The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Fabio Martinelli: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Roberto Gorrieri, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
    Compositional Verification of Integrity for Digital Stream Signature Protocols. [Citation Graph (0, 0)][DBLP]
    ACSD, 2003, pp:142-149 [Conf]
  2. Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
    Message Authentication through Non Interference. [Citation Graph (0, 0)][DBLP]
    AMAST, 2000, pp:258-272 [Conf]
  3. Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
    Information Flow Analysis in a Discrete-Time Process Algebra. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:170-184 [Conf]
  4. Fabio Martinelli
    Partial Model Checking and Theorem Proving for Ensuring Security Properties. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:44-52 [Conf]
  5. Roberto Gorrieri, Enrico Locatelli, Fabio Martinelli
    A Simple Language for Real-Time Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    ESOP, 2003, pp:114-128 [Conf]
  6. Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Roberto Marangoni, Fabio Martinelli
    On Representing Biological Systems through Multiset Rewriting. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 2003, pp:415-426 [Conf]
  7. Riccardo Focardi, Fabio Martinelli
    A Uniform Approach for the Definition of Security Properties. [Citation Graph (0, 0)][DBLP]
    World Congress on Formal Methods, 1999, pp:794-813 [Conf]
  8. Fabio Martinelli
    Towards an Integrated Formal Analysis for Security and Trust. [Citation Graph (0, 0)][DBLP]
    FMOODS, 2005, pp:115-130 [Conf]
  9. Roberto Gorrieri, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
    Formal Anaylsis of Some Timed Security Properties in Wireless Protocols. [Citation Graph (0, 0)][DBLP]
    FMOODS, 2003, pp:139-154 [Conf]
  10. Fabio Martinelli, Alistair Sinclair, Dror Weitz
    The Ising Model on Trees: Boundary Conditions and Mixing Time. [Citation Graph (0, 0)][DBLP]
    FOCS, 2003, pp:628-639 [Conf]
  11. Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
    Classification of Security Properties - Part II: Network Security. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2002, pp:139-185 [Conf]
  12. Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
    Non Interference for the Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    ICALP, 2000, pp:354-372 [Conf]
  13. Hristo Koshutanski, Fabio Martinelli, Paolo Mori, Anna Vaccarelli
    Fine-grained and History-based Access Control with Trust Management for Autonomic Grid Services. [Citation Graph (0, 0)][DBLP]
    ICAS, 2006, pp:34- [Conf]
  14. Fabio Martinelli, Paolo Mori, Anna Vaccarelli
    Towards Continuous Usage Control on Grid Computational Services. [Citation Graph (0, 0)][DBLP]
    ICAS/ICNS, 2005, pp:82- [Conf]
  15. Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
    Compositional Verification of Secure Streamed Data: A Case Study with EMSS. [Citation Graph (0, 0)][DBLP]
    ICTCS, 2003, pp:383-396 [Conf]
  16. Fabio Martinelli
    About Compositional Analysis of Pi-Calculus Processes. [Citation Graph (0, 0)][DBLP]
    IFIP TCS, 2002, pp:524-536 [Conf]
  17. Fabrizio Baiardi, Alessandro Falleni, Riccardo Granchi, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
    SEAS: A Secure E-Voting Applet System. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:318-329 [Conf]
  18. Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
    Automated Analysis of Some Security Mechanisms of SCEP. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:414-427 [Conf]
  19. Roberto Gorrieri, Fabio Martinelli
    Process Algebraic Frameworks for the Specification and Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    MFCS, 2003, pp:46-67 [Conf]
  20. Fabio Martinelli
    Symbolic Semantics and Analysis for Crypto-CCS with (Almost) Generic Inference Systems. [Citation Graph (0, 0)][DBLP]
    MFCS, 2002, pp:519-531 [Conf]
  21. Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli
    Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:86-99 [Conf]
  22. Fabio Martinelli
    Symbolic Partial Model Checking for Security Analysis. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:122-134 [Conf]
  23. Fabrizio Baiardi, Fabio Martinelli, Paolo Mori, Anna Vaccarelli
    Improving Grid Services Security with Fine Grain Policies. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2004, pp:123-134 [Conf]
  24. Hristo Koshutanski, Fabio Martinelli, Paolo Mori, Luca Borz, Anna Vaccarelli
    A Fine-Grained and X.509-Based Access Control System for Globus. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2006, pp:1336-1350 [Conf]
  25. Fabio Dianda, Filippo Giuntini, Fabio Martinelli, Anna Vaccarelli
    A Flexible Framework for Access Control Based on Ability Authentication. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2005, pp:106-109 [Conf]
  26. Fabio Martinelli, Alistair Sinclair, Dror Weitz
    Fast mixing for independent sets, colorings and other models on trees. [Citation Graph (0, 0)][DBLP]
    SODA, 2004, pp:456-465 [Conf]
  27. Giampaolo Bella, Stefano Bistarelli, Fabio Martinelli
    Biometrics to Enhance Smartcard Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:324-332 [Conf]
  28. Fabio Martinelli
    Biometrics to Enhance Smartcard Security (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:333-335 [Conf]
  29. Davide Marchignoli, Fabio Martinelli
    Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques. [Citation Graph (0, 0)][DBLP]
    TACAS, 1999, pp:148-162 [Conf]
  30. Fabrizio Baiardi, Alessandro Falleni, Riccardo Granchi, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
    SEAS, a secure e-voting protocol: Design and implementation. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:8, pp:642-652 [Journal]
  31. Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
    Techniques for Security Checking: Non-Interference vs Control Flow Analysis. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:62, n:, pp:- [Journal]
  32. Nadia Busi, Roberto Gorrieri, Fabio Martinelli
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:121, n:, pp:1-2 [Journal]
  33. Riccardo Focardi, Roberto Gorrieri, Ruggero Lanotte, Andrea Maggiolo-Schettini, Fabio Martinelli, Simone Tini, Enrico Tronci
    Formal Models of Timing Attacks on Web Privacy. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:62, n:, pp:- [Journal]
  34. Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
    Secrecy in Security Protocols as Non Interference. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2000, v:32, n:, pp:- [Journal]
  35. Stefania Gnesi, Gabriele Lenzini, Fabio Martinelli
    Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:111-126 [Journal]
  36. Stefania Gnesi, Gabriele Lenzini, Fabio Martinelli
    Logical Specification and Analysis of Fault Tolerant Systems Through Partial Model Checking. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:118, n:, pp:57-70 [Journal]
  37. Roberto Gorrieri, Fabio Martinelli, Marinella Petrocchi
    A Formalization of Credit and Responsibility Within the GNDC Schema. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:157, n:3, pp:61-78 [Journal]
  38. Fabio Martinelli, Marinella Petrocchi
    On Relating and Integrating Two Trust Management Frameworks. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:191-205 [Journal]
  39. Fabio Martinelli, Ilaria Matteucci
    An Approach for the Specification, Verification and Synthesis of Secure Systems. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:29-43 [Journal]
  40. Roberto Gorrieri, Ruggero Lanotte, Andrea Maggiolo-Schettini, Fabio Martinelli, Simone Tini, Enrico Tronci
    Automated analysis of timed security: a case study on web privacy. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:2, n:3-4, pp:168-186 [Journal]
  41. Fabio Martinelli
    An Improvement of Algorithms for Solving Interface Equations. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:67, n:4, pp:185-190 [Journal]
  42. Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli
    Relating multiset rewriting and process algebras for security protocol analysis. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:1, pp:3-47 [Journal]
  43. Roberto Gorrieri, Fabio Martinelli
    A simple framework for real-time cryptographic protocol analysis with compositional proof rules. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2004, v:50, n:1-3, pp:23-49 [Journal]
  44. Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
    Formal analysis of some secure procedures for certificate delivery. [Citation Graph (0, 0)][DBLP]
    Softw. Test., Verif. Reliab., 2006, v:16, n:1, pp:33-59 [Journal]
  45. Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
    A comparison of three authentication properties. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:291, n:3, pp:285-327 [Journal]
  46. Roberto Gorrieri, Fabio Martinelli
    Theoretical foundations of security analysis and design II. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2005, v:340, n:1, pp:1-2 [Journal]
  47. Fabio Martinelli
    Analysis of security protocols as open systems. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:290, n:1, pp:1057-1106 [Journal]
  48. Maurizio Colombo, Fabio Martinelli, Paolo Mori, Anna Vaccarelli
    Extending the Globus Architecture with Role-Based Trust Management. [Citation Graph (0, 0)][DBLP]
    EUROCAST, 2007, pp:448-456 [Conf]
  49. Fabio Martinelli, Paolo Mori
    Enhancing Java Security with History Based Access Control. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:135-159 [Conf]
  50. Maurizio Colombo, Fabio Martinelli, Paolo Mori, Marinella Petrocchi, Anna Vaccarelli
    Fine Grained Access Control with Trust and Reputation Management for Globus. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1505-1515 [Conf]
  51. Fabio Martinelli, Ilaria Matteucci
    Through Modeling to Synthesis of Security Automata. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:179, n:, pp:31-46 [Journal]
  52. Fabio Martinelli, Marinella Petrocchi
    A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:186, n:, pp:85-99 [Journal]
  53. Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider
    Guest Editors' Preface. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:65-66 [Journal]

  54. Synthesis of Local Controller Programs for Enforcing Global Security Properties. [Citation Graph (, )][DBLP]


  55. Weighted Datalog and Levels of Trust. [Citation Graph (, )][DBLP]


  56. A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily. [Citation Graph (, )][DBLP]


  57. Enhancing Java ME Security Support with Resource Usage Monitoring. [Citation Graph (, )][DBLP]


  58. A Uniform Approach to Security and Fault-Tolerance Specification and Analysis. [Citation Graph (, )][DBLP]


  59. A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application. [Citation Graph (, )][DBLP]


  60. Risk-Based Usage Control for Service Oriented Architecture. [Citation Graph (, )][DBLP]


  61. Mixing time for the solid-on-solid model. [Citation Graph (, )][DBLP]


  62. Controlling Usage in Business Process Workflows through Fine-Grained Security Policies. [Citation Graph (, )][DBLP]


  63. Usage Control, Risk and Trust. [Citation Graph (, )][DBLP]


  64. Synthesis of Web Services Orchestrators in a Timed Setting. [Citation Graph (, )][DBLP]


  65. Formal approach to security metrics.: what does "more secure" mean for you? [Citation Graph (, )][DBLP]


  66. Mobile Implementation and Formal Verification of an e-Voting System. [Citation Graph (, )][DBLP]


  67. Extending Security-by-Contract with Quantitative Trust on Mobile Devices. [Citation Graph (, )][DBLP]


  68. Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach. [Citation Graph (, )][DBLP]


  69. Detection of images with adult content for parental control on mobile devices? [Citation Graph (, )][DBLP]


  70. Idea: Action Refinement for Security Properties Enforcement. [Citation Graph (, )][DBLP]


  71. On Usage Control for GRID Services. [Citation Graph (, )][DBLP]


  72. Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks. [Citation Graph (, )][DBLP]


  73. Runtime monitoring for next generation Java ME platform. [Citation Graph (, )][DBLP]


  74. Mixing Time for the Solid-on-Solid Model [Citation Graph (, )][DBLP]


  75. Towards Information Flow Properties for Distributed Systems. [Citation Graph (, )][DBLP]


  76. Preface. [Citation Graph (, )][DBLP]


Search in 0.066secs, Finished in 0.068secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002