|
Search the dblp DataBase
Sandro Etalle:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Marco Bertolino, Sandro Etalle, Catuscia Palamidessi
The Replacement Operation for CCP Programs. [Citation Graph (0, 0)][DBLP] APPIA-GULP-PRODE, 1999, pp:441-454 [Conf]
- Sandro Etalle, Maurizio Gabbrielli
Modular Transformations of CLP Programs. [Citation Graph (0, 0)][DBLP] GULP-PRODE (1), 1994, pp:218-233 [Conf]
- Sandro Etalle, Maurizio Gabbrielli
Layered Modes. [Citation Graph (0, 0)][DBLP] APPIA-GULP-PRODE, 1996, pp:41-52 [Conf]
- Annalisa Bossi, Nicoletta Cocco, Sandro Etalle
Transformation Systems and Nondeclarative Properties. [Citation Graph (0, 0)][DBLP] Computational Logic: Logic Programming and Beyond, 2002, pp:162-186 [Conf]
- Pieter H. Hartel, Pascal van Eck, Sandro Etalle, Roel Wieringa
Modelling Mobility Aspects of Security Policies. [Citation Graph (0, 0)][DBLP] CASSIS, 2004, pp:172-191 [Conf]
- Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader
Timed model checking of security protocols. [Citation Graph (0, 0)][DBLP] FMSE, 2004, pp:23-32 [Conf]
- M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle
Extended privilege inheritance in RBAC. [Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:383-385 [Conf]
- Annalisa Bossi, Sandro Etalle, Sabina Rossi
Semantics of Input-Consuming Logic Programs. [Citation Graph (0, 0)][DBLP] Computational Logic, 2000, pp:194-208 [Conf]
- Sandro Etalle, Maurizio Gabbrielli, Maria Chiara Meo
Unfold/Fold Transformations of CCP Programs. [Citation Graph (0, 0)][DBLP] CONCUR, 1998, pp:348-365 [Conf]
- Annalisa Bossi, Sandro Etalle, Sabina Rossi, Jan-Georg Smaus
Semantics and Termination of Simply-Moded Logic Programs with Dynamic Scheduling. [Citation Graph (0, 0)][DBLP] ESOP, 2001, pp:402-416 [Conf]
- Ricardo Corin, Gaetano Di Caprio, Sandro Etalle, Stefania Gnesi, Gabriele Lenzini, Corrado Moiso
A Formal Security Analysis of an OSA/Parlay Authentication Interface. [Citation Graph (0, 0)][DBLP] FMOODS, 2005, pp:131-146 [Conf]
- Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, Yee Wei Law
Approximating Fair Use in LicenseScript. [Citation Graph (0, 0)][DBLP] ICADL, 2003, pp:432-443 [Conf]
- Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, Rieks Joosten, Geert Kleinhuis
Service Brokerage in Prolog. [Citation Graph (0, 0)][DBLP] ICEIS (3), 2005, pp:409-412 [Conf]
- Ricardo Corin, Ari Saptawijaya, Sandro Etalle
PS-LTL for Constraint-Based Security Protocol Analysis. [Citation Graph (0, 0)][DBLP] ICLP, 2005, pp:439-440 [Conf]
- Sandro Etalle, Maurizio Gabbrielli
A Transformation System for Modular CLP Programs. [Citation Graph (0, 0)][DBLP] ICLP, 1995, pp:681-695 [Conf]
- Sandro Etalle, Femke van Raamsdonk
Beyond Success and Failure. [Citation Graph (0, 0)][DBLP] IJCSLP, 1998, pp:190-205 [Conf]
- Sandro Etalle, Femke van Raamsdonk
Logic Programming with Requests. [Citation Graph (0, 0)][DBLP] ICLP, 1999, pp:558-572 [Conf]
- Sandro Etalle, Frank Teusink
A Compositional Semantics for Normal Open Programs. [Citation Graph (0, 0)][DBLP] JICSLP, 1996, pp:468-482 [Conf]
- Roberto Di Pietro, Luigi V. Mancini, Yee Wei Law, Sandro Etalle, Paul J. M. Havinga
LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ICPP Workshops, 2003, pp:397-0 [Conf]
- Ricardo Corin, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini, I. Staicu
A Logic for Auditing Accountability in Decentralized Systems. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:187-201 [Conf]
- Paul J. M. Havinga, Sandro Etalle, Holger Karl, Chiara Petrioli, Michele Zorzi, Harry Kip, Thomas Lentsch
EYES - Energy Efficient Sensor Networks. [Citation Graph (0, 0)][DBLP] PWC, 2003, pp:198-201 [Conf]
- Yee Wei Law, Ricardo Corin, Sandro Etalle, Pieter H. Hartel
A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] PWC, 2003, pp:27-39 [Conf]
- Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, Emmanuele Zambon
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP] IWIA, 2006, pp:144-156 [Conf]
- Giorgio Delzanno, Sandro Etalle
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols. [Citation Graph (0, 0)][DBLP] LOPSTR, 2001, pp:76-90 [Conf]
- Sandro Etalle, Jon Mountjoy
The lazy functional side of logic programming. [Citation Graph (0, 0)][DBLP] LOPSTR, 2000, pp:- [Conf]
- Marco Bertolino, Sandro Etalle, Catuscia Palamidessi
The Replacement Operation for CCP Programs. [Citation Graph (0, 0)][DBLP] LOPSTR, 1999, pp:216-233 [Conf]
- Annalisa Bossi, Nicoletta Cocco, Sandro Etalle
Transformation of Left Terminating Programs: the Reordering Problem. [Citation Graph (0, 0)][DBLP] LOPSTR, 1995, pp:33-45 [Conf]
- Annalisa Bossi, Nicoletta Cocco, Sandro Etalle
Transformation of Left Terminating Programs. [Citation Graph (0, 0)][DBLP] LOPSTR, 1999, pp:156-175 [Conf]
- Annalisa Bossi, Nicoletta Cocco, Sandro Etalle, Sabina Rossi
Declarative Semantics of Input Consuming Logic Programs. [Citation Graph (0, 0)][DBLP] Program Development in Computational Logic, 2004, pp:90-114 [Conf]
- Annalisa Bossi, Sandro Etalle
More on Unfold/Fold Transformations of Normal Programs: Preservation of Fitting's Semantics. [Citation Graph (0, 0)][DBLP] META, 1994, pp:311-331 [Conf]
- Annalisa Bossi, Nicoletta Cocco, Sandro Etalle
Transforming Normal Programs by Replacement. [Citation Graph (0, 0)][DBLP] META, 1992, pp:265-279 [Conf]
- Krzysztof R. Apt, Sandro Etalle
On the Unification Free Prolog Programs. [Citation Graph (0, 0)][DBLP] MFCS, 1993, pp:1-19 [Conf]
- Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel
Comparing Logic-Based and XML-Based Rights Expression Languages. [Citation Graph (0, 0)][DBLP] OTM Workshops, 2003, pp:779-792 [Conf]
- Sandro Etalle, Maurizio Gabbrielli
The Replacement Operation for CLP Modules. [Citation Graph (0, 0)][DBLP] PEPM, 1995, pp:168-177 [Conf]
- Sandro Etalle, Maurizio Gabbrielli, Elena Marchiori
A Transformation System for CLP with Dynamic Scheduling and CCP. [Citation Graph (0, 0)][DBLP] PEPM, 1997, pp:137-150 [Conf]
- Annalisa Bossi, Nicoletta Cocco, Sandro Etalle
On Safe Folding. [Citation Graph (0, 0)][DBLP] PLILP, 1992, pp:172-186 [Conf]
- J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog
An Audit Logic for Accountability. [Citation Graph (0, 0)][DBLP] POLICY, 2005, pp:34-43 [Conf]
- Sandro Etalle, William H. Winsborough
Integrity constraints in trust management. [Citation Graph (0, 0)][DBLP] SACMAT, 2005, pp:1-10 [Conf]
- Ricardo Corin, Sandro Etalle
An Improved Constraint-Based System for the Verification of Security Protocols. [Citation Graph (0, 0)][DBLP] SAS, 2002, pp:326-341 [Conf]
- Jieyin Cheng, Cheun Ngen Chong, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus
StreamTo: Streaming Content using a Tamper-Resistant Token. [Citation Graph (0, 0)][DBLP] SEC, 2005, pp:601-612 [Conf]
- Yee Wei Law, Sandro Etalle, Pieter H. Hartel
Assessing Security in Energy-Efficient Sensor Networks. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:459-463 [Conf]
- Ricardo Corin, Sandro Etalle, Ari Saptawijaya
A Logic for Constraint-based Security Protocol Analysis. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:155-168 [Conf]
- Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin
License Protection with a Tamper-Resistant Token. [Citation Graph (0, 0)][DBLP] WISA, 2004, pp:223-237 [Conf]
- Cheun Ngen Chong, Ricardo Corin, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Yee Wei Law, Andrew Tokmakoff
LicenseScript: a logical language for digital rights management. [Citation Graph (0, 0)][DBLP] Annales des Télécommunications, 2006, v:61, n:3-4, pp:284-331 [Journal]
- Annalisa Bossi, Sandro Etalle, Sabina Rossi
Semantics of well-moded input-consuming logic programs. [Citation Graph (0, 0)][DBLP] Comput. Lang., 2000, v:26, n:1, pp:1-25 [Journal]
- Ricardo Corin, Antonio Durante, Sandro Etalle, Pieter H. Hartel
A Trace Logic for Local Security Properties [Citation Graph (0, 0)][DBLP] CoRR, 2004, v:0, n:, pp:- [Journal]
- Annalisa Bossi, Nicoletta Cocco, Sandro Etalle, Sabina Rossi
On Modular Termination Proofs of General Logic Programs [Citation Graph (0, 0)][DBLP] CoRR, 2000, v:0, n:, pp:- [Journal]
- Annalisa Bossi, Sandro Etalle, Sabina Rossi, Jan-Georg Smaus
Semantics and Termination of Simply-Moded Logic Programs with Dynamic Scheduling [Citation Graph (0, 0)][DBLP] CoRR, 2001, v:0, n:, pp:- [Journal]
- Sandro Etalle, Jon Mountjoy
The (Lazy) Functional Side of Logic Programming [Citation Graph (0, 0)][DBLP] CoRR, 2000, v:0, n:, pp:- [Journal]
- Annalisa Bossi, Sandro Etalle, Sabina Rossi
Properties of Input-Consuming Derivations [Citation Graph (0, 0)][DBLP] CoRR, 2001, v:0, n:, pp:- [Journal]
- Sandro Etalle, Maurizio Gabbrielli, Maria Chiara Meo
Transformations of CCP programs [Citation Graph (0, 0)][DBLP] CoRR, 2001, v:0, n:, pp:- [Journal]
- Sandro Etalle, Maurizio Gabbrielli
Partial Evaluation of Concurrent Constraint Languages. [Citation Graph (0, 0)][DBLP] ACM Comput. Surv., 1998, v:30, n:3es, pp:11- [Journal]
- Ricardo Corin, Jeroen Doumen, Sandro Etalle
Analysing Password Protocol Security Against Off-line Dictionary Attacks. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:121, n:, pp:47-63 [Journal]
- Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Antonio Durante
A Trace Logic for Local Security Properties. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:118, n:, pp:129-143 [Journal]
- Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Jerry den Hartog
Nonmonotonic Trust Management for P2P Applications. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2006, v:157, n:3, pp:113-130 [Journal]
- Sandro Etalle, Supratik Mukhopadhyay, Abhik Roychoudhury
Preface. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:118, n:, pp:1-0 [Journal]
- M. A. C. Dekker, Sandro Etalle
Audit-Based Access Control for Electronic Health Records. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:221-236 [Journal]
- Sandro Etalle, Maurizio Gabbrielli
On the Correctness of the Replacement Operation for CLP Modules. [Citation Graph (0, 0)][DBLP] Journal of Functional and Logic Programming, 1996, v:1996, n:1, pp:- [Journal]
- Sandro Etalle, Annalisa Bossi, Nicoletta Cocco
Termination of Well-Moded Programs. [Citation Graph (0, 0)][DBLP] J. Log. Program., 1999, v:38, n:2, pp:243-257 [Journal]
- Sandro Etalle, Maurizio Gabbrielli
Layered Modes. [Citation Graph (0, 0)][DBLP] J. Log. Program., 1999, v:39, n:1-3, pp:225-244 [Journal]
- Sandro Etalle
Unification-free Prolog programs revisited. [Citation Graph (0, 0)][DBLP] J. Prog. Lang., 1996, v:4, n:4, pp:187-210 [Journal]
- Annalisa Bossi, Nicoletta Cocco, Sandro Etalle
Simultaneous Replacement in Normal Programs. [Citation Graph (0, 0)][DBLP] J. Log. Comput., 1996, v:6, n:1, pp:79-120 [Journal]
- Sandro Etalle, Pieter H. Hartel, Willem G. Vree
Declarative solutions to partitioned-grid problems. [Citation Graph (0, 0)][DBLP] Softw., Pract. Exper., 1999, v:29, n:13, pp:1173-1200 [Journal]
- Annalisa Bossi, Sandro Etalle, Sabina Rossi
Properties of Input-Consuming Derivations. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 1999, v:30, n:1, pp:- [Journal]
- Sandro Etalle
A Semantics for Modular General Logic Programs. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 1998, v:206, n:1-2, pp:51-80 [Journal]
- Sandro Etalle, Maurizio Gabbrielli
Transformations of CLP Modules. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 1996, v:166, n:1&2, pp:101-146 [Journal]
- Sandro Etalle, Jan-Georg Smaus
Preface - Workshop on Verification of Logic Programs. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 1999, v:30, n:1, pp:- [Journal]
- Annalisa Bossi, Sandro Etalle, Sabina Rossi, Jan-Georg Smaus
Termination of simply moded logic programs with dynamic scheduling. [Citation Graph (0, 0)][DBLP] ACM Trans. Comput. Log., 2004, v:5, n:3, pp:470-507 [Journal]
- Annalisa Bossi, Sandro Etalle
Transforming Acyclic Programs. [Citation Graph (0, 0)][DBLP] ACM Trans. Program. Lang. Syst., 1994, v:16, n:4, pp:1081-1096 [Journal]
- Sandro Etalle, Maurizio Gabbrielli, Maria Chiara Meo
Transformations of CCP programs. [Citation Graph (0, 0)][DBLP] ACM Trans. Program. Lang. Syst., 2001, v:23, n:3, pp:304-395 [Journal]
- Annalisa Bossi, Nicoletta Cocco, Sandro Etalle, Sabina Rossi
On modular termination proofs of general logic programs. [Citation Graph (0, 0)][DBLP] TPLP, 2002, v:2, n:3, pp:263-291 [Journal]
- Annalisa Bossi, Sandro Etalle, Sabina Rossi
Properties of input-consuming derivations. [Citation Graph (0, 0)][DBLP] TPLP, 2002, v:2, n:2, pp:125-154 [Journal]
- Giorgio Delzanno, Sandro Etalle, Maurizio Gabbrielli
Introduction to the Special Issue on Specification Analysis and Verification of Reactive Systems. [Citation Graph (0, 0)][DBLP] TPLP, 2006, v:6, n:3, pp:225-226 [Journal]
- Marcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough
An Introduction to the Role Based Trust Management Framework RT. [Citation Graph (0, 0)][DBLP] FOSAD, 2007, pp:246-281 [Conf]
- Marcin Czenko, Sandro Etalle
Core TuLiP Logic Programming for Trust Management. [Citation Graph (0, 0)][DBLP] ICLP, 2007, pp:380-394 [Conf]
- Sandro Etalle, William H. Winsborough
A posteriori compliance control. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:11-20 [Conf]
- M. A. C. Dekker, Sandro Etalle
Refinement for Administrative Policies. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2007, pp:33-46 [Conf]
- Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin
The Meaning of Logs. [Citation Graph (0, 0)][DBLP] TrustBus, 2007, pp:145-154 [Conf]
- J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog
An Audit Logic for Accountability [Citation Graph (0, 0)][DBLP] CoRR, 2005, v:0, n:, pp:- [Journal]
- Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader
Timed Analysis of Security Protocols [Citation Graph (0, 0)][DBLP] CoRR, 2005, v:0, n:, pp:- [Journal]
- Sandro Etalle, William H. Winsborough
Integrity Constraints in Trust Management [Citation Graph (0, 0)][DBLP] CoRR, 2005, v:0, n:, pp:- [Journal]
- Damiano Bolzoni, Sandro Etalle
APHRODITE: an Anomaly-based Architecture for False Positive Reduction [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
- Sandro Etalle, Pierangela Samarati
Preface. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:179, n:, pp:1-2 [Journal]
- J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini
Audit-based compliance control. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:133-151 [Journal]
Extended eTVRA vs. security checklist: Experiences in a value-web. [Citation Graph (, )][DBLP]
Know What You Trust. [Citation Graph (, )][DBLP]
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]
LP with Flexible Grouping and Aggregates Using Modes. [Citation Graph (, )][DBLP]
Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. [Citation Graph (, )][DBLP]
POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy. [Citation Graph (, )][DBLP]
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]
RBAC administration in distributed systems. [Citation Graph (, )][DBLP]
Towards Static Flow-Based Declassification for Legacy and Untrusted Programs. [Citation Graph (, )][DBLP]
Trust and punishment. [Citation Graph (, )][DBLP]
IT confidentiality risk assessment for an architecture-based approach. [Citation Graph (, )][DBLP]
Model-Based Mitigation of Availability Risks. [Citation Graph (, )][DBLP]
Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control. [Citation Graph (, )][DBLP]
Nonmonotonic Trust Management for P2P Applications [Citation Graph (, )][DBLP]
Poseidon: a 2-tier Anomaly-based Intrusion Detection System [Citation Graph (, )][DBLP]
Search in 0.120secs, Finished in 0.125secs
|