Security Evidences (Dwr Model)[built on 2019-01-09]

Journal Paper U-Gov ID316444
Yearinpress
Author(s)Ceccato, Mariano; Tonella, Paolo; Basile, Cataldo; Falcarin, Paolo; Torchiano, Marco; Coppens, Bart; De Sutter, Bjorn
TitleUnderstanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge
JournalEMPIRICAL SOFTWARE ENGINEERING
ISSN1382-3256
VolumeN/D
InternationalNo
1596 2.933 3.494 0.422 5.6 0.0031 0.968
COMPUTER SCIENCE, SOFTWARE ENGINEERING 11 104 Q1
No ESF data
No ANVUR data
Journal Paper U-Gov ID316172
Year2018
Author(s)Ranise, Silvio; Truong, Anh; Viganò, Luca
TitleAutomated and efficient analysis of administrative temporal RBAC policies with role hierarchies
JournalJOURNAL OF COMPUTER SECURITY
ISSN0926-227X
Volume26
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID313198
Year2017
Author(s)Turkmen, Fatih; den Hartog, Jerry; Ranise, Silvio; Zannone, Nicola
TitleFormal analysis of XACML policies using SMT
JournalCOMPUTERS & SECURITY
ISSN0167-4048
Volume66
InternationalNo
2630 2.65 2.862 0.432 5.9 0.00355 0.582
COMPUTER SCIENCE, INFORMATION SYSTEMS 44 148 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID313200
Year2017
Author(s)Sciarretta, Giada; Carbone, Roberto; Ranise, Silvio; Armando, Alessandro
TitleAnatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements
JournalCOMPUTERS & SECURITY
ISSN0167-4048
Volume71
InternationalNo
2630 2.65 2.862 0.432 5.9 0.00355 0.582
COMPUTER SCIENCE, INFORMATION SYSTEMS 44 148 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID313204
Year2017
Author(s)Dos santos, Daniel ricardo; Ranise, Silvio; Compagna, Luca; Ponta, Serena elisa
TitleAutomatically finding execution scenarios to deploy security-sensitive workflows
JournalJOURNAL OF COMPUTER SECURITY
ISSN0926-227X
Volume25
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID316116
Year2017
Author(s)Tomasi, A.; Meneghetti, A.; Sala, M.
TitleCode generator matrices as RNG conditioners
JournalFINITE FIELDS AND THEIR APPLICATIONS
ISSN1071-5797
Volume47
InternationalNo
962 1.077 1.148 0.204 5.7 0.004 0.735
MATHEMATICS 57 310 Q1
MATHEMATICS, APPLIED 105 252 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID307003
Year2016
Author(s)Armando, Alessandro; Carbone, Roberto; Compagna, Luca
TitleSATMC: a SAT-based model checker for security protocols, business processes, and security APIs
JournalINTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER
ISSN1433-2779
Volume18
InternationalNo
646 1.612 N/D 0.514 7.7 0.00108 N/D
COMPUTER SCIENCE, SOFTWARE ENGINEERING 43 106 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID307037
Year2016
Author(s)Ranise, Silvio; Truong, Anh; Traverso, Riccardo
TitleParameterized model checking for security policy analysis
JournalINTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER
ISSN1433-2779
Volume18
InternationalNo
646 1.612 N/D 0.514 7.7 0.00108 N/D
COMPUTER SCIENCE, SOFTWARE ENGINEERING 43 106 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID300451
Year2015
Author(s)Sabatucci, Luca; Ceccato, Mariano; Marchetto, Alessandro; Susi, Angelo
TitleAhab’s legs in scenario-based requirements validation: An experiment to study communication mistakes
JournalTHE JOURNAL OF SYSTEMS AND SOFTWARE
ISSN0164-1212
Volume109
InternationalNo
3243 1.424 1.767 0.221 5.6 0.0084 0.57
COMPUTER SCIENCE, SOFTWARE ENGINEERING 24 106 Q1
COMPUTER SCIENCE, THEORY & METHODS 31 105 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID300911
Year2015
Author(s)Ceccato, Mariano; Capiluppi, Andrea; Falcarin, Paolo; Boldyreff, Cornelia
TitleA large study on the effect of code obfuscation on the quality of java code
JournalEMPIRICAL SOFTWARE ENGINEERING
ISSN1382-3256
Volume20
InternationalNo
828 1.393 2.08 0.135 6.5 0.00245 0.995
COMPUTER SCIENCE, SOFTWARE ENGINEERING 27 106 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID301861
Year2015
Author(s)Ceccato, Mariano; Marchetto, Alessandro; Mariani, Leonardo; Nguyen, Cu Duy; Tonella, Paolo
TitleDo Automatically Generated Test Cases Make Debugging Easier? An Experimental Assessment of Debugging Effectiveness and Efficiency
JournalACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY
ISSN1049-331X
Volume25
InternationalNo
700 1.513 1.669 0.095 8.2 0.00184 0.956
COMPUTER SCIENCE, SOFTWARE ENGINEERING 21 106 Q1
No ESF data
No ANVUR data
Journal Paper U-Gov ID227619
Year2014
Author(s)Mariano Ceccato;Massimiliano Di Penta;Paolo Falcarin;Filippo Ricca;Marco Torchiano;Paolo Tonella
TitleA family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques
JournalEMPIRICAL SOFTWARE ENGINEERING
ISSN1382-3256
Volume19
InternationalYes
711 2.161 2.585 0.14 6.1 0.00275 1.332
COMPUTER SCIENCE, SOFTWARE ENGINEERING 9 104 Q1
No ESF data
No ANVUR data
Journal Paper U-Gov ID231419
Year2014
Author(s)Mariano Ceccato;Zheng Li;James R. Cordy
TitleGuest editorial for the special issue on source code analysis and manipulation, SCAM 2012
JournalJOURNAL OF SOFTWARE MAINTENANCE AND EVOLUTION: RESEARCH AND PRACTICE
ISSN2047-7473
Volume26
InternationalYes
82 0.624 0.679 0.105 N/D 0.00048 0.28
COMPUTER SCIENCE, SOFTWARE ENGINEERING 80 104 Q4
No ESF data
No ANVUR data
Journal Paper U-Gov ID264419
Year2014
Author(s)Bruttomesso R.; Ghilardi S.; Ranise S.
TitleQuantifier-free interpolation in combinations of equality interpolating theories
JournalACM TRANSACTIONS ON COMPUTATIONAL LOGIC
ISSN1529-3785
Volume15
InternationalNo
312 0.618 0.927 0.029 7.1 0.00177 0.737
COMPUTER SCIENCE, THEORY & METHODS 74 102 Q3
LOGIC 6 21 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID269019
Year2014
Author(s)Alberti F.; Bruttomesso R.; Ghilardi S.; Ranise S.; Sharygina N.
TitleAn extension of lazy abstraction with interpolation for programs with arrays
JournalFORMAL METHODS IN SYSTEM DESIGN
ISSN0925-9856
Volume45
InternationalYes
357 0.875 1.218 0.043 8.4 0.0016 0.846
COMPUTER SCIENCE, THEORY & METHODS 55 102 Q3
No ESF data
No ANVUR data
Journal Paper U-Gov ID104419
Year2013
Author(s)A. Armando; R. Carbone; L. Compagna; J. Cuellar; G. Pellegrino; A. Sorniotti
TitleAn Authentication Flaw in Browser-based Single Sign-On Protocols: Impact and Remediations
JournalCOMPUTERS & SECURITY
ISSN0167-4048
Volume33
InternationalYes
991 1.172 1.488 0.138 6.8 0.00211 0.448
COMPUTER SCIENCE, INFORMATION SYSTEMS 59 135 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID180610
Year2013
Author(s)Ranise S.
TitleSymbolic Backward Reachability with Effectively Propositional Logic-Applications to Security Policy Analysis
JournalFORMAL METHODS IN SYSTEM DESIGN
ISSN1572-8102
Volume42
InternationalNo
273 0.404 0.942 0.1 9.0 0.00102 0.591
COMPUTER SCIENCE, THEORY & METHODS 88 102 Q4
No ESF data
No ANVUR data
Journal Paper U-Gov ID180611
Year2013
Author(s)Carioni A.; Ghilardi S.; Ranise S.
TitleAutomated Termination in Model-Checking Modulo Theories
JournalINTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE
ISSN0129-0541
Volume24
InternationalNo
375 0.326 0.4 0.0 6.5 0.00211 0.298
COMPUTER SCIENCE, THEORY & METHODS 97 102 Q4
No ESF data
No ANVUR data
Journal Paper U-Gov ID188810
Year2013
Author(s)Avancini A.; Ceccato M.
TitleComparison and integration of genetic algorithms and dynamic symbolic execution for security testing of cross-site scripting vulnerabilities
JournalINFORMATION AND SOFTWARE TECHNOLOGY
ISSN0950-5849
Volume55
InternationalNo
1493 1.328 1.583 0.157 5.9 0.0046 0.582
COMPUTER SCIENCE, SOFTWARE ENGINEERING 31 105 Q2
COMPUTER SCIENCE, INFORMATION SYSTEMS 51 135 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID250672
Year2013
Author(s)Silvia Ingolfo;Alberto Siena;John Mylopoulos;Angelo Susi;Anna Perini
TitleArguing regulatory compliance of software requirements
JournalDATA & KNOWLEDGE ENGINEERING
ISSN0169-023X
Volume87
InternationalNo
1226 1.489 1.609 0.206 6.5 0.00353 0.649
COMPUTER SCIENCE, INFORMATION SYSTEMS 44 135 Q2
COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE 48 121 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID50389
Year2012
Author(s)S. Ranise
TitleOn the Verification of Security-Aware E-services
JournalJOURNAL OF SYMBOLIC COMPUTATION
ISSN0747-7171
Volume47
InternationalNo
1178 0.391 0.611 0.154 -10.0 0.0038 0.586
COMPUTER SCIENCE, THEORY & METHODS 86 100 Q4
MATHEMATICS, APPLIED 217 247 Q4
No ESF data
No ANVUR data
Journal Paper U-Gov ID101201
Year2012
Author(s)R. Bruttomesso; S. Ghilardi; S. Ranise
TitleQuantifier-Free Interpolation of a Theory of Arrays
JournalLOGICAL METHODS IN COMPUTER SCIENCE
ISSN1860-5974
Volume8
InternationalNo
161 0.44 0.508 0.074 4.3 0.00198 0.471
COMPUTER SCIENCE, THEORY & METHODS 81 100 Q4
LOGIC 11 19 Q3
No ESF data
No ANVUR data
Journal Paper U-Gov ID101202
Year2012
Author(s)F. Alberti; S. Ghilardi; E. Pagani; S. Ranise; G. P. Rossi
TitleUniversal Guards, Relativization of Quantifiers, and Failure Models in Model Checking Modulo Theories
JournalJOURNAL ON SATISFIABILITY, BOOLEAN MODELING AND COMPUTATION
ISSN1574-0617
Volume8
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID121401
Year2012
Author(s)A. Armando; S. Ranise
TitleScalable automated symbolic analysis of administrative role-based access control policies by SMT solving
JournalJOURNAL OF COMPUTER SECURITY
ISSN0926-227X
Volume20
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID22250
Year2011
Author(s)R. Carbone
TitleLTL Model-Checking for Security Protocols
JournalAI COMMUNICATIONS
ISSN0921-7126
Volume24
InternationalNo
237 0.5 0.583 0.357 -10.0 0.00078 0.368
COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE 93 111 Q4
No ESF data
No ANVUR data
Journal Paper U-Gov ID25369
Year2011
Author(s)M. Ceccato; P. Tonella
TitleCodebender: Remote software protection using orthogonal replacement
JournalIEEE SOFTWARE
ISSN0740-7459
Volume28
InternationalNo
1471 1.508 1.443 0.245 8.8 0.00327 0.561
COMPUTER SCIENCE, SOFTWARE ENGINEERING 18 103 Q1
No ESF data
No ANVUR data
Journal Paper U-Gov ID50381
Year2011
Author(s)M. Barletta; S. Ranise; L. Vigano
TitleA Declarative Two-level Framework to Specify and Verify Workflow and Authorization Policies in Service Oriented Architectures
JournalSERVICE ORIENTED COMPUTING AND APPLICATIONS
ISSN1863-2386
Volume5
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID50382
Year2011
Author(s)C. Lynch; S. Ranise; C. Ringeissen; D.-K. Tran
TitleAutomatic Decidability and Combinability
JournalINFORMATION AND COMPUTATION
ISSN0890-5401
Volume209
InternationalYes
3130 0.56 0.76 0.235 -10.0 0.00352 0.562
COMPUTER SCIENCE, THEORY & METHODS 73 99 Q3
MATHEMATICS, APPLIED 164 245 Q3
No ESF data
No ANVUR data
Journal Paper U-Gov ID50390
Year2011
Author(s)M. Barletta; A. Calvi; S. Ranise; L. Vigano; L. Zanetti
TitleWorkflow and Access Control Reloaded: a Declarative Specification Framework for the Automated Analysis of Web Services
JournalSCALABLE COMPUTING. PRACTICE AND EXPERIENCE
ISSN1895-1767
Volume12
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID6650
Year2010
Author(s)Filippo Ricca; Massimiliano Di Penta; Marco Torchiano; Paolo Tonella; Mariano Ceccato
TitleHow Developers' Experience and Ability Influence Web Application Comprehension Tasks Supported by UML Stereotypes: a Series of Four Experiments
JournalIEEE TRANSACTIONS ON SOFTWARE ENGINEERING
ISSN0098-5589
Volume36
InternationalNo
4382 2.216 3.468 0.224 -10.0 0.00616 1.137
COMPUTER SCIENCE, SOFTWARE ENGINEERING 9 99 Q1
ENGINEERING, ELECTRICAL & ELECTRONIC 35 247 Q1
No ESF data
No ANVUR data
Journal Paper U-Gov ID9634
Year2010
Author(s)Sepideh Ghanavati; Alberto Siena; Daniel Amyot; Anna Perini; Liam Peyton; Angelo Susi
TitleIntegrating business strategies with Requirement models of legal compliance.
JournalINTERNATIONAL JOURNAL OF ELECTRONIC BUSINESS
ISSN1470-6067
Volume8
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID9988
Year2010
Author(s)Mariano Ceccato; Thomas Roy Dean; Paolo Tonella; Davide Marchignoli
TitleMigrating legacy data structures based on variable overlay to Java
JournalJOURNAL OF SOFTWARE MAINTENANCE AND EVOLUTION-RESEARCH AND PRACTICE
ISSN1532-060X
Volume22
InternationalNo
223 0.606 0.869 0.167 8.8 0.00029 0.175
COMPUTER SCIENCE, SOFTWARE ENGINEERING 79 99 Q4
No ESF data
No ANVUR data
Journal Paper U-Gov ID21249
Year2010
Author(s)D.-K. Tran; C. Ringeissen; S. Ranise; H. Kirchner
TitleCombination of convex theories: Modularity, deduction completeness, and explanation
JournalJOURNAL OF SYMBOLIC COMPUTATION
ISSN0747-7171
Volume45
InternationalNo
1287 0.838 0.817 0.276 -10.0 0.00485 0.691
COMPUTER SCIENCE, THEORY & METHODS 58 97 Q3
MATHEMATICS, APPLIED 103 236 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID21929
Year2010
Author(s)Komminist Weldemariam; Adolfo Villafiorita; Alberto Siena; Angelo Susi
TitleEnhancing Law Modeling and Analysis: using BPR-Based and Goal-Oriented Frameworks
JournalINTERNATIONAL JOURNAL ON ADVANCES IN SECURITY
ISSN1942-2636
Volume3
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID50380
Year2010
Author(s)S. Ghilardi; S. Ranise
TitleBackward Reachability of Array-based Systems by SMT solving: Termination and Invariant Synthesis
JournalLOGICAL METHODS IN COMPUTER SCIENCE
ISSN1860-5974
Volume6
InternationalNo
190 0.864 N/D 0.082 3.3 0.00209 N/D
COMPUTER SCIENCE, THEORY & METHODS 55 97 Q3
No ESF data
No ANVUR data
Journal Paper U-Gov ID4374
Year2009
Author(s)Filippo Ricca; Marco Torchiano; M. Di Penta; Mariano Ceccato; Paolo Tonella
TitleUsing acceptance tests as a support for clarifying requirements: A series of experiments
JournalINFORMATION AND SOFTWARE TECHNOLOGY
ISSN0950-5849
Volume51
InternationalNo
1264 1.821 1.426 0.317 6.1 0.00308 0.362
COMPUTER SCIENCE, SOFTWARE ENGINEERING 19 93 Q1
COMPUTER SCIENCE, INFORMATION SYSTEMS 35 116 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID4548
Year2009
Author(s)Mariano Ceccato; Mila Dalla Preda; Jasvir Nagra; Christian Collberg; Paolo Tonella
TitleTrading-off security and performance in barrier slicing for remote software entrusting
JournalAUTOMATED SOFTWARE ENGINEERING
ISSN0928-8910
Volume16
InternationalNo
192 1.267 N/D 0.071 6.2 0.00057 N/D
COMPUTER SCIENCE, SOFTWARE ENGINEERING 43 93 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID4917
Year2009
Author(s)Mariano Ceccato; Thomas Roy Dean; Paolo Tonella
TitleRecovering structured data types from a legacy data model with overlays
JournalINFORMATION AND SOFTWARE TECHNOLOGY
ISSN0950-5849
Volume51
InternationalNo
1264 1.821 1.426 0.317 6.1 0.00308 0.362
COMPUTER SCIENCE, SOFTWARE ENGINEERING 19 93 Q1
COMPUTER SCIENCE, INFORMATION SYSTEMS 35 116 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID4946
Year2009
Author(s)Paolo Tonella; Mariano Ceccato; Davide Marchignoli; Cristina Matteotti; Thomas Roy Dean
TitleMIGRAZIONE DI SISTEMI SOFTWARE LEGACY
JournalMONDO DIGITALE
ISSN1720-898X
VolumeN/D
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID4949
Year2009
Author(s)Mariano Ceccato; Paolo Tonella
TitleDynamic aspect mining
JournalIET SOFTWARE
ISSN1751-8806
Volume3
InternationalNo
41 0.65 0.667 0.027 N/D 0.00024 0.194
COMPUTER SCIENCE, SOFTWARE ENGINEERING 72 93 Q4
No ESF data
No ANVUR data
Journal Paper U-Gov ID5085
Year2009
Author(s)Alberto Siena; Alessio Bonetti; Paolo Giorgini
TitleBalancing Business Perspectives in Requirements Analysis
JournalN/D
ISSNN/D
VolumeN/D
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID21389
Year2009
Author(s)A. Armando; M. P. Bonacina; S. Ranise; S. Schulz
TitleNew results on rewrite-based satisfiability procedures
JournalACM TRANSACTIONS ON COMPUTATIONAL LOGIC
ISSN1529-3785
Volume10
InternationalNo
404 1.212 N/D 0.486 4.8 0.00225 N/D
COMPUTER SCIENCE, THEORY & METHODS 39 91 Q2
No ESF data
No ANVUR data
Journal Paper U-Gov ID21409
Year2009
Author(s)D. Deharbe; S. Ranise
TitleSatisfiability solving for software verification
JournalINTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER
ISSN1433-2779
Volume11
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID21490
Year2009
Author(s)ARMANDO A.; CARBONE R.; COMPAGNA L.
TitleLTL Model Checking for Security Protocols
JournalJOURNAL OF APPLIED NON-CLASSICAL LOGICS
ISSN1166-3081
VolumeN/D
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID22073
Year2009
Author(s)D. Déharbe; S. Ranise
TitleSatisfiability solving for software verification
JournalINTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER
ISSN1433-2779
Volume11
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID6651
Year2008
Author(s)Filippo Ricca; Marco Torchiano; Massimiliano Di Penta; Mariano Ceccato; Paolo Tonella
TitleThe use of executable Fit tables to support maintenance and evolution tasks
JournalELECTRONIC COMMUNICATIONS OF THE EASST
ISSN1863-2122
Volume8
InternationalNo
No ISI data
No ESF data
No ANVUR data
Journal Paper U-Gov ID22031
Year2008
Author(s)D. Déharbe; S. Ranise; J. Vidal
Titleprototype implementation of a distributed satisfiability modulo theories solver in the ToolBus framework
JournalJOURNAL OF THE BRAZILIAN COMPUTER SOCIETY
ISSN0104-6500
Volume14
InternationalNo
No ISI data
No ESF data
No ANVUR data
Conference Paper U-Gov ID314965
Year2018
Author(s)Demissie, Biniam Fisseha; Ceccato, Mariano; Khin Shar, Lwin
TitleAnFlo: Detecting Anomalous Sensitive Information Flows in Android Apps
ConferenceACM/IEEE 5th International Conference on Mobile Software Engineering and Systems (MOBILESoft 2018)
PlaceGothenburg, Sweden
Book TitleProceedings of the 2018 ACM/IEEE 5th International Conference on Mobile Software Engineering and Systems
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID315793
Year2018
Author(s)Pizzolotto, Davide; Ceccato, Mariano
TitleObfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries
Conference2018 IEEE 18th International Working Conference on Source Code Analysis and Manipulation
PlaceMadrid, Spagna
Book TitleProceedings of 2018 IEEE 18th International Working Conference on Source Code Analysis and Manipulation
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID316065
Year2018
Author(s)Franch, Xavier; Ralyté, Jolita; Perini, Anna; Abelló, Alberto; Ameller, David; Gorroñogoitia, Jesús; Nadal, Sergi; Oriol, Marc; Seyff, Norbert; Siena, Alberto; Susi, Angelo
TitleA Situational Approach for the Definition and Tailoring of a Data-Driven Software Evolution Method
ConferenceCAiSE 2018
PlaceTallinn, Estonia
Book TitleAdvanced Information Systems Engineering. CAiSE 2018
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID316174
Year2018
Author(s)Bertolissi, Clara; dos Santos, Daniel R.; Ranise, Silvio
TitleSolving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques
Conference23nd ACM on Symposium on Access Control Models and Technologies, SACMAT 18
PlaceIndianapolis, Indiana, USA
Book TitleProceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, (SACMAT)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID316176
Year2018
Author(s)Ahmad, Tahir; Morelli, Umberto; Ranise, Silvio; Zannone, Nicola
TitleA Lazy Approach to Access Control as a Service (ACaaS) for IoT
Conference23nd ACM on Symposium on Access Control Models and Technologies (SACMAT 18)
PlaceIndianapolis, Indiana, USA
Book TitleProceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, (SACMAT)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID316182
Year2018
Author(s)Sciarretta, Giada; Carbone, Roberto; Ranise, Silvio; Viganò, Luca
TitleDesign, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience
Conference2018 7th International Conference on Principles of Security and Trust (POST)
PlaceThessaloniki, Greece
Book TitleProceedings of 2018 7th International Conference on Principles of Security and Trust (POST)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID316195
Year2018
Author(s)Ahmad, Tahir; Ranise, Silvio
TitleValidating Requirements of Access Control for Cloud-Edge IoT Solutions
ConferenceN/D
PlaceN/D
Book TitleProceedings of the 11th International Symposium on Foundations & Practice of Security (FPS 2018)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID316309
Year2018
Author(s)Ambrosin, Moreno; Conti, Mauro; Lazzeretti, Riccardo; Rabbani, Md Masoom; Ranise, Silvio
TitlePADS: Practical Attestation for Highly Dynamic Swarm Topologies
ConferenceN/D
PlaceN/D
Book TitleProceedings of the 7th International Workshop onSecure Internet of Things (ESORICS 2018 workshop: SIoT 2018)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID316311
Year2018
Author(s)Conti, Mauro; Kaliyar, Pallavi; Rabbani, Md Masoom; Ranise, Silvio
TitleSPLIT: A Secure and Scalable RPL routing protocol for Internet of Things
ConferenceN/D
PlaceN/D
Book TitleProceedings of the 14th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (IEEE WiMob'18)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID309493
Year2017
Author(s)Tiella, Roberto; Ceccato, Mariano
TitleAutomatic generation of opaque constants based on the k-clique problem for resilient data obfuscation
Conference2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER),
PlaceAustria
Book Title2017 IEEE 24th International Conference on Software Analysis, Evolution and Reengineering (SANER),
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID310079
Year2017
Author(s)Ceccato, M.; Tonella, P.; Basile, C.; Coppens, B.; De Sutter, B.; Falcarin, P.; Torchiano, M.
TitleHow professional hackers understand protected code while performing attack tasks
Conference25th International Conference on Program Comprehension
PlaceBuenos Aires, Argentina
Book TitleProceedings of the 25th International Conference on Program Comprehension
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID312944
Year2017
Author(s)Fitsum Meshesha Kifetew, ; Denisse, Muñante; Jesús, Gorroñogoitia; Alberto, Siena; Angelo, Susi; Anna, Perini
TitleGrammar Based Genetic Programming for Software Configuration Problem
ConferenceSearch Based Software Engineering - 9th International Symposium, SSBSE2017
PlacePaderborn, Germany
Book TitleSearch Based Software Engineering - 9th International Symposium, SSBSE2017, Paderborn, Germany, September 9-11, 2017, Proceedings
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID312946
Year2017
Author(s)Fitsum Meshesha Kifetew, ; Denisse, Munante; Anna, Perini; Angelo, Susi; Alberto, Siena; Paolo, Busetta
TitleDMGame: A Gamified Collaborative Requirements Prioritisation Tool
Conference25th IEEE International Requirements Engineering Conference, RE2017
PlaceLisbon, Portugal,
Book Title25th IEEE International Requirements Engineering Conference, RE2017, Lisbon, Portugal, September 4-8, 2017
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID312948
Year2017
Author(s)Itzel, Morales-Ramirez; Denisse, Munante; Fitsum Meshesha Kifetew, ; Anna, Perini; Angelo, Susi; Alberto, Siena
TitleExploiting User Feedback in Tool-Supported Multi-criteria Requirements Prioritization
Conference25th IEEE International Requirements Engineering Conference, RE2017
PlaceLisbon, Portugal
Book Title25th IEEE International Requirements Engineering Conference, RE2017, Lisbon, Portugal, September 4-8, 2017
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID312950
Year2017
Author(s)Fitsum Meshesha Kifetew, ; Denisse, Munante; Anna, Perini; Angelo, Susi; Alberto, Siena; Paolo, Busetta; Danilo, Valerio
TitleGamifying Collaborative Prioritization: Does Pointsification Work?
Conference25th IEEE International Requirements Engineering Conference, RE2017
PlaceLisbon, Portugal
Book Title25th IEEE International Requirements Engineering Conference, RE2017, Lisbon, Portugal, September 4-8, 2017
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID312952
Year2017
Author(s)Paolo, Busetta; Fitsum Meshesha Kifetew, ; Denisse, Munante; Anna, Perini; Alberto, Siena; Angelo, Susi
TitleTool-Supported Collaborative Requirements Prioritisation
Conference41st IEEE Annual Computer Software and Applications Conference,COMPSAC 2017
PlaceTurin, Italy
Book Title41st IEEE Annual Computer Software and Applications Conference,COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 1
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID312978
Year2017
Author(s)Dabrowski, Jacek; Kifetew, Fitsum Meshesha; Denisse, Munante; Letier, Emmanuel; Siena, Alberto; Susi, Angelo
TitleDiscovering Requirements through Goal-Driven Process Mining
Conference2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)
PlaceLisbon, Portugal
Book TitleIEEE 25th International Requirements Engineering Conference Workshops, RE 2017 Workshops
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID312980
Year2017
Author(s)Denisse, Munante; Siena, Alberto; Kifetew, Fitsum Meshesha; Susi, Angelo; Stade, Melanie; Seyff, Norbert
TitleGathering Requirements for Software Configuration from the Crowd
Conference2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)
PlaceLisbon, Portugal
Book TitleProceedings of 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID312984
Year2017
Author(s)Kifetew, Fitsum Meshesha; Susi, Angelo; Denisse, Munante; Perini, Anna; Siena, Alberto; Busetta, Paolo
TitleTowards Multi-decision-maker Requirements Prioritisation via Multi-Objective Optimisation
Conference29th International Conference on Advanced Information Systems Engineering, CAiSE 2017
PlaceEssen, Germany
Book TitleProceedings of the Forum and Doctoral Consortium Papers Presentedat the 29th International Conference on Advanced Information Systems Engineering, CAiSE 2017, Essen, Germany, June 12-16, 2017
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID313202
Year2017
Author(s)Sinigaglia, Federico; Carbone, Roberto; Costa, Gabriele
TitleStrong Authentication for e-Banking: A Survey on European Regulations and Implementations
Conference14th International Joint Conference on e-Business and Telecommunications (ICETE 2017)
PlaceMadrid, Spain
Book TitleProceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID313208
Year2017
Author(s)Costa, Gabriele; Sinigaglia, Federico; Carbone, Roberto
TitlePolEnA: Enforcing Fine-grained Permission Policies in Android
ConferenceSAFECOMP 2017: Computer Safety, Reliability, and Security
PlaceTrento, Italy
Book TitleComputer Safety, Reliability, and Security. SAFECOMP 2017
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID313213
Year2017
Author(s)Compagna, Luca; dos Santos, Daniel Ricardo; Ponta, Serena Elisa; Ranise, Silvio
TitleAegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications
ConferenceCODASPY '17
PlaceScottsdale, Arizona, USA
Book TitleCODASPY '17 Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID313216
Year2017
Author(s)Sudhodanan, Avinash; Carbone, Roberto; Compagna, Luca; Dolgin, Nicolas; Armando, Alessandro; Morelli, Umberto
TitleLarge-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries
Conference2017 IEEE European Symposium on Security and Privacy (EuroS&P)
PlaceParis, France
Book TitleProceedings of 2017 IEEE European Symposium on Security and Privacy (EuroS&P)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID313220
Year2017
Author(s)Guarda, Paolo; Ranise, Silvio; Siswantoro, Hari
TitleSecurity Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems
ConferenceSACMAT '17 Abstracts Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies
PlaceIndianapolis, Indiana, USA
Book TitleProceedings of the 22nd ACM on Symposium on Access Control Models and Technologies
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID313224
Year2017
Author(s)Morelli, Umberto; Ranise, Silvio
TitleAssisted Authoring, Analysis and Enforcement of Access Control Policies in the Cloud
ConferenceIFIP International Conference on ICT Systems Security and Privacy Protection (SEC '17)
PlaceRome, Italy
Book TitleICT Systems Security and Privacy Protection
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID313228
Year2017
Author(s)dos Santos, Daniel Ricardo; Ranise, Silvio
TitleOn Run-Time Enforcement of Authorization Constraints in Security-Sensitive Workflows
Conference15th International Conference, SEFM 2017
PlaceTrento, Italy
Book TitleSoftware Engineering and Formal Methods
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID313230
Year2017
Author(s)Ambrosin, Moreno; Conti, Mauro; Lazzeretti, Riccardo; Rabbani, Md Masoom; Ranise, Silvio
TitleToward secure and efficient attestation for highly dynamic swarms
ConferenceWiSec '17 - 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
PlaceBoston, Massachusetts
Book TitleProceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID313237
Year2017
Author(s)Ranise, Silvio; Siswantoro, Hari
TitleAutomated Legal Compliance Checking by Security Policy Analysis
ConferenceSAFECOMP 2017: Computer Safety, Reliability, and Security
PlaceTrento, Italy
Book TitleComputer Safety, Reliability, and Security
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID313805
Year2017
Author(s)Massari, Nicola; Gasparini, Leonardo; Meneghetti, Alessio; Tomasi, Alessandro
TitleA SPAD-Based Random Number Generator Pixel Based on the Arrival Time of Photons
Conference1st IEEE conference New Generation of Circuits and Systems 2017
PlaceGenova, Italy
Book TitleProceedings of the 1st IEEE conference New Generation of Circuits and Systems 2017
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID304573
Year2016
Author(s)Demissie, Biniam Fisseha; Ghio, Davide; Ceccato, Mariano; Avancini, Andrea
TitleIdentifying Android Inter App Communication Vulnerabilities Using Static and Dynamic Analysis
ConferenceMOBILESoft '16 - International Conference on Mobile Software Engineering and Systems
PlaceAustin, TX, USA
Book TitleProceedings of 2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID305693
Year2016
Author(s)Massari, Nicola; Gasparini, Leonardo; Tomasi, Alessandro; Meneghetti, Alessio; Xu, Hesong; Perenzoni, Daniele; Morgari, Guglielmo; Stoppa, David
Title16.3 A 16×16 pixels SPAD-based 128-Mb/s quantum random number generator with −74dB light rejection ratio and −6.7ppm/°C bias sensitivity on temperature
Conference2016 IEEE International Solid-State Circuits Conference (ISSCC)
PlaceSan Francisco, CA
Book TitleProceedings of 2016 IEEE International Solid-State Circuits Conference (ISSCC)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID305727
Year2016
Author(s)De Sutter, Bjorn; Falcarin, Paolo; Wyseur, Brecht; Basile, Cataldo; Ceccato, Mariano; Dannoville, Jerome; Zunke, Michael
TitleA Reference Architecture for Software Protection
Conference13th Working IEEE/IFIP Conference on Software Architecture
PlaceVenice, Italy
Book Title13th Working IEEE/IFIP Conference on Software Architecture
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID306101
Year2016
Author(s)Ceccato, Mariano; Nguyen, Cu D.; Appelt, Dennis; Briand, Lionel C.
TitleSOFIA: an automated security oracle for black-box testing of SQL-injection vulnerabilities
Conference31st IEEE/ACM International Conference on Automated Software Engineering
PlaceSingapore
Book TitleProceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID306117
Year2016
Author(s)Ceccato, Mariano; Scandariato, Riccardo
TitleStatic Analysis and Penetration Testing from the Perspective of Maintenance Teams
Conference10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurements
PlaceCiudad Real, Spain
Book TitleProceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurements
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID306878
Year2016
Author(s)Ceccato, Mariano; Falcarin, Paolo; Cabutto, Alessandro; Frezghi, Yosief Weldezghi; Staicu, Cristian-Alexandru
TitleSearch Based Clustering for Protecting Software with Diversified Updates
Conference8th Symposium on Search-Based Software Engineering (SSBSE 2016)
PlaceRaleigh, North Carolina, US
Book TitleProceedings of the 8th Symposium on Search-Based Software Engineering (SSBSE 2016)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID306890
Year2016
Author(s)Viticchié, Alessio; Basile, Cataldo; Avancini, Andrea; Ceccato, Mariano; Abrath, Bert; Coppens, Bart
TitleReactive attestation: Automatic detection and reaction to software tampering attacks
ConferenceACM Workshop on Software PROtection (SPRO 2016)
PlaceVienna, Austria
Book TitleProceedings of the 2016 ACM Workshop on Software PROtection (SPRO 2016)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID307012
Year2016
Author(s)Armando, Alessandro; Ranise, Silvio; Traverso, Riccardo; Wrona, Konrad
TitleSMT-based Enforcement and Analysis of NATO Content-based Protection and Release Policies
ConferenceCODASPYData and Application Security and Privacy
PlaceNew Orleans, Louisiana, USA
Book TitleABAC '16 Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID307029
Year2016
Author(s)Sudhodanan, Avinash; Armando, Alessandro; Carbone, Roberto; Compagna, Luca
TitleAttack Patterns for Black-Box Security Testing of Multi-Party Web Applications
Conference23nd Annual Network and Distributed System Security Symposium, {NDSS} 2016
PlaceSan Diego, California, USA
Book TitleProceedings of 23nd Annual Network and Distributed System Security Symposium, {NDSS} 2016
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID307033
Year2016
Author(s)Ranise, Silvio; Carbone, Roberto; Armando, Alessandro; Sciarretta, Giada
TitleSecurity of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution
ConferenceThe 13th International Joint Conference on e-Business and Telecommunications (ICETE) 2016
PlaceLisbon, Portugal
Book TitleProceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID307039
Year2016
Author(s)Truong, Anh; Ranise, Silvio
TitleASASPXL: New Clother for Analysing ARBAC Policies
ConferenceFuture Data and Security Engineering - Third International Conference, {FDSE} 2016
PlaceCan Tho City, Vietnam
Book TitleProceedings of Future Data and Security Engineering - Third International Conference, {FDSE} 2016
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID307044
Year2016
Author(s)dos Santos, Daniel R.; Ponta, Serena Elisa; Ranise, Silvio
TitleModular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem
ConferenceSACMAT Symposium on Access Control Models and Technologies
PlaceShanghai, China
Book TitleProceedings of the 21st {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2016
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID307053
Year2016
Author(s)Compagna, Luca; dos Santos, Daniel Ricardo; Ponta, Serena Elisa; Ranise, Silvio
TitleCerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes
Conference22nd International Conference, TACAS 2016
PlaceEindhoven, The Netherlands
Book TitleTools and Algorithms for the Construction and Analysis of Systems
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID307361
Year2016
Author(s)Viticchié, Alessio; Regano, Leonardo; Torchiano, Marco; Basile, Cataldo; Ceccato, Mariano; Tonella, Paolo; Tiella, Roberto
TitleAssessment of Source Code Obfuscation Techniques
Conference16th IEEE International Working Conference on Source Code Analysis and Manipulation
PlaceRaleigh, NC, Usa
Book TitleIn Proceedings of the 16th IEEE International Working Conference on Source Code Analysis and Manipulation
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID307510
Year2016
Author(s)De Sutter, Bjorn; Basile, Cataldo; Ceccato, Mariano; Falcarin, Paolo; Zunke, Michael; Wyseur, Brecht; D'Annoville, Jerome
TitleThe ASPIRE Framework for Software Protection
ConferenceWorkshop on Software PROtection (SPRO 2016)
PlaceVienna, Austria
Book TitleProceedings of the 2016 ACM Workshop on Software PROtection (SPRO 2016)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID313241
Year2016
Author(s)Sciarretta, Giada; Carbone, Roberto; Ranise, Silvio
TitleA delegated authorization solution for smart-city mobile applications
Conference2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI)
PlaceBologna, Italy
Book TitleProceedings of 2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID300566
Year2015
Author(s)Demissie, Biniam Fisseha; Ceccato, Mariano; Tiella, Roberto
TitleAssessment of Data Obfuscation with Residue Number Coding
ConferenceSoftware Protection (SPRO), 2015 IEEE/ACM 1st International Workshop on
PlaceFlorence, Italy
Book TitleSoftware Protection (SPRO), 2015 IEEE/ACM 1st International Workshop on
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID300784
Year2015
Author(s)Costal, Dolors; Lopez, Lidia; Morandini, Mirko; Siena, Alberto; Annosi, Maria Carmela; Gross, Daniel; Mendez, Lucia; Franch, Xavier; Susi, Angelo
TitleAligning Business Goals and Risks in OSS Adoption
ConferenceConceptual Modeling - 34th International Conference
PlaceStockholm, Sweden
Book TitleConceptual Modeling - 34th International Conference, ER 2015, Stockholm, Sweden, October 19-22, 2015, Proceedings
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303716
Year2015
Author(s)Armando, Alessandro; Bocci, Gianluca; Costa, Gabriele; Mammoliti, Rocco; Merlo, Alessio; Ranise, Silvio; Traverso, Riccarto; Valenza, Andrea
TitleMobile App Security Assessment with the MAVeriC Dynamic Analysis Module
Conference22nd ACM Conference on Computer and Communications Security
PlaceDenver, Colorado, US
Book TitleProceeding MIST '15 Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303719
Year2015
Author(s)Armando, Alessandro; Carbone, Roberto; Costa, Gabriele; Merlo, Alessio
TitleAndroid Permissions Unleashed
Conference28th IEEE Computer Security Foundations Symposium
PlaceVerona
Book TitleComputer Security Foundations Symposium (CSF), 2015 IEEE 28th
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303728
Year2015
Author(s)Armando, Alessandro; Ranise, Silvio; Traverso, Riccardo; Wrona, Konrad
TitleA SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies
ConferenceACM Symposium on Access Control Models and Technologies (SACMAT)
PlaceVienna, Austria
Book TitleProceeding SACMAT '15 Proceedings of the 20th ACM Symposium on Access Control Models and Technologies
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303734
Year2015
Author(s)Carbone, Roberto; Compagna, Luca; Panichella, Annibale; Ponta, Serena Elisa
TitleSecurity Threat Identification and Testing
Conference8th {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2015
PlaceGraz, Austria
Book TitleSoftware Testing, Verification and Validation (ICST), 2015 IEEE 8th International Conference on
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303737
Year2015
Author(s)Bertolissi, Clara; dos Santos, Daniel Ricardo; Ranise, Silvio
TitleAutomated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes
Conference10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
PlaceSingapore
Book TitleProceeding ASIA CCS '15 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303740
Year2015
Author(s)Armando, Alessandro; Ranise, Silvio; Traverso, Riccardo; Wrona, Konrad
TitleCompiling NATO authorization policies for enforcement in the cloud and SDNs
ConferenceIEEE Conference on Communications and Network Security (CNS) 2015
PlaceFlorence, Italy
Book TitleCommunications and Network Security (CNS), 2015 IEEE Conference on
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303743
Year2015
Author(s)dos Santos, Daniel R.; Ranise, Silvio; Compagna, Luca; Ponta, Serena E.
TitleAssisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios
Conference29th Annual IFIP WG 11.3 Working Conference, DBSec 2015
PlaceFairfax, VA, USA
Book TitleData and Applications Security and Privacy XXIX
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303746
Year2015
Author(s)Turkmen, Fatih; den Hartog, Jerry; Ranise, Silvio; Zannone, Nicola
TitleAnalysis of XACML Policies with SMT
Conference4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015
PlaceLondon, UK
Book TitlePrinciples of Security and Trust
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303755
Year2015
Author(s)Ranise, Silvio; Truong, Anh; Viganò, Luca
TitleAutomated analysis of RBAC policies with temporal constraints and static role hierarchies
Conference30th Annual {ACM} Symposium on Applied Computing 2015
PlaceSalamanca, Spain
Book TitleProceedings of the 30th Annual {ACM} Symposium on Applied Computing
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303758
Year2015
Author(s)Ranise, Silvio; Bertolissi, Clara; Uttha, Worachet
TitleModeling Authorization Policies for Web Services in Presence of Transitive Dependencies
Conference12th International Conference on Security and Cryptography (SECRYPT 2015)
PlaceColmar, France
Book TitleSECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID303761
Year2015
Author(s)De Masellis, Riccardo; Ghidini, Chiara; Ranise, Silvio
TitleA Declarative Framework for Specifying and Enforcing Purpose-Aware Policies
Conference1th International Workshop on Security and Trust Management (STM)
PlaceVienna, Austria
Book TitleSecurity and Trust Management, 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID307343
Year2015
Author(s)Avesani, Paolo; Perini, Anna; Siena, Alberto; Susi, Angelo
TitleGoals at risk? Machine learning at support of early assessment
ConferenceRequirements Engineering
PlaceOttawa, ON, Canada
Book Title2015 IEEE 23rd International Requirements Engineering Conference (RE)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID307595
Year2015
Author(s)Massari, Nicola; Gasparini, Leonardo; Tomasi, Alessandro; Meneghetti, Alessio; Perenzoni, Daniele; Stoppa, David
TitleA low bias variation SPAD-based pixel for a quantum random generator
ConferenceElectro-Optical and Infrared Systems: Technology and Applications XII; and Quantum Information Science and Technology
PlaceToulouse, France
Book TitleProc. SPIE: Electro-Optical and Infrared Systems: Technology and Applications XII; and Quantum Information Science and Technology
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID211216
Year2014
Author(s)Armando A.; Carbone R.; Compagna L.
TitleSATMC: a SAT-based Model Checker for Security-critical Systems
Conference20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS)
PlaceGrenoble, France
Book TitleTools and Algorithms for the Construction and Analysis of Systems- 20th International Conference, {TACAS} 2014
InternationalNo
Conf. RankA
Conference Paper U-Gov ID226015
Year2014
Author(s)Ranise S.; Truong A.
TitleIncremental analysis of evolving administrative role based access control policies
Conference28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSeC14)
PlaceVienna, Austria
Book TitleData and Applications Security and Privacy XXVIII
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID226016
Year2014
Author(s)Ranise S.; Truong A.; Armando A.
TitleScalable and Precise Automated Analysis of Administrative Temporal Role-Based Access Control
ConferenceACM Symposium on Access Control Models and Technologies (SACMAT14)
PlaceLondon, Ontario, Canada
Book TitleProceedings of the 19th ACM symposium on Access control models and technologies
InternationalNo
Conf. RankC
Conference Paper U-Gov ID226218
Year2014
Author(s)Armando A.; Carbone R.; Chekole E. G.; Ranise S.
TitleAttribute Based Access Control for APIs in Spring Security
ConferenceACM Symposium on Access Control Models and Technologies (SACMAT14)
PlaceLondon, Ontario, Canada
Book TitleSACMAT '14 Proceedings of the 19th ACM symposium on Access control models and technologies
InternationalNo
Conf. RankC
Conference Paper U-Gov ID226615
Year2014
Author(s)Armando A.; Oudkerk S.; Ranise S.; Wrona K.
TitleFormal Modelling of Content-Based Protection and Release for Access Control in NATO Operations
ConferenceFoundations and Practice of Security - 6th International Symposium, FPS 2013
PlaceLa Rochelle, France
Book TitleFoundations and Practice of Security
InternationalYes
Conf. RankN/D
Conference Paper U-Gov ID232822
Year2014
Author(s)Morales-Ramirez I.; Vergne M.; Morandini M.; Siena A.; Perini A.; Susi A.
TitleWho is the expert? combining intention and knowledge of online discussants in collaborative RE tasks
ConferenceICSE Companion’14
PlaceHyderabad, India
Book TitleCompanion Proceedings of the 36th International Conference on Software Engineering - ICSE Companion 2014
InternationalNo
Conf. RankA
Conference Paper U-Gov ID244419
Year2014
Author(s)Mariano Ceccato; Alessandro Marchetto; Anna Perini; Angelo Susi
TitleHow Smartphone Users Assess the Value/Risk Trade-Off of Apps: An Observational Study
Conference2014 IEEE 4th International Workshop on Empirical Requirements Engineering (EmpiRE)
PlaceKarlskrona (Sweden)
Book Title2014 IEEE 4th International Workshop on Empirical Requirements Engineering (EmpiRE)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID250026
Year2014
Author(s)Mirko Morandini;Alberto Siena;Angelo Susi
TitleRisk Awareness in Open Source Component SelectionBusiness Information Systems
ConferenceN/D
PlaceN/D
Book TitleLecture Notes in Business Information ProcessingBusiness Information Systems
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID250028
Year2014
Author(s)Mirko Morandini; Alberto Siena; Angelo Susi
TitleA Context-specific Definition of Risk for Enterprise-level Decision Making
ConferenceVMBO 14
PlaceBerlin
Book Title8th International Workshop on Value Modeling and Business Ontology
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID250649
Year2014
Author(s)Xavier Franch;Ron Kenett;Fabio Mancinelli;Angelo Susi;David Ameller;Ron Ben-Jacob;Alberto Siena
TitleA Layered Approach to Managing Risks in OSS Projects
Conference10th IFIP WG 2.13 International Conference on Open Source Systems
PlaceCosta Rica
Book TitleIFIP Advances in Information and Communication Technology Open Source Software: Mobile Open Source Technologies
InternationalYes
Conf. RankN/D
Conference Paper U-Gov ID251431
Year2014
Author(s)Ranise S.; Traverso R.
TitleALPS: An Action Language for Policy Specification and Automated Safety Analysis
ConferenceN/D
PlaceN/D
Book TitleSecurity and Trust Management - 10th International Workshop, STM 2014
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID251631
Year2014
Author(s)Armando A.; Carbone R.; Chekole E. G.; Petrazzuolo C.; Ranalli A.; Ranise S.
TitleSelective Release of Smart Metering Data in Multi-domain Smart Grids
ConferenceSecond International Workshop, SmartGridSec 2014
PlaceMunich, Germany
Book TitleSmart Grid Security
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID255020
Year2014
Author(s)Tonella P.; Ceccato M.; De Sutter B.; Coppens B.
TitlePOSTER: A measurement framework to quantify software protections
ConferenceACM SIGSAC Conference on Computer and Communications Security
PlaceScottsdale, Arizona, USA
Book TitleProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14
InternationalYes
Conf. RankN/D
Conference Paper U-Gov ID255219
Year2014
Author(s)Mariano Ceccato
TitleOn the need for more human studies to assess software protection
ConferenceWorkshop on Continuously Upgradeable Software Security and Protection
PlaceScottsdale, Arizona, USA
Book TitleWorkshop on Continuously Upgradeable Software Security and Protection
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID265419
Year2014
Author(s)S. Ingolfo; I. Jureta; A. Siena; A. Perini; A. Susi
TitleNomos 3: Legal compliance of roles and requirements
ConferenceConceptual Modeling - 33rd International Conference, ER 2014
PlaceAtlanta
Book TitleConceptual Modeling - 33rd International Conference, ER 2014
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID271019
Year2014
Author(s)Siena A; Morandini M; Susi A
TitleModelling Risks in Open Source Software Component Selection
ConferenceConceptual Modeling - 33rd International Conference, ER 2014
PlaceAtlanta, GA, USA
Book TitleConceptual Modeling
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID101602
Year2013
Author(s)S. Ranise; A. Truong; A. Armando
TitleBoosting Model Checking to Analyse Large ARBAC Policies
ConferenceSecurity and Trust Management-STM'2012
PlacePisa, Italy
Book TitleSTM 2012
InternationalNo
Conf. RankC
Conference Paper U-Gov ID151202
Year2013
Author(s)A. Armando; R. Carbone; L. Zanetti
TitleFormal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols
Conference7th International Conference on Network and System Security (NSS 2013)
PlaceMadrid, Spain
Book TitleN/D
InternationalNo
Conf. RankB
Conference Paper U-Gov ID169210
Year2013
Author(s)Cataldo Basile; Mariano Ceccato
TitleTowards a Unified Software Attack Model to Assess Software Protections
Conference21st International Conference on Program Comprehension
PlaceSan Francisco, CA, USA
Book TitleProceedings of the 21st International Conference on Program Comprehension
InternationalNo
Conf. RankC
Conference Paper U-Gov ID169211
Year2013
Author(s)Andrea Avancini; Mariano Ceccato
TitleSecurity Testing of the Communication among Android Applications
Conference8th International Workshop on Automation of Software Test
PlaceSan Francisco, CA, USA
Book TitleProceedings of the 8th International Workshop on Automation of Software Test
InternationalNo
Conf. RankC
Conference Paper U-Gov ID180613
Year2013
Author(s)Armando A.; Grasso M.; Oudkerk S.; Ranise S.; Wrona K.
TitleContent- based information protection and release in NATO operations
ConferenceN/D
PlaceN/D
Book TitleSymposium on Access Control Models and Technologies (SACMAT)
InternationalYes
Conf. RankC
Conference Paper U-Gov ID180614
Year2013
Author(s)Bertolissi C.; Ranise S.
TitleVerification of Composed Array-based Systems with Applications to Security-Aware Workflows
ConferenceN/D
PlaceN/D
Book TitleSymposium on Frontiers of Combining Systems (FroCoS)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID181631
Year2013
Author(s)Ceccato M; Marchetto A.; Perini A.; Susi A.; Veronesi L.
TitleDo Mobile-App Users Care about Privacy?
Conference19th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2013)
PlaceEssen (Germany)
Book TitleREFSQ 2013 workshop proceedings. Empirical Track: Online Questionnaires
InternationalNo
Conf. RankB
Conference Paper U-Gov ID201812
Year2013
Author(s)X. Franch; A. Susi; M. Annosi; C. Ayala; R. Glott; D. Gross; R. Kenett; F. Mancinelli; P. Ramsamy; C. Thomas; D. Ameller; S. Bannier; N. Bergida; Y. Blumenfeld; O. Bouzereau; D. Costal; M. Dominguez; K. Haaland; L. López; M. Morandini; A. Siena
TitleManaging Risk in Open Source Software Adoption
ConferenceInternational Joint Conference on Software Technologies
PlaceReykjavík, Iceland
Book TitleProceedings of the 8th International Joint Conference on Software Technologies
InternationalYes
Conf. RankN/D
Conference Paper U-Gov ID214017
Year2013
Author(s)Andrea Avancini; Mariano Ceccato
TitleCirce: A grammar-based oracle for testing Cross-site scripting in web applications
ConferenceWorking Conference on Reverse Engineering
PlaceKoblenz
Book Title2013 20th Working Conference on Reverse Engineering (WCRE)
InternationalNo
Conf. RankB
Conference Paper U-Gov ID222616
Year2013
Author(s)C. Bertolissi; S. Ranise
TitleA Methodology to build run-time Monitors for Security-Aware Workflows
ConferenceThe 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)
Place09/12/2013-12/12/2013
Book TitleProceedings of the 8th International Conference for Internet Technology and Secured Transactions
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID265420
Year2013
Author(s)A. Siena; S. Ingolfo; A. Perini; A. Susi; J. Mylopoulos
TitleAutomated Reasoning for Regulatory Compliance
ConferenceConceptual Modeling - 32th International Conference, ER 2013
PlaceHong-Kong, China
Book TitleConceptual Modeling - 32th International Conference, ER 2013
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID265421
Year2013
Author(s)S. Ingolfo; A. Siena; A. Susi; A. Perini; J. Mylopoulos
TitleModeling laws with Nomos 2
ConferenceSixth International Workshop on Requirements Engineering and Law, RELAW 2013
PlaceRio de Janeiro, Brasil
Book TitleRELAW 2013
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID81001
Year2012
Author(s)A. Armando; G. Pellegrino; R. Carbone; A. Merlo; D. Balzarotti
TitleFrom Model-checking to Automated Testing of Security Protocols: Bridging the Gap
Conference6th International Conference, TAP 2012
PlacePrague, Czech Republic
Book TitleTESTS AND PROOFS
InternationalNo
Conf. RankB
Conference Paper U-Gov ID81605
Year2012
Author(s)Mariano Ceccato; Alessandro Marchetto; Leonardo Mariani; Cu D. Nguyen; Paolo Tonella
TitleAn Empirical Study about the Effectiveness of Debugging When Random Test Cases Are Used
Conference34th International Conference on Software Engineering (ICSE)
PlaceZurich, Switzerland
Book TitleProceedings of the 34th International Conference on Software Engineering (ICSE 2012)
InternationalNo
Conf. RankA
Conference Paper U-Gov ID81606
Year2012
Author(s)Andrea Avancini; Mariano Ceccato
TitleGrammar Based Oracle for Security Testing of Web Applications
Conference7th International Workshop on Automation of Software Test (AST)
PlaceZurich, Switzerland
Book TitleProceedings of the 7th International Workshop on Automation of Software Test (AST)
InternationalNo
Conf. RankC
Conference Paper U-Gov ID81801
Year2012
Author(s)Andrea Avancini; Mariano Ceccato
TitleSecurity Testing of Web Applications: A Research Plan
ConferenceICSE 2012
PlaceZurigo
Book TitleProceedings of 34th International Conference on Software Engineering (ICSE 2012)
InternationalNo
Conf. RankA
Conference Paper U-Gov ID101203
Year2012
Author(s)R. Bruttomesso; A. Carioni; S. Ghilardi; S. Ranise
TitleAutomated Analysis of Parametric Timing-Based Mutual Exclusion Algorithms
ConferenceNASA Formal Methods - 4th International Symposium, NFM 2012
PlaceNorfolk, VA, USA
Book TitleN/D
InternationalNo
Conf. RankC
Conference Paper U-Gov ID101204
Year2012
Author(s)F. Alberti; R. Bruttomesso; S. Ghilardi; S. Ranise; N. Sharygina
TitleLazy Abstraction with Interpolants for Arrays
ConferenceLogic for Programming, Artificial Intelligence, and Reasoning - 18th International Conference, LPAR-18
PlaceMerida, Venezuela
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID101205
Year2012
Author(s)R. Bruttomesso; S. Ghilardi; S. Ranise
TitleFrom Strong Amalgamability to Modularity of Quantifier-Free Interpolation
ConferenceAutomated Reasoning - 6th International Joint Conference, IJCAR 2012
PlaceManchester, UK
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID101206
Year2012
Author(s)A. Armando; S. Ranise
TitleAutomated and Efficient Analysis of Role-Based Access Control with Attributes
ConferenceData and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012
PlaceParis, France
Book TitleN/D
InternationalNo
Conf. RankB
Conference Paper U-Gov ID101401
Year2012
Author(s)A. Armando; S. Ranise; F. Turkmen; B. Crispo
TitleEfficient run-time solving of RBAC user authorization queries: pushing the envelope
ConferenceSecond ACM Conference on Data and Application Security and Privacy, CODASPY 2012
PlaceSan Antonio, TX, USA
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID101402
Year2012
Author(s)F. Alberti; R. Bruttomesso; S. Ghilardi; S. Ranise; N. Sharygina
TitleSAFARI: SMT-Based Abstraction for Arrays with Interpolants
ConferenceComputer Aided Verification - 24th International Conference, CAV 2012
PlaceBerkeley, CA, USA
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID101403
Year2012
Author(s)S. Ranise; A. Armando
TitleOn the Automated Analysis of Safety in Usage Control: A New Decidability Result
Conference6th International Conference on Network and System Security, NSS'2012
PlaceWu Yi Shan, Fujian, China
Book TitleN/D
InternationalNo
Conf. RankB
Conference Paper U-Gov ID101601
Year2012
Author(s)M. Barletta; S. Ranise; L. Vigano
TitleAutomated Analysis of Scenario-based Specifications of Distributed Access Control Policies with Non-Mechanizable Activities
ConferenceSecurity and Trust Management-STM'2012
PlacePisa, Italy
Book TitleN/D
InternationalNo
Conf. RankC
Conference Paper U-Gov ID101801
Year2012
Author(s)A. Avancini; M. Ceccato
TitleTowards a Security Oracle Based on Tree Kernel Methods
Conference2012 Joint Workshop on Intelligent Methods for Software System Engineering
PlaceMontpellier, Francia
Book TitleProceedings of 2012 Joint Workshop on Intelligent Methods for Software System Engineering
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID104417
Year2012
Author(s)A. Armando; W. Arsac; T. Avanesov; M. Barletta; A. Calvi; A. Cappai; R. Carbone; Y. Chevalier; L. Compagna; J. Cuéllar; G. Erzse; S. Frau; M. Minea; S. Mödersheim; D. von Oheimb; G. Pellegrino; S. E. Ponta; M. Rocchetto; M. Rusinowitch; M. Torabi Dashti; M. Turuani; L. Viganò
TitleThe AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures
ConferenceTACAS 2012
PlaceTalling, Estonia
Book TitleTOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS
InternationalNo
Conf. RankA
Conference Paper U-Gov ID123001
Year2012
Author(s)Alberto Siena; Silvia Ingolfo; Angelo Susi; Ivan Jureta; Anna Perini; John Mylopoulos
TitleRequirements, Intentions, Goals and Applicable Norms
ConferenceRIGIM 12 - ER Workshop
PlaceFirenze, Italy
Book TitleAdvances in Conceptual Modeling - ER 2012 Workshops
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID123002
Year2012
Author(s)Alberto Siena; Ivan Jureta; Silvia Ingolfo; Angelo Susi; Anna Perini; John Mylopoulos
TitleCapturing Variability of Law with Nomos 2
ConferenceConceptual Modeling - 31st International Conference ER 2012
PlaceFirenze, Italy
Book TitleConceptual Modeling - 31st International Conference ER 2012
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID151201
Year2012
Author(s)A. Armando; R. Carbone; A. Merlo
TitleFormal Analysis of a Privacy-Preserving Billing Protocol
Conference1st EIT ICT Labs Workshop on Smart Grid Security (SmartGridSec 2012)
PlaceBerlin, Germnay
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID21617
Year2011
Author(s)Alberti F.; Armando A.; Ranise S.
TitleEfficient Symbolic Automated Analysis of Administrative Attribute-based RBAC-Policies
Conference6th ACM Symposium on Information, Computer and Communications Security (ASIACCS'10)
PlaceHong Kong
Book TitleProceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
InternationalNo
Conf. RankB
Conference Paper U-Gov ID21635
Year2011
Author(s)Armando A.; Ranise S.
TitleAutomated Symbolic Analysis of ARBAC Policies
Conference6th International Workshop on Security and Trust Management (STM'10)
PlaceAthens, Greece
Book TitleProceedings of 6th International Workshop on Security and Trust Management (STM)
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID38003
Year2011
Author(s)A. Armando; R. Carbone; L. Compagna; J. Cuellar; G. Pellegrino; A. Sorniotti
TitleFrom Multiple Credentials to Browser-based Single Sign-On: Are We More Secure?
Conference26th IFIP TC-11 International Information Security Conference (SEC 2011)
PlaceLuzern, Switzerland
Book TitleN/D
InternationalNo
Conf. RankB
Conference Paper U-Gov ID46399
Year2011
Author(s)Andrea Avancini; Mariano Ceccato
TitleSecurity Testing of Web Applications: a Search Based Approach for Cross-Site Scripting Vulnerabilities
Conference2011 11th IEEE International Working Conference on Source Code Analysis and Manipulation
PlaceWilliamsburg, VA, USA
Book TitleProceedings of Eleventh IEEE International Working Conference on Source Code Analysis and Manipulation
InternationalNo
Conf. RankC
Conference Paper U-Gov ID50383
Year2011
Author(s)R. Bruttomesso; S. Ghilardi; S. Ranise
TitleRewriting-based Quantifier-free Interpolation for a Theory of Arrays
Conference22nd Int. Conf. on Rewriting Techniques and Applications (RTA '11)
PlaceNovi Sad, Serbia
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID50384
Year2011
Author(s)F. Alberti; A. Armando; S. Ranise
TitleASASP: Automated Symbolic Analysis of Security Policies
Conference23rd Conference on Automated Deduction (CADE)
PlaceWroclow, Poland
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID50385
Year2011
Author(s)A. Armando; S. Ranise
TitleAutomated Analysis of Infinite State Workflows with Access Control Policies
Conference7th Int. Workshop on Security and Trust Management
PlaceCopenhagen, Denmark
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID50386
Year2011
Author(s)A. Carioni; S. Ghilardi; S. Ranise
TitleAutomated Termination in Model Checking Modulo Theories
Conference5th Int. Workshop on Reachability Problems (RP 11)
PlaceGenova, Italy
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID50387
Year2011
Author(s)R. Bruttomesso; S. Ghilardi; S. Ranise
TitleA Combination of Rewriting and Constraint Solving for the Quantifier-free Interpolation of Arrays with Integer Difference Constraints
Conference8th Int. Symp. on Frontiers of Combining Systems (FroCoS'11)
PlaceSaarbruecken, Germany
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID50388
Year2011
Author(s)A. Armando; R. Carbone; S. Ranise
TitleAutomated Analysis of Semantic-Aware Access Control Policies: a Logic-based Approach
ConferenceIEEE Int. Workshop on Semantics, Security, and Privacy (TCSEM + TCSP)
PlaceStanford Univ., Palo Alto, CA, USA
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID50394
Year2011
Author(s)G. Gheorghe; B. Crispo; R. Carbone; L. Desmet; W. Joosen
TitleDeploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement
ConferenceACM/IFIP/USENIX 12th International Middleware Conference
PlaceLisboa, Portugal
Book TitleMiddleware 2011
InternationalNo
Conf. RankA
Conference Paper U-Gov ID50580
Year2011
Author(s)Luca Sabatucci; Mariano Ceccato; Alessandro Marchetto; Angelo Susi
TitleAhab's leg dilemma: on the design of a controlled experiment
ConferenceInternational Workshop on Empirical Requirements Engineering
PlaceTrento, Italy
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID50582
Year2011
Author(s)Anna Perini; Nauman A. Qureshi; Luca Sabatucci; Alberto Siena; Angelo Susi
TitleEvolving Requirements in Socio-Technical Systems: Concepts and Practice
Conference30th International Conference on Conceptual Modeling - (ER 2011)
PlaceBrussels, Belgium
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID270624
Year2011
Author(s)Barrett C.; de Moura L.; Ranise S.; Stump A.; Tinelli C.
TitleThe {SMT-LIB} Initiative and the Rise of {SMT} - {(HVC} 2010 Award Talk)
ConferenceHaifa Verification Conference 2010
PlaceIsrael
Book TitleHardware and Software: Verification and Testing
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID5384
Year2010
Author(s)Adolfo Villafiorita; Komminist Sisai Weldemariam; Angelo Susi; Alberto Siena
TitleModeling and Analysis of Laws using BPR and Goal-oriented framework
ConferenceCYBERLAWS'10: International Conference on Technical and Legal Aspects of the e-Society
PlaceSt. Maarten, Netherlands Antilles
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID7848
Year2010
Author(s)A. Avancini; M. Ceccato
TitleTowards Security Testing with Taint Analysis and Genetic Algorithms
Conference2010 ICSE Workshop on Software Engineering for Secure Systems
PlaceCape Town, South Africa
Book TitleProceedings of the 32nd ACM/IEEE International Conference on Software Engineering and ICSE Workshops
InternationalNo
Conf. RankA
Conference Paper U-Gov ID9628
Year2010
Author(s)Alberto Siena; Giampaolo Armellin; Gianluca Mameli; John Mylopoulos; Anna Perini; Angelo Susi
TitleEstablishing Regulatory Compliance for Information System Requirements: An Experience Report from the Health Care Domain
Conference29th International Conference on Conceptual Modeling, ER'10
PlaceVancouver, BC, Canada
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID9630
Year2010
Author(s)Mirko Morandini; Luca Sabatucci; Alberto Siena; John Mylopoulos; Loris Penserini; Anna Perini; Angelo Susi
TitleOn the use of the Goal-Oriented Paradigm for System Design and Law Compliance Reasoning
ConferenceiStar 2010 4th International i* Workshop
PlaceHammamet, Tunisia
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID16410
Year2010
Author(s)Mariano Ceccato; Paolo Tonella
TitleStatic analysis for enforcing intra-thread consistent locks in the migration of a legacy system
ConferenceInternational Conference on Software Maintenance
PlaceTimisoara, Romania
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID21309
Year2010
Author(s)S. Ghilardi; S. Ranise
TitleMCMT: A Model Checker Modulo Theories
ConferenceAutomated Reasoning, 5th International Joint Conference, IJCAR 2010
PlaceEdinburgh, UK
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID21329
Year2010
Author(s)F. Alberti; S. Ghilardi; E. Pagani; S. Ranise; G. P. Rossi
TitleBrief Announcement: Automated Support for the Design and Validation of Fault Tolerant Parameterized Systems - A Case Study
ConferenceDistributed Computing, 24th International Symposium, DISC 2010
PlaceCambridge, MA, USA
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID22171
Year2010
Author(s)S. Ghanavati; D. Amyot; A. Siena; A. Susi; A. Perini
TitleTowards a Framework for Business Process Compliance
ConferenceInt. Workshop on Goal-based Business Process Engineering (WGBP 2010)
PlaceVitoria, Brazil
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID22251
Year2010
Author(s)A. Armando; R. Carbone; L. Compagna; L. Keqin; G. Pellegrino
TitleModel-Checking Driven Security Testing of Web-Based Applications
ConferenceThird International Conference on Software Testing, Verification, and Validation Workshops (ICSTW)
PlaceParis France
Book TitleN/D
InternationalNo
Conf. RankC
Conference Paper U-Gov ID50391
Year2010
Author(s)M. Barletta; A. Calvi; S. Ranise; L. Vigano; L. Zanetti
TitleWSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications
Conference1st Workshop on Software Service (satellite of SYNASC symposium)
PlaceTimisoara, Romania
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID50392
Year2010
Author(s)A. Calvi; S. Ranise; L. Vigano
TitleAutomated Validation of Security-sensitive Web Services specified in BPEL and RBAC
Conference1st Workshop on Software Service (satellite of SYNASC symposium)
PlaceTimisoara, Romania
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID4545
Year2009
Author(s)Mariano Ceccato; Paolo Tonella; Mila Dalla Preda; Anirban Majumdar
TitleRemote software protection by orthogonal client replacement
Conference24th ACM Symposium on Applied Computing (SAC 2009)
PlaceHonolulu, Hawaii, USA
Book Title24th ACM Symposium on Applied Computing (SAC 2009)
InternationalNo
Conf. RankB
Conference Paper U-Gov ID4547
Year2009
Author(s)Mario Bernardi; Lucca G. Di; Mariano Ceccato
TitleWorkshop on maintenance of aspect oriented systems
ConferenceEuropean Conference on Software Maintenance and Reengineering
PlaceKaiserslautern, Germany
Book TitleEuropean Conference on Software Maintenance and Reengineering
InternationalNo
Conf. RankC
Conference Paper U-Gov ID4676
Year2009
Author(s)Mariano Ceccato; Massimiliano Di Penta; Jasvir Nagra; Paolo Falcarin; Filippo Ricca; Marco Torchiano; Paolo Tonella
TitleThe Effectiveness of Source Code Obfuscation: an Experimental Assessment
Conference17th IEEE International Conference on Program Comprehension
PlaceVancouver, Canada
Book Title17th IEEE International Conference on Program Comprehension
InternationalNo
Conf. RankC
Conference Paper U-Gov ID5083
Year2009
Author(s)Sepideh Ghanavati; Alberto Siena; Daniel Amyot; Liam Peyton; Anna Perini; Angelo Susi
TitleA Legal Perspective on Business: Modeling the Impact of Law
Conference4th International MCETECH Conference on eTechnologies
PlaceN/D
Book Title4th International MCETECH Conference on eTechnologies
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID5084
Year2009
Author(s)Alberto Siena; John Mylopoulos; Anna Perini; Angelo Susi
TitleTowards a Framework for Law-Compliant Software Requirements
Conference31st International Conference on Software Engineering
PlaceN/D
Book Title31st International Conference on Software Engineering
InternationalNo
Conf. RankA
Conference Paper U-Gov ID10036
Year2009
Author(s)A. Siena; J. Mylopoulos; A. Perini; A. Susi;
TitleDesigning law-compliant software requirements
ConferenceConceptual Modeling - ER 2009, 28th International Conference on Conceptual Modeling
PlaceGramado, Brazil
Book TitleConceptual Modeling - ER 2009, 28th International Conference on Conceptual Modeling
InternationalNo
Conf. RankA
Conference Paper U-Gov ID21330
Year2009
Author(s)M. Barletta; S. Ranise; L. Viganò:
TitleVerifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures
ConferenceComputational Science and Engineering, 2009. CSE '09. International Conference on
PlaceVancouver, BC, Canada
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID21349
Year2009
Author(s)S. Ghilardi; S. Ranise
TitleGoal-Directed Invariant Synthesis for Model Checking Modulo Theories
Conferenceutomated Reasoning with Analytic Tableaux and Related Methods, 18th International Conference, TABLEAUX 2009
PlaceOslo, Norway
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID21369
Year2009
Author(s)S. Ghilardi; S. Ranise; T. Valsecchi
TitleLight-Weight SMT-based Model Checking
ConferenceEighth International Workshop on Automated Verification of Critical Systems (AVoCS 2008)
PlaceGlasgow, Scotland, UK
Book TitleN/D
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID22074
Year2009
Author(s)S. Ghilardi; S. Ranise
TitleGoal-Directed Invariant Synthesis for Model Checking Modulo Theories
ConferenceAutomated Reasoning with Analytic Tableaux and Related Methods
PlaceOslo, Norway
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID3645
Year2008
Author(s)Filippo Ricca; M. Di Penta; Marco Torchiano; Paolo Tonella; Mariano Ceccato; Corrado Visaggio
TitleAre Fit tables really talking? A series of experiments to understand whether Fit tables are useful during evolution tasks
Conference30th International Conference on Software Engineering (ICSE 2008)
PlaceLeipzig, Germany
Book Title30th International Conference on Software Engineering (ICSE 2008)
InternationalNo
Conf. RankA
Conference Paper U-Gov ID3667
Year2008
Author(s)Mariano Ceccato; Jasvir Nagra; Paolo Tonella
TitleDistributing trust verification to increase application performance
Conference16th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2008)
PlaceToulouse, France
Book Title16th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2008)
InternationalNo
Conf. RankC
Conference Paper U-Gov ID3669
Year2008
Author(s)Mariano Ceccato; Yoram Ofek; Paolo Tonella
TitleRemote entrusting by run-time software authentication
Conference34th Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2008)
PlaceNovy Smokovec, Slovakia
Book Title34th Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 2008)
InternationalNo
Conf. RankB
Conference Paper U-Gov ID3670
Year2008
Author(s)Mariano Ceccato; Paolo Tonella; Cristina Matteotti
TitleGoto elimination strategies in the migration of legacy code to java
Conference12th European Conference on Software Maintenance and Reengineering (CSMR 2008)
PlaceAthens, Greece
Book Title12th European Conference on Software Maintenance and Reengineering (CSMR 2008)
InternationalNo
Conf. RankC
Conference Paper U-Gov ID3693
Year2008
Author(s)Alberto Siena; Neil Maiden; James Lockerbie; Kristine Karlsen; Anna Perini; Angelo Susi
TitleExploring the Effectiveness of Normative i* Modelling: Results from a Case Study on Food Chain Traceability
Conference20th International Conference on Advanced Information Systems Engineering
PlaceMontpellier, France
Book Title20th International Conference on Advanced Information Systems Engineering
InternationalNo
Conf. RankA
Conference Paper U-Gov ID3744
Year2008
Author(s)Mariano Ceccato
TitleAutomatic Support for the Migration Towards Aspects
Conference12th European Conference onConference on Software Maintenance and Reengineering
PlaceAthens, Greece
Book Title12th European Conference onConference on Software Maintenance and Reengineering
InternationalNo
Conf. RankC
Conference Paper U-Gov ID4239
Year2008
Author(s)Mariano Ceccato; Thomas Roy Dean; Paolo Tonella
TitleUsing Program Transformations to Add Structure to a Legacy Data Model
ConferenceWorking Conference on Source Code Analysis and Manipulation
PlaceN/D
Book TitleWorking Conference on Source Code Analysis and Manipulation
InternationalNo
Conf. RankC
Conference Paper U-Gov ID4342
Year2008
Author(s)Mariano Ceccato; Thomas Roy Dean; Paolo Tonella; Davide Marchignoli
TitleData Model Reverse Engineering in Migrating a Legacy System to Java
Conference15th Working Conference on Reverse Engineering, 2008. WCRE `08.
PlaceAntwerp, Belgium
Book Title15th Working Conference on Reverse Engineering, 2008. WCRE `08.
InternationalNo
Conf. RankB
Conference Paper U-Gov ID4343
Year2008
Author(s)Mariano Ceccato; M. Di Penta; Jasvir Nagra; Paolo Falcarin; Filippo Ricca; Marco Torchiano; Paolo Tonella
TitleTowards experimental evaluation of code obfuscation techniques
ConferenceQoP `08: Proceedings of the 4th ACM workshop on Quality of protection
PlaceAlexandria (Virginia), USA
Book TitleQoP `08: Proceedings of the 4th ACM workshop on Quality of protection
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID5081
Year2008
Author(s)Alberto Siena; Alessio Bonetti; Paolo Giorgini
TitleBalanced Goalcards: combining Balanced Scorecards and Goal Analysis
Conference3rd International Conference on Evaluation of Novel Approaches in Software Engineering
PlaceMadeira, Portugal
Book Title3rd International Conference on Evaluation of Novel Approaches in Software Engineering
InternationalNo
Conf. RankB
Conference Paper U-Gov ID5082
Year2008
Author(s)Alberto Siena; John Mylopoulos; Anna Perini; Angelo Susi
TitleFrom Laws to Requirements
Conference1st International Workshop on Requirements Engineering and Law
PlaceBarcelona, Spain
Book Title1st International Workshop on Requirements Engineering and Law
InternationalNo
Conf. RankN/D
Conference Paper U-Gov ID21449
Year2008
Author(s)S. Ghilardi; E. Nicolini; S. Ranise; D. Zucchelli
TitleTowards SMT Model Checking of Array-Based Systems
ConferenceAutomated Reasoning, 4th International Joint Conference, IJCAR 2008
PlaceSydney, Australia
Book TitleN/D
InternationalNo
Conf. RankA
Conference Paper U-Gov ID21631
Year2008
Author(s)Armando A.; Carbone R.; Compagna L.; Cuellar J.; Tobarra L.
TitleFormal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps.
Conference6th ACM Workshop on Formal Methods in Security Engineering (FMSE 2008)
PlaceAlexandria, Virginia, USA
Book TitleProceedings of the 6th ACM Workshop on Formal Methods in Security Engineering (FMSE 2008)
InternationalNo
Conf. RankC
Book Chapter U-Gov ID316186
Year2018
Author(s)Cimatti, Alessandro; Ghilardi, Silvio; Ranise, Silvio
TitleModel checking: teoria ed applicazioni
Book TitleLe direzioni della ricerca logica in Italia 2
InternationalNo
Book Chapter U-Gov ID313210
Year2017
Author(s)Anh, Truong; Ranise, Silvio; Nguyen, Thanh Tung
TitleScalable Automated Analysis of Access Control and Privacy Policies
Book TitleTransactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI
InternationalNo
Book Chapter U-Gov ID282222
Year2015
Author(s)Itzel Morales-Ramirez; Anna Perini; Mariano Ceccato
TitleTowards Supporting the Analysis of Online Discussions in OSS Communities: A Speech-Act Based Approach
Book TitleLecture Notes in Business Information ProcessingInformation Systems Engineering in Complex Environments
InternationalNo
Book Chapter U-Gov ID250027
Year2014
Author(s)Mirko Morandini; Fabiano Dalpiaz; Cu Duy Nguyen; Alberto Siena
TitleThe Tropos Software Engineering Methodology -- in Handbook on Agent-Oriented Design Processes
Book TitleHandbook on Agent-Oriented Design Processes
InternationalNo
Book Chapter U-Gov ID201411
Year2013
Author(s)Avancini A.; Ceccato M.
TitleSecurity Oracle Based on Tree Kernel Methods
Book TitleTrustworthy Eternal Systems via Evolving Software, Data and Knowledge
InternationalNo
Book Chapter U-Gov ID50393
Year2012
Author(s)A. Armando; R. Carbone; L. Compagna; G. Pellegrino
TitleAutomatic Security Analysis of SAML-based Single Sign-On Protocols
Book TitleDigital Identity and Access Management: Technologies and Frameworks
InternationalNo
Book Chapter U-Gov ID37997
Year2011
Author(s)R. Carbone; M. Minea; S. A. Mödersheim; S. E. Ponta; M. Turuani; L. Viganò
TitleTowards Formal Validation of Trust and Security in the Internet of Services
Book TitleThe Future Internet
InternationalNo
Book Chapter U-Gov ID22249
Year2009
Author(s)C. Rudolph; L. Compagna; R. Carbone; A. Muñoz; J. Repp
TitleVerification of S&D Solutions for Network Communications and Devices
Book TitleSecurity and Dependability for Ambient Intelligence
InternationalNo
Book Chapter U-Gov ID3659
Year2008
Author(s)Mirko Morandini; Cu Nguyen; Anna Perini; Alberto Siena; Angelo Susi
TitleTool-supported development with Tropos: The conference management system case study
Book TitleAgent Oriented Software Engineering VIII
InternationalNo
Editorship U-Gov ID316439
Year2017
Author(s)Knauss, Eric; Susi, Angelo; Ameller, David; Berry, Daniel M.; Dalpiaz, Fabiano; Daneva, Maya; Daun, Marian; Dieste, Oscar; Forbrig, Peter; Groen, Eduard C.; Herrmann, Andrea; Horkoff, Jennifer; Kifetew, Fitsum Meshesha; Kirikova, Marite; Knauss, Alessia; Maeder, Patrick; Massacci, Fabio; Palomares, Cristina; Ralyté, Jolita; Seffah, Ahmed; Siena, Alberto; Tenbergen, Bastian
TitleJoint Proceedings of REFSQ-2017 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2017), Essen, Germany, Febru...
JournalN/D
BookN/D
Volume1796
PublisherCEUR-WS.org
InternationalNo
Editorship U-Gov ID307064
Year2016
Author(s)Ranise, Silvio; Swarup, Vipin
TitleData and Applications Security and Privacy {XXX}
JournalN/D
BookN/D
VolumeN/D
PublisherSpringer International Publishing
InternationalNo
Editorship U-Gov ID303765
Year2015
Author(s)Lutz, Carsten; Ranise, Silvio
TitleFrontiers of Combining Systems, 10th International Symposium, FroCoS 2015, Wroclaw, Poland, September 21-24, 2015, Proceedings
JournalN/D
BookN/D
Volume9322
PublisherSpringer International Publishing
InternationalNo
Editorship U-Gov ID251026
Year2014
Author(s)Anna Perini; 
Daniel Amyot; Annie Antón; Travis D. Breaux; Aaron Massey; Alberto Siena
Title7th International Workshop on Requirements Engineering and Law (RELAW)
JournalN/D
BookN/D
VolumeN/D
PublisherIEEE
InternationalYes
Editorship U-Gov ID21429
Year2009
Author(s)S. Ranise; U. Hustadt
TitlePreface
JournalANNALS OF MATHEMATICS AND OF ARTIFICIAL INTELLIGENCE
BookN/D
Volume55
PublisherN/D
InternationalNo
Patent U-Gov ID313234
Year2017
Author(s)Luca, Compagna; Avinash, Sudhodanan; Roberto, Carbone; Alessandro, Armando
TitleDynamic analysis security testing of multi-party web applications via attack patterns
InternationalNo
Patent U-Gov ID261219
Year2014
Author(s)L. Pavesi; P. Bettotti; M. Cazzanelli; L. Gasparini; N. Massari; G. Pucker; A. Rimoldi; M. Sala; A. Tomasi
TitleGeneratore di numeri casuali di tipo perfezionato, in particolare generatore di numeri realmente casuali di tipo perfezionato
InternationalNo
Poster U-Gov ID253820
Year2014
Author(s)Paolo Tonella; Mariano Ceccato; Bjorn De Sutter; Bart Coppens
TitleA Measurement Framework to Quantify Software Protections
InternationalNo
Other U-Gov ID303764
Year2015
Author(s)Daniel, Ricardo dos Santos; Silvio, Ranise; Serena, Elisa Ponta
TitleModularity for Security-Sensitive Workflows
InternationalNo
Other U-Gov ID22172
Year2010
Author(s)Ivan Jureta; Alberto Siena; John Mylopoulos; Anna Perini; Angelo Susi
TitleTheory of Regulatory Compliance for Requirements Engineering
InternationalNo
Other U-Gov ID3647
Year2008
Author(s)Mariano Ceccato; Thomas Roy Dean; Paolo Tonella; Davide Marchignoli
TitleInference of a structured data model in migrating a legacy system to Java
InternationalNo

           (\-.  +-------------------------------------------------+
           / _`> |         RAT - Research Assessment Tool          |
   _)     / _)=  | (C) 2011--2014 - FBK _ Fondazione Bruno Kessler |
  (      / _/    |                      v2.2                       |
   `-.__(___)_   +-------------------------------------------------+