S&T Evidences (Std Model)[built on 2017-12-16]

Journal Paper U-Gov ID306998
Year2016
Author(s)Merlo, Alessio; Costa, Gabriele; Verderame, Luca; Armando, Alessandro
TitleAndroid vs. SEAndroid: An empirical assessment
JournalPERVASIVE AND MOBILE COMPUTING
ISSN1574-1192
Volume30
InternationalNo
1619 2.349 2.874 0.482 4.7 0.00354 0.691
COMPUTER SCIENCE, INFORMATION SYSTEMS 63 146 Q2
TELECOMMUNICATIONS 34 89 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID307003
Year2016
Author(s)Armando, Alessandro; Carbone, Roberto; Compagna, Luca
TitleSATMC: a SAT-based model checker for security protocols, business processes, and security APIs
JournalINTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER
ISSN1433-2779
Volume18
InternationalNo
646 1.612 N/D 0.514 7.7 0.00108 N/D
COMPUTER SCIENCE, SOFTWARE ENGINEERING 43 106 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID307037
Year2016
Author(s)Ranise, Silvio; Truong, Anh; Traverso, Riccardo
TitleParameterized model checking for security policy analysis
JournalINTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER
ISSN1433-2779
Volume18
InternationalNo
646 1.612 N/D 0.514 7.7 0.00108 N/D
COMPUTER SCIENCE, SOFTWARE ENGINEERING 43 106 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID307070
Year2016
Author(s)Delzanno, Giorgio; Sangnier, Arnaud; Traverso, Riccardo
TitleAdding Data Registers to Parameterized Networks with Broadcast
JournalFUNDAMENTA INFORMATICAE
ISSN0169-2968
Volume143
InternationalNo
1711 0.687 0.775 0.206 10.0 0.00281 0.241
COMPUTER SCIENCE, SOFTWARE ENGINEERING 91 106 Q4
MATHEMATICS, APPLIED 182 255 Q3
No ESF data
No ANVUR data
Journal Paper U-Gov ID307073
Year2016
Author(s)Abdulla, Parosh Aziz; Delzanno, Giorgio; Rezine, Othmane; Sangnier, Arnaud; Traverso, Riccardo
TitleParameterized verification of time-sensitive models of ad hoc network protocols
JournalTHEORETICAL COMPUTER SCIENCE
ISSN0304-3975
Volume612
InternationalNo
7328 0.698 0.815 0.169 10.0 0.01636 0.492
COMPUTER SCIENCE, THEORY & METHODS 85 104 Q4
No ESF data
No ANVUR data
Journal Paper U-Gov ID303713
Year2015
Author(s)Armando, Alessandro; Bezzi, Michele; Metoui, Nadia; Sabetta, Antonino
TitleRisk-Based Privacy-Aware Information Disclosure
JournalINTERNATIONAL JOURNAL OF SECURE SOFTWARE ENGINEERING
ISSN1947-3036
Volume6
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID307086
Year2015
Author(s)Nguyen, Viet Hung; Dashevskyi, Stanislav; Massacci, Fabio
TitleAn automatic method for assessing the versions affected by a vulnerability
JournalEMPIRICAL SOFTWARE ENGINEERING
ISSN1382-3256
VolumeN/D
InternationalNo
828 1.393 2.08 0.135 6.5 0.00245 0.995
COMPUTER SCIENCE, SOFTWARE ENGINEERING 27 106 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID250443
Year2014
Author(s)Evandro Alencar Rigon;Carla Merkle Westphall;Daniel Ricardo dos Santos;Carlos Becker Westphall
TitleA cyclical evaluation model of information security maturity
JournalINTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY
ISSN1744-1773
Volume22
InternationalYes
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID253626
Year2014
Author(s)Annibale Panichella;ROCCO OLIVETO;Massimiliano Di Penta;Andrea De Lucia
TitleImproving Multi-Objective Test Case Selection by Injecting Diversity in Genetic Algorithms
JournalIEEE TRANSACTIONS ON SOFTWARE ENGINEERING
ISSN0098-5589
VolumeN/D
InternationalNo
3943 1.614 2.35 0.127 10.0 0.00588 1.146
COMPUTER SCIENCE, SOFTWARE ENGINEERING 21 104 Q1
ENGINEERING, ELECTRICAL & ELECTRONIC 94 249 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID264419
Year2014
Author(s)Bruttomesso R.; Ghilardi S.; Ranise S.
TitleQuantifier-free interpolation in combinations of equality interpolating theories
JournalACM TRANSACTIONS ON COMPUTATIONAL LOGIC
ISSN1529-3785
Volume15
InternationalNo
312 0.618 0.927 0.029 7.1 0.00177 0.737
COMPUTER SCIENCE, THEORY & METHODS 74 102 Q3
LOGIC 6 21 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID266619
Year2014
Author(s)Armando A.; Ponta S. E.
TitleModel checking authorization requirements in business processes
JournalCOMPUTERS & SECURITY
ISSN0167-4048
Volume40
InternationalNo
1095 1.031 1.386 0.19 7.0 0.0023 0.419
COMPUTER SCIENCE, INFORMATION SYSTEMS 69 139 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID266620
Year2014
Author(s)Armando A.; Costa G.; Verderame L.; Merlo A.
TitleSecuring the "Bring Your Own Device" Paradigm
JournalCOMPUTER
ISSN0018-9162
Volume47
InternationalNo
4235 1.443 2.181 0.153 10.0 0.00846 1.099
COMPUTER SCIENCE, SOFTWARE ENGINEERING 27 104 Q2
COMPUTER SCIENCE, HARDWARE & ARCHITECTURE 14 50 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID266621
Year2014
Author(s)Armando A.; Costa G.; Merlo A.; Verderame L.
TitleFormal modeling and automatic enforcement of Bring Your Own Device policies
JournalINTERNATIONAL JOURNAL OF INFORMATION SECURITY
ISSN1615-5262
VolumeN/D
InternationalNo
272 0.963 0.919 0.206 6.2 0.00059 0.273
COMPUTER SCIENCE, SOFTWARE ENGINEERING 49 104 Q3
COMPUTER SCIENCE, INFORMATION SYSTEMS 74 139 Q3
COMPUTER SCIENCE, THEORY & METHODS 48 102 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID266622
Year2014
Author(s)Armando A.; Benerecetti M.; Mantovani J.
TitleCounterexample-guided abstraction refinement for linear programs with arrays
JournalAUTOMATED SOFTWARE ENGINEERING
ISSN0928-8910
Volume21
InternationalNo
228 1.733 1.391 0.312 6.6 0.0009 0.823
COMPUTER SCIENCE, SOFTWARE ENGINEERING 15 104 Q1
No ESF data
No ANVUR data
Journal Paper U-Gov ID269019
Year2014
Author(s)Alberti F.; Bruttomesso R.; Ghilardi S.; Ranise S.; Sharygina N.
TitleAn extension of lazy abstraction with interpolation for programs with arrays
JournalFORMAL METHODS IN SYSTEM DESIGN
ISSN0925-9856
Volume45
InternationalYes
357 0.875 1.218 0.043 8.4 0.0016 0.846
COMPUTER SCIENCE, THEORY & METHODS 55 102 Q3
No ESF data
No ANVUR data
Journal Paper U-Gov ID270629
Year2014
Author(s)Armando A.; Merlo A.; Verderame L.
TitleSecurity considerations related to the use of mobile devices in the operation of critical infrastructures
JournalINTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION
ISSN1874-5482
Volume7
InternationalNo
118 1.0 1.392 0.1 4.4 0.00057 0.481
COMPUTER SCIENCE, INFORMATION SYSTEMS 72 139 Q3
ENGINEERING, MULTIDISCIPLINARY 39 85 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID104419
Year2013
Author(s)A. Armando; R. Carbone; L. Compagna; J. Cuellar; G. Pellegrino; A. Sorniotti
TitleAn Authentication Flaw in Browser-based Single Sign-On Protocols: Impact and Remediations
JournalCOMPUTERS & SECURITY
ISSN0167-4048
Volume33
InternationalYes
991 1.172 1.488 0.138 6.8 0.00211 0.448
COMPUTER SCIENCE, INFORMATION SYSTEMS 59 135 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID180610
Year2013
Author(s)Ranise S.
TitleSymbolic Backward Reachability with Effectively Propositional Logic-Applications to Security Policy Analysis
JournalFORMAL METHODS IN SYSTEM DESIGN
ISSN1572-8102
Volume42
InternationalNo
273 0.404 0.942 0.1 9.0 0.00102 0.591
COMPUTER SCIENCE, THEORY & METHODS 88 102 Q4
No ESF data
No ANVUR data
Journal Paper U-Gov ID180611
Year2013
Author(s)Carioni A.; Ghilardi S.; Ranise S.
TitleAutomated Termination in Model-Checking Modulo Theories
JournalINTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE
ISSN0129-0541
Volume24
InternationalNo
375 0.326 0.4 0.0 6.5 0.00211 0.298
COMPUTER SCIENCE, THEORY & METHODS 97 102 Q4
No ESF data
No ANVUR data
Journal Paper U-Gov ID180616
Year2013
Author(s)Armando A.; Merlo A.; Migliardi M; Verderame L.
TitleBreaking and fixing the Android Launching Flow
JournalCOMPUTERS & SECURITY
ISSN0167-4048
Volume39, Part A
InternationalNo
991 1.172 1.488 0.138 6.8 0.00211 0.448
COMPUTER SCIENCE, INFORMATION SYSTEMS 59 135 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID213017
Year2013
Author(s)Armando A.; Benerecetti M.;Mantovani J.
TitleCounterexample-guided abstraction refinement for linear programs with arrays
JournalAUTOMATED SOFTWARE ENGINEERING
ISSN0928-8910
VolumeN/D
InternationalNo
203 1.24 1.429 0.375 5.8 0.00125 1.064
COMPUTER SCIENCE, SOFTWARE ENGINEERING 34 105 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID214418
Year2013
Author(s)de Souza R.F.; Westphall C.B.; dos Santos D.R.; Westphall C.M.
TitleA Review of PACS on Cloud for Archiving Secure Medical Images
JournalINTERNATIONAL JOURNAL OF PRIVACY AND HEALTH INFORMATION MANAGEMENT
ISSN2155-5621
Volume1
InternationalYes
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID50389
Year2012
Author(s)S. Ranise
TitleOn the Verification of Security-Aware E-services
JournalJOURNAL OF SYMBOLIC COMPUTATION
ISSN0747-7171
Volume47
InternationalNo
1178 0.391 0.611 0.154 -10.0 0.0038 0.586
COMPUTER SCIENCE, THEORY & METHODS 86 100 Q4
MATHEMATICS, APPLIED 217 247 Q4
No ESF data
No ANVUR data
Journal Paper U-Gov ID101201
Year2012
Author(s)R. Bruttomesso; S. Ghilardi; S. Ranise
TitleQuantifier-Free Interpolation of a Theory of Arrays
JournalLOGICAL METHODS IN COMPUTER SCIENCE
ISSN1860-5974
Volume8
InternationalNo
161 0.44 0.508 0.074 4.3 0.00198 0.471
COMPUTER SCIENCE, THEORY & METHODS 81 100 Q4
LOGIC 11 19 Q3
No ESF data
No ANVUR data
Journal Paper U-Gov ID101202
Year2012
Author(s)F. Alberti; S. Ghilardi; E. Pagani; S. Ranise; G. P. Rossi
TitleUniversal Guards, Relativization of Quantifiers, and Failure Models in Model Checking Modulo Theories
JournalJOURNAL ON SATISFIABILITY, BOOLEAN MODELING AND COMPUTATION
ISSN1574-0617
Volume8
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID121401
Year2012
Author(s)A. Armando; S. Ranise
TitleScalable automated symbolic analysis of administrative role-based access control policies by SMT solving
JournalJOURNAL OF COMPUTER SECURITY
ISSN0926-227X
Volume20
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID130602
Year2012
Author(s)A. Armando; G. Costa; A. Merlo; L. Verderame
TitleSecuring the "Bring Your Own Device'' Policy
JournalJOURNAL OF INTERNET SERVICES AND APPLICATIONS
ISSN1867-4828
Volume2
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID156002
Year2012
Author(s)A. Armando; E. Giunchiglia; M. Maratea; S. E. Ponta
TitleAn Action-based Approach to the Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints
JournalJOURNAL OF COMPUTER AND SYSTEM SCIENCES
ISSN0022-0000
Volume1
InternationalNo
2330 1.0 1.106 0.286 -10.0 0.00528 0.968
COMPUTER SCIENCE, THEORY & METHODS 34 100 Q2
COMPUTER SCIENCE, HARDWARE & ARCHITECTURE 24 50 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID251426
Year2012
Author(s)T.K Dang; A.T. Truong
TitleAnonymizing but Deteriorating Location Databases
JournalPOLIBITS
ISSN1870-9044
Volume46
InternationalYes
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID22250
Year2011
Author(s)R. Carbone
TitleLTL Model-Checking for Security Protocols
JournalAI COMMUNICATIONS
ISSN0921-7126
Volume24
InternationalNo
237 0.5 0.583 0.357 -10.0 0.00078 0.368
COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE 93 111 Q4
No ESF data
No ANVUR data
Journal Paper U-Gov ID50381
Year2011
Author(s)M. Barletta; S. Ranise; L. Vigano
TitleA Declarative Two-level Framework to Specify and Verify Workflow and Authorization Policies in Service Oriented Architectures
JournalSERVICE ORIENTED COMPUTING AND APPLICATIONS
ISSN1863-2386
Volume5
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID50382
Year2011
Author(s)C. Lynch; S. Ranise; C. Ringeissen; D.-K. Tran
TitleAutomatic Decidability and Combinability
JournalINFORMATION AND COMPUTATION
ISSN0890-5401
Volume209
InternationalYes
3130 0.56 0.76 0.235 -10.0 0.00352 0.562
COMPUTER SCIENCE, THEORY & METHODS 73 99 Q3
MATHEMATICS, APPLIED 164 245 Q3
No ESF data
No ANVUR data
Journal Paper U-Gov ID50390
Year2011
Author(s)M. Barletta; A. Calvi; S. Ranise; L. Vigano; L. Zanetti
TitleWorkflow and Access Control Reloaded: a Declarative Specification Framework for the Automated Analysis of Web Services
JournalSCALABLE COMPUTING. PRACTICE AND EXPERIENCE
ISSN1895-1767
Volume12
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID21249
Year2010
Author(s)D.-K. Tran; C. Ringeissen; S. Ranise; H. Kirchner
TitleCombination of convex theories: Modularity, deduction completeness, and explanation
JournalJOURNAL OF SYMBOLIC COMPUTATION
ISSN0747-7171
Volume45
InternationalNo
1287 0.838 0.817 0.276 -10.0 0.00485 0.691
COMPUTER SCIENCE, THEORY & METHODS 58 97 Q3
MATHEMATICS, APPLIED 103 236 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID50380
Year2010
Author(s)S. Ghilardi; S. Ranise
TitleBackward Reachability of Array-based Systems by SMT solving: Termination and Invariant Synthesis
JournalLOGICAL METHODS IN COMPUTER SCIENCE
ISSN1860-5974
Volume6
InternationalNo
190 0.864 N/D 0.082 3.3 0.00209 N/D
COMPUTER SCIENCE, THEORY & METHODS 55 97 Q3
No ESF data
No ANVUR data
Conference Paper U-Gov ID307012
Year2016
Author(s)Armando, Alessandro; Ranise, Silvio; Traverso, Riccardo; Wrona, Konrad
TitleSMT-based Enforcement and Analysis of NATO Content-based Protection and Release Policies
ConferenceCODASPYData and Application Security and Privacy
PlaceNew Orleans, Louisiana, USA
Book TitleABAC '16 Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID307025
Year2016
Author(s)Metoui, Nadia; Bezzi, Michele; Armando, Alessandro
TitleTrust and Risk-Based Access Control for Privacy Preserving Threat Detection Systems
Conference3rd International Conference on Future Data and Security Engineering (FDSE 2016)
PlaceCan Tho City, Vietnam
Book TitleFuture Data and Security Engineering - Third International Conference, {FDSE} 2016
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID307029
Year2016
Author(s)Sudhodanan, Avinash; Armando, Alessandro; Carbone, Roberto; Compagna, Luca
TitleAttack Patterns for Black-Box Security Testing of Multi-Party Web Applications
Conference23nd Annual Network and Distributed System Security Symposium, {NDSS} 2016
PlaceSan Diego, California, USA
Book TitleProceedings of 23nd Annual Network and Distributed System Security Symposium, {NDSS} 2016
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID307033
Year2016
Author(s)Ranise, Silvio; Carbone, Roberto; Armando, Alessandro; Sciarretta, Giada
TitleSecurity of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution
ConferenceThe 13th International Joint Conference on e-Business and Telecommunications (ICETE) 2016
PlaceLisbon, Portugal
Book TitleProceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID307039
Year2016
Author(s)Truong, Anh; Ranise, Silvio
TitleASASPXL: New Clother for Analysing ARBAC Policies
ConferenceFuture Data and Security Engineering - Third International Conference, {FDSE} 2016
PlaceCan Tho City, Vietnam
Book TitleProceedings of Future Data and Security Engineering - Third International Conference, {FDSE} 2016
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID307044
Year2016
Author(s)dos Santos, Daniel R.; Ponta, Serena Elisa; Ranise, Silvio
TitleModular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem
ConferenceSACMAT Symposium on Access Control Models and Technologies
PlaceShanghai, China
Book TitleProceedings of the 21st {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2016
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID307053
Year2016
Author(s)Compagna, Luca; dos Santos, Daniel Ricardo; Ponta, Serena Elisa; Ranise, Silvio
TitleCerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes
Conference22nd International Conference, TACAS 2016
PlaceEindhoven, The Netherlands
Book TitleTools and Algorithms for the Construction and Analysis of Systems
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID307090
Year2016
Author(s)Dashevskyi, Stanislav; Brucker, Achim D.; Massacci, Fabio
TitleOn the Security Cost of Using a Free and Open Source Component in a Proprietary Product
Conference8th International Symposium on Engineering Secure Software and Systems (Essos 2016)
PlaceLondon, UK
Book TitleProceedings of the 8th nternational Symposium on Engineering Secure Software and Systems
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303716
Year2015
Author(s)Armando, Alessandro; Bocci, Gianluca; Costa, Gabriele; Mammoliti, Rocco; Merlo, Alessio; Ranise, Silvio; Traverso, Riccarto; Valenza, Andrea
TitleMobile App Security Assessment with the MAVeriC Dynamic Analysis Module
Conference22nd ACM Conference on Computer and Communications Security
PlaceDenver, Colorado, US
Book TitleProceeding MIST '15 Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303719
Year2015
Author(s)Armando, Alessandro; Carbone, Roberto; Costa, Gabriele; Merlo, Alessio
TitleAndroid Permissions Unleashed
Conference28th IEEE Computer Security Foundations Symposium
PlaceVerona
Book TitleComputer Security Foundations Symposium (CSF), 2015 IEEE 28th
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303722
Year2015
Author(s)Armando, Alessandro; Merlo, Alessio; Verderame, Luca
TitleTrusted host-based card emulation
ConferenceThe 2015 International Conference on High Performance Computing & Simulation (HPCS 2015)
PlaceAmsterdam, the Netherlands
Book TitleHigh Performance Computing & Simulation (HPCS), 2015 International Conference on
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303725
Year2015
Author(s)Armando, Alessandro; Bezzi, Michele; Di Cerbo, Francesco; Metoui, Nadia
TitleBalancing Trust and Risk in Access Control
Conference2015 OTM Conference
PlaceRhodes, Greece
Book TitleOn the Move to Meaningful Internet Systems: OTM 2015 Conferences
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303728
Year2015
Author(s)Armando, Alessandro; Ranise, Silvio; Traverso, Riccardo; Wrona, Konrad
TitleA SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies
ConferenceACM Symposium on Access Control Models and Technologies (SACMAT)
PlaceVienna, Austria
Book TitleProceeding SACMAT '15 Proceedings of the 20th ACM Symposium on Access Control Models and Technologies
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303731
Year2015
Author(s)Armando, Alessandro; Bocci, Gianluca; Chiarelli, Giantonio; Costa, Gabriele; De Maglie, Gabriele; Mammoliti, Rocco; Merlo, Alessio
TitleSAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform
Conference21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS)
PlaceLondon, UK
Book TitleTools and Algorithms for the Construction and Analysis of Systems
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303734
Year2015
Author(s)Carbone, Roberto; Compagna, Luca; Panichella, Annibale; Ponta, Serena Elisa
TitleSecurity Threat Identification and Testing
Conference8th {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2015
PlaceGraz, Austria
Book TitleSoftware Testing, Verification and Validation (ICST), 2015 IEEE 8th International Conference on
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303737
Year2015
Author(s)Bertolissi, Clara; dos Santos, Daniel Ricardo; Ranise, Silvio
TitleAutomated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes
Conference10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
PlaceSingapore
Book TitleProceeding ASIA CCS '15 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303740
Year2015
Author(s)Armando, Alessandro; Ranise, Silvio; Traverso, Riccardo; Wrona, Konrad
TitleCompiling NATO authorization policies for enforcement in the cloud and SDNs
ConferenceIEEE Conference on Communications and Network Security (CNS) 2015
PlaceFlorence, Italy
Book TitleCommunications and Network Security (CNS), 2015 IEEE Conference on
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303743
Year2015
Author(s)dos Santos, Daniel R.; Ranise, Silvio; Compagna, Luca; Ponta, Serena E.
TitleAssisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios
Conference29th Annual IFIP WG 11.3 Working Conference, DBSec 2015
PlaceFairfax, VA, USA
Book TitleData and Applications Security and Privacy XXIX
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303746
Year2015
Author(s)Turkmen, Fatih; den Hartog, Jerry; Ranise, Silvio; Zannone, Nicola
TitleAnalysis of XACML Policies with SMT
Conference4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015
PlaceLondon, UK
Book TitlePrinciples of Security and Trust
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303755
Year2015
Author(s)Ranise, Silvio; Truong, Anh; Viganò, Luca
TitleAutomated analysis of RBAC policies with temporal constraints and static role hierarchies
Conference30th Annual {ACM} Symposium on Applied Computing 2015
PlaceSalamanca, Spain
Book TitleProceedings of the 30th Annual {ACM} Symposium on Applied Computing
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303758
Year2015
Author(s)Ranise, Silvio; Bertolissi, Clara; Uttha, Worachet
TitleModeling Authorization Policies for Web Services in Presence of Transitive Dependencies
Conference12th International Conference on Security and Cryptography (SECRYPT 2015)
PlaceColmar, France
Book TitleSECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303761
Year2015
Author(s)De Masellis, Riccardo; Ghidini, Chiara; Ranise, Silvio
TitleA Declarative Framework for Specifying and Enforcing Purpose-Aware Policies
Conference1th International Workshop on Security and Trust Management (STM)
PlaceVienna, Austria
Book TitleSecurity and Trust Management, 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID211216
Year2014
Author(s)Armando A.; Carbone R.; Compagna L.
TitleSATMC: a SAT-based Model Checker for Security-critical Systems
Conference20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS)
PlaceGrenoble, France
Book TitleTools and Algorithms for the Construction and Analysis of Systems- 20th International Conference, {TACAS} 2014
InternationalNo
Conf. RankA
Conference Paper U-Gov ID226015
Year2014
Author(s)Ranise S.; Truong A.
TitleIncremental analysis of evolving administrative role based access control policies
Conference28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSeC14)
PlaceVienna, Austria
Book TitleData and Applications Security and Privacy XXVIII
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID226016
Year2014
Author(s)Ranise S.; Truong A.; Armando A.
TitleScalable and Precise Automated Analysis of Administrative Temporal Role-Based Access Control
ConferenceACM Symposium on Access Control Models and Technologies (SACMAT14)
PlaceLondon, Ontario, Canada
Book TitleProceedings of the 19th ACM symposium on Access control models and technologies
InternationalNo
Conf. RankC
Conference Paper U-Gov ID226218
Year2014
Author(s)Armando A.; Carbone R.; Chekole E. G.; Ranise S.
TitleAttribute Based Access Control for APIs in Spring Security
ConferenceACM Symposium on Access Control Models and Technologies (SACMAT14)
PlaceLondon, Ontario, Canada
Book TitleSACMAT '14 Proceedings of the 19th ACM symposium on Access control models and technologies
InternationalNo
Conf. RankC
Conference Paper U-Gov ID226615
Year2014
Author(s)Armando A.; Oudkerk S.; Ranise S.; Wrona K.
TitleFormal Modelling of Content-Based Protection and Release for Access Control in NATO Operations
ConferenceFoundations and Practice of Security - 6th International Symposium, FPS 2013
PlaceLa Rochelle, France
Book TitleFoundations and Practice of Security
InternationalYes
Conf. RankN/D
Conference Paper U-Gov ID249619
Year2014
Author(s)Mojtaba Eskandari; Anderson Santana de Oliveira; Bruno Crispo
TitleVLOC: An Approach To Verify The Physical Location Of A Virtual Machine In Cloud
ConferenceCloudCom 2014
PlaceSingapore
Book TitleIEEE CloudCom 2014
InternationalYes
Conf. RankN/D
Conference Paper U-Gov ID250444
Year2014
Author(s)Daniel Ricardo dos Santos;Carla Merkle Westphall;Carlos Becker Westphall
TitleA dynamic risk-based access control architecture for cloud computing
ConferenceN/D
PlaceN/D
Book Title2014 IEEE Network Operations and Management Symposium (NOMS)
InternationalYes
Conf. RankN/D
Conference Paper U-Gov ID250445
Year2014
Author(s)Paulo F. Silva; Carlos B. Westphall; Carla M. Westphall; Mauro M. Mattos; Daniel Ricardo dos Santos
TitleAn Architecture for Risk Analysis in Cloud
ConferenceN/D
PlaceN/D
Book TitleProceedings of The Tenth International Conference on Networking and Services (ICNS2014)
InternationalYes
Conf. RankN/D
Conference Paper U-Gov ID250446
Year2014
Author(s)Stanislav Dashevskyi; Daniel Ricardo dos Santos; Fabio Massacci; Antonino Sabetta
TitleTESTREX: a Testbed for Repeatable Exploits
ConferenceN/D
PlaceN/D
Book Title7th Workshop on Cyber Security Experimentation and Test (CSET'14)
InternationalYes
Conf. RankN/D
Conference Paper U-Gov ID251429
Year2014
Author(s)Delzanno G.; Tatarek M.; Traverso R.
TitleModel Checking Paxos in Spin
ConferenceN/D
PlaceN/D
Book TitleProceedings Fifth International Symposium on Games, Automata, Logics and Formal Verification, GandALF 2014
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID251430
Year2014
Author(s)Delzanno G.; Rensink A.; Traverso R.
TitleGraph- versus Vector-Based Analysis of a Consensus Protocol
ConferenceN/D
PlaceN/D
Book TitleProceedings 3rd Workshop on GRAPH Inspection and Traversal Engineering, GRAPHITE 2014
InternationalYes
Conf. RankN/D
Conference Paper U-Gov ID251431
Year2014
Author(s)Ranise S.; Traverso R.
TitleALPS: An Action Language for Policy Specification and Automated Safety Analysis
ConferenceN/D
PlaceN/D
Book TitleSecurity and Trust Management - 10th International Workshop, STM 2014
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID251631
Year2014
Author(s)Armando A.; Carbone R.; Chekole E. G.; Petrazzuolo C.; Ranalli A.; Ranise S.
TitleSelective Release of Smart Metering Data in Multi-domain Smart Grids
ConferenceSecond International Workshop, SmartGridSec 2014
PlaceMunich, Germany
Book TitleSmart Grid Security
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID253637
Year2014
Author(s)Annibale Panichella;Rocco Oliveto;Andrea De Lucia
TitleCross-project defect prediction models: L'Union fait la force2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE)
ConferenceN/D
PlaceN/D
Book Title2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID101602
Year2013
Author(s)S. Ranise; A. Truong; A. Armando
TitleBoosting Model Checking to Analyse Large ARBAC Policies
ConferenceSecurity and Trust Management-STM'2012
PlacePisa, Italy
Book TitleSTM 2012
InternationalNo
Conf. RankC
Conference Paper U-Gov ID151202
Year2013
Author(s)A. Armando; R. Carbone; L. Zanetti
TitleFormal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols
Conference7th International Conference on Network and System Security (NSS 2013)
PlaceMadrid, Spain
Book TitleN/D
InternationalNo
Conf. RankB
Conference Paper U-Gov ID180613
Year2013
Author(s)Armando A.; Grasso M.; Oudkerk S.; Ranise S.; Wrona K.
TitleContent- based information protection and release in NATO operations
ConferenceN/D
PlaceN/D
Book TitleSymposium on Access Control Models and Technologies (SACMAT)
InternationalYes
Conf. RankC
Conference Paper U-Gov ID180614
Year2013
Author(s)Bertolissi C.; Ranise S.
TitleVerification of Composed Array-based Systems with Applications to Security-Aware Workflows
ConferenceN/D
PlaceN/D
Book TitleSymposium on Frontiers of Combining Systems (FroCoS)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID180615
Year2013
Author(s)Armando A.; Costa G.; Merlo A.; Verderame L.
TitleBring Your Own Device, Securely
Conference28th ACM Symposium on Applied Computing, Computer Security track (SEC@SAC 2013)
PlaceCoimbra, Portugal
Book TitleProceedings of the 28th ACM Symposium on Applied Computing
InternationalNo
Conf. RankB
Conference Paper U-Gov ID180618
Year2013
Author(s)Armando A.; Merlo A.; Verderame L.
TitleAn Empirical Evaluation of the Android Security Framework
Conference28th IFIP International Information Security and Privacy Conference (SEC 2013)
PlaceAuckland, New Zeland
Book TitleProceedings of the 28th IFIP International Information Security and Privacy Conference (SEC 2013)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID212815
Year2013
Author(s)Armando A.; Castiglione A.; Costa G.; Fiore U.; Merlo A.; Verderame L.; You I.
TitleTrustworthy Opportunistic Access to the Internet of Services
ConferenceICT-EurAsia'13
PlaceYogyakarta, Indonesia
Book TitleICT-EurAsia'13: Proceedings of the 2013 international conference on Information and Communication Technology
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID214415
Year2013
Author(s)dos Santos D. R.; Westphall C. M.; Westphall C. B.
TitleRisk-based Dynamic Access Control for a Highly Scalable Cloud Federation
ConferenceSECURWARE 2013
PlaceBarcelona, Spain
Book TitleSECURWARE 2013. The Seventh International Conference on Emerging Security Information, Systems.
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID214416
Year2013
Author(s)de Souza R. F.; Westphall C. B.; dos Santos D. R.; Westphall C. M.
TitleChallenges of Operationalizing PACS on Cloud Over Wireless Networks
ConferenceICWMC 2013
PlaceNice, France
Book TitleICWMC 2013. The Ninth International Conference on Wireless and Mobile Communications
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID214417
Year2013
Author(s)Brinhosa R. B.; Westphall C. M.; Westphall C. B.; dos Santos D. R.; Grezele F.
TitleA Validation Model of Data Input for Web Services
ConferenceICN 2013
PlaceSeville, Spain
Book TitleICN 2013. The Twelfth International Conference on Networks
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID222616
Year2013
Author(s)C. Bertolissi; S. Ranise
TitleA Methodology to build run-time Monitors for Security-Aware Workflows
ConferenceThe 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)
Place09/12/2013-12/12/2013
Book TitleProceedings of the 8th International Conference for Internet Technology and Secured Transactions
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID270626
Year2013
Author(s)Armando A.; Costa G.; Merlo A.
TitleFormal Modeling and Reasoning about the Android Security Framework
Conference7th International Symposium, TGC 2012
PlaceNewcastle upon Tyne, UK
Book TitleTrustworthy Global Computing
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID81001
Year2012
Author(s)A. Armando; G. Pellegrino; R. Carbone; A. Merlo; D. Balzarotti
TitleFrom Model-checking to Automated Testing of Security Protocols: Bridging the Gap
Conference6th International Conference, TAP 2012
PlacePrague, Czech Republic
Book TitleTESTS AND PROOFS
InternationalNo
Conf. RankB
Conference Paper U-Gov ID101203
Year2012
Author(s)R. Bruttomesso; A. Carioni; S. Ghilardi; S. Ranise
TitleAutomated Analysis of Parametric Timing-Based Mutual Exclusion Algorithms
ConferenceNASA Formal Methods - 4th International Symposium, NFM 2012
PlaceNorfolk, VA, USA
Book TitleN/D
InternationalNo
Conf. RankC
Conference Paper U-Gov ID101204
Year2012
Author(s)F. Alberti; R. Bruttomesso; S. Ghilardi; S. Ranise; N. Sharygina
TitleLazy Abstraction with Interpolants for Arrays
ConferenceLogic for Programming, Artificial Intelligence, and Reasoning - 18th International Conference, LPAR-18
PlaceMerida, Venezuela
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID101205
Year2012
Author(s)R. Bruttomesso; S. Ghilardi; S. Ranise
TitleFrom Strong Amalgamability to Modularity of Quantifier-Free Interpolation
ConferenceAutomated Reasoning - 6th International Joint Conference, IJCAR 2012
PlaceManchester, UK
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID101206
Year2012
Author(s)A. Armando; S. Ranise
TitleAutomated and Efficient Analysis of Role-Based Access Control with Attributes
ConferenceData and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012
PlaceParis, France
Book TitleN/D
InternationalNo
Conf. RankB
Conference Paper U-Gov ID101401
Year2012
Author(s)A. Armando; S. Ranise; F. Turkmen; B. Crispo
TitleEfficient run-time solving of RBAC user authorization queries: pushing the envelope
ConferenceSecond ACM Conference on Data and Application Security and Privacy, CODASPY 2012
PlaceSan Antonio, TX, USA
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID101402
Year2012
Author(s)F. Alberti; R. Bruttomesso; S. Ghilardi; S. Ranise; N. Sharygina
TitleSAFARI: SMT-Based Abstraction for Arrays with Interpolants
ConferenceComputer Aided Verification - 24th International Conference, CAV 2012
PlaceBerkeley, CA, USA
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID101403
Year2012
Author(s)S. Ranise; A. Armando
TitleOn the Automated Analysis of Safety in Usage Control: A New Decidability Result
Conference6th International Conference on Network and System Security, NSS'2012
PlaceWu Yi Shan, Fujian, China
Book TitleN/D
InternationalNo
Conf. RankB
Conference Paper U-Gov ID101601
Year2012
Author(s)M. Barletta; S. Ranise; L. Vigano
TitleAutomated Analysis of Scenario-based Specifications of Distributed Access Control Policies with Non-Mechanizable Activities
ConferenceSecurity and Trust Management-STM'2012
PlacePisa, Italy
Book TitleN/D
InternationalNo
Conf. RankC
Conference Paper U-Gov ID104417
Year2012
Author(s)A. Armando; W. Arsac; T. Avanesov; M. Barletta; A. Calvi; A. Cappai; R. Carbone; Y. Chevalier; L. Compagna; J. Cuéllar; G. Erzse; S. Frau; M. Minea; S. Mödersheim; D. von Oheimb; G. Pellegrino; S. E. Ponta; M. Rocchetto; M. Rusinowitch; M. Torabi Dashti; M. Turuani; L. Viganò
TitleThe AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures
ConferenceTACAS 2012
PlaceTalling, Estonia
Book TitleTOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS
InternationalNo
Conf. RankA
Conference Paper U-Gov ID151002
Year2012
Author(s)A. Armando; G. Costa; A. Merlo
TitleFormal Modeling and Verification of the Android Security Framework
Conference7th International Symposium on Trustworthy Global Computing (TGC 2012)
PlaceNewcastle upon Tyne, UK
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID151003
Year2012
Author(s)A. Armando; A. Contento; D. Costa; M. Maratea
TitleMinimum Disclosure as Boolean Optimization: New Results
Conference19th RCRA International Workshop on "Experimental Evaluation of Algorithms for Solving Problems with Combinatorial Explosion" (RCRA 2012)
PlaceRome, Italy
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID151004
Year2012
Author(s)A. Armando; A. Merlo; M. Migliardi; L. Verderame
TitleWould You Mind Forking This Process? A Denial of Service attack on Android (and Some Countermeasures)
Conference27th IFIP International Information Security and Privacy Conference (SEC 2012)
PlaceHeraklion, Crete, Greece
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID151201
Year2012
Author(s)A. Armando; R. Carbone; A. Merlo
TitleFormal Analysis of a Privacy-Preserving Billing Protocol
Conference1st EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec 2012)
PlaceBerlin, Germnay
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID21617
Year2011
Author(s)Alberti F.; Armando A.; Ranise S.
TitleEfficient Symbolic Automated Analysis of Administrative Attribute-based RBAC-Policies
Conference6th ACM Symposium on Information, Computer and Communications Security (ASIACCS'10)
PlaceHong Kong
Book TitleProceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
InternationalNo
Conf. RankB
Conference Paper U-Gov ID21635
Year2011
Author(s)Armando A.; Ranise S.
TitleAutomated Symbolic Analysis of ARBAC Policies
Conference6th International Workshop on Security and Trust Management (STM'10)
PlaceAthens, Greece
Book TitleProceedings of 6th International Workshop on Security and Trust Management (STM)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID38003
Year2011
Author(s)A. Armando; R. Carbone; L. Compagna; J. Cuellar; G. Pellegrino; A. Sorniotti
TitleFrom Multiple Credentials to Browser-based Single Sign-On: Are We More Secure?
Conference26th IFIP TC-11 International Information Security Conference (SEC 2011)
PlaceLuzern, Switzerland
Book TitleN/D
InternationalNo
Conf. RankB
Conference Paper U-Gov ID50383
Year2011
Author(s)R. Bruttomesso; S. Ghilardi; S. Ranise
TitleRewriting-based Quantifier-free Interpolation for a Theory of Arrays
Conference22nd Int. Conf. on Rewriting Techniques and Applications (RTA '11)
PlaceNovi Sad, Serbia
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID50384
Year2011
Author(s)F. Alberti; A. Armando; S. Ranise
TitleASASP: Automated Symbolic Analysis of Security Policies
Conference23rd Conference on Automated Deduction (CADE)
PlaceWroclow, Poland
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID50385
Year2011
Author(s)A. Armando; S. Ranise
TitleAutomated Analysis of Infinite State Workflows with Access Control Policies
Conference7th Int. Workshop on Security and Trust Management
PlaceCopenhagen, Denmark
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID50386
Year2011
Author(s)A. Carioni; S. Ghilardi; S. Ranise
TitleAutomated Termination in Model Checking Modulo Theories
Conference5th Int. Workshop on Reachability Problems (RP 11)
PlaceGenova, Italy
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID50387
Year2011
Author(s)R. Bruttomesso; S. Ghilardi; S. Ranise
TitleA Combination of Rewriting and Constraint Solving for the Quantifier-free Interpolation of Arrays with Integer Difference Constraints
Conference8th Int. Symp. on Frontiers of Combining Systems (FroCoS'11)
PlaceSaarbruecken, Germany
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID50388
Year2011
Author(s)A. Armando; R. Carbone; S. Ranise
TitleAutomated Analysis of Semantic-Aware Access Control Policies: a Logic-based Approach
ConferenceIEEE Int. Workshop on Semantics, Security, and Privacy (TCSEM + TCSP)
PlaceStanford Univ., Palo Alto, CA, USA
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID50394
Year2011
Author(s)G. Gheorghe; B. Crispo; R. Carbone; L. Desmet; W. Joosen
TitleDeploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement
ConferenceACM/IFIP/USENIX 12th International Middleware Conference
PlaceLisboa, Portugal
Book TitleMiddleware 2011
InternationalNo
Conf. RankA
Conference Paper U-Gov ID251424
Year2011
Author(s)A.T. Truong; T.K. Dang; J. Küng
TitleOn Guaranteeing k-Anonymity in Location Databases
Conference22nd International Conference on Database and Expert Systems Applications (DEXA ‘11)
PlaceN/D
Book TitleProceeding of the 22nd International Conference on Database and Expert Systems Applications (DEXA ‘11)
InternationalYes
Conf. RankB
Conference Paper U-Gov ID270624
Year2011
Author(s)Barrett C.; de Moura L.; Ranise S.; Stump A.; Tinelli C.
TitleThe {SMT-LIB} Initiative and the Rise of {SMT} - {(HVC} 2010 Award Talk)
ConferenceHaifa Verification Conference 2010
PlaceIsrael
Book TitleHardware and Software: Verification and Testing
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID21309
Year2010
Author(s)S. Ghilardi; S. Ranise
TitleMCMT: A Model Checker Modulo Theories
ConferenceAutomated Reasoning, 5th International Joint Conference, IJCAR 2010
PlaceEdinburgh, UK
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID21329
Year2010
Author(s)F. Alberti; S. Ghilardi; E. Pagani; S. Ranise; G. P. Rossi
TitleBrief Announcement: Automated Support for the Design and Validation of Fault Tolerant Parameterized Systems - A Case Study
ConferenceDistributed Computing, 24th International Symposium, DISC 2010
PlaceCambridge, MA, USA
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID21616
Year2010
Author(s)Merlo A.; Armando A.
TitleCooperative Access Control for the Grid
Conference6th International Conference on Information Assurance and Security (IAS 2010)
PlaceAtlanta, USA
Book TitleProceedings of the 6th International Conference on Information Assurance and Security (IAS 2010)
InternationalNo
Conf. RankC
Conference Paper U-Gov ID21632
Year2010
Author(s)Armando A.; Ponta S. E.
TitleModel Checking of Security-sensitive Business Processes
Conference6th International Workshop on Formal Aspects in Security and Trust (FAST 2009)
PlaceEindhover
Book TitleProceedings of the 6th International Workshop on Formal Aspects in Security and Trust (FAST 2009)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID22251
Year2010
Author(s)A. Armando; R. Carbone; L. Compagna; L. Keqin; G. Pellegrino
TitleModel-Checking Driven Security Testing of Web-Based Applications
ConferenceThird International Conference on Software Testing, Verification, and Validation Workshops (ICSTW)
PlaceParis France
Book TitleN/D
InternationalNo
Conf. RankC
Conference Paper U-Gov ID50391
Year2010
Author(s)M. Barletta; A. Calvi; S. Ranise; L. Vigano; L. Zanetti
TitleWSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications
Conference1st Workshop on Software Service (satellite of SYNASC symposium)
PlaceTimisoara, Romania
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID50392
Year2010
Author(s)A. Calvi; S. Ranise; L. Vigano
TitleAutomated Validation of Security-sensitive Web Services specified in BPEL and RBAC
Conference1st Workshop on Software Service (satellite of SYNASC symposium)
PlaceTimisoara, Romania
Book TitleN/D
InternationalNo
Conf. RankN/D
Book Chapter U-Gov ID50393
Year2012
Author(s)A. Armando; R. Carbone; L. Compagna; G. Pellegrino
TitleAutomatic Security Analysis of SAML-based Single Sign-On Protocols
Book TitleDigital Identity and Access Management: Technologies and Frameworks
InternationalNo
Book Chapter U-Gov ID37997
Year2011
Author(s)R. Carbone; M. Minea; S. A. Mödersheim; S. E. Ponta; M. Turuani; L. Viganò
TitleTowards Formal Validation of Trust and Security in the Internet of Services
Book TitleThe Future Internet
InternationalNo
Editorship U-Gov ID307064
Year2016
Author(s)Ranise, Silvio; Swarup, Vipin
TitleData and Applications Security and Privacy {XXX}
JournalN/D
BookN/D
VolumeN/D
PublisherSpringer International Publishing
InternationalNo
Editorship U-Gov ID303765
Year2015
Author(s)Lutz, Carsten; Ranise, Silvio
TitleFrontiers of Combining Systems, 10th International Symposium, FroCoS 2015, Wroclaw, Poland, September 21-24, 2015, Proceedings
JournalN/D
BookN/D
Volume9322
PublisherSpringer International Publishing
InternationalNo
Editorship U-Gov ID21510
Year2010
Author(s)A. ARMANDO; G. LOWE
TitleAutomated Reasoning for Security Protocol Analysis and Issues in the Theory of Security
JournalN/D
BookN/D
Volume6186
PublisherSpringer
InternationalNo
Editorship U-Gov ID21582
Year2010
Author(s)Armando A.; Baumgartner P. ;Dowek G.
TitleSpecial Issue of the Journal of Automated Reasoning on Selected Papers from the 4th International Joint Conference of Automated Reasoning (IJCAR 2008)
JournalJOURNAL OF AUTOMATED REASONING
BookN/D
Volume45
PublisherSpringer
InternationalNo
Other U-Gov ID303764
Year2015
Author(s)Daniel, Ricardo dos Santos; Silvio, Ranise; Serena, Elisa Ponta
TitleModularity for Security-Sensitive Workflows
InternationalNo

           (\-.  +-------------------------------------------------+
           / _`> |         RAT - Research Assessment Tool          |
   _)     / _)=  | (C) 2011--2014 - FBK _ Fondazione Bruno Kessler |
  (      / _/    |                      v2.2                       |
   `-.__(___)_   +-------------------------------------------------+