|
Search the dblp DataBase
Fabio Martinelli:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Roberto Gorrieri, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
Compositional Verification of Integrity for Digital Stream Signature Protocols. [Citation Graph (0, 0)][DBLP] ACSD, 2003, pp:142-149 [Conf]
- Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
Message Authentication through Non Interference. [Citation Graph (0, 0)][DBLP] AMAST, 2000, pp:258-272 [Conf]
- Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
Information Flow Analysis in a Discrete-Time Process Algebra. [Citation Graph (0, 0)][DBLP] CSFW, 2000, pp:170-184 [Conf]
- Fabio Martinelli
Partial Model Checking and Theorem Proving for Ensuring Security Properties. [Citation Graph (0, 0)][DBLP] CSFW, 1998, pp:44-52 [Conf]
- Roberto Gorrieri, Enrico Locatelli, Fabio Martinelli
A Simple Language for Real-Time Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP] ESOP, 2003, pp:114-128 [Conf]
- Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Roberto Marangoni, Fabio Martinelli
On Representing Biological Systems through Multiset Rewriting. [Citation Graph (0, 0)][DBLP] EUROCAST, 2003, pp:415-426 [Conf]
- Riccardo Focardi, Fabio Martinelli
A Uniform Approach for the Definition of Security Properties. [Citation Graph (0, 0)][DBLP] World Congress on Formal Methods, 1999, pp:794-813 [Conf]
- Fabio Martinelli
Towards an Integrated Formal Analysis for Security and Trust. [Citation Graph (0, 0)][DBLP] FMOODS, 2005, pp:115-130 [Conf]
- Roberto Gorrieri, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
Formal Anaylsis of Some Timed Security Properties in Wireless Protocols. [Citation Graph (0, 0)][DBLP] FMOODS, 2003, pp:139-154 [Conf]
- Fabio Martinelli, Alistair Sinclair, Dror Weitz
The Ising Model on Trees: Boundary Conditions and Mixing Time. [Citation Graph (0, 0)][DBLP] FOCS, 2003, pp:628-639 [Conf]
- Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
Classification of Security Properties - Part II: Network Security. [Citation Graph (0, 0)][DBLP] FOSAD, 2002, pp:139-185 [Conf]
- Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
Non Interference for the Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] ICALP, 2000, pp:354-372 [Conf]
- Hristo Koshutanski, Fabio Martinelli, Paolo Mori, Anna Vaccarelli
Fine-grained and History-based Access Control with Trust Management for Autonomic Grid Services. [Citation Graph (0, 0)][DBLP] ICAS, 2006, pp:34- [Conf]
- Fabio Martinelli, Paolo Mori, Anna Vaccarelli
Towards Continuous Usage Control on Grid Computational Services. [Citation Graph (0, 0)][DBLP] ICAS/ICNS, 2005, pp:82- [Conf]
- Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
Compositional Verification of Secure Streamed Data: A Case Study with EMSS. [Citation Graph (0, 0)][DBLP] ICTCS, 2003, pp:383-396 [Conf]
- Fabio Martinelli
About Compositional Analysis of Pi-Calculus Processes. [Citation Graph (0, 0)][DBLP] IFIP TCS, 2002, pp:524-536 [Conf]
- Fabrizio Baiardi, Alessandro Falleni, Riccardo Granchi, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
SEAS: A Secure E-Voting Applet System. [Citation Graph (0, 0)][DBLP] ISSS, 2003, pp:318-329 [Conf]
- Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
Automated Analysis of Some Security Mechanisms of SCEP. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:414-427 [Conf]
- Roberto Gorrieri, Fabio Martinelli
Process Algebraic Frameworks for the Specification and Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] MFCS, 2003, pp:46-67 [Conf]
- Fabio Martinelli
Symbolic Semantics and Analysis for Crypto-CCS with (Almost) Generic Inference Systems. [Citation Graph (0, 0)][DBLP] MFCS, 2002, pp:519-531 [Conf]
- Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli
Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2003, pp:86-99 [Conf]
- Fabio Martinelli
Symbolic Partial Model Checking for Security Analysis. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2003, pp:122-134 [Conf]
- Fabrizio Baiardi, Fabio Martinelli, Paolo Mori, Anna Vaccarelli
Improving Grid Services Security with Fine Grain Policies. [Citation Graph (0, 0)][DBLP] OTM Workshops, 2004, pp:123-134 [Conf]
- Hristo Koshutanski, Fabio Martinelli, Paolo Mori, Luca Borz, Anna Vaccarelli
A Fine-Grained and X.509-Based Access Control System for Globus. [Citation Graph (0, 0)][DBLP] OTM Conferences (2), 2006, pp:1336-1350 [Conf]
- Fabio Dianda, Filippo Giuntini, Fabio Martinelli, Anna Vaccarelli
A Flexible Framework for Access Control Based on Ability Authentication. [Citation Graph (0, 0)][DBLP] SAINT Workshops, 2005, pp:106-109 [Conf]
- Fabio Martinelli, Alistair Sinclair, Dror Weitz
Fast mixing for independent sets, colorings and other models on trees. [Citation Graph (0, 0)][DBLP] SODA, 2004, pp:456-465 [Conf]
- Giampaolo Bella, Stefano Bistarelli, Fabio Martinelli
Biometrics to Enhance Smartcard Security. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2003, pp:324-332 [Conf]
- Fabio Martinelli
Biometrics to Enhance Smartcard Security (Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2003, pp:333-335 [Conf]
- Davide Marchignoli, Fabio Martinelli
Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques. [Citation Graph (0, 0)][DBLP] TACAS, 1999, pp:148-162 [Conf]
- Fabrizio Baiardi, Alessandro Falleni, Riccardo Granchi, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
SEAS, a secure e-voting protocol: Design and implementation. [Citation Graph (0, 0)][DBLP] Computers & Security, 2005, v:24, n:8, pp:642-652 [Journal]
- Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
Techniques for Security Checking: Non-Interference vs Control Flow Analysis. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2001, v:62, n:, pp:- [Journal]
- Nadia Busi, Roberto Gorrieri, Fabio Martinelli
Preface. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:121, n:, pp:1-2 [Journal]
- Riccardo Focardi, Roberto Gorrieri, Ruggero Lanotte, Andrea Maggiolo-Schettini, Fabio Martinelli, Simone Tini, Enrico Tronci
Formal Models of Timing Attacks on Web Privacy. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2001, v:62, n:, pp:- [Journal]
- Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
Secrecy in Security Protocols as Non Interference. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2000, v:32, n:, pp:- [Journal]
- Stefania Gnesi, Gabriele Lenzini, Fabio Martinelli
Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:111-126 [Journal]
- Stefania Gnesi, Gabriele Lenzini, Fabio Martinelli
Logical Specification and Analysis of Fault Tolerant Systems Through Partial Model Checking. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:118, n:, pp:57-70 [Journal]
- Roberto Gorrieri, Fabio Martinelli, Marinella Petrocchi
A Formalization of Credit and Responsibility Within the GNDC Schema. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2006, v:157, n:3, pp:61-78 [Journal]
- Fabio Martinelli, Marinella Petrocchi
On Relating and Integrating Two Trust Management Frameworks. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:191-205 [Journal]
- Fabio Martinelli, Ilaria Matteucci
An Approach for the Specification, Verification and Synthesis of Secure Systems. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:29-43 [Journal]
- Roberto Gorrieri, Ruggero Lanotte, Andrea Maggiolo-Schettini, Fabio Martinelli, Simone Tini, Enrico Tronci
Automated analysis of timed security: a case study on web privacy. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2004, v:2, n:3-4, pp:168-186 [Journal]
- Fabio Martinelli
An Improvement of Algorithms for Solving Interface Equations. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1998, v:67, n:4, pp:185-190 [Journal]
- Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli
Relating multiset rewriting and process algebras for security protocol analysis. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:1, pp:3-47 [Journal]
- Roberto Gorrieri, Fabio Martinelli
A simple framework for real-time cryptographic protocol analysis with compositional proof rules. [Citation Graph (0, 0)][DBLP] Sci. Comput. Program., 2004, v:50, n:1-3, pp:23-49 [Journal]
- Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
Formal analysis of some secure procedures for certificate delivery. [Citation Graph (0, 0)][DBLP] Softw. Test., Verif. Reliab., 2006, v:16, n:1, pp:33-59 [Journal]
- Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli
A comparison of three authentication properties. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2003, v:291, n:3, pp:285-327 [Journal]
- Roberto Gorrieri, Fabio Martinelli
Theoretical foundations of security analysis and design II. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2005, v:340, n:1, pp:1-2 [Journal]
- Fabio Martinelli
Analysis of security protocols as open systems. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2003, v:290, n:1, pp:1057-1106 [Journal]
- Maurizio Colombo, Fabio Martinelli, Paolo Mori, Anna Vaccarelli
Extending the Globus Architecture with Role-Based Trust Management. [Citation Graph (0, 0)][DBLP] EUROCAST, 2007, pp:448-456 [Conf]
- Fabio Martinelli, Paolo Mori
Enhancing Java Security with History Based Access Control. [Citation Graph (0, 0)][DBLP] FOSAD, 2007, pp:135-159 [Conf]
- Maurizio Colombo, Fabio Martinelli, Paolo Mori, Marinella Petrocchi, Anna Vaccarelli
Fine Grained Access Control with Trust and Reputation Management for Globus. [Citation Graph (0, 0)][DBLP] OTM Conferences (2), 2007, pp:1505-1515 [Conf]
- Fabio Martinelli, Ilaria Matteucci
Through Modeling to Synthesis of Security Automata. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:179, n:, pp:31-46 [Journal]
- Fabio Martinelli, Marinella Petrocchi
A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:186, n:, pp:85-99 [Journal]
- Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider
Guest Editors' Preface. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:65-66 [Journal]
Synthesis of Local Controller Programs for Enforcing Global Security Properties. [Citation Graph (, )][DBLP]
Weighted Datalog and Levels of Trust. [Citation Graph (, )][DBLP]
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily. [Citation Graph (, )][DBLP]
Enhancing Java ME Security Support with Resource Usage Monitoring. [Citation Graph (, )][DBLP]
A Uniform Approach to Security and Fault-Tolerance Specification and Analysis. [Citation Graph (, )][DBLP]
A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application. [Citation Graph (, )][DBLP]
Risk-Based Usage Control for Service Oriented Architecture. [Citation Graph (, )][DBLP]
Mixing time for the solid-on-solid model. [Citation Graph (, )][DBLP]
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies. [Citation Graph (, )][DBLP]
Usage Control, Risk and Trust. [Citation Graph (, )][DBLP]
Synthesis of Web Services Orchestrators in a Timed Setting. [Citation Graph (, )][DBLP]
Formal approach to security metrics.: what does "more secure" mean for you? [Citation Graph (, )][DBLP]
Mobile Implementation and Formal Verification of an e-Voting System. [Citation Graph (, )][DBLP]
Extending Security-by-Contract with Quantitative Trust on Mobile Devices. [Citation Graph (, )][DBLP]
Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach. [Citation Graph (, )][DBLP]
Detection of images with adult content for parental control on mobile devices? [Citation Graph (, )][DBLP]
Idea: Action Refinement for Security Properties Enforcement. [Citation Graph (, )][DBLP]
On Usage Control for GRID Services. [Citation Graph (, )][DBLP]
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks. [Citation Graph (, )][DBLP]
Runtime monitoring for next generation Java ME platform. [Citation Graph (, )][DBLP]
Mixing Time for the Solid-on-Solid Model [Citation Graph (, )][DBLP]
Towards Information Flow Properties for Distributed Systems. [Citation Graph (, )][DBLP]
Preface. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.460secs
|