The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gabriele Lenzini: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stefania Gnesi, Diego Latella, Gabriele Lenzini, C. Abbaneo, Arturo M. Amendola, P. Marmo
    An Automatic SPIN Validation of a Safety Critical Railway Control System. [Citation Graph (0, 0)][DBLP]
    DSN, 2000, pp:119-124 [Conf]
  2. Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Roberto Marangoni, Fabio Martinelli
    On Representing Biological Systems through Multiset Rewriting. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 2003, pp:415-426 [Conf]
  3. Ricardo Corin, Gaetano Di Caprio, Sandro Etalle, Stefania Gnesi, Gabriele Lenzini, Corrado Moiso
    A Formal Security Analysis of an OSA/Parlay Authentication Interface. [Citation Graph (0, 0)][DBLP]
    FMOODS, 2005, pp:131-146 [Conf]
  4. Ricardo Corin, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini, I. Staicu
    A Logic for Auditing Accountability in Decentralized Systems. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:187-201 [Conf]
  5. Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli
    Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:86-99 [Conf]
  6. Stefania Gnesi, Diego Latella, Gabriele Lenzini, C. Abbaneo, Arturo M. Amendola, P. Marmo
    A Formal Specification and Validation of a Critical System in Presence of Byzantine Errors. [Citation Graph (0, 0)][DBLP]
    TACAS, 2000, pp:535-549 [Conf]
  7. Maurice H. ter Beek, Gabriele Lenzini, Marinella Petrocchi
    Team Automata for Security: - A Survey -. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:128, n:5, pp:105-119 [Journal]
  8. Stefania Gnesi, Gabriele Lenzini, Fabio Martinelli
    Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:111-126 [Journal]
  9. Stefania Gnesi, Gabriele Lenzini, Fabio Martinelli
    Logical Specification and Analysis of Fault Tolerant Systems Through Partial Model Checking. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:118, n:, pp:57-70 [Journal]
  10. Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli
    Relating multiset rewriting and process algebras for security protocol analysis. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:1, pp:3-47 [Journal]
  11. R. J. Hulsebosch, Mortaza S. Bargh, Gabriele Lenzini, P. W. G. Ebben, Sorin M. Iacob
    Context Sensitive Adaptive Authentication. [Citation Graph (0, 0)][DBLP]
    EuroSSC, 2007, pp:93-109 [Conf]
  12. Ricardo Neisse, Maarten Wegdam, Marten van Sinderen, Gabriele Lenzini
    Trust Management Model and Architecture for Context-Aware Service Platforms. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1803-1820 [Conf]
  13. Santtu Toivonen, Gabriele Lenzini, Ilkka Uusitalo
    Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems. [Citation Graph (0, 0)][DBLP]
    MTW, 2006, pp:- [Conf]
  14. Gabriele Lenzini, Andrew Tokmakoff, Johan Muskens
    Managing Trustworthiness in Component-based Embedded Systems. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:179, n:, pp:143-155 [Journal]
  15. J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini
    Audit-based compliance control. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:133-151 [Journal]

  16. Shall I Trust a Recommendation? Towards an Evaluation of the Trustworthiness of Recommender Sites. [Citation Graph (, )][DBLP]


  17. Agents Selecting Trustworthy Recommendations in Mobile Virtual Communities. [Citation Graph (, )][DBLP]


  18. A Uniform Approach to Security and Fault-Tolerance Specification and Analysis. [Citation Graph (, )][DBLP]


  19. Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services. [Citation Graph (, )][DBLP]


  20. Trust Model for High Quality Recommendation. [Citation Graph (, )][DBLP]


  21. Trust-enhanced Security in Location-based Adaptive Authentication. [Citation Graph (, )][DBLP]


  22. Design of Architectures for Proximity-aware Services: Experiments in Context-based Authentication with Subjective Logic. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002