Fabio Massacci
Fabio Massacci
Professor of Computer Science, University of Trento
Dirección de correo verificada de unitn.it - Página principal
Título
Citado por
Citado por
Año
A survey of autonomic communications
S Dobson, S Denazis, A Fernández, D Gaïti, E Gelenbe, F Massacci, ...
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 1 (2), 223-259, 2006
7992006
Modeling security requirements through ownership, permission and delegation
P Giorgini, F Massacci, J Mylopoulos, N Zannone
13th IEEE International Conference on Requirements Engineering (RE'05), 167-176, 2005
2542005
EXPTIME tableaux for ALC
FM Donini, F Massacci
Artificial Intelligence 124 (1), 87-138, 2000
1812000
Logical cryptanalysis as a SAT problem
F Massacci, L Marraro
Journal of Automated Reasoning 24 (1-2), 165-203, 2000
1782000
Requirements engineering meets trust management
P Giorgini, F Massacci, J Mylopoulos, N Zannone
International Conference on Trust Management, 176-190, 2004
1302004
Strongly analytic tableaux for normal modal logics
F Massacci
International Conference on Automated Deduction, 723-737, 1994
1241994
An access control framework for business processes for web services
H Koshutanski, F Massacci
Proceedings of the 2003 ACM workshop on XML security, 15-24, 2003
1192003
Integrating Security and Software Engineering: Advances and Future Visions: Advances and Future Visions
H Mouratidis
Igi Global, 2006
1072006
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
F Massacci, M Prest, N Zannone
Computer Standards & Interfaces 27 (5), 445-455, 2005
1072005
Requirements engineering for trust management: model, methodology, and reasoning
P Giorgini, F Massacci, J Mylopoulos, N Zannone
International Journal of Information Security 5 (4), 257-274, 2006
1062006
Combining deduction and model checking into tableaux and algorithms for converse-PDL
G De Giacomo, F Massacci
Information and Computation 162 (1-2), 117-137, 2000
1062000
Single step tableaux for modal logics
F Massacci
Journal of Automated Reasoning 24 (3), 319-364, 2000
1012000
Comparing vulnerability severity and exploits using case-control studies
L Allodi, F Massacci
ACM Transactions on Information and System Security (TISSEC) 17 (1), 1-20, 2014
922014
Comparing vulnerability severity and exploits using case-control studies
L Allodi, F Massacci
ACM Transactions on Information and System Security (TISSEC) 17 (1), 1-20, 2014
922014
Verifying the SET registration protocols
G Bella, F Massacci, LC Paulson
IEEE Journal on Selected Areas in Communications 21 (1), 77-87, 2003
922003
Security and trust requirements engineering
P Giorgini, F Massacci, N Zannone
Foundations of Security Analysis and Design III, 237-272, 2005
902005
Verifying security protocols as planning in logic programming
L Carlucci Aiello, F Massacci
ACM Transactions on Computational Logic (TOCL) 2 (4), 542-580, 2001
902001
Security-by-contract: Toward a semantics for digital signatures on mobile code
N Dragoni, F Massacci, K Naliuka, I Siahaan
European Public Key Infrastructure Workshop, 297-312, 2007
842007
Generalized XML security views
G Kuper, F Massacci, N Rassadko
Proceedings of the tenth ACM symposium on Access control models and …, 2005
822005
The verification of an industrial payment protocol: The SET purchase phase
G Bella, LC Paulson, F Massacci
Proceedings of the 9th ACM conference on Computer and communications …, 2002
802002
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20