Fabio Massacci
Fabio Massacci
Professor of Computer Science, University of Trento
Dirección de correo verificada de unitn.it - Página principal
Título
Citado por
Citado por
Año
A survey of autonomic communications
S Dobson, S Denazis, A Fernández, D Gaïti, E Gelenbe, F Massacci, ...
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 1 (2), 223-259, 2006
8262006
Modeling security requirements through ownership, permission and delegation
P Giorgini, F Massacci, J Mylopoulos, N Zannone
13th IEEE International Conference on Requirements Engineering (RE'05), 167-176, 2005
2572005
Logical cryptanalysis as a SAT problem
F Massacci, L Marraro
Journal of Automated Reasoning 24 (1-2), 165-203, 2000
1872000
EXPTIME tableaux for ALC
FM Donini, F Massacci
Artificial Intelligence 124 (1), 87-138, 2000
1832000
Requirements engineering meets trust management
P Giorgini, F Massacci, J Mylopoulos, N Zannone
International Conference on Trust Management, 176-190, 2004
1322004
Strongly analytic tableaux for normal modal logics
F Massacci
International Conference on Automated Deduction, 723-737, 1994
1241994
An access control framework for business processes for web services
H Koshutanski, F Massacci
Proceedings of the 2003 ACM workshop on XML security, 15-24, 2003
1212003
Integrating Security and Software Engineering: Advances and Future Visions: Advances and Future Visions
H Mouratidis
Igi Global, 2006
1142006
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
F Massacci, M Prest, N Zannone
Computer Standards & Interfaces 27 (5), 445-455, 2005
1112005
Requirements engineering for trust management: model, methodology, and reasoning
P Giorgini, F Massacci, J Mylopoulos, N Zannone
International Journal of Information Security 5 (4), 257-274, 2006
1072006
Combining deduction and model checking into tableaux and algorithms for converse-PDL
G De Giacomo, F Massacci
Information and Computation 162 (1-2), 117-137, 2000
1072000
Single step tableaux for modal logics
F Massacci
Journal of Automated Reasoning 24 (3), 319-364, 2000
1032000
Comparing vulnerability severity and exploits using case-control studies
L Allodi, F Massacci
ACM Transactions on Information and System Security (TISSEC) 17 (1), 1-20, 2014
962014
Comparing vulnerability severity and exploits using case-control studies
L Allodi, F Massacci
ACM Transactions on Information and System Security (TISSEC) 17 (1), 1-20, 2014
962014
Verifying security protocols as planning in logic programming
L Carlucci Aiello, F Massacci
ACM Transactions on Computational Logic (TOCL) 2 (4), 542-580, 2001
932001
Security and trust requirements engineering
P Giorgini, F Massacci, N Zannone
Foundations of Security Analysis and Design III, 237-272, 2005
922005
Verifying the SET registration protocols
G Bella, F Massacci, LC Paulson
IEEE Journal on Selected Areas in Communications 21 (1), 77-87, 2003
902003
Security-by-contract: Toward a semantics for digital signatures on mobile code
N Dragoni, F Massacci, K Naliuka, I Siahaan
European Public Key Infrastructure Workshop, 297-312, 2007
862007
Stadyna: Addressing the problem of dynamic code updates in the security analysis of android applications
Y Zhauniarovich, M Ahmad, O Gadyatskaya, B Crispo, F Massacci
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
842015
Generalized XML security views
G Kuper, F Massacci, N Rassadko
Proceedings of the tenth ACM symposium on Access control models and …, 2005
822005
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20