You are here

Publications

  1. A. Armando; G. Costa; A. Merlo; L. Verderame,
    Securing the "Bring Your Own Device'' Policy,
    in «JOURNAL OF INTERNET SERVICES AND APPLICATIONS»,
    vol. 2,
    n. 3,
    2012
    , pp. 3 -
    16
  2. A. Armando; E. Giunchiglia; M. Maratea; S. E. Ponta,
    An Action-based Approach to the Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints,
    in «JOURNAL OF COMPUTER AND SYSTEM SCIENCES»,
    vol. 1,
    2012
  3. T.K Dang; A.T. Truong,
    Anonymizing but Deteriorating Location Databases,
    in «POLIBITS»,
    vol. 46,
    2012
    , pp. 73 -
    81
  4. A. Armando; R. Carbone; L. Compagna; G. Pellegrino,
    Automatic Security Analysis of SAML-based Single Sign-On Protocols,
    Digital Identity and Access Management: Technologies and Frameworks,
    Hershey, Pennsylvania,
    IGI Global,
    2012
    , pp. 168 -
    187
  5. A. Armando; G. Pellegrino; R. Carbone; A. Merlo; D. Balzarotti,
    TESTS AND PROOFS,
    Springer,
    vol.7305,
    2012
    , pp. 3-
    18
    , (6th International Conference, TAP 2012,
    Prague, Czech Republic,
    da 05/31/2012 a 06/01/2012)
  6. R. Bruttomesso; A. Carioni; S. Ghilardi; S. Ranise,
    Automated Analysis of Parametric Timing-Based Mutual Exclusion Algorithms,
    in «LECTURE NOTES IN COMPUTER SCIENCE»
    n. 7226,
    2012
    , (NASA Formal Methods - 4th International Symposium, NFM 2012,
    Norfolk, VA, USA,
    04/03/2012 a 04/05/2012)
  7. F. Alberti; R. Bruttomesso; S. Ghilardi; S. Ranise; N. Sharygina,
    Lazy Abstraction with Interpolants for Arrays,
    in «LECTURE NOTES IN COMPUTER SCIENCE»
    n. 7180,
    2012
    , (Logic for Programming, Artificial Intelligence, and Reasoning - 18th International Conference, LPAR-18,
    Merida, Venezuela,
    03/11/2012 a 03/15/2012)
  8. R. Bruttomesso; S. Ghilardi; S. Ranise,
    From Strong Amalgamability to Modularity of Quantifier-Free Interpolation,
    in «LECTURE NOTES IN COMPUTER SCIENCE»
    n. 7364,
    2012
    , (Automated Reasoning - 6th International Joint Conference, IJCAR 2012,
    Manchester, UK,
    06/26/2012 a 06/29/2012)
  9. A. Armando; S. Ranise,
    Automated and Efficient Analysis of Role-Based Access Control with Attributes,
    in «LECTURE NOTES IN COMPUTER SCIENCE»
    n. 7371,
    2012
    , (Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012,
    Paris, France,
    07/11/2012 a 07/13/2012)
  10. A. Armando; S. Ranise; F. Turkmen; B. Crispo,
    Efficient run-time solving of RBAC user authorization queries: pushing the envelope,
    2012
    , (Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012,
    San Antonio, TX, USA,
    02/07/2012 a 02/09/2012)

Pages