Остановите войну!
for scientists:
default search action
Luigi Logrippo
- > Home > Persons > Luigi Logrippo
Publications
- 2023
- [c67]Daniel Amyot, Luigi Logrippo, John Mylopoulos, Marco Roveri, Amal Ahmed Anda, Alireza Parvizimosaed, Sofana Alfuhaid, Sepehr Sharifi, Aidin Rasti, Regan Meloche, Daniel Sousa-Diaz:
Engineering Smart Contracts with Symboleo: A Progress Report. CASCON 2023: 235-237 - 2022
- [j38]Alireza Parvizimosaed, Sepehr Sharifi, Daniel Amyot, Luigi Logrippo, Marco Roveri, Aidin Rasti, Ali Roudak, John Mylopoulos:
Specification and analysis of legal contracts with Symboleo. Softw. Syst. Model. 21(6): 2395-2427 (2022) - [c66]Alireza Parvizimosaed, Marco Roveri, Aidin Rasti, Daniel Amyot, Luigi Logrippo, John Mylopoulos:
Model-checking legal contracts with SymboleoPC. MoDELS 2022: 278-288 - [c65]Aidin Rasti, Daniel Amyot, Alireza Parvizimosaed, Marco Roveri, Luigi Logrippo, Amal Ahmed Anda, John Mylopoulos:
Symboleo2SC: from legal contract specifications to smart contracts. MoDELS 2022: 300-310 - 2021
- [c64]John Mylopoulos, Daniel Amyot, Luigi Logrippo, Alireza Parvizimosaed, Sepehr Sharifi:
Social Requirements Models for Services. Next-Gen Digital Services 2021: 100-108 - 2020
- [c63]Alireza Parvizimosaed, Sepehr Sharifi, Daniel Amyot, Luigi Logrippo, John Mylopoulos:
Subcontracting, Assignment, and Substitution for Legal Contracts in Symboleo. ER 2020: 271-285 - [c62]John Mylopoulos, Daniel Amyot, Luigi Logrippo, Alireza Parvizimosaed, Sepehr Sharifi:
Social Dependence Relationships in Requirements Engineering. iStar 2020: 55-60 - [c61]Sepehr Sharifi, Alireza Parvizimosaed, Daniel Amyot, Luigi Logrippo, John Mylopoulos:
Symboleo: Towards a Specification Language for Legal Contracts. RE 2020: 364-369 - 2018
- [e5]Abdessamad Imine, José M. Fernandez, Jean-Yves Marion, Luigi Logrippo, Joaquín García-Alfaro:
Foundations and Practice of Security - 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10723, Springer 2018, ISBN 978-3-319-75649-3 [contents] - 2017
- [j35]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo:
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets. Int. J. Inf. Sec. 16(1): 91-113 (2017) - [c58]Sofiene Boulares, Kamel Adi, Luigi Logrippo:
Insider Threat Likelihood Assessment for Flexible Access Control. MCETECH 2017: 77-95 - 2016
- [c57]Sofiene Boulares, Kamel Adi, Luigi Logrippo:
Insider Threat Likelihood Assessment for Access Control Systems: Quantitative Approach. FPS 2016: 135-142 - 2015
- [j34]Jamal Abd-Ali, Karim El Guemhioui, Luigi Logrippo:
A Metamodel for Hybrid Access Control Policies. J. Softw. 10(7): 784-797 (2015) - [c56]Sofiene Boulares, Kamel Adi, Luigi Logrippo:
Information Flow-Based Security Levels Assessment for Access Control Systems. MCETECH 2015: 105-121 - [c55]Jamal Abd-Ali, Karim El Guemhioui, Luigi Logrippo:
Metamodelling with Formal Semantics with Application to Access Control Specification. MODELSWARD 2015: 354-362 - 2013
- [j33]Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo:
A framework for risk assessment in access control systems. Comput. Secur. 39: 86-103 (2013) - [c52]Waël Hassan, Luigi Logrippo:
Towards a process for legally compliant software. RELAW 2013: 44-52 - [c51]Salim Khamadja, Kamel Adi, Luigi Logrippo:
Designing flexible access control models for the cloud. SIN 2013: 225-232 - [c50]Salim Khamadja, Kamel Adi, Luigi Logrippo:
An access control framework for hybrid policies. SIN 2013: 282-286 - 2012
- [j32]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo:
Dynamic risk-based decision methods for access control systems. Comput. Secur. 31(4): 447-464 (2012) - [c49]Bernard Stepien, Hemanth Khambhammettu, Kamel Adi, Luigi Logrippo:
CatBAC: A generic framework for designing and validating hybrid access control models. ICC 2012: 6721-6726 - [c48]Muyiwa Olurin, Carlisle Adams, Luigi Logrippo:
Platform for privacy preferences (P3P): Current status and future directions. PST 2012: 217-220 - [c47]Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo:
A Framework for Threat Assessment in Access Control Systems. SEC 2012: 187-198 - 2011
- [j31]Yacine Bouzida, Luigi Logrippo, Serge Mankovski:
Concrete- and abstract-based access control. Int. J. Inf. Sec. 10(4): 223-238 (2011) - [c46]Nadera Slimani, Hemanth Khambhammettu, Kamel Adi, Luigi Logrippo:
UACML: Unified Access Control Modeling Language. NTMS 2011: 1-8 - [c45]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Risk-based decision method for access control systems. PST 2011: 189-192 - 2010
- [c44]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Inconsistency detection method for access control policies. IAS 2010: 204-209 - [c43]Waël Hassan, Nadera Slimani, Kamel Adi, Luigi Logrippo:
Secrecy UML Method for Model Transformations. ASM 2010: 400 - [c42]Ji Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski:
Risk Analysis in Access Control Systems Based on Trust Theories. Web Intelligence/IAT Workshops 2010: 415-418 - [c41]Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Risk management in dynamic role based access control systems. ICDIM 2010: 1-8 - [c40]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Detecting incompleteness in access control policies using data classification schemes. ICDIM 2010: 417-422 - [c39]Ji Ma, Kamel Adi, Mohamed Mejri, Luigi Logrippo:
Risk analysis in access control systems. PST 2010: 160-166 - 2009
- [c38]Waël Hassan, Luigi Logrippo:
Interactions among secrecy models - (Work-in-progress paper). ICFI 2009: 160-165 - [c37]Kamel Adi, Yacine Bouzida, Ikhlass Hattak, Luigi Logrippo, Serge Mankovski:
Typing for Conflict Detection in Access Control Policies. MCETECH 2009: 212-226 - [c36]Waël Hassan, Luigi Logrippo:
Governance Requirements Extraction Model for Legal Compliance Validation. RELAW 2009: 7-12 - 2008
- [c35]Waël Hassan, Luigi Logrippo:
Requirements and compliance in legal systems: a logic approach. RELAW 2008: 40-44 - 2007
- [j30]Rui Gustavo Crespo, Miguel Carvalho, Luigi Logrippo:
Distributed resolution of feature interactions for internet applications. Comput. Networks 51(2): 382-397 (2007) - [j29]Yiqun Xu, Luigi Logrippo, Jacques Sincennes:
Detecting feature interactions in CPL. J. Netw. Comput. Appl. 30(2): 775-799 (2007) - [c33]Ahmed F. Layouni, Luigi Logrippo, Kenneth J. Turner:
Conflict Detection in Call Control Using First-Order Logic Model Checking. ICFI 2007: 66-82 - 2006
- [j28]Kamel Adi, Daniel Amyot, Luigi Logrippo:
Foreword - New technologies in distributed systems. Ann. des Télécommunications 61(11-12): 1226-1228 (2006) - [j27]Dongmei Jiang, Ramiro Liscano, Luigi Logrippo:
Personalization of internet telephony services for presence with SIP and extended CPL. Comput. Commun. 29(18): 3766-3779 (2006) - [j26]Nicolas Gorse, Luigi Logrippo, Jacques Sincennes:
Detecting feature interaction in CPL. Softw. Syst. Model. 5(2): 121-134 (2006) - [j25]Nicolas Gorse, Luigi Logrippo, Jacques Sincennes:
Formal detection of feature interactions with logic programming and LOTOS. Softw. Syst. Model. 5(2): 135 (2006) - 2005
- [j24]Daniel Amyot, Luigi Logrippo, Michael Weiss:
Generation of test purposes from Use Case Maps. Comput. Networks 49(5): 643-660 (2005) - [j23]Daniel Amyot, Tom Gray, Ramiro Liscano, Luigi Logrippo, Jacques Sincennes:
Interactive conflict detection and resolution for personalized features. J. Commun. Networks 7(3): 353-366 (2005) - [c31]Waël Hassan, Luigi Logrippo:
Governance Policies for Privacy Access Control and their Interactions. FIW 2005: 114-130 - 2004
- [j22]Daniel Amyot, Luigi Logrippo:
Directions in feature interaction research. Comput. Networks 45(5): 563-567 (2004) - [j21]Petre Dini, Alexander Clemm, Tom Gray, Fuchun Joseph Lin, Luigi Logrippo, Stephan Reiff-Marganiec:
Policy-enabled mechanisms for feature interactions: reality, expectations, challenges. Comput. Networks 45(5): 585-603 (2004) - 2003
- [e4]Daniel Amyot, Luigi Logrippo:
Feature Interactions in Telecommunications and Software Systems VII, June 11-13, 2003, Ottawa, Canada. IOS Press 2003, ISBN 1-58603-348-4 [contents] - 2002
- [j20]Bernard Stepien, Luigi Logrippo:
Graphic visualization and animation of LOTOS execution traces. Comput. Networks 40(5): 665-681 (2002) - [c30]Rui Gustavo Crespo, Luigi Logrippo, Tom Gray:
Feature Execution Trees and Interactions. PDPTA 2002: 1230-1236 - 2000
- [j19]Xiao Jun Chen, Luigi Logrippo:
Deriving use cases for distributed systems from knowledge requirements. Ann. des Télécommunications 55(1-2): 45-57 (2000) - [j18]Q. Fu, P. Harnois, Luigi Logrippo, Jacques Sincennes:
Feature interaction detection: a LOTOS-based approach. Comput. Networks 32(4): 433-448 (2000) - [j15]Daniel Amyot, Luigi Logrippo:
Use Case Maps and LOTOS for the prototyping and validation of a mobile group call system. Comput. Commun. 23(12): 1135-1157 (2000) - [c28]Masahide Nakamura, Tohru Kikuno, Jameleddine Hassine, Luigi Logrippo:
Feature Interaction Filtering with Use Case Maps at Requirements Stage. FIW 2000: 163-178 - [c27]Daniel Amyot, Leïla Charfi, Nicolas Gorse, Tom Gray, Luigi Logrippo, Jacques Sincennes, Bernard Stepien, Tom Ware:
Feature Description and Feature Interaction Analysis with Use Case Maps and LOTOS. FIW 2000: 274-289 - [c26]Daniel Amyot, Luigi Logrippo:
Structural Coverage For LOTOS - a Probe Insertion Technique. TestCom 2000: 19-34 - 1999
- [c25]Daniel Amyot, Luigi Logrippo, Raymond J. A. Buhr, Tom Gray:
Use Case Maps for the Capture and Validation of Distributed Systems Requirements. RE 1999: 44- - 1998
- [j13]Petre Dini, Luigi Logrippo:
Feature Interactions in Telecommunications Software. Comput. Networks 30(14): 1359-1362 (1998) - 1997
- [j12]Mohammed Faci, Luigi Logrippo, Bernard Stepien:
Structural Models for Specifying Telephone Systems. Comput. Networks ISDN Syst. 29(4): 501-528 (1997) - [e3]Petre Dini, Raouf Boutaba, Luigi Logrippo:
Feature Interactions in Telecommunications Networks IV, June 17-19, 1997, Montréal, Canada. IOS Press 1997, ISBN 90-5199-347-1 [contents] - 1995
- [c23]Bernard Stepien, Luigi Logrippo:
Representing and Verifying Intentions in Telephony Features Using Abstract Data Types. FIW 1995: 141-155 - [c22]Daniel Amyot, Francis Bordeleau, Raymond J. A. Buhr, Luigi Logrippo:
Formal Support for Design Techniques: A Timethreads-LOTOS Approach. FORTE 1995: 57-72 - 1994
- [c21]Mohammed Faci, Luigi Logrippo:
Specifying features and analysing their interactions in a LOTOS environment. FIW 1994: 136-151 - [c20]Bernard Stepien, Luigi Logrippo:
Feature interaction detection using backward reasoning with LOTOS. PSTV 1994: 71-86 - 1993
- [c19]Mohammed Faci, Luigi Logrippo:
Specifying Hardware Systems in LOTOS. CHDL 1993: 319-326 - 1992
- [j7]Luigi Logrippo, Mohammed Faci, Mazen Haj-Hussein:
An Introduction to LOTOS: Learning by Examples. Comput. Networks ISDN Syst. 23(5): 325-342 (1992) - [c17]Mazen Haj-Hussein, Luigi Logrippo, Jacques Sincennes:
Goal oriented execution for LOTOS. FORTE 1992: 311-327 - 1991
- [j6]Mohammed Faci, Luigi Logrippo, Bernard Stepien:
Formal Specification of Telephone Systems in LOTOS: The Contraint-Oriented Style Approach. Comput. Networks ISDN Syst. 21: 53-67 (1991) - 1990
- [e1]Luigi Logrippo, Robert L. Probert, Hasan Ural:
Protocol Specification, Testing and Verification X, Proceedings of the IFIP WG6.1 Tenth International Symposium on Protocol Specification, Testing and Verification, Ottawa, Ontario, Canada, 12-15 June, 1990. North-Holland 1990, ISBN 0-444-88810-1 [contents] - 1989
- [c11]Mohammed Faci, Luigi Logrippo, Bernard Stepien:
Formal Specifications of Telephone Systems in LOTOS. PSTV 1989: 25-34 - 1986
- [j4]Luigi Logrippo, Bernard Stepien:
Cluster analysis for the computer-assisted statistical analysis of melodies. Comput. Humanit. 20(1): 19-33 (1986) - 1984
- [c6]Luigi Logrippo, Didier Simon, Hasan Ural:
Executable Description of the OSI Transport Service in Prolog. PSTV 1984: 279-293 - 1982
- [c4]Luigi Logrippo, Robert L. Probert:
Protocol/Specification-Level Validation. PSTV 1982: 303-304
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 17:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint