Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Fabio Massacci
2010 – today
- 2013
[c106]Le Minh Sang Tran, Fabio Massacci: UNICORN: A Tool for Modeling and Reasoning on the Uncertainty of Requirements Evolution. CAiSE Forum 2013: 161-168
[c105]Viet Hung Nguyen, Fabio Massacci: The (un)reliability of NVD vulnerable versions data: an empirical experiment on Google Chrome vulnerabilities. ASIACCS 2013: 493-498
[c104]Vadim Kotov, Fabio Massacci: Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts. ESSoS 2013: 181-196
[c103]Luca Allodi, Woohyun Shim, Fabio Massacci: Quantitative Assessment of Risk Reduction with Cybercrime Black Market Monitoring. IEEE Symposium on Security and Privacy Workshops 2013: 165-172
[i6]Luca Allodi, Fabio Massacci: My Software has a Vulnerability, should I worry? CoRR abs/1301.1275 (2013)
[i5]Viet Hung Nguyen, Fabio Massacci: The (Un)Reliability of NVD Vulnerable Versions Data: an Empirical Experiment on Google Chrome Vulnerabilities. CoRR abs/1302.4133 (2013)
[i4]Minh Ngo, Fabio Massacci, Olga Gadyatskaya: MAP-REDUCE Runtime Enforcement of Information Flow Policies. CoRR abs/1305.2136 (2013)
[i3]Viet Hung Nguyen, Fabio Massacci: A Systematically Empirical Evaluation of Vulnerability Discovery Models: a Study on Browsers' Vulnerabilities. CoRR abs/1306.2476 (2013)- 2012
[j42]Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci, Anton Philippov: High-level algorithms and data structures requirements for security-by-contract on Java cards. IJCCBS 3(4): 284-304 (2012)
[j41]Jongmoon Baik, Fabio Massacci, Mohammad Zulkernine: Guest Editorial: Special section on software reliability and security. Information & Software Technology 54(12): 1376 (2012)
[j40]Nataliia Bielova, Fabio Massacci: Iterative enforcement by suppression: Towards practical enforcement theories. Journal of Computer Security 20(1): 51-79 (2012)
[c102]Viet Hung Nguyen, Fabio Massacci: An independent validation of vulnerability discovery models. ASIACCS 2012: 6-7
[c101]Woohyun Shim, Luca Allodi, Fabio Massacci: Crime Pays If You Are Just an Average Hacker. CyberSecurity 2012: 62-68
[c100]Viet Hung Nguyen, Fabio Massacci: An Idea of an Independent Validation of Vulnerability Discovery Models. ESSoS 2012: 89-96
[c99]Olga Gadyatskaya, Fabio Massacci: Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract. FMCO 2012: 197-215
[c98]Federica Paci, Fabio Massacci, Fabrice Bouquet, Stephane Debricon: Managing Evolution by Orchestrating Requirements and Testing Engineering Processes. ICST 2012: 834-841
[c97]Fabio Massacci, Federica Paci: How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners. NordSec 2012: 89-104
[c96]Olga Gadyatskaya, Fabio Massacci, Anton Philippov: Security-by-Contract for the OSGi Platform. SEC 2012: 364-375
[i2]Viet Hung Nguyen, Fabio Massacci: An Independent Validation of Vulnerability Discovery Models. CoRR abs/1203.5830 (2012)- 2011
[j39]Nataliia Bielova, Fabio Massacci: Do you really mean what you actually enforced? - Edited automata revisited. Int. J. Inf. Sec. 10(4): 239-254 (2011)
[j38]Yudistira Asnar, Fabio Massacci, Ayda Saïdane, Carlo Riccucci, Massimo Felici, Alessandra Tedeschi, Paul El Khoury, Keqin Li, Magali Seguran, Nicola Zannone: Organizational Patterns for Security and Dependability: From Design to Application. IJSSE 2(3): 1-22 (2011)
[c95]Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu: A Tool for Managing Evolving Security Requirements. CAiSE Forum 2011: 49-56
[c94]Le Minh Sang Tran, Fabio Massacci: Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution. CAiSE 2011: 62-76
[c93]Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu: A Tool for Managing Evolving Security Requirements. CAiSE Forum (Selected Papers) 2011: 110-125
[c92]Fabio Massacci, John Mylopoulos, Federica Paci, Thein Than Tun, Yijun Yu: An Extended Ontology for Security Requirements. CAiSE Workshops 2011: 622-636
[c91]
[c90]Fabio Massacci, Stephan Neuhaus, Viet Hung Nguyen: After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes. ESSoS 2011: 195-208
[c89]Wouter Joosen, Javier Lopez, Fabio Martinelli, Fabio Massacci: Engineering Secure Future Internet Services. Future Internet Assembly 2011: 177-192
[c88]Yudistira Asnar, Fabio Massacci: A Method for Security Governance, Risk, and Compliance (GRC): A Goal-Process Approach. FOSAD 2011: 152-184
[c87]Olga Gadyatskaya, Eduardo Lostal, Fabio Massacci: Load Time Security Verification. ICISS 2011: 250-264
[c86]Edith Felix, Olivier Delande, Fabio Massacci, Federica Paci: Managing changes with legacy security engineering processes. ISI 2011: 137-142
[c85]Nataliia Bielova, Dominique Devriese, Fabio Massacci, Frank Piessens: Reactive non-interference for a browser model. NSS 2011: 97-104
[c84]Nataliia Bielova, Fabio Massacci: Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies. POLICY 2011: 89-96
[c83]Nicola Dragoni, Eduardo Lostal, Olga Gadyatskaya, Fabio Massacci, Federica Paci: A Load Time Policy Checker for Open Multi-application Smart Cards. POLICY 2011: 153-156
[c82]Fabio Massacci, Fabrice Bouquet, Elizabeta Fourneret, Jan Jürjens, Mass Soldal Lund, Sébastien Madelénat, JanTobias Muehlberg, Federica Paci, Stéphane Paul, Frank Piessens, Bjørnar Solhaug, Sven Wenzel: Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper). ServiceWave 2011: 134-143
[c81]Gábor Bergmann, Fabio Massacci, Federica Paci, Thein Than Tun, Dániel Varró, Yijun Yu: SeCMER: A Tool to Gain Control of Security Requirements Evolution. ServiceWave 2011: 321-322
[c80]Yudistira Asnar, Tong Li, Fabio Massacci, Federica Paci: Computer Aided Threat Identification. CEC 2011: 145-152- 2010
[j37]Gabor Karsai, Fabio Massacci, Leon J. Osterweil, Ina Schieferdecker: Evolving Embedded Systems. IEEE Computer 43(5): 34-40 (2010)
[j36]Jan Camenisch, Javier Lopez, Fabio Massacci, Massimo Ciscato, Thomas Skordas: JCS special issue on EU-funded ICT research on Trust and Security. Journal of Computer Security 18(1): 1-5 (2010)
[j35]Luca Compagna, Paul El Khoury, Fabio Massacci, Ayda Saïdane: A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application. Transactions on Computational Science 10: 1-24 (2010)
[c79]Gabriele Costa, Nicola Dragoni, Aliaksandr Lazouski, Fabio Martinelli, Fabio Massacci, Ilaria Matteucci: Extending Security-by-Contract with Quantitative Trust on Mobile Devices. CISIS 2010: 872-877
[c78]Stephan Neuhaus, Fabio Massacci: Towards Security Climate Forecasts. Future Internet Assembly 2010: 41-50
[c77]Riccardo Scandariato, Fabio Massacci: SecureChange: Security Engineering for Lifelong Evolvable Systems. ISoLA (2) 2010: 9-12
[c76]Olga Gadyatskaya, Fabio Massacci, Federica Paci, Sergey Stankevich: Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications. NordSec 2010: 187-192
[c75]Fabio Massacci: Infringo ergo sum: when will software engineering support infringements? FoSER 2010: 233-238
[c74]Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci: Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract? WISTP 2010: 221-228
[p1]Fabio Massacci, John Mylopoulos, Nicola Zannone: Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology. Advances in Intelligent Information Systems 2010: 147-174
[e6]Fabio Massacci, Dan S. Wallach, Nicola Zannone (Eds.): Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings. Lecture Notes in Computer Science 5965, Springer 2010, ISBN 978-3-642-11746-6
2000 – 2009
- 2009
[j34]Luca Compagna, Paul El Khoury, Alzbeta Krausová, Fabio Massacci, Nicola Zannone: How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artif. Intell. Law 17(1): 1-30 (2009)
[j33]Nicola Dragoni, Fabio Massacci, Ayda Saïdane: A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems. Computer Networks 53(10): 1628-1648 (2009)
[j32]Nicola Dragoni, Fabio Massacci, Thomas Walter, Christian Schaefer: What the heck is this application doing? - A security-by-contract architecture for pervasive services. Computers & Security 28(7): 566-577 (2009)
[j31]Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe: The S3MS.NET Run Time Monitor: Tool Demonstration. Electr. Notes Theor. Comput. Sci. 253(5): 153-159 (2009)
[j30]Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadko: Generalized XML security views. Int. J. Inf. Sec. 8(3): 173-203 (2009)
[j29]Nataliia Bielova, Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka, Ida Siahaan: Matching in security-by-contract for mobile code. J. Log. Algebr. Program. 78(5): 340-358 (2009)
[c73]Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin: Logging key assurance indicators in business processes. ASIACCS 2009: 364-367
[c72]Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Ida Siahaan, Dries Vanoverberghe: A Security Architecture for Web 2.0 Applications. Future Internet Assembly 2009: 35-46
[c71]Alzbeta Krausová, Fabio Massacci, Ayda Saïdane: How to capture and use legal patterns in IT. ICAIL 2009: 228-229
[c70]Daniela Marino, Fabio Massacci, Andrea Micheletti, Nataliya Rassadko, Stephan Neuhaus: Satisfaction of Control Objectives by Control Processes. ICSOC/ServiceWave 2009: 531-545
[c69]Nataliia Bielova, Fabio Massacci, Andrea Micheletti: Towards Practical Enforcement Theories. NordSec 2009: 239-254
[c68]Fabio Massacci, Viet Hung Nguyen: Goal-Oriented Access Control Model for Ambient Assisted Living. PrimeLife 2009: 160-173
[c67]Alzbeta Krausová, Fabio Massacci, Ayda Saïdane: Legal Patterns Implement Trust in IT Requirements: When Legal Means are the "Best" Implementation of IT Technical Goals. RELAW 2009: 33-38
[e5]Fabio Massacci, Samuel T. Redwine Jr., Nicola Zannone (Eds.): Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings. Lecture Notes in Computer Science 5429, Springer 2009, ISBN 978-3-642-00198-7- 2008
[j28]
[j27]Luca Compagna, Volkmar Lotz, Fabio Massacci: Preface. Electr. Notes Theor. Comput. Sci. 197(2): 1-2 (2008)
[j26]Fabio Martinelli, Fabio Massacci, Paolo Mori, Christian Schaefer, Thomas Walter: Enhancing Java ME Security Support with Resource Usage Monitoring. ERCIM News 2008(75) (2008)
[j25]Lieven Desmet, Wouter Joosen, Fabio Massacci, Pieter Philippaerts, Frank Piessens, Ida Siahaan, Dries Vanoverberghe: Security-by-contract on the .NET platform. Inf. Sec. Techn. Report 13(1): 25-32 (2008)
[j24]
[j23]Hristo Koshutanski, Fabio Massacci: Interactive access control for autonomic systems: From theory to implementation. TAAS 3(3) (2008)
[j22]Volkmar Lotz, Emmanuel Pigout, Peter M. Fischer, Donald Kossmann, Fabio Massacci, Alexander Pretschner: Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach. Wirtschaftsinformatik 50(5): 383-391 (2008)
[c66]Fabio Massacci, Katsiaryna Naliuka: Towards Practical Security Monitors of UML Policies for Mobile Applications. ARES 2008: 1112-1119
[c65]Fabio Massacci, Frank Piessens, Ida Siahaan: Security-By-Contract for the Future Internet. FIS 2008: 29-43
[c64]Nataliia Bielova, Fabio Massacci: Do You Really Mean What You Actually Enforced?. Formal Aspects in Security and Trust 2008: 287-301
[c63]Fabio Massacci, Nicola Zannone: A Model-Driven Approach for the Specification and Analysis of Access Control Policies. OTM Conferences (2) 2008: 1087-1103
[c62]Fabio Massacci, Ida Siahaan: Simulating midlet's security claims with automata modulo theory. PLAS 2008: 1-9
[c61]Azzedine Benameur, Fabio Massacci, Nataliya Rassadko: Security views for outsourced business processes. SWS 2008: 45-52
[e4]Akshai Aggarwal, Mohamad Badra, Fabio Massacci (Eds.): NTMS 2008, 2nd International Conference on New Technologies, Mobility and Security, November 5-7, 2008, Tangier, Morocco. IEEE 2008- 2007
[j21]Fabio Massacci, John Mylopoulos, Nicola Zannone: Computer-aided Support for Secure Tropos. Autom. Softw. Eng. 14(3): 341-364 (2007)
[j20]Yücel Karabulut, Florian Kerschbaum, Fabio Massacci, Philip Robinson, Artsiom Yautsiukhin: Security and Trust in IT Business Outsourcing: a Manifesto. Electr. Notes Theor. Comput. Sci. 179: 47-58 (2007)
[j19]Fabio Massacci, John Mylopoulos, Nicola Zannone: From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach. International Journal of Software Engineering and Knowledge Engineering 17(2): 265-284 (2007)
[j18]Hristo Koshutanski, Fabio Massacci: A Negotiation Scheme for Access Rights Establishment in Autonomic Communication. J. Network Syst. Manage. 15(1): 117-136 (2007)
[c60]Yudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone: From Trust to Dependability through Risk Analysis. ARES 2007: 19-26
[c59]Fabio Massacci, Artsiom Yautsiukhin: Modelling Quality of Protection in Outsourced Business Processes. IAS 2007: 247-252
[c58]Lieven Desmet, Wouter Joosen, Fabio Massacci, Katsiaryna Naliuka, Pieter Philippaerts, Frank Piessens, Dries Vanoverberghe: A flexible security architecture to support third-party applications on mobile devices. CSAW 2007: 19-28
[c57]Fabio Massacci, Artsiom Yautsiukhin: An algorithm for the appraisal of assurance indicators for complex business processes. QoP 2007: 22-27
[c56]Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka, Ida Siahaan: Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code. EuroPKI 2007: 297-312
[c55]Luca Compagna, Paul El Khoury, Fabio Massacci, Reshma Thomas, Nicola Zannone: How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach. ICAIL 2007: 149-153
[c54]Hugo A. López, Fabio Massacci, Nicola Zannone: Goal-Equivalent Secure Business Process Re-engineering. ICSOC Workshops 2007: 212-223
[c53]Fabio Massacci, Katsiaryna Naliuka: Towards Practical Security Monitors of UML Policies for Mobile Applications. POLICY 2007: 278
[c52]
[c51]Alexander Pretschner, Fabio Massacci, Manuel Hilty: Usage Control in Service-Oriented Architectures. TrustBus 2007: 83-93
[c50]- 2006
[j17]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Requirements engineering for trust management: model, methodology, and reasoning. Int. J. Inf. Sec. 5(4): 257-274 (2006)
[j16]Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson: Verifying the SET Purchase Protocols. J. Autom. Reasoning 36(1-2): 5-37 (2006)
[j15]Simon Dobson, Spyros G. Denazis, Antonio Fernández, Dominique Gaïti, Erol Gelenbe, Fabio Massacci, Paddy Nixon, Fabrice Saffre, Nikita Schmidt, Franco Zambonelli: A survey of autonomic communications. TAAS 1(2): 223-259 (2006)
[j14]Fabio Massacci, John Mylopoulos, Nicola Zannone: Hierarchical hippocratic databases with minimal disclosure for virtual organizations. VLDB J. 15(4): 370-387 (2006)
[c49]Volha Bryl, Fabio Massacci, John Mylopoulos, Nicola Zannone: Designing Security Requirements Models Through Planning. CAiSE 2006: 33-47
[c48]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Detecting Conflicts of Interest. RE 2006: 308-311
[e3]Günter Karjoth, Fabio Massacci (Eds.): Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006. ACM 2006, ISBN 1-59593-553-3
[e2]Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio Massacci (Eds.): Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings. Lecture Notes in Computer Science 3986, Springer 2006, ISBN 3-540-34295-8
[e1]Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin (Eds.): Quality of Protection - Security Measurements and Metrics. Advances in Information Security 23, Springer 2006, ISBN 978-0-387-29016-4- 2005
[j13]Fabio Massacci, Marco Prest, Nicola Zannone: Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation. Computer Standards & Interfaces 27(5): 445-455 (2005)
[j12]Alexey Gotsman, Fabio Massacci, Marco Pistore: Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language. Electr. Notes Theor. Comput. Sci. 135(1): 59-77 (2005)
[j11]Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson: An overview of the verification of SET. Int. J. Inf. Sec. 4(1-2): 17-28 (2005)
[c47]Fabio Massacci, John Mylopoulos, Nicola Zannone: Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. ESORICS 2005: 438-454
[c46]Paolo Giorgini, Fabio Massacci, Nicola Zannone: Security and Trust Requirements Engineering. FOSAD 2005: 237-272
[c45]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Modeling Social and Individual Trust in Requirements Engineering Methodologies. iTrust 2005: 161-176
[c44]Hristo Koshutanski, Fabio Massacci: Interactive Credential Negotiation for Stateful Business Processes. iTrust 2005: 256-272
[c43]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Alberto Siena, Nicola Zannone: ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. iTrust 2005: 415-419
[c42]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Modeling Security Requirements Through Ownership, Permission and Delegation. RE 2005: 167-176
[c41]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: ST-Tool: A CASE Tool for Security Requirements Engineering. RE 2005: 451-452
[c40]Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadko: Generalized XML security views. SACMAT 2005: 77-84
[c39]Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera: Maintaining privacy on derived objects. WPES 2005: 10-19- 2004
[c38]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures. EuroPKI 2004: 98-111
[c37]Hristo Koshutanski, Fabio Massacci: A System for Interactive Authorization for Business Processes for Web Services. ICWE 2004: 521-525
[c36]Hristo Koshutanski, Fabio Massacci: An Interactive Trust Management and Negotiation Scheme. Formal Aspects in Security and Trust 2004: 115-128
[c35]Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning. iTrust 2004: 176-190
[c34]
[c33]Fabio Massacci, Nicola Zannone: Privacy Is Linking Permission to Purpose. Security Protocols Workshop 2004: 179-191
[c32]Fabio Massacci: Privacy is Linking Permission to Purpose (Transcript of Discussion). Security Protocols Workshop 2004: 192-198
[c31]- 2003
[j10]Claudia Fiorini, Enrico Martinelli, Fabio Massacci: How to fake an RSA signature by encoding modular root finding as a SAT problem. Discrete Applied Mathematics 130(2): 101-127 (2003)
[j9]Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson: Verifying the SET registration protocols. IEEE Journal on Selected Areas in Communications 21(1): 77-87 (2003)
[c30]Paolo Giorgini, Fabio Massacci, John Mylopoulos: Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard. ER 2003: 263-276
[c29]Giampaolo Bella, Stefano Bistarelli, Fabio Massacci: A Protocol's Life After Attacks.... Security Protocols Workshop 2003: 3-10
[c28]Hristo Koshutanski, Fabio Massacci: An access control framework for business processes for web services. XML Security 2003: 15-24- 2002
[c27]Luigia Carlucci Aiello, Fabio Massacci: Planning Attacks to Security Protocols: Case Studies in Logic Programming. Computational Logic: Logic Programming and Beyond 2002: 533-560
[c26]Giampaolo Bella, Lawrence C. Paulson, Fabio Massacci: The verification of an industrial payment protocol: the SET purchase phase. ACM Conference on Computer and Communications Security 2002: 12-20
[c25]Francesco M. Donini, Paolo Liberatore, Fabio Massacci, Marco Schaerf: Solving QBF by SMV. KR 2002: 578-592- 2001
[j8]Luigia Carlucci Aiello, Fabio Massacci: Attacking fair-exchange protocols: parallel models vs trace models. Electr. Notes Theor. Comput. Sci. 55(1): 51-68 (2001)
[j7]Luigia Carlucci Aiello, Fabio Massacci: Verifying security protocols as planning in logic programming. ACM Trans. Comput. Log. 2(4): 542-580 (2001)
[c24]Luis Fariñas del Cerro, David Fauthoux, Olivier Gasquet, Andreas Herzig, Dominique Longin, Fabio Massacci: Lotrec : The Generic Tableau Prover for Modal and Description Logics. IJCAR 2001: 453-458
[c23]Fabio Massacci: Decision Procedures for Expressive Description Logics with Intersection, Composition, Converse of Roles and Role Identity. IJCAI 2001: 193-198- 2000
[j6]
[j5]Giuseppe De Giacomo, Fabio Massacci: Combining Deduction and Model Checking into Tableaux and Algorithms for Converse-PDL. Inf. Comput. 162(1-2): 117-137 (2000)
[j4]Fabio Massacci, Laura Marraro: Logical Cryptanalysis as a SAT Problem. J. Autom. Reasoning 24(1/2): 165-203 (2000)
[j3]
[j2]Fabio Massacci: The proof complexity of analytic and clausal tableaux. Theor. Comput. Sci. 243(1-2): 477-487 (2000)
[c22]
[c21]Luigia Carlucci Aiello, Fabio Massacci: An Executable Specification Language for Planning Attacks to Security Protocols. CSFW 2000: 88-102
[c20]Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano: Formal Verification of Cardholder Registration in SET. ESORICS 2000: 159-174
[c19]Fabio Massacci: Reduction rules and universal variables for first order tableaux and DPLL. KR 2000: 186-197
[c18]Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano: Making Sense of Specifications: The Formalization of SET. Security Protocols Workshop 2000: 74-81
[c17]Fabio Massacci, Francesco M. Donini: Design and Results of TANCS-2000 Non-classical (Modal) Systems Comparison. TABLEAUX 2000: 52-56
[i1]Maarit Hietalahti, Fabio Massacci, Ilkka Niemelä: DES: a Challenge Problem for Nonmonotonic Reasoning Systems. CoRR cs.AI/0003039 (2000)
1990 – 1999
- 1999
[c16]
[c15]Fabio Massacci: Design and Results of the Tableaux-99 Non-classical (Modal) Systems Comparison. TABLEAUX 1999: 14-18
[c14]Fabio Massacci: Automated Reasoning and the Verification of Security Protocols. TABLEAUX 1999: 32-33- 1998
[j1]Fabio Massacci: Tableau Methods for Formal Verification of Multi-Agent Distributed Systems. J. Log. Comput. 8(3): 373-400 (1998)
[c13]
[c12]Fabio Massacci: Cook and Reckhow are Wrong: Subexponential Tableaux Proofs for Their Family of Formulae. ECAI 1998: 408-409
[c11]Fabio Massacci: Simplification: A General Constraint Propagation Technique for Propositional and Modal Tableaux. TABLEAUX 1998: 217-231- 1997
[c10]Fabio Massacci: A Proof Theory for Tractable Approximations of Propositional Reasoning. AI*IA 1997: 219-230
[c9]
[c8]Fabio Massacci: Reasoning About Security: A Logic and a Decision Method for Role-Based Access Control. ECSQARU-FAPR 1997: 421-435
[c7]- 1996
[c6]
[c5]Giuseppe De Giacomo, Fabio Massacci: Tableaux and Algorithms for Propositional Dynamic Logic with Converse. CADE 1996: 613-627
[c4]Giuseppe De Giacomo, Francesco M. Donini, Fabio Massacci: Exptime Tableaux for ALC. Description Logics 1996: 107-110
[c3]
[c2]Francesco M. Donini, Fabio Massacci, Daniele Nardi, Riccardo Rosati: A Uniform Tableaux Method for Nonmonotonic Modal Logics. JELIA 1996: 87-103- 1994
[c1]
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:12 CEST by the dblp team



