Fabio Martinelli

According to our database1, Fabio Martinelli
  • authored at least 267 papers between 1998 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention.
IEEE Trans. Dependable Sec. Comput., 2018

Evaluating model checking for cyber threats code obfuscation identification.
J. Parallel Distrib. Comput., 2018

Risk analysis of Android applications: A user-centric solution.
Future Generation Comp. Syst., 2018

R-PackDroid: Practical On-Device Detection of Android Ransomware.
CoRR, 2018

Practical Location Validation in Participatory Sensing Through Mobile WiFi Hotspots.
CoRR, 2018

A Secure Distributed Framework for Agglomerative Hierarchical Clustering Construction.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

CARS: Context Aware Reputation Systems to Evaluate Vehicles' Behaviour.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

Getmewhere: A Location-Based Privacy-Preserving Information Service.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

Cluster Analysis for Driver Aggressiveness Identification.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Who's Driving My Car? A Machine Learning based Approach to Driver Identification.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Identifying Insecure Features in Android Applications using Model Checking.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Secure Two-party Agglomerative Hierarchical Clustering Construction.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

VizMal: A Visualization Tool for Analyzing the Behavior of Android Malware.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Privacy Preserving Expectation Maximization (EM) Clustering Construction.
Proceedings of the Distributed Computing and Artificial Intelligence, 2018

POSTER: A Framework for Phylogenetic Analysis in Mobile Environment.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

2017
Stateful Data Usage Control for Android Mobile Devices.
Int. J. Inf. Sec., 2017

Cyber-insurance survey.
Computer Science Review, 2017

Private mobility-cast for opportunistic networks.
Computer Networks, 2017

A time series classification approach to game bot detection.
Proceedings of the 7th International Conference on Web Intelligence, Mining and Semantics, 2017

Privacy-Utility Feature Selection as a Privacy Mechanism in Collaborative Data Classification.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Implementing Usage Control in Internet of Things: A Smart Home Use Case.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Privacy Preserving Hierarchical Clustering over Multi-party Data Distribution.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Improving MQTT by Inclusion of Usage Control.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Mobile Silent and Continuous Authentication using Apps Sequence.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Try Walking in My Shoes, if You Can: Accurate Gait Recognition Through Deep Learning.
Proceedings of the Computer Safety, Reliability, and Security, 2017

R-PackDroid: API package-based characterization and detection of mobile ransomware.
Proceedings of the Symposium on Applied Computing, 2017

A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Trade-off analysis of safety and security in CAN bus communication.
Proceedings of the 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems, 2017

Concurrent History-based Usage Control Policies.
Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017

A Quantitative Partial Model-Checking Function and Its Optimisation.
Proceedings of the LPAR-21, 2017

Evaluating Convolutional Neural Network for Effective Mobile Malware Detection.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 21st International Conference KES-2017, 2017

Privacy preserving clustering over horizontal and vertical partitioned data.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Privacy-preserving text mining as a service.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Game Bot Detection in Online Role Player Game through Behavioural Features.
Proceedings of the 12th International Conference on Software Technologies, 2017

Model Checking for Mobile Android Malware Evolution.
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017

Identifying Mobile Repackaged Applications through Formal Methods.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Analysis of Data Sharing Agreements.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Car hacking identification through fuzzy logic algorithms.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

A fuzzy-based process mining approach for dynamic malware detection.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

Introducing Usage Control in MQTT.
Proceedings of the Computer Security, 2017

Privacy-Utility Feature Selection as a tool in Private Data Classification.
Proceedings of the Distributed Computing and Artificial Intelligence, 2017

Preventing the Drop in Security Investments for Non-competitive Cyber-Insurance Market.
Proceedings of the Risks and Security of Internet and Systems, 2017

BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

How Discover a Malware using Model Checking.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Tor traffic analysis and detection via machine learning techniques.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017

Malware and Formal Methods: Rigorous Approaches for detecting Malicious Behaviour.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions.
JoWUA, 2016

Usage Control on Cloud systems.
Future Generation Comp. Syst., 2016

Cybersecurity - Introduction to the Special Theme.
ERCIM News, 2016

LVS: A WiFi-based system to tackle Location Spoofing in location-based services.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

Modeling Privacy Aware Information Sharing Systems: A Formal and General Approach.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

On Probabilistic Application Compliance.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Enforcement of U-XACML History-Based Usage Control Policy.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

A multi-criteria ranking of security countermeasures.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Enhancing Android permission through usage control: a BYOD use-case.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

LoSeRO: a locality sensitive routing protocol in opportunistic networks.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Automated adaptation via quantitative partial model checking.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Security by Insurance for Services.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Towards a Usage Control Based Video Surveillance Framework.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

Exploiting Vehicles' Reputation to Mitigate DoS Attack.
Proceedings of the International Workshop on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn, 2016

Data-Sluice: Fine-grained traffic control for Android application.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Privacy-Aware Data Sharing in a Tree-Based Categorical Clustering Algorithm.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property.
Proceedings of the Formal Aspects of Component Software - 13th International Conference, 2016

Practical Privacy-Preserving Medical Diagnosis Using Homomorphic Encryption.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
A quality model for social networks populated with web services.
Service Oriented Computing and Applications, 2015

Probabilistic cost enforcement of security policies.
Journal of Computer Security, 2015

AntiCheetah: Trustworthy computing in an outsourced (cheating) environment.
Future Generation Comp. Syst., 2015

Semiring-based Specification Approaches for Quantitative Security.
Proceedings of the Proceedings Thirteenth Workshop on Quantitative Aspects of Programming Languages and Systems, 2015

Dynamics of Lattice Triangulations on Thin Rectangles.
CoRR, 2015

Detection of repackaged mobile applications through a collaborative approach.
Concurrency and Computation: Practice and Experience, 2015

Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Network security supported by arguments.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Preserving QoI in participatory sensing by tackling location-spoofing through mobile WiFi hotspots.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

Location-Based Routing for Opportunistic Networks.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Sharing Data through Confidential Clouds: An Architectural Perspective.
Proceedings of the 1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2015

Privacy-Preserving Energy-Reading for Smart Meter.
Proceedings of the Inclusive Smart Cities and e-Health, 2015

Fast and Effective Clustering of Spam Emails Based on Structural Similarity.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

Business Reputation of Social Networks of Web Services.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

There are Two Sides to Every Question - Controller Versus Attacker.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
On the Synthesis of Secure Services Composition.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Investigating the Privacy versus Forwarding Accuracy Tradeoff in OpportunisticInterest-Casting.
IEEE Trans. Mob. Comput., 2014

Testing of PolPA-based usage control systems.
Software Quality Journal, 2014

Automated Synthesis and Ranking of Secure BPMN Orchestrators.
IJSSE, 2014

Using Incentives to Analyze Social Web Services' Behaviors.
Proceedings of the Web Information Systems Engineering - WISE 2014 Workshops, 2014

Stateful Usage Control for Android Mobile Devices.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Architecture, Workflows, and Prototype for Stateful Data Usage Control in Cloud.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

On Security Countermeasures Ranking through Threat Analysis.
Proceedings of the Computer Safety, Reliability, and Security, 2014

Privacy-preserving mobility-casting in opportunistic networks.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Evaluation of Risk for Complex Systems Using Attack Surface.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

Usage Control in Cloud Federations.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

Debating Cybersecurity or Securing a Debate? - (Position Paper).
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Enforcing Mobile Application Security Through Probabilistic Contracts.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

Reputation-Based Composition of Social Web Services.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

An Improved Role-Based Access to Android Applications with JCHR.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Cost-Effective Enforcement of Access and Usage Control Policies Under Uncertainties.
IEEE Systems Journal, 2013

Secure and Privacy-Aware Mobile Identity Management.
ERCIM News, 2013

Privacy-Preserving Interest-Cast for Android Smartphones.
ERCIM News, 2013

A Survey on Security for Mobile Devices.
IEEE Communications Surveys and Tutorials, 2013

Usage control in SIP-based multimedia delivery.
Computers & Security, 2013

AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Formal Analysis of Security Metrics with Defensive Actions.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Random lattice triangulations: structure and algorithms.
Proceedings of the Symposium on Theory of Computing Conference, 2013

Probabilistic Cost Enforcement of Security Policies.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

Towards Attribute-Based Access Control Policy Engineering Using Risk.
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013

Remote Policy Enforcement for Trusted Application Execution in Mobile Environments.
Proceedings of the Trusted Systems - 5th International Conference, 2013

Towards Policy Engineering for Attribute-Based Access Control.
Proceedings of the Trusted Systems - 5th International Conference, 2013

Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

CheR: Cheating Resilience in the Cloud via Smart Resource Allocation.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Quantitative Evaluation of Enforcement Strategies - Position Paper.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Partial Model Checking for the Verification and Synthesis of Secure Service Compositions.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

Classifying Android Malware through Subgraph Mining.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Introducing Probabilities in Contract-Based Approaches for Mobile Application Security.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

A collaborative framework for generating probabilistic contracts.
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

Are photos on Social Networks really private?
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

Multi-dimensional Secure Service Orchestration.
Proceedings of the Business Process Management Workshops, 2013

Towards enforcing on-the-fly policies in BYOD environments.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

How to grant less permissions to facebook applications.
Proceedings of the 9th International Conference on Information Assurance and Security, 2013

Probabilistic Contract Compliance for Mobile Applications.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Automated Synthesis and Ranking of Secure BPMN Orchestrators.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
A framework for automatic generation of security controller.
Softw. Test., Verif. Reliab., 2012

Synthesis of secure adaptors.
J. Log. Algebr. Program., 2012

Modular plans for secure service composition.
Journal of Computer Security, 2012

Metric-Aware Secure Service Orchestration
Proceedings of the Proceedings Fifth Interaction and Concurrency Experience, 2012

A semiring-based framework for the deduction/abduction reasoning in access control with weighted credentials.
Computers & Mathematics with Applications, 2012

Privacy-preserving interest-casting in opportunistic networks.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

A Prototype for Enforcing Usage Control Policies Based on XACML.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

Cost-Aware Runtime Enforcement of Security Policies.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Continuous Authorizations in SIP with Usage Control.
Proceedings of the 20th Euromicro International Conference on Parallel, 2012

A tool for the synthesis of cryptographic orchestrators.
Proceedings of the Model-Driven Security Workshop, 2012

An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

From Qualitative to Quantitative Enforcement of Security Policy.
Proceedings of the Computer Network Security, 2012

MADAM: A Multi-level Anomaly Detector for Android Malware.
Proceedings of the Computer Network Security, 2012

A Quantitative Approach for Inexact Enforcement of Security Policies.
Proceedings of the Information Security - 15th International Conference, 2012

A Multi-criteria-Based Evaluation of Android Applications.
Proceedings of the Trusted Systems, 4th International Conference, 2012

Testing of PolPA authorization systems.
Proceedings of the 7th International Workshop on Automation of Software Test, 2012

Usage control in cloud systems.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Towards Modelling Adaptive Attacker's Behaviour.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

Quantitative access control with partially-observable Markov decision processes.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Priorities-Based Review Computation.
Proceedings of the Intelligent Web Services Meet Social Computing, 2012

A Formal Support for Collaborative Data Sharing.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
The Multistate Hard Core Model on a Regular Tree.
SIAM J. Discrete Math., 2011

Convergence to equilibrium of biased plane Partitions.
Random Struct. Algorithms, 2011

Secure service orchestration in open networks.
Journal of Systems Architecture - Embedded Systems Design, 2011

Formal Analysis of Security Metrics and Risk.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

Security and Trust.
Proceedings of the Formal Methods for Eternal Networked Software Systems, 2011

A General Method for Assessment of Security in Complex Services.
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

Preserving security properties under refinement.
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011

Sharp Mixing Time Bounds for Sampling Random Surfaces.
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011

Engineering Secure Future Internet Services.
Proceedings of the Future Internet, 2011

A Distributed Authorization System with Mobile Usage Control Policies.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011

Risk-Based Auto-delegation for Probabilistic Availability.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Cost-effective Enforcement of UCONA Policies.
Proceedings of the CRiSIS 2011, 2011

2010
Access and Usage Control in Grid Systems.
Proceedings of the Handbook of Information and Communication Security, 2010

Special issue on security and trust management for dynamic coalitions.
Security and Communication Networks, 2010

Security-by-Contract-with-Trust for Mobile Devices.
JoWUA, 2010

On usage control for GRID systems.
Future Generation Comp. Syst., 2010

Parental Control for Mobile Devices.
ERCIM News, 2010

Usage control in computer security: A survey.
Computer Science Review, 2010

Mixing Time for the Solid-on-Solid Model
CoRR, 2010

Runtime monitoring for next generation Java ME platform.
Computers & Security, 2010

Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks.
Computer Communications, 2010

Usage Control, Risk and Trust.
Proceedings of the Trust, 2010

Influence of Attribute Freshness on Decision Making in Usage Control.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Risk-Based Usage Control for Service Oriented Architecture.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

Enforcing UCON Policies on the Enterprise Service Bus.
Proceedings of the On the Move to Meaningful Internet Systems, 2010

Modular Plans for Secure Service Composition.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

Formal approach to security metrics.: what does "more secure" mean for you?
Proceedings of the Software Architecture, 4th European Conference, 2010

Extending Security-by-Contract with Quantitative Trust on Mobile Devices.
Proceedings of the CISIS 2010, 2010

A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints.
Proceedings of the Autonomic and Trusted Computing - 7th International Conference, 2010

2009
Securing Java with Local Policies.
Journal of Object Technology, 2009

Enhancing grid security by fine-grained behavioral control and negotiation-based authorization.
Int. J. Inf. Sec., 2009

Towards Information Flow Properties for Distributed Systems.
Electr. Notes Theor. Comput. Sci., 2009

Preface.
Electr. Notes Theor. Comput. Sci., 2009

Mixing time for the solid-on-solid model.
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009

Detection of images with adult content for parental control on mobile devices?
Proceedings of the 6th International Conference on Mobile Technology, 2009

On Usage Control in Data Grids.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

A Proposal on Enhancing XACML with Continuous Usage Control Features.
Proceedings of the Grids, 2009

Idea: Action Refinement for Security Properties Enforcement.
Proceedings of the Engineering Secure Software and Systems, 2009

On Usage Control for GRID Services.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

Executable Specification of Cryptofraglets in Maude for Security Verification.
Proceedings of the Bioinspired Models of Network, Information, and Computing Systems, 2009

2008
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks.
J. Autom. Reasoning, 2008

Enhancing Java ME Security Support with Resource Usage Monitoring.
ERCIM News, 2008

Controlling Usage in Business Process Workflows through Fine-Grained Security Policies.
Proceedings of the Trust, 2008

Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach.
Proceedings of the Towards a Service-Based Internet, 2008

A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application.
Proceedings of the Leveraging Applications of Formal Methods, 2008

A Runtime Monitoring Environment for Mobile Java.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

A Uniform Approach to Security and Fault-Tolerance Specification and Analysis.
Proceedings of the Architecting Dependable Systems VI, 2008

Mobile Implementation and Formal Verification of an e-Voting System.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

Enhancing Java ME Security Support with Resource Usage Monitoring.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Signed and Weighted Trust Credentials in Fraglets.
Proceedings of the 3rd International ICST Conference on Bio-Inspired Models of Network, 2008

A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

Synthesis of Local Controller Programs for Enforcing Global Security Properties.
Proceedings of the The Third International Conference on Availability, 2008

Weighted Datalog and Levels of Trust.
Proceedings of the The Third International Conference on Availability, 2008

2007
Fast mixing for independent sets, colorings, and other models on trees.
Random Struct. Algorithms, 2007

Guest Editors' Preface.
Int. J. Inf. Sec., 2007

Formal Modelling and Verification in Service-Oriented Computing.
ERCIM News, 2007

A Uniform Framework for Security and Trust Modeling and Analysis with Crypto-CCS.
Electr. Notes Theor. Comput. Sci., 2007

On Relating and Integrating Two Trust Management Frameworks.
Electr. Notes Theor. Comput. Sci., 2007

Through Modeling to Synthesis of Security Automata.
Electr. Notes Theor. Comput. Sci., 2007

An Approach for the Specification, Verification and Synthesis of Secure Systems.
Electr. Notes Theor. Comput. Sci., 2007

Synthesis of Web Services Orchestrators in a Timed Setting.
Proceedings of the Web Services and Formal Methods, 4th International Workshop, 2007

A model for usage control in GRID systems.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

A model for usage control in GRID systems.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Fine Grained Access Control with Trust and Reputation Management for Globus.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Enhancing Java Security with History Based Access Control.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

Extending the Globus Architecture with Role-Based Trust Management.
Proceedings of the Computer Aided Systems Theory, 2007

Access Control Mechanisms for Fraglets.
Proceedings of the 2nd International ICST Conference on Bio-Inspired Models of Network, 2007

2006
Formal analysis of some secure procedures for certificate delivery.
Softw. Test., Verif. Reliab., 2006

A Formalization of Credit and Responsibility Within the GNDC Schema.
Electr. Notes Theor. Comput. Sci., 2006

A Fine-Grained and X.509-Based Access Control System for Globus.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006

Fine-grained and History-based Access Control with Trust Management for Autonomic Grid Services.
Proceedings of the 2006 International Conference on Autonomic and Autonomous Systems (ICAS 2006), 2006

2005
Theoretical foundations of security analysis and design II.
Theor. Comput. Sci., 2005

Relating multiset rewriting and process algebras for security protocol analysis.
Journal of Computer Security, 2005

Logical Specification and Analysis of Fault Tolerant Systems Through Partial Model Checking.
Electr. Notes Theor. Comput. Sci., 2005

Preface.
Electr. Notes Theor. Comput. Sci., 2005

SEAS, a secure e-voting protocol: Design and implementation.
Computers & Security, 2005

A Flexible Framework for Access Control Based on Ability Authentication.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005

Towards Continuous Usage Control on Grid Computational Services.
Proceedings of the Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, 2005

Towards an Integrated Formal Analysis for Security and Trust.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2005

2004
A simple framework for real-time cryptographic protocol analysis with compositional proof rules.
Sci. Comput. Program., 2004

Automated analysis of timed security: a case study on web privacy.
Int. J. Inf. Sec., 2004

Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability.
Electr. Notes Theor. Comput. Sci., 2004

Fast mixing for independent sets, colorings and other models on trees.
Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2004

Improving Grid Services Security with Fine Grain Policies.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

Local Management of Credits and Debits in Mobile Ad Hoc Networks.
Proceedings of the Communications and Multimedia Security, 2004

2003
Analysis of security protocols as open systems.
Theor. Comput. Sci., 2003

A comparison of three authentication properties.
Theor. Comput. Sci., 2003

Real-time information flow analysis.
IEEE Journal on Selected Areas in Communications, 2003

Biometrics to Enhance Smartcard Security (Discussion).
Proceedings of the Security Protocols, 2003

Biometrics to Enhance Smartcard Security.
Proceedings of the Security Protocols, 2003

Symbolic Partial Model Checking for Security Analysis.
Proceedings of the Computer Network Security, 2003

Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols.
Proceedings of the Computer Network Security, 2003

Process Algebraic Frameworks for the Specification and Analysis of Cryptographic Protocols.
Proceedings of the Mathematical Foundations of Computer Science 2003, 2003

SEAS: A Secure E-Voting Applet System.
Proceedings of the Software Security, 2003

Compositional Verification of Secure Streamed Data: A Case Study with EMSS.
Proceedings of the Theoretical Computer Science, 8th Italian Conference, 2003

The Ising Model on Trees: Boundary Conditions and Mixing Time.
Proceedings of the 44th Symposium on Foundations of Computer Science (FOCS 2003), 2003

Formal Anaylsis of Some Timed Security Properties in Wireless Protocols.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2003

On Representing Biological Systems through Multiset Rewriting.
Proceedings of the Computer Aided Systems Theory, 2003

A Simple Language for Real-Time Cryptographic Protocol Analysis.
Proceedings of the Programming Languages and Systems, 2003

Compositional Verification of Integrity for Digital Stream Signature Protocols.
Proceedings of the 3rd International Conference on Application of Concurrency to System Design (ACSD 2003), 2003

2002
Symbolic Semantics and Analysis for Crypto-CCS with (Almost) Generic Inference Systems.
Proceedings of the Mathematical Foundations of Computer Science 2002, 2002

Automated Analysis of Some Security Mechanisms of SCEP.
Proceedings of the Information Security, 5th International Conference, 2002

About Compositional Analysis of Pi-Calculus Processes.
Proceedings of the Foundations of Information Technology in the Era of Networking and Mobile Computing, 2002

Classification of Security Properties - Part II: Network Security.
Proceedings of the Foundations of Security Analysis and Design II, 2002

2001
Formal Models of Timing Attacks on Web Privacy.
Electr. Notes Theor. Comput. Sci., 2001

Techniques for Security Checking: Non-Interference vs Control Flow Analysis.
Electr. Notes Theor. Comput. Sci., 2001

2000
Secrecy in Security Protocols as Non Interference.
Electr. Notes Theor. Comput. Sci., 2000

Non Interference for the Analysis of Cryptographic Protocols.
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000

Information Flow Analysis in a Discrete-Time Process Algebra.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

Message Authentication through Non Interference.
Proceedings of the Algebraic Methodology and Software Technology. 8th International Conference, 2000

1999
Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques.
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1999

A Uniform Approach for the Definition of Security Properties.
Proceedings of the FM'99 - Formal Methods, 1999

1998
An Improvement of Algorithms for Solving Interface Equations.
Inf. Process. Lett., 1998

Partial Model Checking and Theorem Proving for Ensuring Security Properties.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998


  Loading...