Follow
Fabio Massacci
Fabio Massacci
Chair at Vrije Universiteit, Netherlands and prof. at University of Trento, Italy
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
A survey of autonomic communications
S Dobson, S Denazis, A Fernßndez, D Ga´ti, E Gelenbe, F Massacci, ...
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 1 (2), 223-259, 2006
9372006
Modeling security requirements through ownership, permission and delegation
P Giorgini, F Massacci, J Mylopoulos, N Zannone
13th IEEE International Conference on Requirements Engineering (RE'05), 167-176, 2005
2842005
Logical cryptanalysis as a SAT problem
F Massacci, L Marraro
Journal of Automated Reasoning 24 (1-2), 165, 2000
2452000
EXPTIME tableaux for ALC
FM Donini, F Massacci
Artificial Intelligence 124 (1), 87-138, 2000
2102000
Comparing vulnerability severity and exploits using case-control studies
L Allodi, F Massacci
ACM Transactions on Information and System Security (TISSEC) 17 (1), 1-20, 2014
1782014
Comparing vulnerability severity and exploits using case-control studies
L Allodi, F Massacci
ACM Transactions on Information and System Security (TISSEC) 17 (1), 1-20, 2014
1782014
Requirements engineering meets trust management: Model, methodology, and reasoning
P Giorgini, F Massacci, J Mylopoulos, N Zannone
Trust Management: Second International Conference, iTrust 2004, Oxford, UKá…, 2004
1392004
Strongly analytic tableaux for normal modal logics
F Massacci
Automated Deduction—CADE-12: 12th International Conference on Automatedá…, 2005
1352005
An access control framework for business processes for web services
H Koshutanski, F Massacci
Proceedings of the 2003 ACM workshop on XML security, 15-24, 2003
1252003
Combining deduction and model checking into tableaux and algorithms for converse-PDL
G De Giacomo, F Massacci
Information and Computation 162 (1-2), 117-137, 2000
1222000
Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation
F Massacci, M Prest, N Zannone
Computer Standards & Interfaces 27 (5), 445-455, 2005
1192005
Stadyna: Addressing the problem of dynamic code updates in the security analysis of android applications
Y Zhauniarovich, M Ahmad, O Gadyatskaya, B Crispo, F Massacci
Proceedings of the 5th ACM Conference on Data and Application Security andá…, 2015
1182015
Integrating Security and Software Engineering: Advances and Future Visions: Advances and Future Visions
H Mouratidis, P Giorgini
Igi Global, 2006
1152006
Requirements engineering for trust management: model, methodology, and reasoning
P Giorgini, F Massacci, J Mylopoulos, N Zannone
International Journal of Information Security 5, 257-274, 2006
1112006
Single step tableaux for modal logics
F Massacci
Journal of Automated Reasoning 24, 319-364, 2000
1112000
Security and trust requirements engineering
P Giorgini, F Massacci, N Zannone
Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorialá…, 2005
1042005
Security events and vulnerability data for cybersecurity risk estimation
L Allodi, F Massacci
Risk Analysis 37 (8), 1606-1627, 2017
1032017
Verifying the SET registration protocols
G Bella, F Massacci, LC Paulson
IEEE Journal on Selected Areas in Communications 21 (1), 77-87, 2003
1012003
Verifying security protocols as planning in logic programming
L Carlucci Aiello, F Massacci
ACM Transactions on Computational Logic (TOCL) 2 (4), 542-580, 2001
992001
Anatomy of exploit kits: Preliminary analysis of exploit kits as software artefacts
V Kotov, F Massacci
Engineering Secure Software and Systems: 5th International Symposium, ESSoSá…, 2013
982013
The system can't perform the operation now. Try again later.
Articles 1–20