Fabio Massacci

According to our database1, Fabio Massacci authored at least 202 papers between 1994 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
TestREx: a framework for repeatable exploits.
STTT, 2019

A QBDI-based Fuzzer Taming Magic Bytes.
Proceedings of the Third Italian Conference on Cyber Security, 2019

2018
Non-monotonic Security Protocols and Failures in Financial Intermediation.
Proceedings of the Security Protocols XXVI, 2018

Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion).
Proceedings of the Security Protocols XXVI, 2018

FuturesMEX: Secure, Distributed Futures Market Exchange.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations.
Proceedings of the 40th International Conference on Software Engineering, 2018

Vulnerable open source dependencies: counting those that matter.
Proceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2018

2017
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates.
Empirical Software Engineering, 2017

The Seconomics (Security-Economics) Vulnerabilities of Decentralized Autonomous Organizations.
Proceedings of the Security Protocols XXV, 2017

REW-SMT: A New Approach for Rewriting XACML Request with Dynamic Big Data Security Policies.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2017

Diversity: A Poor Man's Solution to Drone Takeover.
Proceedings of the 7th International Joint Conference on Pervasive and Embedded Computing and Communication Systems (PECCS 2017), 2017

Teaching predictive modeling to junior software engineers - seminar format and its evaluation: poster.
Proceedings of the 39th International Conference on Software Engineering, 2017

Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment.
Proceedings of the Future Data and Security Engineering - 4th International Conference, 2017

Delta-Bench: Differential Benchmark for Static Analysis Security Testing Tools.
Proceedings of the 2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2017

Graphical vs. Tabular Notations for Risk Models: On the Role of Textual Labels and Complexity.
Proceedings of the 2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2017

Attack Potential in Impact and Complexity.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned.
IEEE Trans. Emerging Topics Comput., 2016

Economic Impacts of Rules- versus Risk-Based Cybersecurity Regulations for Critical Infrastructure Providers.
IEEE Security & Privacy, 2016

Action, Inaction, Trust, and Cybersecurity's Common Property Problem.
IEEE Security & Privacy, 2016

An automatic method for assessing the versions affected by a vulnerability.
Empirical Software Engineering, 2016

On the Security Cost of Using a Free and Open Source Component in a Proprietary Product.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

2015
IT Interdependence and the Economic Fairness of Cybersecurity Regulations for Civil Aviation.
IEEE Security & Privacy, 2015

The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2015

Which security catalogue is better for novices?
Proceedings of the 2015 IEEE Fifth International Workshop on Empirical Requirements Engineering, 2015

Runtime Enforcement of Security Policies on Black Box Reactive Programs.
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015

The Work-Averse Attacker Model.
Proceedings of the 23rd European Conference on Information Systems, 2015

StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Towards Black Box Testing of Android Apps.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Empirical Assessment of Security Requirements and Architecture: Lessons Learned.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

An Empirical Methodology to Evaluate Vulnerability Discovery Models.
IEEE Trans. Software Eng., 2014

Comparing Vulnerability Severity and Exploits Using Case-Control Studies.
ACM Trans. Inf. Syst. Secur., 2014

Assessing a requirements evolution approach: Empirical studies in the air traffic management domain.
Journal of Systems and Software, 2014

Security in the Firefox OS and Tizen Mobile Platforms.
IEEE Computer, 2014

TESTREX: a Testbed for Repeatable Exploits.
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014

An Approach for Decision Support on the Uncertainty in Feature Model Evolution.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

An experiment on comparing textual vs. visual industrial methods for security risk assessment.
Proceedings of the 4th IEEE International Workshop on Empirical Requirements Engineering, 2014

Security triage: A report of a lean security requirements methodology for cost-effective security analysis.
Proceedings of the 4th IEEE International Workshop on Empirical Requirements Engineering, 2014

Programmable enforcement framework of information flow policies.
Proceedings of the 15th Italian Conference on Theoretical Computer Science, 2014

Security triage: an industrial case study on the effectiveness of a lean methodology to identify security requirements.
Proceedings of the 2014 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, 2014

An Empirical Study of the Technology Transfer Potential of EU Security and Trust R&D Projects.
Proceedings of the Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, 2014

NodeSentry: least-privilege library integration for server-side JavaScript.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

A Relative Cost-Benefit Approach for Evaluating Alternative Airport Security Policies.
Proceedings of the Ninth International Conference on Availability, 2014

EMFASE - An Empirical Framework for Security Design and Economic Trade-off.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Load time code validation for mobile phone Java Cards.
J. Inf. Sec. Appl., 2013

MalwareLab: Experimentation with Cybercrime Attack Tools.
Proceedings of the 6th Workshop on Cyber Security Experimentation and Test, 2013

Quantitative Assessment of Risk Reduction with Cybercrime Black Market Monitoring.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013

An Experimental Comparison of Two Risk-Based Security Methods.
Proceedings of the 2013 ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, 2013

The (un)reliability of NVD vulnerable versions data: an empirical experiment on Google Chrome vulnerabilities.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

UNICORN: A Tool for Modeling and Reasoning on the Uncertainty of Requirements Evolution.
Proceedings of the CAiSE'13 Forum at the 25th International Conference on Advanced Information Systems Engineering (CAiSE), 2013

Evaluation of Airport Security Training Programs: Perspectives and Issues.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Iterative enforcement by suppression: Towards practical enforcement theories.
Journal of Computer Security, 2012

Guest Editorial: Special section on software reliability and security.
Information & Software Technology, 2012

High-level algorithms and data structures requirements for security-by-contract on Java cards.
IJCCBS, 2012

Security-by-Contract for the OSGi Platform.
Proceedings of the Information Security and Privacy Research, 2012

Assessing a requirements evolution approach: Empirical studies in the Air Traffic Management domain.
Proceedings of the Second IEEE International Workshop on Empirical Requirements Engineering, 2012

How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners.
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012

Managing Evolution by Orchestrating Requirements and Testing Engineering Processes.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract.
Proceedings of the Formal Methods for Components and Objects, 2012

An Idea of an Independent Validation of Vulnerability Discovery Models.
Proceedings of the Engineering Secure Software and Systems - 4th International Symposium, 2012

Crime Pays If You Are Just an Average Hacker.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

An independent validation of vulnerability discovery models.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Organizational Patterns for Security and Dependability: From Design to Application.
IJSSE, 2011

Do you really mean what you actually enforced? - Edited automata revisited.
Int. J. Inf. Sec., 2011

Computer Aided Threat Identification.
Proceedings of the 13th IEEE Conference on Commerce and Enterprise Computing, 2011

Orchestrating Security and System Engineering for Evolving Systems - (Invited Paper).
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

SeCMER: A Tool to Gain Control of Security Requirements Evolution.
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

Invited talks.
Proceedings of the First International Workshop on Empirical Requirements Engineering, 2011

A Load Time Policy Checker for Open Multi-application Smart Cards.
Proceedings of the POLICY 2011, 2011

Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies.
Proceedings of the POLICY 2011, 2011

Reactive non-interference for a browser model.
Proceedings of the 5th International Conference on Network and System Security, 2011

Managing changes with legacy security engineering processes.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Load Time Security Verification.
Proceedings of the Information Systems Security - 7th International Conference, 2011

A Method for Security Governance, Risk, and Compliance (GRC): A Goal-Process Approach.
Proceedings of the Foundations of Security Analysis and Design VI, 2011

Engineering Secure Future Internet Services.
Proceedings of the Future Internet, 2011

After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

Predictability of Enforcement.
Proceedings of the Engineering Secure Software and Systems - Third International Symposium, 2011

Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution.
Proceedings of the Advanced Information Systems Engineering, 2011

An Extended Ontology for Security Requirements.
Proceedings of the Advanced Information Systems Engineering Workshops, 2011

A Tool for Managing Evolving Security Requirements.
Proceedings of the IS Olympics: Information Systems in a Diverse World, 2011

A Tool for Managing Evolving Security Requirements.
Proceedings of the CAiSE Forum 2011, London, UK, June 22-24, 2011, 2011

2010
Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology.
Proceedings of the Advances in Intelligent Information Systems, 2010

A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application.
Trans. Computational Science, 2010

Security-by-Contract-with-Trust for Mobile Devices.
JoWUA, 2010

JCS special issue on EU-funded ICT research on Trust and Security.
Journal of Computer Security, 2010

Evolving Embedded Systems.
IEEE Computer, 2010

Can We Support Applications' Evolution in Multi-application Smart Cards by Security-by-Contract?
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Infringo ergo sum: when will software engineering support infringements?
Proceedings of the Workshop on Future of Software Engineering Research, 2010

Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications.
Proceedings of the Information Security Technology for Applications, 2010

SecureChange: Security Engineering for Lifelong Evolvable Systems.
Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation, 2010

Towards Security Climate Forecasts.
Proceedings of the Towards the Future Internet - Emerging Trends from European Research, 2010

Extending Security-by-Contract with Quantitative Trust on Mobile Devices.
Proceedings of the CISIS 2010, 2010

2009
Matching in security-by-contract for mobile code.
J. Log. Algebr. Program., 2009

The S3MS.NET Run Time Monitor: Tool Demonstration.
Electr. Notes Theor. Comput. Sci., 2009

What the heck is this application doing? - A security-by-contract architecture for pervasive services.
Computers & Security, 2009

A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems.
Computer Networks, 2009

How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns.
Artif. Intell. Law, 2009

Legal Patterns Implement Trust in IT Requirements: When Legal Means are the "Best" Implementation of IT Technical Goals.
Proceedings of the Second International Workshop on Requirements Engineering and Law, 2009

Goal-Oriented Access Control Model for Ambient Assisted Living.
Proceedings of the Privacy and Identity Management for Life, 2009

Towards Practical Enforcement Theories.
Proceedings of the Identity and Privacy in the Internet Age, 2009

Satisfaction of Control Objectives by Control Processes.
Proceedings of the Service-Oriented Computing, 7th International Joint Conference, 2009

How to capture and use legal patterns in IT.
Proceedings of the 12th International Conference on Artificial Intelligence and Law, 2009

A Security Architecture for Web 2.0 Applications.
Proceedings of the Towards the Future Internet - A European Research Perspective, 2009

Logging key assurance indicators in business processes.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach.
Wirtschaftsinformatik, 2008

Interactive access control for autonomic systems: From theory to implementation.
TAAS, 2008

Preface.
Sci. Comput. Program., 2008

Security-by-contract on the .NET platform.
Inf. Sec. Techn. Report, 2008

Enhancing Java ME Security Support with Resource Usage Monitoring.
ERCIM News, 2008

Preface.
Electr. Notes Theor. Comput. Sci., 2008

Preface.
Electr. Notes Theor. Comput. Sci., 2008

Security views for outsourced business processes.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Simulating midlet's security claims with automata modulo theory.
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, 2008

A Model-Driven Approach for the Specification and Analysis of Access Control Policies.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

An Inline Monitoring System for .NET Mobile Devices.
Proceedings of the Trust Management II, 2008

Do You Really Mean What You Actually Enforced?.
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008

Security-By-Contract for the Future Internet.
Proceedings of the Future Internet - FIS 2008, First Future Internet Symposium, 2008

Towards Practical Security Monitors of UML Policies for Mobile Applications.
Proceedings of the The Third International Conference on Availability, 2008

2007
A Negotiation Scheme for Access Rights Establishment in Autonomic Communication.
J. Network Syst. Manage., 2007

From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach.
International Journal of Software Engineering and Knowledge Engineering, 2007

Security and Trust in IT Business Outsourcing: a Manifesto.
Electr. Notes Theor. Comput. Sci., 2007

Computer-aided Support for Secure Tropos.
Autom. Softw. Eng., 2007

Usage Control in Service-Oriented Architectures.
Proceedings of the Trust, 2007

The Meaning of Logs.
Proceedings of the Trust, 2007

Security-by-contract for web services.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

A Security-by-Contract Architecture for Pervasive Services.
Proceedings of the Third International Workshop on Security, 2007

Towards Practical Security Monitors of UML Policies for Mobile Applications.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

From Early Requirements Analysis towards Secure Workflows.
Proceedings of the Trust Management, 2007

Goal-Equivalent Secure Business Process Re-engineering.
Proceedings of the Service-Oriented Computing, 2007

How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach.
Proceedings of the Eleventh International Conference on Artificial Intelligence and Law, 2007

Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code.
Proceedings of the Public Key Infrastructure, 2007

An algorithm for the appraisal of assurance indicators for complex business processes.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

A flexible security architecture to support third-party applications on mobile devices.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

Modelling Quality of Protection in Outsourced Business Processes.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

From Trust to Dependability through Risk Analysis.
Proceedings of the The Second International Conference on Availability, 2007

2006
Hierarchical hippocratic databases with minimal disclosure for virtual organizations.
VLDB J., 2006

A survey of autonomic communications.
TAAS, 2006

Verifying the SET Purchase Protocols.
J. Autom. Reasoning, 2006

Requirements engineering for trust management: model, methodology, and reasoning.
Int. J. Inf. Sec., 2006

Detecting Conflicts of Interest.
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006

Designing Security Requirements Models Through Planning.
Proceedings of the Advanced Information Systems Engineering, 18th International Conference, 2006

2005
An overview of the verification of SET.
Int. J. Inf. Sec., 2005

Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language.
Electr. Notes Theor. Comput. Sci., 2005

Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation.
Computer Standards & Interfaces, 2005

Maintaining privacy on derived objects.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

Generalized XML security views.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

ST-Tool: A CASE Tool for Security Requirements Engineering.
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005

Modeling Security Requirements Through Ownership, Permission and Delegation.
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005

Interactive Credential Negotiation for Stateful Business Processes.
Proceedings of the Trust Management, Third International Conference, 2005

Modeling Social and Individual Trust in Requirements Engineering Methodologies.
Proceedings of the Trust Management, Third International Conference, 2005

ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements.
Proceedings of the Trust Management, Third International Conference, 2005

Security and Trust Requirements Engineering.
Proceedings of the Foundations of Security Analysis and Design III, 2005

Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation.
Proceedings of the Computer Security, 2005

2004
E Pluribus Unum.
Proceedings of the Autonomic Communication, First International IFIP Workshop, 2004

Privacy Is Linking Permission to Purpose.
Proceedings of the Security Protocols, 2004

Privacy is Linking Permission to Purpose (Transcript of Discussion).
Proceedings of the Security Protocols, 2004

Interactive Access Control for Web Services.
Proceedings of the Security and Protection in Information Processing Systems, 2004

Requirements Engineering Meets Trust Management: Model, Methodology, and Reasoning.
Proceedings of the Trust Management, Second International Conference, 2004

An Interactive Trust Management and Negotiation Scheme.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

A System for Interactive Authorization for Business Processes for Web Services.
Proceedings of the Web Engineering - 4th International Conference, 2004

Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures.
Proceedings of the Public Key Infrastructure, 2004

2003
Verifying the SET registration protocols.
IEEE Journal on Selected Areas in Communications, 2003

How to fake an RSA signature by encoding modular root finding as a SAT problem.
Discrete Applied Mathematics, 2003

An access control framework for business processes for web services.
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003

A Protocol's Life After Attacks....
Proceedings of the Security Protocols, 2003

Requirement Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard.
Proceedings of the Conceptual Modeling, 2003

2002
Solving QBF by SMV.
Proceedings of the Eights International Conference on Principles and Knowledge Representation and Reasoning (KR-02), 2002

The verification of an industrial payment protocol: the SET purchase phase.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

Planning Attacks to Security Protocols: Case Studies in Logic Programming.
Proceedings of the Computational Logic: Logic Programming and Beyond, 2002

2001
Verifying security protocols as planning in logic programming.
ACM Trans. Comput. Log., 2001

Attacking fair-exchange protocols: parallel models vs trace models.
Electr. Notes Theor. Comput. Sci., 2001

Decision Procedures for Expressive Description Logics with Intersection, Composition, Converse of Roles and Role Identity.
Proceedings of the Seventeenth International Joint Conference on Artificial Intelligence, 2001

Lotrec : The Generic Tableau Prover for Modal and Description Logics.
Proceedings of the Automated Reasoning, First International Joint Conference, 2001

2000
The proof complexity of analytic and clausal tableaux.
Theor. Comput. Sci., 2000

Logical Cryptanalysis as a SAT Problem.
J. Autom. Reasoning, 2000

Single Step Tableaux for Modal Logics.
J. Autom. Reasoning, 2000

Combining Deduction and Model Checking into Tableaux and Algorithms for Converse-PDL.
Inf. Comput., 2000

EXPTIME tableaux for ALC.
Artif. Intell., 2000

Design and Results of TANCS-2000 Non-classical (Modal) Systems Comparison.
Proceedings of the Automated Reasoning with Analytic Tableaux and Related Methods, 2000

Making Sense of Specifications: The Formalization of SET.
Proceedings of the Security Protocols, 2000

Reduction rules and universal variables for first order tableaux and DPLL.
Proceedings of the KR 2000, 2000

Formal Verification of Cardholder Registration in SET.
Proceedings of the Computer Security, 2000

An Executable Specification Language for Planning Attacks to Security Protocols.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

The Taming of the (X)OR.
Proceedings of the Computational Logic, 2000

1999
Automated Reasoning and the Verification of Security Protocols.
Proceedings of the Automated Reasoning with Analytic Tableaux and Related Methods, 1999

Design and Results of the Tableaux-99 Non-classical (Modal) Systems Comparison.
Proceedings of the Automated Reasoning with Analytic Tableaux and Related Methods, 1999

Using Walk-SAT and Rel-Sat for Cryptographic Key Search.
Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence, 1999

1998
Tableau Methods for Formal Verification of Multi-Agent Distributed Systems.
J. Log. Comput., 1998

Simplification: A General Constraint Propagation Technique for Propositional and Modal Tableaux.
Proceedings of the Automated Reasoning with Analytic Tableaux and Related Methods, 1998

Cook and Reckhow are Wrong: Subexponential Tableaux Proofs for Their Family of Formulae.
ECAI, 1998

Anytime Approximate Modal Reasoning.
Proceedings of the Fifteenth National Conference on Artificial Intelligence and Tenth Innovative Applications of Artificial Intelligence Conference, 1998

1997
Tableaux Methods for Access Control in Distributed Systems.
Proceedings of the Automated Reasoning with Analytic Tableaux and Related Methods, 1997

Reasoning About Security: A Logic and a Decision Method for Role-Based Access Control.
Proceedings of the Qualitative and Quantitative Practical Reasoning, 1997

Breaking Security Protocols as an AI Planning Problem.
Proceedings of the Recent Advances in AI Planning, 4th European Conference on Planning, 1997

A Proof Theory for Tractable Approximations of Propositional Reasoning.
Proceedings of the AI*IA 97: Advances in Artificial Intelligence, 1997

1996
A Uniform Tableaux Method for Nonmonotonic Modal Logics.
Proceedings of the Logics in Artificial Intelligence, European Workshop, 1996

Approximate Reasoning for Contextual Databases.
Proceedings of the Eigth International Conference on Tools with Artificial Intelligence, 1996

Exptime Tableaux for ALC.
Proceedings of the 1996 International Workshop on Description Logics, 1996

Tableaux and Algorithms for Propositional Dynamic Logic with Converse.
Proceedings of the Automated Deduction - CADE-13, 13th International Conference on Automated Deduction, New Brunswick, NJ, USA, July 30, 1996

Contextual Reasoning Is NP-Complete.
Proceedings of the Thirteenth National Conference on Artificial Intelligence and Eighth Innovative Applications of Artificial Intelligence Conference, 1996

1994
Strongly Analytic Tableaux for Normal Modal Logics.
Proceedings of the Automated Deduction - CADE-12, 12th International Conference on Automated Deduction, Nancy, France, June 26, 1994


  Loading...