging key assurance indicators in business processes. [Citation Graph (, )][DBLP]


  77. How to capture and use legal patterns in IT. [Citation Graph (, )][DBLP]


  78. Goal-Equivalent Secure Business Process Re-engineering. [Citation Graph (, )][DBLP]


  79. Satisfaction of Control Objectives by Control Processes. [Citation Graph (, )][DBLP]


  80. Do You Really Mean What You Actually Enforced?. [Citation Graph (, )][DBLP]


  81. A Model-Driven Approach for the Specification and Analysis of Access Control Policies. [Citation Graph (, )][DBLP]


  82. Simulating midlet's security claims with automata modulo theory. [Citation Graph (, )][DBLP]


  83. Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? [Citation Graph (, )][DBLP]


  84. An access control framework for business processes for web services. [Citation Graph (, )][DBLP]


  85. Security-by-contract for web services. [Citation Graph (, )][DBLP]


  86. Security views for outsourced business processes. [Citation Graph (, )][DBLP]


  87. Modelling Quality of Protection in Outsourced Business Processes. [Citation Graph (, )][DBLP]


  88. Extending Security-by-Contract with Quantitative Trust on Mobile Devices. [Citation Graph (, )][DBLP]


  89. Security-By-Contract for the Future Internet. [Citation Graph (, )][DBLP]


  90. Towards Practical Enforcement Theories. [Citation Graph (, )][DBLP]


  91. How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. [Citation Graph (, )][DBLP]


  92. Computer-aided Support for Secure Tropos. [Citation Graph (, )][DBLP]


  93. A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems. [Citation Graph (, )][DBLP]


  94. What the heck is this application doing? - A security-by-contract architecture for pervasive services. [Citation Graph (, )][DBLP]


  95. Evolving Embedded Systems. [Citation Graph (, )][DBLP]


  96. Preface. [Citation Graph (, )][DBLP]


  97. Preface. [Citation Graph (, )][DBLP]


  98. The S3MS.NET Run Time Monitor: Tool Demonstration. [Citation Graph (, )][DBLP]


Search in 0.055secs, Finished in 0.060secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002