The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sandro Etalle: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Marco Bertolino, Sandro Etalle, Catuscia Palamidessi
    The Replacement Operation for CCP Programs. [Citation Graph (0, 0)][DBLP]
    APPIA-GULP-PRODE, 1999, pp:441-454 [Conf]
  2. Sandro Etalle, Maurizio Gabbrielli
    Modular Transformations of CLP Programs. [Citation Graph (0, 0)][DBLP]
    GULP-PRODE (1), 1994, pp:218-233 [Conf]
  3. Sandro Etalle, Maurizio Gabbrielli
    Layered Modes. [Citation Graph (0, 0)][DBLP]
    APPIA-GULP-PRODE, 1996, pp:41-52 [Conf]
  4. Annalisa Bossi, Nicoletta Cocco, Sandro Etalle
    Transformation Systems and Nondeclarative Properties. [Citation Graph (0, 0)][DBLP]
    Computational Logic: Logic Programming and Beyond, 2002, pp:162-186 [Conf]
  5. Pieter H. Hartel, Pascal van Eck, Sandro Etalle, Roel Wieringa
    Modelling Mobility Aspects of Security Policies. [Citation Graph (0, 0)][DBLP]
    CASSIS, 2004, pp:172-191 [Conf]
  6. Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader
    Timed model checking of security protocols. [Citation Graph (0, 0)][DBLP]
    FMSE, 2004, pp:23-32 [Conf]
  7. M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle
    Extended privilege inheritance in RBAC. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:383-385 [Conf]
  8. Annalisa Bossi, Sandro Etalle, Sabina Rossi
    Semantics of Input-Consuming Logic Programs. [Citation Graph (0, 0)][DBLP]
    Computational Logic, 2000, pp:194-208 [Conf]
  9. Sandro Etalle, Maurizio Gabbrielli, Maria Chiara Meo
    Unfold/Fold Transformations of CCP Programs. [Citation Graph (0, 0)][DBLP]
    CONCUR, 1998, pp:348-365 [Conf]
  10. Annalisa Bossi, Sandro Etalle, Sabina Rossi, Jan-Georg Smaus
    Semantics and Termination of Simply-Moded Logic Programs with Dynamic Scheduling. [Citation Graph (0, 0)][DBLP]
    ESOP, 2001, pp:402-416 [Conf]
  11. Ricardo Corin, Gaetano Di Caprio, Sandro Etalle, Stefania Gnesi, Gabriele Lenzini, Corrado Moiso
    A Formal Security Analysis of an OSA/Parlay Authentication Interface. [Citation Graph (0, 0)][DBLP]
    FMOODS, 2005, pp:131-146 [Conf]
  12. Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, Yee Wei Law
    Approximating Fair Use in LicenseScript. [Citation Graph (0, 0)][DBLP]
    ICADL, 2003, pp:432-443 [Conf]
  13. Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, Rieks Joosten, Geert Kleinhuis
    Service Brokerage in Prolog. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2005, pp:409-412 [Conf]
  14. Ricardo Corin, Ari Saptawijaya, Sandro Etalle
    PS-LTL for Constraint-Based Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    ICLP, 2005, pp:439-440 [Conf]
  15. Sandro Etalle, Maurizio Gabbrielli
    A Transformation System for Modular CLP Programs. [Citation Graph (0, 0)][DBLP]
    ICLP, 1995, pp:681-695 [Conf]
  16. Sandro Etalle, Femke van Raamsdonk
    Beyond Success and Failure. [Citation Graph (0, 0)][DBLP]
    IJCSLP, 1998, pp:190-205 [Conf]
  17. Sandro Etalle, Femke van Raamsdonk
    Logic Programming with Requests. [Citation Graph (0, 0)][DBLP]
    ICLP, 1999, pp:558-572 [Conf]
  18. Sandro Etalle, Frank Teusink
    A Compositional Semantics for Normal Open Programs. [Citation Graph (0, 0)][DBLP]
    JICSLP, 1996, pp:468-482 [Conf]
  19. Roberto Di Pietro, Luigi V. Mancini, Yee Wei Law, Sandro Etalle, Paul J. M. Havinga
    LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2003, pp:397-0 [Conf]
  20. Ricardo Corin, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini, I. Staicu
    A Logic for Auditing Accountability in Decentralized Systems. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:187-201 [Conf]
  21. Paul J. M. Havinga, Sandro Etalle, Holger Karl, Chiara Petrioli, Michele Zorzi, Harry Kip, Thomas Lentsch
    EYES - Energy Efficient Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PWC, 2003, pp:198-201 [Conf]
  22. Yee Wei Law, Ricardo Corin, Sandro Etalle, Pieter H. Hartel
    A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PWC, 2003, pp:27-39 [Conf]
  23. Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, Emmanuele Zambon
    POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:144-156 [Conf]
  24. Giorgio Delzanno, Sandro Etalle
    Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols. [Citation Graph (0, 0)][DBLP]
    LOPSTR, 2001, pp:76-90 [Conf]
  25. Sandro Etalle, Jon Mountjoy
    The lazy functional side of logic programming. [Citation Graph (0, 0)][DBLP]
    LOPSTR, 2000, pp:- [Conf]
  26. Marco Bertolino, Sandro Etalle, Catuscia Palamidessi
    The Replacement Operation for CCP Programs. [Citation Graph (0, 0)][DBLP]
    LOPSTR, 1999, pp:216-233 [Conf]
  27. Annalisa Bossi, Nicoletta Cocco, Sandro Etalle
    Transformation of Left Terminating Programs: the Reordering Problem. [Citation Graph (0, 0)][DBLP]
    LOPSTR, 1995, pp:33-45 [Conf]
  28. Annalisa Bossi, Nicoletta Cocco, Sandro Etalle
    Transformation of Left Terminating Programs. [Citation Graph (0, 0)][DBLP]
    LOPSTR, 1999, pp:156-175 [Conf]
  29. Annalisa Bossi, Nicoletta Cocco, Sandro Etalle, Sabina Rossi
    Declarative Semantics of Input Consuming Logic Programs. [Citation Graph (0, 0)][DBLP]
    Program Development in Computational Logic, 2004, pp:90-114 [Conf]
  30. Annalisa Bossi, Sandro Etalle
    More on Unfold/Fold Transformations of Normal Programs: Preservation of Fitting's Semantics. [Citation Graph (0, 0)][DBLP]
    META, 1994, pp:311-331 [Conf]
  31. Annalisa Bossi, Nicoletta Cocco, Sandro Etalle
    Transforming Normal Programs by Replacement. [Citation Graph (0, 0)][DBLP]
    META, 1992, pp:265-279 [Conf]
  32. Krzysztof R. Apt, Sandro Etalle
    On the Unification Free Prolog Programs. [Citation Graph (0, 0)][DBLP]
    MFCS, 1993, pp:1-19 [Conf]
  33. Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel
    Comparing Logic-Based and XML-Based Rights Expression Languages. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2003, pp:779-792 [Conf]
  34. Sandro Etalle, Maurizio Gabbrielli
    The Replacement Operation for CLP Modules. [Citation Graph (0, 0)][DBLP]
    PEPM, 1995, pp:168-177 [Conf]
  35. Sandro Etalle, Maurizio Gabbrielli, Elena Marchiori
    A Transformation System for CLP with Dynamic Scheduling and CCP. [Citation Graph (0, 0)][DBLP]
    PEPM, 1997, pp:137-150 [Conf]
  36. Annalisa Bossi, Nicoletta Cocco, Sandro Etalle
    On Safe Folding. [Citation Graph (0, 0)][DBLP]
    PLILP, 1992, pp:172-186 [Conf]
  37. J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog
    An Audit Logic for Accountability. [Citation Graph (0, 0)][DBLP]
    POLICY, 2005, pp:34-43 [Conf]
  38. Sandro Etalle, William H. Winsborough
    Integrity constraints in trust management. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:1-10 [Conf]
  39. Ricardo Corin, Sandro Etalle
    An Improved Constraint-Based System for the Verification of Security Protocols. [Citation Graph (0, 0)][DBLP]
    SAS, 2002, pp:326-341 [Conf]
  40. Jieyin Cheng, Cheun Ngen Chong, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus
    StreamTo: Streaming Content using a Tamper-Resistant Token. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:601-612 [Conf]
  41. Yee Wei Law, Sandro Etalle, Pieter H. Hartel
    Assessing Security in Energy-Efficient Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:459-463 [Conf]
  42. Ricardo Corin, Sandro Etalle, Ari Saptawijaya
    A Logic for Constraint-based Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:155-168 [Conf]
  43. Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin
    License Protection with a Tamper-Resistant Token. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:223-237 [Conf]
  44. Cheun Ngen Chong, Ricardo Corin, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Yee Wei Law, Andrew Tokmakoff
    LicenseScript: a logical language for digital rights management. [Citation Graph (0, 0)][DBLP]
    Annales des Télécommunications, 2006, v:61, n:3-4, pp:284-331 [Journal]
  45. Annalisa Bossi, Sandro Etalle, Sabina Rossi
    Semantics of well-moded input-consuming logic programs. [Citation Graph (0, 0)][DBLP]
    Comput. Lang., 2000, v:26, n:1, pp:1-25 [Journal]
  46. Ricardo Corin, Antonio Durante, Sandro Etalle, Pieter H. Hartel
    A Trace Logic for Local Security Properties [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  47. Annalisa Bossi, Nicoletta Cocco, Sandro Etalle, Sabina Rossi
    On Modular Termination Proofs of General Logic Programs [Citation Graph (0, 0)][DBLP]
    CoRR, 2000, v:0, n:, pp:- [Journal]
  48. Annalisa Bossi, Sandro Etalle, Sabina Rossi, Jan-Georg Smaus
    Semantics and Termination of Simply-Moded Logic Programs with Dynamic Scheduling [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  49. Sandro Etalle, Jon Mountjoy
    The (Lazy) Functional Side of Logic Programming [Citation Graph (0, 0)][DBLP]
    CoRR, 2000, v:0, n:, pp:- [Journal]
  50. Annalisa Bossi, Sandro Etalle, Sabina Rossi
    Properties of Input-Consuming Derivations [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  51. Sandro Etalle, Maurizio Gabbrielli, Maria Chiara Meo
    Transformations of CCP programs [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  52. Sandro Etalle, Maurizio Gabbrielli
    Partial Evaluation of Concurrent Constraint Languages. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1998, v:30, n:3es, pp:11- [Journal]
  53. Ricardo Corin, Jeroen Doumen, Sandro Etalle
    Analysing Password Protocol Security Against Off-line Dictionary Attacks. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:121, n:, pp:47-63 [Journal]
  54. Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Antonio Durante
    A Trace Logic for Local Security Properties. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:118, n:, pp:129-143 [Journal]
  55. Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Jerry den Hartog
    Nonmonotonic Trust Management for P2P Applications. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:157, n:3, pp:113-130 [Journal]
  56. Sandro Etalle, Supratik Mukhopadhyay, Abhik Roychoudhury
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:118, n:, pp:1-0 [Journal]
  57. M. A. C. Dekker, Sandro Etalle
    Audit-Based Access Control for Electronic Health Records. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:221-236 [Journal]
  58. Sandro Etalle, Maurizio Gabbrielli
    On the Correctness of the Replacement Operation for CLP Modules. [Citation Graph (0, 0)][DBLP]
    Journal of Functional and Logic Programming, 1996, v:1996, n:1, pp:- [Journal]
  59. Sandro Etalle, Annalisa Bossi, Nicoletta Cocco
    Termination of Well-Moded Programs. [Citation Graph (0, 0)][DBLP]
    J. Log. Program., 1999, v:38, n:2, pp:243-257 [Journal]
  60. Sandro Etalle, Maurizio Gabbrielli
    Layered Modes. [Citation Graph (0, 0)][DBLP]
    J. Log. Program., 1999, v:39, n:1-3, pp:225-244 [Journal]
  61. Sandro Etalle
    Unification-free Prolog programs revisited. [Citation Graph (0, 0)][DBLP]
    J. Prog. Lang., 1996, v:4, n:4, pp:187-210 [Journal]
  62. Annalisa Bossi, Nicoletta Cocco, Sandro Etalle
    Simultaneous Replacement in Normal Programs. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 1996, v:6, n:1, pp:79-120 [Journal]
  63. Sandro Etalle, Pieter H. Hartel, Willem G. Vree
    Declarative solutions to partitioned-grid problems. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1999, v:29, n:13, pp:1173-1200 [Journal]
  64. Annalisa Bossi, Sandro Etalle, Sabina Rossi
    Properties of Input-Consuming Derivations. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1999, v:30, n:1, pp:- [Journal]
  65. Sandro Etalle
    A Semantics for Modular General Logic Programs. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1998, v:206, n:1-2, pp:51-80 [Journal]
  66. Sandro Etalle, Maurizio Gabbrielli
    Transformations of CLP Modules. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1996, v:166, n:1&2, pp:101-146 [Journal]
  67. Sandro Etalle, Jan-Georg Smaus
    Preface - Workshop on Verification of Logic Programs. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1999, v:30, n:1, pp:- [Journal]
  68. Annalisa Bossi, Sandro Etalle, Sabina Rossi, Jan-Georg Smaus
    Termination of simply moded logic programs with dynamic scheduling. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Log., 2004, v:5, n:3, pp:470-507 [Journal]
  69. Annalisa Bossi, Sandro Etalle
    Transforming Acyclic Programs. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1994, v:16, n:4, pp:1081-1096 [Journal]
  70. Sandro Etalle, Maurizio Gabbrielli, Maria Chiara Meo
    Transformations of CCP programs. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2001, v:23, n:3, pp:304-395 [Journal]
  71. Annalisa Bossi, Nicoletta Cocco, Sandro Etalle, Sabina Rossi
    On modular termination proofs of general logic programs. [Citation Graph (0, 0)][DBLP]
    TPLP, 2002, v:2, n:3, pp:263-291 [Journal]
  72. Annalisa Bossi, Sandro Etalle, Sabina Rossi
    Properties of input-consuming derivations. [Citation Graph (0, 0)][DBLP]
    TPLP, 2002, v:2, n:2, pp:125-154 [Journal]
  73. Giorgio Delzanno, Sandro Etalle, Maurizio Gabbrielli
    Introduction to the Special Issue on Specification Analysis and Verification of Reactive Systems. [Citation Graph (0, 0)][DBLP]
    TPLP, 2006, v:6, n:3, pp:225-226 [Journal]
  74. Marcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough
    An Introduction to the Role Based Trust Management Framework RT. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:246-281 [Conf]
  75. Marcin Czenko, Sandro Etalle
    Core TuLiP Logic Programming for Trust Management. [Citation Graph (0, 0)][DBLP]
    ICLP, 2007, pp:380-394 [Conf]
  76. Sandro Etalle, William H. Winsborough
    A posteriori compliance control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:11-20 [Conf]
  77. M. A. C. Dekker, Sandro Etalle
    Refinement for Administrative Policies. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:33-46 [Conf]
  78. Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin
    The Meaning of Logs. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2007, pp:145-154 [Conf]
  79. J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog
    An Audit Logic for Accountability [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  80. Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader
    Timed Analysis of Security Protocols [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  81. Sandro Etalle, William H. Winsborough
    Integrity Constraints in Trust Management [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  82. Damiano Bolzoni, Sandro Etalle
    APHRODITE: an Anomaly-based Architecture for False Positive Reduction [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  83. Sandro Etalle, Pierangela Samarati
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:179, n:, pp:1-2 [Journal]
  84. J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini
    Audit-based compliance control. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:133-151 [Journal]

  85. Extended eTVRA vs. security checklist: Experiences in a value-web. [Citation Graph (, )][DBLP]


  86. Know What You Trust. [Citation Graph (, )][DBLP]


  87. ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  88. LP with Flexible Grouping and Aggregates Using Modes. [Citation Graph (, )][DBLP]


  89. Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. [Citation Graph (, )][DBLP]


  90. POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy. [Citation Graph (, )][DBLP]


  91. Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  92. RBAC administration in distributed systems. [Citation Graph (, )][DBLP]


  93. Towards Static Flow-Based Declassification for Legacy and Untrusted Programs. [Citation Graph (, )][DBLP]


  94. Trust and punishment. [Citation Graph (, )][DBLP]


  95. IT confidentiality risk assessment for an architecture-based approach. [Citation Graph (, )][DBLP]


  96. Model-Based Mitigation of Availability Risks. [Citation Graph (, )][DBLP]


  97. Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control. [Citation Graph (, )][DBLP]


  98. Nonmonotonic Trust Management for P2P Applications [Citation Graph (, )][DBLP]


  99. Poseidon: a 2-tier Anomaly-based Intrusion Detection System [Citation Graph (, )][DBLP]


Search in 0.468secs, Finished in 0.473secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002