dblp.uni-trier.dewww.uni-trier.de

Fabio Massacci Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
101EEFabio Massacci, Samuel T. Redwine Jr., Nicola Zannone: Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings Springer 2009
100EEFabio Massacci, Gene Tsudik, Artsiom Yautsiukhin: Logging key assurance indicators in business processes. ASIACCS 2009: 364-367
99EEAlzbeta Krausová, Fabio Massacci, Ayda Saïdane: How to capture and use legal patterns in IT. ICAIL 2009: 228-229
98EENataliia Bielova, Fabio Massacci, Andrea Micheletti: Towards Practical Enforcement Theories. NordSec 2009: 239-254
97EELuca Compagna, Paul El Khoury, Alzbeta Krausová, Fabio Massacci, Nicola Zannone: How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artif. Intell. Law 17(1): 1-30 (2009)
96EENicola Dragoni, Fabio Massacci, Ayda Saïdane: A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems. Computer Networks 53(10): 1628-1648 (2009)
95EEGabriel M. Kuper, Fabio Massacci, Nataliya Rassadko: Generalized XML security views. Int. J. Inf. Sec. 8(3): 173-203 (2009)
2008
94EEFabio Massacci, Katsiaryna Naliuka: Towards Practical Security Monitors of UML Policies for Mobile Applications. ARES 2008: 1112-1119
93EEFabio Massacci, Frank Piessens, Ida Siahaan: Security-By-Contract for the Future Internet. FIS 2008: 29-43
92EENataliia Bielova, Fabio Massacci: Do You Really Mean What You Actually Enforced?. Formal Aspects in Security and Trust 2008: 287-301
91EEFabio Massacci, Nicola Zannone: A Model-Driven Approach for the Specification and Analysis of Access Control Policies. OTM Conferences (2) 2008: 1087-1103
90EEFabio Massacci, Ida Siahaan: Simulating midlet's security claims with automata modulo theory. PLAS 2008: 1-9
89EEAzzedine Benameur, Fabio Massacci, Nataliya Rassadko: Security views for outsourced business processes. SWS 2008: 45-52
88EEFabio Massacci, Frank Piessens: Preface. Electr. Notes Theor. Comput. Sci. 197(1): 1-2 (2008)
87EELuca Compagna, Volkmar Lotz, Fabio Massacci: Preface. Electr. Notes Theor. Comput. Sci. 197(2): 1-2 (2008)
86EEFabio Massacci, Frank Piessens, Sjouke Mauw: Preface. Sci. Comput. Program. 74(1-2): 1 (2008)
85EEHristo Koshutanski, Fabio Massacci: Interactive access control for autonomic systems: From theory to implementation. TAAS 3(3): (2008)
84EEVolkmar Lotz, Emmanuel Pigout, Peter M. Fischer, Donald Kossmann, Fabio Massacci, Alexander Pretschner: Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach. Wirtschaftsinformatik 50(5): 383-391 (2008)
2007
83EEYudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone: From Trust to Dependability through Risk Analysis. ARES 2007: 19-26
82EELieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe: A flexible security architecture to support third-party applications on mobile devices. CSAW 2007: 19-28
81EENicola Dragoni, Fabio Massacci, Katsiaryna Naliuka, Ida Siahaan: Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code. EuroPKI 2007: 297-312
80EEFabio Massacci, Artsiom Yautsiukhin: Modelling Quality of Protection in Outsourced Business Processes. IAS 2007: 247-252
79EELuca Compagna, Paul El Khoury, Fabio Massacci, Reshma Thomas, Nicola Zannone: How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. ICAIL 2007: 149-153
78EEHugo A. López, Fabio Massacci, Nicola Zannone: Goal-Equivalent Secure Business Process Re-engineering. ICSOC Workshops 2007: 212-223
77EEFabio Massacci, Katsiaryna Naliuka: Towards Practical Security Monitors of UML Policies for Mobile Applications. POLICY 2007: 278
76EEFabio Massacci, Artsiom Yautsiukhin: An algorithm for the appraisal of assurance indicators for complex business processes. QoP 2007: 22-27
75EENicola Dragoni, Fabio Massacci: Security-by-contract for web services. SWS 2007: 90-98
74EESandro Etalle, Fabio Massacci, Artsiom Yautsiukhin: The Meaning of Logs. TrustBus 2007: 145-154
73EEAlexander Pretschner, Fabio Massacci, Manuel Hilty: Usage Control in Service-Oriented Architectures. TrustBus 2007: 83-93
72EEFabio Massacci, John Mylopoulos, Nicola Zannone: Computer-aided Support for Secure Tropos. Autom. Softw. Eng. 14(3): 341-364 (2007)
71EEYücel Karabulut, Florian Kerschbaum, Fabio Massacci, Philip Robinson, Artsiom Yautsiukhin: Security and Trust in IT Business Outsourcing: a Manifesto. Electr. Notes Theor. Comput. Sci. 179: 47-58 (2007)
70EEFabio Massacci, John Mylopoulos, Nicola Zannone: From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach. International Journal of Software Engineering and Knowledge Engineering 17(2): 265-284 (2007)
69EEHristo Koshutanski, Fabio Massacci: A Negotiation Scheme for Access Rights Establishment in Autonomic Communication. J. Network Syst. Manage. 15(1): 117-136 (2007)
2006
68 Günter Karjoth, Fabio Massacci: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006 ACM 2006
67 Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio Massacci: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings Springer 2006
66EEVolha Bryl, Fabio Massacci, John Mylopoulos, Nicola Zannone: Designing Security Requirements Models Through Planning. CAiSE 2006: 33-47
65EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Detecting Conflicts of Interest. RE 2006: 308-311
64EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Requirements engineering for trust management: model, methodology, and reasoning. Int. J. Inf. Sec. 5(4): 257-274 (2006)
63EEGiampaolo Bella, Fabio Massacci, Lawrence C. Paulson: Verifying the SET Purchase Protocols. J. Autom. Reasoning 36(1-2): 5-37 (2006)
62EESimon Dobson, Spyros G. Denazis, Antonio Fernández, Dominique Gaïti, Erol Gelenbe, Fabio Massacci, Paddy Nixon, Fabrice Saffre, Nikita Schmidt, Franco Zambonelli: A survey of autonomic communications. TAAS 1(2): 223-259 (2006)
61EEFabio Massacci, John Mylopoulos, Nicola Zannone: Hierarchical hippocratic databases with minimal disclosure for virtual organizations. VLDB J. 15(4): 370-387 (2006)
2005
60EEFabio Massacci, John Mylopoulos, Nicola Zannone: Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. ESORICS 2005: 438-454
59EEPaolo Giorgini, Fabio Massacci, Nicola Zannone: Security and Trust Requirements Engineering. FOSAD 2005: 237-272
58EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. RE 2005: 167-176
57EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: ST-Tool: A CASE Tool for Security Requirements Engineering. RE 2005: 451-452
56EEGabriel M. Kuper, Fabio Massacci, Nataliya Rassadko: Generalized XML security views. SACMAT 2005: 77-84
55EENicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera: Maintaining privacy on derived objects. WPES 2005: 10-19
54EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. iTrust 2005: 161-176
53EEHristo Koshutanski, Fabio Massacci: Interactive Credential Negotiation for Stateful Business Processes. iTrust 2005: 256-272
52EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Alberto Siena, Nicola Zannone: ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. iTrust 2005: 415-419
51EEFabio Massacci, Marco Prest, Nicola Zannone: Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation. Computer Standards & Interfaces 27(5): 445-455 (2005)
50EEAlexey Gotsman, Fabio Massacci, Marco Pistore: Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language. Electr. Notes Theor. Comput. Sci. 135(1): 59-77 (2005)
49EEGiampaolo Bella, Fabio Massacci, Lawrence C. Paulson: An overview of the verification of SET. Int. J. Inf. Sec. 4(1-2): 17-28 (2005)
2004
48EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures. EuroPKI 2004: 98-111
47EEHristo Koshutanski, Fabio Massacci: An Interactive Trust Management and Negotiation Scheme. Formal Aspects in Security and Trust 2004: 115-128
46EEHristo Koshutanski, Fabio Massacci: A System for Interactive Authorization for Business Processes for Web Services. ICWE 2004: 521-525
45 Hristo Koshutanski, Fabio Massacci: Interactive Access Control for Web Services. SEC 2004: 151-166
44EEFabio Massacci, Nicola Zannone: Privacy Is Linking Permission to Purpose. Security Protocols Workshop 2004: 179-191
43EEFabio Massacci: Privacy is Linking Permission to Purpose (Transcript of Discussion). Security Protocols Workshop 2004: 192-198
42EEHristo Koshutanski, Fabio Massacci: E Pluribus Unum. WAC 2004: 179-190
41EEPaolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning. iTrust 2004: 176-190
2003
40EEPaolo Giorgini, Fabio Massacci, John Mylopoulos: Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard. ER 2003: 263-276
39EEGiampaolo Bella, Stefano Bistarelli, Fabio Massacci: A Protocol's Life After Attacks.... Security Protocols Workshop 2003: 3-10
38EEHristo Koshutanski, Fabio Massacci: An access control framework for business processes for web services. XML Security 2003: 15-24
37EEClaudia Fiorini, Enrico Martinelli, Fabio Massacci: How to fake an RSA signature by encoding modular root finding as a SAT problem. Discrete Applied Mathematics 130(2): 101-127 (2003)
2002
36EEGiampaolo Bella, Lawrence C. Paulson, Fabio Massacci: The verification of an industrial payment protocol: the SET purchase phase. ACM Conference on Computer and Communications Security 2002: 12-20
35EELuigia Carlucci Aiello, Fabio Massacci: Planning Attacks to Security Protocols: Case Studies in Logic Programming. Computational Logic: Logic Programming and Beyond 2002: 533-560
34 Francesco M. Donini, Paolo Liberatore, Fabio Massacci, Marco Schaerf: Solving QBF by SMV. KR 2002: 578-592
2001
33 Fabio Massacci: Decision Procedures for Expressive Description Logics with Intersection, Composition, Converse of Roles and Role Identity. IJCAI 2001: 193-198
32EELuis Fariñas del Cerro, David Fauthoux, Olivier Gasquet, Andreas Herzig, Dominique Longin, Fabio Massacci: Lotrec : The Generic Tableau Prover for Modal and Description Logics. IJCAR 2001: 453-458
31EELuigia Carlucci Aiello, Fabio Massacci: Verifying security protocols as planning in logic programming. ACM Trans. Comput. Log. 2(4): 542-580 (2001)
30EELuigia Carlucci Aiello, Fabio Massacci: Attacking fair-exchange protocols: parallel models vs trace models. Electr. Notes Theor. Comput. Sci. 55(1): (2001)
2000
29EELuigia Carlucci Aiello, Fabio Massacci: An Executable Specification Language for Planning Attacks to Security Protocols. CSFW 2000: 88-102
28EEPeter Baumgartner, Fabio Massacci: The Taming of the (X)OR. Computational Logic 2000: 508-522
27EEGiampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano: Formal Verification of Cardholder Registration in SET. ESORICS 2000: 159-174
26 Fabio Massacci: Reduction rules and universal variables for first order tableaux and DPLL. KR 2000: 186-197
25EEGiampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano: Making Sense of Specifications: The Formalization of SET. Security Protocols Workshop 2000: 74-81
24 Fabio Massacci, Francesco M. Donini: Design and Results of TANCS-2000 Non-classical (Modal) Systems Comparison. TABLEAUX 2000: 52-56
23EEFrancesco M. Donini, Fabio Massacci: EXPTIME tableaux for ALC. Artif. Intell. 124(1): 87-138 (2000)
22EEMaarit Hietalahti, Fabio Massacci, Ilkka Niemelä: DES: a Challenge Problem for Nonmonotonic Reasoning Systems CoRR cs.AI/0003039: (2000)
21 Giuseppe De Giacomo, Fabio Massacci: Combining Deduction and Model Checking into Tableaux and Algorithms for Converse-PDL. Inf. Comput. 162(1-2): 117-137 (2000)
20 Fabio Massacci, Laura Marraro: Logical Cryptanalysis as a SAT Problem. J. Autom. Reasoning 24(1/2): 165-203 (2000)
19 Fabio Massacci: Single Step Tableaux for Modal Logics. J. Autom. Reasoning 24(3): 319-364 (2000)
18EEFabio Massacci: The proof complexity of analytic and clausal tableaux. Theor. Comput. Sci. 243(1-2): 477-487 (2000)
1999
17 Fabio Massacci: Using Walk-SAT and Rel-Sat for Cryptographic Key Search. IJCAI 1999: 290-295
16 Fabio Massacci: Design and Results of the Tableaux-99 Non-classical (Modal) Systems Comparison. TABLEAUX 1999: 14-18
15 Fabio Massacci: Automated Reasoning and the Verification of Security Protocols. TABLEAUX 1999: 32-33
1998
14 Fabio Massacci: Anytime Approximate Modal Reasoning. AAAI/IAAI 1998: 274-279
13 Fabio Massacci: Cook and Reckhow are Wrong: Subexponential Tableaux Proofs for Their Family of Formulae. ECAI 1998: 408-409
12EEFabio Massacci: Simplification: A General Constraint Propagation Technique for Propositional and Modal Tableaux. TABLEAUX 1998: 217-231
11 Fabio Massacci: Tableau Methods for Formal Verification of Multi-Agent Distributed Systems. J. Log. Comput. 8(3): 373-400 (1998)
1997
10 Fabio Massacci: A Proof Theory for Tractable Approximations of Propositional Reasoning. AI*IA 1997: 219-230
9 Fabio Massacci: Breaking Security Protocols as an AI Planning Problem. ECP 1997: 286-298
8 Fabio Massacci: Reasoning About Security: A Logic and a Decision Method for Role-Based Access Control. ECSQARU-FAPR 1997: 421-435
7 Fabio Massacci: Tableaux Methods for Access Control in Distributed Systems. TABLEAUX 1997: 246-260
1996
6 Fabio Massacci: Contextual Reasoning Is NP-Complete. AAAI/IAAI, Vol. 1 1996: 621-626
5EEGiuseppe De Giacomo, Fabio Massacci: Tableaux and Algorithms for Propositional Dynamic Logic with Converse. CADE 1996: 613-627
4 Giuseppe De Giacomo, Francesco M. Donini, Fabio Massacci: Exptime Tableaux for ALC. Description Logics 1996: 107-110
3 Fabio Massacci: Approximate Reasoning for Contextual Databases. ICTAI 1996: 308-315
2EEFrancesco M. Donini, Fabio Massacci, Daniele Nardi, Riccardo Rosati: A Uniform Tableaux Method for Nonmonotonic Modal Logics. JELIA 1996: 87-103
1994
1EEFabio Massacci: Strongly Analytic Tableaux for Normal Modal Logics. CADE 1994: 723-737

Coauthor Index

1Luigia Carlucci Aiello (Luigia Aiello) [29] [30] [31] [35]
2Yudistira Asnar [83]
3Peter Baumgartner [28]
4Giampaolo Bella [25] [27] [36] [39] [49] [63]
5Azzedine Benameur [89]
6Nataliia Bielova [92] [98]
7Stefano Bistarelli [39]
8Volha Bryl [66]
9Luis Fariñas del Cerro [32]
10Luca Compagna [79] [87] [97]
11Spyros G. Denazis [62]
12Lieven Desmet [82]
13Simon A. Dobson (Simon Dobson) [62]
14Francesco M. Donini [2] [4] [23] [24] [34]
15Nicola Dragoni [75] [81] [96]
16Sandro Etalle [74]
17David Fauthoux [32]
18Antonio Fernández (Antonio Fernández Anta) [62]
19Claudia Fiorini [37]
20Peter M. Fischer [84]
21Dominique Gaïti [62]
22Olivier Gasquet [32]
23Erol Gelenbe [62]
24Giuseppe De Giacomo [4] [5] [21]
25Paolo Giorgini [40] [41] [48] [52] [54] [57] [58] [59] [64] [65] [83]
26Alexey Gotsman [50]
27Andreas Herzig [32]
28Maarit Hietalahti [22]
29Manuel Hilty [73]
30Sushil Jajodia [55]
31Wouter Joosen [82]
32Yücel Karabulut [71]
33Günter Karjoth [68]
34Florian Kerschbaum [71]
35Paul El Khoury [79] [97]
36Hristo Koshutanski [38] [42] [45] [46] [47] [53] [69] [85]
37Donald Kossmann [84]
38Alzbeta Krausová [97] [99]
39Gabriel M. Kuper [56] [95]
40Paolo Liberatore [34]
41Dominique Longin [32]
42Hugo A. López [78]
43Volkmar Lotz [84] [87]
44Laura Marraro [20]
45Enrico Martinelli [37]
46Fabio Martinelli [67]
47Sjouke Mauw [86]
48Andrea Micheletti [98]
49John Mylopoulos [40] [41] [48] [52] [54] [57] [58] [60] [61] [64] [65] [66] [70] [72]
50Katsiaryna Naliuka [77] [81] [82] [94]
51Daniele Nardi [2]
52Ilkka Niemelä [22]
53Paddy Nixon (Patrick Nixon) [62]
54Lawrence C. Paulson [25] [27] [36] [49] [63]
55Pieter Philippaerts [82]
56Frank Piessens [82] [86] [88] [93]
57Emmanuel Pigout [84]
58Marco Pistore [50]
59Marco Prest [51]
60Alexander Pretschner [73] [84]
61Nataliya Rassadko [56] [89] [95]
62Samuel T. Redwine Jr. [101]
63Philip Robinson [71]
64Riccardo Rosati [2]
65Fabrice Saffre [62]
66Ayda Saïdane [96] [99]
67Marco Schaerf [34]
68Nikita Schmidt [62]
69Ida Siahaan [81] [90] [93]
70Alberto Siena [52]
71Ketil Stølen [67]
72Reshma Thomas [79]
73Piero Tramontano [25] [27]
74Gene Tsudik [100]
75Dries Vanoverberghe [82]
76Duminda Wijesekera [55]
77William H. Winsborough [67]
78Artsiom Yautsiukhin [71] [74] [76] [80] [100]
79Franco Zambonelli [62]
80Nicola Zannone [41] [44] [48] [51] [52] [54] [55] [57] [58] [59] [60] [61] [64] [65] [66] [70] [72] [78] [79] [83] [91] [97] [101]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)