You are here

Publications

  1. Brinhosa R. B.; Westphall C. M.; Westphall C. B.; dos Santos D. R.; Grezele F.,
    A Validation Model of Data Input for Web Services,
    ICN 2013. The Twelfth International Conference on Networks,
    2013
    , pp. 87-
    94
    , (ICN 2013,
    Seville, Spain,
    January 27 - February 1, 2013)
  2. C. Bertolissi; S. Ranise,
    A Methodology to build run-time Monitors for Security-Aware Workflows,
    Proceedings of the 8th International Conference for Internet Technology and Secured Transactions,
    2013
    , pp. 501-
    502
    , (The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013),
    09/12/2013-12/12/2013,
    Londra, UK)
  3. Armando A.; Costa G.; Merlo A.,
    in «LECTURE NOTES IN COMPUTER SCIENCE»
    Trustworthy Global Computing,
    2013
    , pp. 64-
    81
    , (7th International Symposium, TGC 2012,
    Newcastle upon Tyne, UK,
    September 7-8, 2012)
  4. S. Ranise,
    On the Verification of Security-Aware E-services,
    in «JOURNAL OF SYMBOLIC COMPUTATION»,
    vol. 47,
    n. 9,
    2012
    , pp. 1066 -
    1088
  5. R. Bruttomesso; S. Ghilardi; S. Ranise,
    Quantifier-Free Interpolation of a Theory of Arrays,
    in «LOGICAL METHODS IN COMPUTER SCIENCE»,
    vol. 8,
    n. 2,
    2012
  6. F. Alberti; S. Ghilardi; E. Pagani; S. Ranise; G. P. Rossi,
    Universal Guards, Relativization of Quantifiers, and Failure Models in Model Checking Modulo Theories,
    in «JOURNAL ON SATISFIABILITY, BOOLEAN MODELING AND COMPUTATION»,
    vol. 8,
    n. 1/2,
    2012
    , pp. 29 -
    61
  7. A. Armando; S. Ranise,
    Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving,
    in «JOURNAL OF COMPUTER SECURITY»,
    vol. 20,
    2012
    , pp. 309 -
    352
  8. A. Armando; G. Costa; A. Merlo; L. Verderame,
    Securing the "Bring Your Own Device'' Policy,
    in «JOURNAL OF INTERNET SERVICES AND APPLICATIONS»,
    vol. 2,
    n. 3,
    2012
    , pp. 3 -
    16
  9. A. Armando; E. Giunchiglia; M. Maratea; S. E. Ponta,
    An Action-based Approach to the Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints,
    in «JOURNAL OF COMPUTER AND SYSTEM SCIENCES»,
    vol. 1,
    2012
  10. T.K Dang; A.T. Truong,
    Anonymizing but Deteriorating Location Databases,
    in «POLIBITS»,
    vol. 46,
    2012
    , pp. 73 -
    81

Pages