Fabio Massacci
TitleCited byYear
A survey of autonomic communications
S Dobson, S Denazis, A Fernßndez, D Ga´ti, E Gelenbe, F Massacci, ...
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 1 (2), 223-259, 2006
Modeling security requirements through ownership, permission and delegation
P Giorgini, F Massacci, J Mylopoulos, N Zannone
13th IEEE International Conference on Requirements Engineering (RE'05), 167-176, 2005
EXPTIME tableaux for ALC
FM Donini, F Massacci
Artificial Intelligence 124 (1), 87-138, 2000
Logical cryptanalysis as a SAT problem
F Massacci, L Marraro
Journal of Automated Reasoning 24 (1-2), 165-203, 2000
Requirements engineering meets trust management
P Giorgini, F Massacci, J Mylopoulos, N Zannone
International Conference on Trust Management, 176-190, 2004
Strongly analytic tableaux for normal modal logics
F Massacci
International Conference on Automated Deduction, 723-737, 1994
An access control framework for business processes for web services
H Koshutanski, F Massacci
Proceedings of the 2003 ACM workshop on XML security, 15-24, 2003
Combining deduction and model checking into tableaux and algorithms for converse-PDL
G De Giacomo, F Massacci
Information and Computation 162 (1-2), 117-137, 2000
Integrating Security and Software Engineering: Advances and Future Visions: Advances and Future Visions
H Mouratidis
Igi Global, 2006
Requirements engineering for trust management: model, methodology, and reasoning
P Giorgini, F Massacci, J Mylopoulos, N Zannone
International Journal of Information Security 5 (4), 257-274, 2006
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
F Massacci, M Prest, N Zannone
Computer Standards & Interfaces 27 (5), 445-455, 2005
Verifying the SET registration protocols
G Bella, F Massacci, LC Paulson
IEEE Journal on Selected Areas in Communications 21 (1), 77-87, 2003
Single step tableaux for modal logics
F Massacci
Journal of Automated Reasoning 24 (3), 319-364, 2000
Security and trust requirements engineering
P Giorgini, F Massacci, N Zannone
Foundations of Security Analysis and Design III, 237-272, 2005
Generalized XML security views
G Kuper, F Massacci, N Rassadko
Proceedings of the tenth ACM symposium on Access control models andá…, 2005
Verifying security protocols as planning in logic programming
LC Aiello, F Massacci
ACM Transactions on Computational Logic 2 (4), 542-580, 2001
Security-by-contract: Toward a semantics for digital signatures on mobile code
N Dragoni, F Massacci, K Naliuka, I Siahaan
European Public Key Infrastructure Workshop, 297-312, 2007
The verification of an industrial payment protocol: The SET purchase phase
G Bella, LC Paulson, F Massacci
Proceedings of the 9th ACM conference on Computer and communicationsá…, 2002
From trust to dependability through risk analysis
Y Asnar, P Giorgini, F Massacci, N Zannone
The Second International Conference on Availability, Reliability andá…, 2007
Security-by-contract on the. net platform
L Desmet, W Joosen, F Massacci, P Philippaerts, F Piessens, I Siahaan, ...
Information Security Technical Report 13 (1), 25-32, 2008
The system can't perform the operation now. Try again later.
Articles 1–20