Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Alessandro Armando
@article{DBLP:journals/tdsc/RussoCLAM23, author = {Enrico Russo and Gabriele Costa and Giacomo Longo and Alessandro Armando and Alessio Merlo}, title = {LiDiTE: {A} Full-Fledged and Featherweight Digital Twin Framework}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {6}, pages = {4899--4912}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2023.3236798}, doi = {10.1109/TDSC.2023.3236798}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/RussoCLAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LongoRAM23, author = {Giacomo Longo and Enrico Russo and Alessandro Armando and Alessio Merlo}, title = {Attacking (and Defending) the Maritime Radar System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {3575--3589}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3282132}, doi = {10.1109/TIFS.2023.3282132}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LongoRAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamify/RussoROLA23, author = {Enrico Russo and Marina Ribaudo and Alessandro Orlich and Giacomo Longo and Alessandro Armando}, editor = {Riccardo Coppola and Luca Ardito and Gordon Fraser and Maurizio Leotta}, title = {Cyber Range and Cyber Defense Exercises: Gamification Meets University Students}, booktitle = {Proceedings of the 2nd International Workshop on Gamification in Software Development, Verification, and Validation, Gamify 2023, San Francisco, CA, USA, 4 December 2023}, pages = {29--37}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3617553.3617888}, doi = {10.1145/3617553.3617888}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamify/RussoROLA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/RaimondiLMAR22, author = {Marco Raimondi and Giacomo Longo and Alessio Merlo and Alessandro Armando and Enrico Russo}, title = {Training the Maritime Security Operations Centre Teams}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2022, Rhodes, Greece, July 27-29, 2022}, pages = {388--393}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSR54599.2022.9850324}, doi = {10.1109/CSR54599.2022.9850324}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csr2/RaimondiLMAR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-06954, author = {Enrico Russo and Gabriele Costa and Giacomo Longo and Alessandro Armando and Alessio Merlo}, title = {LiDiTE: a Full-Fledged and Featherweight Digital Twin Framework}, journal = {CoRR}, volume = {abs/2202.06954}, year = {2022}, url = {https://arxiv.org/abs/2202.06954}, eprinttype = {arXiv}, eprint = {2202.06954}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-06954.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-05623, author = {Giacomo Longo and Enrico Russo and Alessandro Armando and Alessio Merlo}, title = {Attacking (and defending) the Maritime Radar System}, journal = {CoRR}, volume = {abs/2207.05623}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.05623}, doi = {10.48550/ARXIV.2207.05623}, eprinttype = {arXiv}, eprint = {2207.05623}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-05623.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/RussoVAM21, author = {Enrico Russo and Luca Verderame and Alessandro Armando and Alessio Merlo}, title = {{DIOXIN:} runtime security policy enforcement of fog applications}, journal = {Int. J. Grid Util. Comput.}, volume = {12}, number = {2}, pages = {126--138}, year = {2021}, url = {https://doi.org/10.1504/IJGUC.2021.114821}, doi = {10.1504/IJGUC.2021.114821}, timestamp = {Tue, 25 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/RussoVAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DemetrioBLRA21, author = {Luca Demetrio and Battista Biggio and Giovanni Lagorio and Fabio Roli and Alessandro Armando}, title = {Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {3469--3478}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3082330}, doi = {10.1109/TIFS.2021.3082330}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DemetrioBLRA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/DemetrioCBLAR21, author = {Luca Demetrio and Scott E. Coull and Battista Biggio and Giovanni Lagorio and Alessandro Armando and Fabio Roli}, title = {Adversarial EXEmples: {A} Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {4}, pages = {27:1--27:31}, year = {2021}, url = {https://doi.org/10.1145/3473039}, doi = {10.1145/3473039}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/DemetrioCBLAR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/LagorioRA21, author = {Giovanni Lagorio and Marina Ribaudo and Alessandro Armando}, editor = {Alessandro Armando and Michele Colajanni}, title = {Capture the Flag competitions for Higher Education}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {447--460}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper38.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/LagorioRA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/itasec/2021, editor = {Alessandro Armando and Michele Colajanni}, title = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940}, urn = {urn:nbn:de:0074-2940-2}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RussoCA20, author = {Enrico Russo and Gabriele Costa and Alessandro Armando}, title = {Building next generation Cyber Ranges with {CRACK}}, journal = {Comput. Secur.}, volume = {95}, pages = {101837}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101837}, doi = {10.1016/J.COSE.2020.101837}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RussoCA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ValenzaCA20, author = {Andrea Valenza and Gabriele Costa and Alessandro Armando}, editor = {Manuel Egele and Leyla Bilge}, title = {Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {17--29}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/valenza}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ValenzaCA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ArmandoGT20, author = {Alessandro Armando and Giorgia Gazzarata and Fatih Turkmen}, editor = {Jorge Lobo and Scott D. Stoller and Peng Liu}, title = {Benchmarking {UAQ} Solvers}, booktitle = {Proceedings of the 25th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2020, Barcelona, Spain, June 10-12, 2020}, pages = {145--152}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3381991.3395616}, doi = {10.1145/3381991.3395616}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/ArmandoGT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ArmandoGT20a, author = {Alessandro Armando and Giorgia A. Gazzarata and Fatih Turkmen}, editor = {Jorge Lobo and Scott D. Stoller and Peng Liu}, title = {{AQUA:} An Efficient Solver for the User Authorization Query Problem}, booktitle = {Proceedings of the 25th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2020, Barcelona, Spain, June 10-12, 2020}, pages = {153--154}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3381991.3396225}, doi = {10.1145/3381991.3396225}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/ArmandoGT20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-06681, author = {Gabriele Costa and Enrico Russo and Alessandro Armando}, title = {Automating the Generation of Cyber Range Virtual Scenarios with {VSDL}}, journal = {CoRR}, volume = {abs/2001.06681}, year = {2020}, url = {https://arxiv.org/abs/2001.06681}, eprinttype = {arXiv}, eprint = {2001.06681}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-06681.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-13526, author = {Luca Demetrio and Battista Biggio and Giovanni Lagorio and Fabio Roli and Alessandro Armando}, title = {Efficient Black-box Optimization of Adversarial Windows Malware with Constrained Manipulations}, journal = {CoRR}, volume = {abs/2003.13526}, year = {2020}, url = {https://arxiv.org/abs/2003.13526}, eprinttype = {arXiv}, eprint = {2003.13526}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-13526.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-09769, author = {Andrea Valenza and Gabriele Costa and Alessandro Armando}, title = {Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners}, journal = {CoRR}, volume = {abs/2006.09769}, year = {2020}, url = {https://arxiv.org/abs/2006.09769}, eprinttype = {arXiv}, eprint = {2006.09769}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-09769.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-07125, author = {Luca Demetrio and Scott E. Coull and Battista Biggio and Giovanni Lagorio and Alessandro Armando and Fabio Roli}, title = {Adversarial EXEmples: {A} Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection}, journal = {CoRR}, volume = {abs/2008.07125}, year = {2020}, url = {https://arxiv.org/abs/2008.07125}, eprinttype = {arXiv}, eprint = {2008.07125}, timestamp = {Fri, 21 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-07125.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/MurinoAT19, author = {Giuseppina Murino and Alessandro Armando and Armando Tacchella}, editor = {Tom{\'{a}}s Min{\'{a}}rik and Siim Alatalu and S. Biondi and M. Signoretti and I. Tolga and G. Visky}, title = {Resilience of Cyber-Physical Systems: an Experimental Appraisal of Quantitative Measures}, booktitle = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn, Estonia, May 28-31, 2019}, pages = {1--19}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/CYCON.2019.8757010}, doi = {10.23919/CYCON.2019.8757010}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/MurinoAT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/DemetrioBLRA19, author = {Luca Demetrio and Battista Biggio and Giovanni Lagorio and Fabio Roli and Alessandro Armando}, editor = {Pierpaolo Degano and Roberto Zunino}, title = {Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries}, booktitle = {Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2315}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2315/paper09.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/DemetrioBLRA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DejonCVAM19, author = {Nicolas Dejon and Davide Caputo and Luca Verderame and Alessandro Armando and Alessio Merlo}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {Automated Security Analysis of IoT Software Updates}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {223--239}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_14}, doi = {10.1007/978-3-030-41702-4\_14}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/DejonCVAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-03583, author = {Luca Demetrio and Battista Biggio and Giovanni Lagorio and Fabio Roli and Alessandro Armando}, title = {Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries}, journal = {CoRR}, volume = {abs/1901.03583}, year = {2019}, url = {http://arxiv.org/abs/1901.03583}, eprinttype = {arXiv}, eprint = {1901.03583}, timestamp = {Fri, 01 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-03583.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/CostaMVA18, author = {Gabriele Costa and Alessio Merlo and Luca Verderame and Alessandro Armando}, title = {Automatic security verification of mobile app configurations}, journal = {Future Gener. Comput. Syst.}, volume = {80}, pages = {519--536}, year = {2018}, url = {https://doi.org/10.1016/j.future.2016.06.014}, doi = {10.1016/J.FUTURE.2016.06.014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/CostaMVA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/RussoCA18, author = {Enrico Russo and Gabriele Costa and Alessandro Armando}, title = {Scenario Design and Validation for Next Generation Cyber Ranges}, booktitle = {17th {IEEE} International Symposium on Network Computing and Applications, {NCA} 2018, Cambridge, MA, USA, November 1-3, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NCA.2018.8548324}, doi = {10.1109/NCA.2018.8548324}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/RussoCA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SciarrettaCRA17, author = {Giada Sciarretta and Roberto Carbone and Silvio Ranise and Alessandro Armando}, title = {Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements}, journal = {Comput. Secur.}, volume = {71}, pages = {71--86}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.04.011}, doi = {10.1016/J.COSE.2017.04.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SciarrettaCRA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tlsdkcs/MetouiBA17, author = {Nadia Metoui and Michele Bezzi and Alessandro Armando}, title = {Risk-Based Privacy-Aware Access Control for Threat Detection Systems}, journal = {Trans. Large Scale Data Knowl. Centered Syst.}, volume = {36}, pages = {1--30}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-56266-6\_1}, doi = {10.1007/978-3-662-56266-6\_1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tlsdkcs/MetouiBA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/SudhodananCCDAM17, author = {Avinash Sudhodanan and Roberto Carbone and Luca Compagna and Nicolas Dolgin and Alessandro Armando and Umberto Morelli}, title = {Large-Scale Analysis {\&} Detection of Authentication Cross-Site Request Forgeries}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {350--365}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.45}, doi = {10.1109/EUROSP.2017.45}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/SudhodananCCDAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/itasec/2017, editor = {Alessandro Armando and Roberto Baldoni and Riccardo Focardi}, title = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy, January 17-20, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1816}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1816}, urn = {urn:nbn:de:0074-1816-1}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itasec/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/MerloCVA16, author = {Alessio Merlo and Gabriele Costa and Luca Verderame and Alessandro Armando}, title = {Android vs. SEAndroid: An empirical assessment}, journal = {Pervasive Mob. Comput.}, volume = {30}, pages = {113--131}, year = {2016}, url = {https://doi.org/10.1016/j.pmcj.2016.01.006}, doi = {10.1016/J.PMCJ.2016.01.006}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/percom/MerloCVA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/ArmandoCC16, author = {Alessandro Armando and Roberto Carbone and Luca Compagna}, title = {{SATMC:} a SAT-based model checker for security protocols, business processes, and security APIs}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {18}, number = {2}, pages = {187--204}, year = {2016}, url = {https://doi.org/10.1007/s10009-015-0385-y}, doi = {10.1007/S10009-015-0385-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/ArmandoCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ArmandoRTW16, author = {Alessandro Armando and Silvio Ranise and Riccardo Traverso and Konrad S. Wrona}, editor = {Elisa Bertino and Ravi S. Sandhu and Ram Krishnan}, title = {SMT-based Enforcement and Analysis of {NATO} Content-based Protection and Release Policies}, booktitle = {Proceedings of the 2016 {ACM} International Workshop on Attribute Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA, March 11, 2016}, pages = {35--46}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2875491.2875493}, doi = {10.1145/2875491.2875493}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ArmandoRTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdse/MetouiBA16, author = {Nadia Metoui and Michele Bezzi and Alessandro Armando}, editor = {Tran Khanh Dang and Roland R. Wagner and Josef K{\"{u}}ng and Nam Thoai and Makoto Takizawa and Erich J. Neuhold}, title = {Trust and Risk-Based Access Control for Privacy Preserving Threat Detection Systems}, booktitle = {Future Data and Security Engineering - Third International Conference, {FDSE} 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10018}, pages = {285--304}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48057-2\_20}, doi = {10.1007/978-3-319-48057-2\_20}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fdse/MetouiBA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SudhodananACC16, author = {Avinash Sudhodanan and Alessandro Armando and Roberto Carbone and Luca Compagna}, title = {Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/attack-patterns-black-box-security-testing-multi-party-web-applications.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/SudhodananACC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SciarrettaACR16, author = {Giada Sciarretta and Alessandro Armando and Roberto Carbone and Silvio Ranise}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Security of Mobile Single Sign-On: {A} Rational Reconstruction of Facebook Login Solution}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {147--158}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005969001470158}, doi = {10.5220/0005969001470158}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SciarrettaACR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ArmandoCMV15, author = {Alessandro Armando and Gabriele Costa and Alessio Merlo and Luca Verderame}, title = {Formal modeling and automatic enforcement of Bring Your Own Device policies}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {2}, pages = {123--140}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0252-y}, doi = {10.1007/S10207-014-0252-Y}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ArmandoCMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ArmandoBMS15, author = {Alessandro Armando and Michele Bezzi and Nadia Metoui and Antonino Sabetta}, title = {Risk-Based Privacy-Aware Information Disclosure}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {2}, pages = {70--89}, year = {2015}, url = {https://doi.org/10.4018/IJSSE.2015040104}, doi = {10.4018/IJSSE.2015040104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/ArmandoBMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmandoBCMMRTV15, author = {Alessandro Armando and Gianluca Bocci and Gabriele Costa and Rocco Mammoliti and Alessio Merlo and Silvio Ranise and Riccardo Traverso and Andrea Valenza}, editor = {Elisa Bertino and Ilsun You}, title = {Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {41--49}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808786}, doi = {10.1145/2808783.2808786}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ArmandoBCMMRTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ArmandoRTW15, author = {Alessandro Armando and Silvio Ranise and Riccardo Traverso and Konrad S. Wrona}, title = {Compiling {NATO} authorization policies for enforcement in the cloud and SDNs}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {741--742}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346913}, doi = {10.1109/CNS.2015.7346913}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/ArmandoRTW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ArmandoCCM15, author = {Alessandro Armando and Roberto Carbone and Gabriele Costa and Alessio Merlo}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {Android Permissions Unleashed}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {320--333}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.29}, doi = {10.1109/CSF.2015.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ArmandoCCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ColettaA15, author = {Alessio Coletta and Alessandro Armando}, editor = {Adrien B{\'{e}}cue and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sokratis K. Katsikas and Costas Lambrinoudakis}, title = {Security Monitoring for Industrial Control Systems}, booktitle = {Security of Industrial Control Systems and Cyber Physical Systems - First Workshop, CyberICS 2015 and First Workshop, {WOS-CPS} 2015, Vienna, Austria, September 21-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9588}, pages = {48--62}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-40385-4\_4}, doi = {10.1007/978-3-319-40385-4\_4}, timestamp = {Mon, 03 Jan 2022 22:15:09 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ColettaA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieeehpcs/ArmandoMV15, author = {Alessandro Armando and Alessio Merlo and Luca Verderame}, title = {Trusted host-based card emulation}, booktitle = {2015 International Conference on High Performance Computing {\&} Simulation, {HPCS} 2015, Amsterdam, Netherlands, July 20-24, 2015}, pages = {221--228}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/HPCSim.2015.7237043}, doi = {10.1109/HPCSIM.2015.7237043}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ieeehpcs/ArmandoMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/ArmandoBCM15, author = {Alessandro Armando and Michele Bezzi and Francesco Di Cerbo and Nadia Metoui}, editor = {Christophe Debruyne and Herv{\'{e}} Panetto and Robert Meersman and Tharam S. Dillon and Georg Weichhart and Yuan An and Claudio Agostino Ardagna}, title = {Balancing Trust and Risk in Access Control}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2015 Conferences - Confederated International Conferences: CoopIS, ODBASE, and C{\&}TC 2015, Rhodes, Greece, October 26-30, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9415}, pages = {660--676}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26148-5\_45}, doi = {10.1007/978-3-319-26148-5\_45}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/otm/ArmandoBCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ArmandoRTW15, author = {Alessandro Armando and Silvio Ranise and Riccardo Traverso and Konrad S. Wrona}, editor = {Edgar R. Weippl and Florian Kerschbaum and Adam J. Lee}, title = {A SMT-based Tool for the Analysis and Enforcement of {NATO} Content-based Protection and Release Policies}, booktitle = {Proceedings of the 20th {ACM} Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015}, pages = {151--155}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2752952.2752954}, doi = {10.1145/2752952.2752954}, timestamp = {Mon, 26 Jun 2023 20:45:28 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ArmandoRTW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/ArmandoBCCMMM15, author = {Alessandro Armando and Gianluca Bocci and Giantonio Chiarelli and Gabriele Costa and Gabriele De Maglie and Rocco Mammoliti and Alessio Merlo}, editor = {Christel Baier and Cesare Tinelli}, title = {{SAM:} The Static Analysis Module of the {MAVERIC} Mobile App Security Verification Platform}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, {TACAS} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9035}, pages = {225--230}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46681-0\_19}, doi = {10.1007/978-3-662-46681-0\_19}, timestamp = {Sat, 30 Sep 2023 09:57:43 +0200}, biburl = {https://dblp.org/rec/conf/tacas/ArmandoBCCMMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ase/ArmandoBM14, author = {Alessandro Armando and Massimo Benerecetti and Jacopo Mantovani}, title = {Counterexample-guided abstraction refinement for linear programs with arrays}, journal = {Autom. Softw. Eng.}, volume = {21}, number = {2}, pages = {225--285}, year = {2014}, url = {https://doi.org/10.1007/s10515-013-0132-0}, doi = {10.1007/S10515-013-0132-0}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ase/ArmandoBM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ArmandoP14, author = {Alessandro Armando and Serena Elisa Ponta}, title = {Model checking authorization requirements in business processes}, journal = {Comput. Secur.}, volume = {40}, pages = {1--22}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2013.10.002}, doi = {10.1016/J.COSE.2013.10.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ArmandoP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ArmandoCVM14, author = {Alessandro Armando and Gabriele Costa and Luca Verderame and Alessio Merlo}, title = {Securing the "Bring Your Own Device" Paradigm}, journal = {Computer}, volume = {47}, number = {6}, pages = {48--56}, year = {2014}, url = {https://doi.org/10.1109/MC.2014.164}, doi = {10.1109/MC.2014.164}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ArmandoCVM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ArmandoMV14, author = {Alessandro Armando and Alessio Merlo and Luca Verderame}, title = {Security considerations related to the use of mobile devices in the operation of critical infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {4}, pages = {247--256}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.10.002}, doi = {10.1016/J.IJCIP.2014.10.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ArmandoMV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ArmandoCCMMM14, author = {Alessandro Armando and Giantonio Chiarelli and Gabriele Costa and Gabriele De Maglie and Rocco Mammoliti and Alessio Merlo}, title = {Mobile App Security Analysis with the MAVeriC Static Analysis Module}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {4}, pages = {103--119}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.12.31.103}, doi = {10.22667/JOWUA.2014.12.31.103}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ArmandoCCMMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ArmandoBMS14, author = {Alessandro Armando and Michele Bezzi and Nadia Metoui and Antonino Sabetta}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Risk-Aware Information Disclosure}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {266--276}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_17}, doi = {10.1007/978-3-319-17016-9\_17}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ArmandoBMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ArmandoCCR14, author = {Alessandro Armando and Roberto Carbone and Eyasu Getahun Chekole and Silvio Ranise}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Attribute based access control for APIs in spring security}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {85--88}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613109}, doi = {10.1145/2613087.2613109}, timestamp = {Wed, 02 Jun 2021 09:13:31 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ArmandoCCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/RaniseTA14, author = {Silvio Ranise and Anh Tuan Truong and Alessandro Armando}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Scalable and precise automated analysis of administrative temporal role-based access control}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {103--114}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613102}, doi = {10.1145/2613087.2613102}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/RaniseTA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridsec/ArmandoCCPRR14, author = {Alessandro Armando and Roberto Carbone and Eyasu Getahun Chekole and Claudio Petrazzuolo and Andrea Ranalli and Silvio Ranise}, editor = {Jorge Cu{\'{e}}llar}, title = {Selective Release of Smart Metering Data in Multi-domain Smart Grids}, booktitle = {Smart Grid Security - Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8448}, pages = {48--62}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10329-7\_4}, doi = {10.1007/978-3-319-10329-7\_4}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smartgridsec/ArmandoCCPRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/ArmandoCC14, author = {Alessandro Armando and Roberto Carbone and Luca Compagna}, editor = {Erika {\'{A}}brah{\'{a}}m and Klaus Havelund}, title = {{SATMC:} {A} SAT-Based Model Checker for Security-Critical Systems}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 20th International Conference, {TACAS} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8413}, pages = {31--45}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54862-8\_3}, doi = {10.1007/978-3-642-54862-8\_3}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tacas/ArmandoCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ArmandoCMV14, author = {Alessandro Armando and Gabriele Costa and Alessio Merlo and Luca Verderame}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Enabling {BYOD} through secure meta-market}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {219--230}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627410}, doi = {10.1145/2627393.2627410}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ArmandoCMV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ArmandoCCCPS13, author = {Alessandro Armando and Roberto Carbone and Luca Compagna and Jorge Cu{\'{e}}llar and Giancarlo Pellegrino and Alessandro Sorniotti}, title = {An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations}, journal = {Comput. Secur.}, volume = {33}, pages = {41--58}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2012.08.007}, doi = {10.1016/J.COSE.2012.08.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ArmandoCCCPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ArmandoMMV13, author = {Alessandro Armando and Alessio Merlo and Mauro Migliardi and Luca Verderame}, title = {Breaking and fixing the Android Launching Flow}, journal = {Comput. Secur.}, volume = {39}, pages = {104--115}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.03.009}, doi = {10.1016/J.COSE.2013.03.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ArmandoMMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aips/ArmandoGMP13, author = {Alessandro Armando and Enrico Giunchiglia and Marco Maratea and Serena Elisa Ponta}, editor = {Daniel Borrajo and Subbarao Kambhampati and Angelo Oddi and Simone Fratini}, title = {Modeling and Reasoning about Business Processes under Authorization Constraints: {A} Planning-Based Approach}, booktitle = {Proceedings of the Twenty-Third International Conference on Automated Planning and Scheduling, {ICAPS} 2013, Rome, Italy, June 10-14, 2013}, publisher = {{AAAI}}, year = {2013}, url = {http://www.aaai.org/ocs/index.php/ICAPS/ICAPS13/paper/view/6033}, timestamp = {Wed, 29 Mar 2017 16:45:27 +0200}, biburl = {https://dblp.org/rec/conf/aips/ArmandoGMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/ArmandoORW13, author = {Alessandro Armando and Sander Oudkerk and Silvio Ranise and Konrad S. Wrona}, editor = {Jean{-}Luc Danger and Mourad Debbabi and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood}, title = {Formal Modelling of Content-Based Protection and Release for Access Control in {NATO} Operations}, booktitle = {Foundations and Practice of Security - 6th International Symposium, {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8352}, pages = {227--244}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05302-8\_14}, doi = {10.1007/978-3-319-05302-8\_14}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/ArmandoORW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/ArmandoCCFMVY13, author = {Alessandro Armando and Aniello Castiglione and Gabriele Costa and Ugo Fiore and Alessio Merlo and Luca Verderame and Ilsun You}, editor = {Khabib Mustofa and Erich J. Neuhold and A Min Tjoa and Edgar R. Weippl and Ilsun You}, title = {Trustworthy Opportunistic Access to the Internet of Services}, booktitle = {Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7804}, pages = {469--478}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36818-9\_52}, doi = {10.1007/978-3-642-36818-9\_52}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/ArmandoCCFMVY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ArmandoCZ13, author = {Alessandro Armando and Roberto Carbone and Luca Zanetti}, editor = {Javier L{\'{o}}pez and Xinyi Huang and Ravi S. Sandhu}, title = {Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols}, booktitle = {Network and System Security - 7th International Conference, {NSS} 2013, Madrid, Spain, June 3-4, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7873}, pages = {728--734}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38631-2\_63}, doi = {10.1007/978-3-642-38631-2\_63}, timestamp = {Tue, 09 Feb 2021 08:50:29 +0100}, biburl = {https://dblp.org/rec/conf/nss/ArmandoCZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ArmandoCM13, author = {Alessandro Armando and Gabriele Costa and Alessio Merlo}, editor = {Sung Y. Shin and Jos{\'{e}} Carlos Maldonado}, title = {Bring your own device, securely}, booktitle = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing, {SAC} '13, Coimbra, Portugal, March 18-22, 2013}, pages = {1852--1858}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2480362.2480707}, doi = {10.1145/2480362.2480707}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/ArmandoCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ArmandoGORW13, author = {Alessandro Armando and Matteo Grasso and Sander Oudkerk and Silvio Ranise and Konrad S. Wrona}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Content-based information protection and release in {NATO} operations}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {261--264}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462427}, doi = {10.1145/2462410.2462427}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ArmandoGORW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ArmandoMV13, author = {Alessandro Armando and Alessio Merlo and Luca Verderame}, editor = {Lech J. Janczewski and Henry B. Wolfe and Sujeet Shenoi}, title = {An Empirical Evaluation of the Android Security Framework}, booktitle = {Security and Privacy Protection in Information Processing Systems - 28th {IFIP} {TC} 11 International Conference, {SEC} 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {405}, pages = {176--189}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39218-4\_14}, doi = {10.1007/978-3-642-39218-4\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ArmandoMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ArmandoL12, author = {Alessandro Armando and Gavin Lowe}, title = {Preface}, journal = {J. Comput. Secur.}, volume = {20}, number = {1}, pages = {1}, year = {2012}, url = {https://doi.org/10.3233/JCS-2011-0438}, doi = {10.3233/JCS-2011-0438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ArmandoL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ArmandoR12, author = {Alessandro Armando and Silvio Ranise}, title = {Scalable automated symbolic analysis of administrative role-based access control policies by {SMT} solving}, journal = {J. Comput. Secur.}, volume = {20}, number = {4}, pages = {309--352}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0461}, doi = {10.3233/JCS-2012-0461}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ArmandoR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/ArmandoGMP12, author = {Alessandro Armando and Enrico Giunchiglia and Marco Maratea and Serena Elisa Ponta}, title = {An action-based approach to the formal specification and automatic analysis of business processes under authorization constraints}, journal = {J. Comput. Syst. Sci.}, volume = {78}, number = {1}, pages = {119--141}, year = {2012}, url = {https://doi.org/10.1016/j.jcss.2011.02.015}, doi = {10.1016/J.JCSS.2011.02.015}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/ArmandoGMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ArmandoCMV12, author = {Alessandro Armando and Gabriele Costa and Alessio Merlo and Luca Verderame}, title = {Securing the "Bring Your Own Device" Policy}, journal = {J. Internet Serv. Inf. Secur.}, volume = {2}, number = {3/4}, pages = {3--17}, year = {2012}, url = {https://doi.org/10.22667/JISIS.2012.11.31.003}, doi = {10.22667/JISIS.2012.11.31.003}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ArmandoCMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ArmandoRTC12, author = {Alessandro Armando and Silvio Ranise and Fatih Turkmen and Bruno Crispo}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Efficient run-time solving of {RBAC} user authorization queries: pushing the envelope}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {241--248}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133631}, doi = {10.1145/2133601.2133631}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ArmandoRTC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ArmandoR12, author = {Alessandro Armando and Silvio Ranise}, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Automated and Efficient Analysis of Role-Based Access Control with Attributes}, booktitle = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP} {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7371}, pages = {25--40}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31540-4\_3}, doi = {10.1007/978-3-642-31540-4\_3}, timestamp = {Fri, 27 Dec 2019 21:29:17 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ArmandoR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/RaniseA12, author = {Silvio Ranise and Alessandro Armando}, editor = {Li Xu and Elisa Bertino and Yi Mu}, title = {On the Automated Analysis of Safety in Usage Control: {A} New Decidability Result}, booktitle = {Network and System Security - 6th International Conference, {NSS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7645}, pages = {15--28}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34601-9\_2}, doi = {10.1007/978-3-642-34601-9\_2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/RaniseA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ArmandoMMV12, author = {Alessandro Armando and Alessio Merlo and Mauro Migliardi and Luca Verderame}, editor = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou}, title = {Would You Mind Forking This Process? {A} Denial of Service Attack on Android (and Some Countermeasures)}, booktitle = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {376}, pages = {13--24}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30436-1\_2}, doi = {10.1007/978-3-642-30436-1\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ArmandoMMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridsec/ArmandoCM12, author = {Alessandro Armando and Roberto Carbone and Alessio Merlo}, editor = {Jorge Cu{\'{e}}llar}, title = {Formal Analysis of a Privacy-Preserving Billing Protocol}, booktitle = {Smart Grid Security - First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7823}, pages = {108--119}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38030-3\_8}, doi = {10.1007/978-3-642-38030-3\_8}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smartgridsec/ArmandoCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/RaniseTA12, author = {Silvio Ranise and Anh Tuan Truong and Alessandro Armando}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Boosting Model Checking to Analyse Large {ARBAC} Policies}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {273--288}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_18}, doi = {10.1007/978-3-642-38004-4\_18}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/RaniseTA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12, author = {Alessandro Armando and Wihem Arsac and Tigran Avanesov and Michele Barletta and Alberto Calvi and Alessandro Cappai and Roberto Carbone and Yannick Chevalier and Luca Compagna and Jorge Cu{\'{e}}llar and Gabriel Erzse and Simone Frau and Marius Minea and Sebastian M{\"{o}}dersheim and David von Oheimb and Giancarlo Pellegrino and Serena Elisa Ponta and Marco Rocchetto and Micha{\"{e}}l Rusinowitch and Mohammad Torabi Dashti and Mathieu Turuani and Luca Vigan{\`{o}}}, editor = {Cormac Flanagan and Barbara K{\"{o}}nig}, title = {The {AVANTSSAR} Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 18th International Conference, {TACAS} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7214}, pages = {267--282}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28756-5\_19}, doi = {10.1007/978-3-642-28756-5\_19}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tap/ArmandoPCMB12, author = {Alessandro Armando and Giancarlo Pellegrino and Roberto Carbone and Alessio Merlo and Davide Balzarotti}, editor = {Achim D. Brucker and Jacques Julliand}, title = {From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap}, booktitle = {Tests and Proofs - 6th International Conference, TAP@TOOLS 2012, Prague, Czech Republic, May 31 - June 1, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7305}, pages = {3--18}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30473-6\_3}, doi = {10.1007/978-3-642-30473-6\_3}, timestamp = {Tue, 23 Jun 2020 17:37:39 +0200}, biburl = {https://dblp.org/rec/conf/tap/ArmandoPCMB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tgc/ArmandoCM12, author = {Alessandro Armando and Gabriele Costa and Alessio Merlo}, editor = {Catuscia Palamidessi and Mark Dermot Ryan}, title = {Formal Modeling and Reasoning about the Android Security Framework}, booktitle = {Trustworthy Global Computing - 7th International Symposium, {TGC} 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8191}, pages = {64--81}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-41157-1\_5}, doi = {10.1007/978-3-642-41157-1\_5}, timestamp = {Wed, 07 Dec 2022 23:14:04 +0100}, biburl = {https://dblp.org/rec/conf/tgc/ArmandoCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1209-0687, author = {Alessandro Armando and Alessio Merlo and Luca Verderame}, title = {Security Issues in the Android Cross-Layer Architecture}, journal = {CoRR}, volume = {abs/1209.0687}, year = {2012}, url = {http://arxiv.org/abs/1209.0687}, eprinttype = {arXiv}, eprint = {1209.0687}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1209-0687.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/AlbertiAR11, author = {Francesco Alberti and Alessandro Armando and Silvio Ranise}, editor = {Nikolaj S. Bj{\o}rner and Viorica Sofronie{-}Stokkermans}, title = {{ASASP:} Automated Symbolic Analysis of Security Policies}, booktitle = {Automated Deduction - {CADE-23} - 23rd International Conference on Automated Deduction, Wroclaw, Poland, July 31 - August 5, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6803}, pages = {26--33}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22438-6\_4}, doi = {10.1007/978-3-642-22438-6\_4}, timestamp = {Mon, 28 Aug 2023 21:17:45 +0200}, biburl = {https://dblp.org/rec/conf/cade/AlbertiAR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlbertiAR11, author = {Francesco Alberti and Alessandro Armando and Silvio Ranise}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {Efficient symbolic automated analysis of administrative attribute-based RBAC-policies}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {165--175}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966935}, doi = {10.1145/1966913.1966935}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AlbertiAR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ArmandoCCCPS11, author = {Alessandro Armando and Roberto Carbone and Luca Compagna and Jorge Cu{\'{e}}llar and Giancarlo Pellegrino and Alessandro Sorniotti}, editor = {Jan Camenisch and Simone Fischer{-}H{\"{u}}bner and Yuko Murayama and Armand Portmann and Carlos Rieder}, title = {From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?}, booktitle = {Future Challenges in Security and Privacy for Academia and Industry - 26th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {354}, pages = {68--79}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21424-0\_6}, doi = {10.1007/978-3-642-21424-0\_6}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/ArmandoCCCPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/semco/ArmandoCR11, author = {Alessandro Armando and Roberto Carbone and Silvio Ranise}, title = {Automated Analysis of Semantic-Aware Access Control Policies: {A} Logic-Based Approach}, booktitle = {Proceedings of the 5th {IEEE} International Conference on Semantic Computing {(ICSC} 2011), Palo Alto, CA, USA, September 18-21, 2011}, pages = {356--363}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICSC.2011.74}, doi = {10.1109/ICSC.2011.74}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/semco/ArmandoCR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/ArmandoR11, author = {Alessandro Armando and Silvio Ranise}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Automated Analysis of Infinite State Workflows with Access Control Policies}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {157--174}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_12}, doi = {10.1007/978-3-642-29963-6\_12}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/stm/ArmandoR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip1-7/2010wits, editor = {Alessandro Armando and Gavin Lowe}, title = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-16074-5}, doi = {10.1007/978-3-642-16074-5}, isbn = {978-3-642-16073-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/2010wits.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/ArmandoBD10, author = {Alessandro Armando and Peter Baumgartner and Gilles Dowek}, title = {Preface}, journal = {J. Autom. Reason.}, volume = {45}, number = {2}, pages = {89}, year = {2010}, url = {https://doi.org/10.1007/s10817-010-9180-3}, doi = {10.1007/S10817-010-9180-3}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/ArmandoBD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MerloA10, author = {Alessio Merlo and Alessandro Armando}, title = {Cooperative access control for the Grid}, booktitle = {Sixth International Conference on Information Assurance and Security, {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010}, pages = {228--233}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISIAS.2010.5604068}, doi = {10.1109/ISIAS.2010.5604068}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/MerloA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/ArmandoCCLP10, author = {Alessandro Armando and Roberto Carbone and Luca Compagna and Keqin Li and Giancarlo Pellegrino}, title = {Model-Checking Driven Security Testing of Web-Based Applications}, booktitle = {Third International Conference on Software Testing, Verification and Validation, {ICST} 2010, Paris, France, April 7-9, 2010, Workshops Proceedings}, pages = {361--370}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICSTW.2010.54}, doi = {10.1109/ICSTW.2010.54}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/ArmandoCCLP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/ArmandoR10, author = {Alessandro Armando and Silvio Ranise}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner}, title = {Automated Symbolic Analysis of ARBAC-Policies}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {17--34}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_2}, doi = {10.1007/978-3-642-22444-7\_2}, timestamp = {Sat, 19 Oct 2019 20:20:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/ArmandoR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jancl/ArmandoCC09, author = {Alessandro Armando and Roberto Carbone and Luca Compagna}, title = {{LTL} model checking for security protocols}, journal = {J. Appl. Non Class. Logics}, volume = {19}, number = {4}, pages = {403--429}, year = {2009}, url = {https://doi.org/10.3166/jancl.19.403-429}, doi = {10.3166/JANCL.19.403-429}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jancl/ArmandoCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/ArmandoMP09, author = {Alessandro Armando and Jacopo Mantovani and Lorenzo Platania}, title = {Bounded model checking of software using {SMT} solvers instead of {SAT} solvers}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {11}, number = {1}, pages = {69--83}, year = {2009}, url = {https://doi.org/10.1007/s10009-008-0091-0}, doi = {10.1007/S10009-008-0091-0}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/ArmandoMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocl/ArmandoBRS09, author = {Alessandro Armando and Maria Paola Bonacina and Silvio Ranise and Stephan Schulz}, title = {New results on rewrite-based satisfiability procedures}, journal = {{ACM} Trans. Comput. Log.}, volume = {10}, number = {1}, pages = {4:1--4:51}, year = {2009}, url = {https://doi.org/10.1145/1459010.1459014}, doi = {10.1145/1459010.1459014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tocl/ArmandoBRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/frocos/Armando09, author = {Alessandro Armando}, editor = {Silvio Ghilardi and Roberto Sebastiani}, title = {Building SMT-Based Software Model Checkers: An Experience Report}, booktitle = {Frontiers of Combining Systems, 7th International Symposium, FroCoS 2009, Trento, Italy, September 16-18, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5749}, pages = {1--17}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04222-5\_1}, doi = {10.1007/978-3-642-04222-5\_1}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/frocos/Armando09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/ArmandoP09, author = {Alessandro Armando and Serena Elisa Ponta}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {Model Checking of Security-Sensitive Business Processes}, booktitle = {Formal Aspects in Security and Trust, 6th International Workshop, {FAST} 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5983}, pages = {66--80}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-12459-4\_6}, doi = {10.1007/978-3-642-12459-4\_6}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/ArmandoP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/ArmandoGP09, author = {Alessandro Armando and Enrico Giunchiglia and Serena Elisa Ponta}, editor = {Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis and G{\"{u}}nther Pernul}, title = {Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach}, booktitle = {Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5695}, pages = {63--72}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03748-1\_7}, doi = {10.1007/978-3-642-03748-1\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/ArmandoGP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ArmandoC08, author = {Alessandro Armando and Luca Compagna}, title = {SAT-based model-checking for security protocols analysis}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {1}, pages = {3--32}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0041-y}, doi = {10.1007/S10207-007-0041-Y}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ArmandoC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/Armando08, author = {Alessandro Armando}, editor = {Boris Konev and Renate A. Schmidt and Stephan Schulz}, title = {Model Checking: New Challenges and Opportunities for Automated Reasoning (Invited Talk)}, booktitle = {Proceedings of the First International Workshop on Practical Aspects of Automated Reasoning, Sydney, Australia, August 10-11, 2008}, series = {{CEUR} Workshop Proceedings}, volume = {373}, publisher = {CEUR-WS.org}, year = {2008}, url = {https://ceur-ws.org/Vol-373/invited-1.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:14 +0100}, biburl = {https://dblp.org/rec/conf/cade/Armando08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmandoCCCT08, author = {Alessandro Armando and Roberto Carbone and Luca Compagna and Jorge Cu{\'{e}}llar and Llanos Tobarra}, editor = {Vitaly Shmatikov}, title = {Formal analysis of {SAML} 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps}, booktitle = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {1--10}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456396.1456397}, doi = {10.1145/1456396.1456397}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmandoCCCT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cade/2008, editor = {Alessandro Armando and Peter Baumgartner and Gilles Dowek}, title = {Automated Reasoning, 4th International Joint Conference, {IJCAR} 2008, Sydney, Australia, August 12-15, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5195}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71070-7}, doi = {10.1007/978-3-540-71070-7}, isbn = {978-3-540-71069-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cade/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ArmandoCC07, author = {Alessandro Armando and Roberto Carbone and Luca Compagna}, title = {{LTL} Model Checking for Security Protocols}, booktitle = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8 July 2007, Venice, Italy}, pages = {385--396}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CSF.2007.24}, doi = {10.1109/CSF.2007.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ArmandoCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/ArmandoBCMS07, author = {Alessandro Armando and Massimo Benerecetti and Dario Carotenuto and Jacopo Mantovani and Pasquale Spica}, editor = {R. E. Kurt Stirewalt and Alexander Egyed and Bernd Fischer}, title = {The eureka tool for software model checking}, booktitle = {22nd {IEEE/ACM} International Conference on Automated Software Engineering {(ASE} 2007), November 5-9, 2007, Atlanta, Georgia, {USA}}, pages = {541--542}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1321631.1321734}, doi = {10.1145/1321631.1321734}, timestamp = {Tue, 06 Nov 2018 16:58:23 +0100}, biburl = {https://dblp.org/rec/conf/kbse/ArmandoBCMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/ArmandoBM07, author = {Alessandro Armando and Massimo Benerecetti and Jacopo Mantovani}, editor = {Orna Grumberg and Michael Huth}, title = {Abstraction Refinement of Linear Programs with Arrays}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems, 13th International Conference, {TACAS} 2007, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2007 Braga, Portugal, March 24 - April 1, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4424}, pages = {373--388}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71209-1\_29}, doi = {10.1007/978-3-540-71209-1\_29}, timestamp = {Mon, 11 Sep 2023 15:43:49 +0200}, biburl = {https://dblp.org/rec/conf/tacas/ArmandoBM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/ArmandoR06, author = {Alessandro Armando and Christophe Ringeissen}, title = {Special issue on combining logical systems}, journal = {Inf. Comput.}, volume = {204}, number = {10}, pages = {1411--1412}, year = {2006}, url = {https://doi.org/10.1016/j.ic.2006.04.005}, doi = {10.1016/J.IC.2006.04.005}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/ArmandoR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/ArmandoBCRV06, author = {Alessandro Armando and David A. Basin and Jorge Cu{\'{e}}llar and Micha{\"{e}}l Rusinowitch and Luca Vigan{\`{o}}}, title = {Automated Reasoning for Security Protocol Analysis}, journal = {J. Autom. Reason.}, volume = {36}, number = {1-2}, pages = {1--3}, year = {2006}, url = {https://doi.org/10.1007/s10817-005-9014-x}, doi = {10.1007/S10817-005-9014-X}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/ArmandoBCRV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spin/ArmandoMP06, author = {Alessandro Armando and Jacopo Mantovani and Lorenzo Platania}, editor = {Antti Valmari}, title = {Bounded Model Checking of Software Using {SMT} Solvers Instead of {SAT} Solvers}, booktitle = {Model Checking Software, 13th International {SPIN} Workshop, Vienna, Austria, March 30 - April 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3925}, pages = {146--162}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11691617\_9}, doi = {10.1007/11691617\_9}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/spin/ArmandoMP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/smt/2005, editor = {Alessandro Armando and Alessandro Cimatti}, title = {Proceedings of the Third Workshop on Pragmatics of Decision Procedures in Automated Reasoning, PDPAR@CAV 2005, Edinburgh, UK, July 12, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {144}, number = {2}, publisher = {Elsevier}, year = {2006}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/144/issue/2}, timestamp = {Fri, 16 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smt/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0604054, author = {Alessandro Armando and Maria Paola Bonacina and Silvio Ranise and Stephan Schulz}, title = {New results on rewrite-based satisfiability procedures}, journal = {CoRR}, volume = {abs/cs/0604054}, year = {2006}, url = {http://arxiv.org/abs/cs/0604054}, eprinttype = {arXiv}, eprint = {cs/0604054}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0604054.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/ArmandoCGM05, author = {Alessandro Armando and Claudio Castellini and Enrico Giunchiglia and Marco Maratea}, title = {The SAT-based Approach to Separation Logic}, journal = {J. Autom. Reason.}, volume = {35}, number = {1-3}, pages = {237--263}, year = {2005}, url = {https://doi.org/10.1007/s10817-005-9002-1}, doi = {10.1007/S10817-005-9002-1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/ArmandoCGM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/ArmandoB05, author = {Alessandro Armando and Clemens Ballarin}, title = {A reconstruction and extension of Maple's assume facility via constraint contextual rewriting}, journal = {J. Symb. Comput.}, volume = {39}, number = {5}, pages = {503--521}, year = {2005}, url = {https://doi.org/10.1016/j.jsc.2004.12.010}, doi = {10.1016/J.JSC.2004.12.010}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/ArmandoB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/ArmandoCR05, author = {Alessandro Armando and Luca Compagna and Silvio Ranise}, editor = {Dieter Hutter and Werner Stephan}, title = {Rewriting and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation}, booktitle = {Mechanizing Mathematical Reasoning, Essays in Honor of J{\"{o}}rg H. Siekmann on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {2605}, pages = {30--45}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32254-2\_3}, doi = {10.1007/978-3-540-32254-2\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/ArmandoCR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/ArmandoCGGT05, author = {Alessandro Armando and Claudio Castellini and Enrico Giunchiglia and Fausto Giunchiglia and Armando Tacchella}, editor = {Dieter Hutter and Werner Stephan}, title = {SAT-Based Decision Procedures for Automated Reasoning: {A} Unifying Perspective}, booktitle = {Mechanizing Mathematical Reasoning, Essays in Honor of J{\"{o}}rg H. Siekmann on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {2605}, pages = {46--58}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32254-2\_4}, doi = {10.1007/978-3-540-32254-2\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/ArmandoCGGT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ArmandoBBCCCDHKMMORSTVV05, author = {Alessandro Armando and David A. Basin and Yohan Boichut and Yannick Chevalier and Luca Compagna and Jorge Cu{\'{e}}llar and Paul Hankes Drielsma and Pierre{-}Cyrille H{\'{e}}am and Olga Kouchnarenko and Jacopo Mantovani and Sebastian M{\"{o}}dersheim and David von Oheimb and Micha{\"{e}}l Rusinowitch and Judson Santiago and Mathieu Turuani and Luca Vigan{\`{o}} and Laurent Vigneron}, editor = {Kousha Etessami and Sriram K. Rajamani}, title = {The {AVISPA} Tool for the Automated Validation of Internet Security Protocols and Applications}, booktitle = {Computer Aided Verification, 17th International Conference, {CAV} 2005, Edinburgh, Scotland, UK, July 6-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3576}, pages = {281--285}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11513988\_27}, doi = {10.1007/11513988\_27}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/ArmandoBBCCCDHKMMORSTVV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/frocos/ArmandoBRS05, author = {Alessandro Armando and Maria Paola Bonacina and Silvio Ranise and Stephan Schulz}, editor = {Bernhard Gramlich}, title = {On a Rewriting Approach to Satisfiability Procedures: Extension, Combination of Theories and an Experimental Appraisal}, booktitle = {Frontiers of Combining Systems, 5th International Workshop, FroCoS 2005, Vienna, Austria, September 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3717}, pages = {65--80}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11559306\_4}, doi = {10.1007/11559306\_4}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/frocos/ArmandoBRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ArmandoC06, author = {Alessandro Armando and Alessandro Cimatti}, editor = {Alessandro Armando and Alessandro Cimatti}, title = {Preface}, booktitle = {Proceedings of the Third Workshop on Pragmatics of Decision Procedures in Automated Reasoning, PDPAR@CAV 2005, Edinburgh, UK, July 12, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {144}, number = {2}, pages = {1--2}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.12.002}, doi = {10.1016/J.ENTCS.2005.12.002}, timestamp = {Fri, 16 Dec 2022 10:24:43 +0100}, biburl = {https://dblp.org/rec/journals/entcs/ArmandoC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ArmandoBM06, author = {Alessandro Armando and Massimo Benerecetti and Jacopo Mantovani}, editor = {Byron Cook and Scott D. Stoller and Willem Visser}, title = {Model Checking Linear Programs with Arrays}, booktitle = {Proceedings of the 3rd Workshop on Software Model Checking, SoftMC@CAV 2005, Edinburgh, UK, July 11, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {144}, number = {3}, pages = {79--94}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2006.01.006}, doi = {10.1016/J.ENTCS.2006.01.006}, timestamp = {Fri, 16 Dec 2022 10:50:33 +0100}, biburl = {https://dblp.org/rec/journals/entcs/ArmandoBM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/arspa/2004, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, publisher = {Elsevier}, year = {2005}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/125/issue/1}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arspa/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/ArmandoCM04, author = {Alessandro Armando and Claudio Castellini and Jacopo Mantovani}, editor = {Jim Davies and Wolfram Schulte and Michael Barnett}, title = {Software Model Checking Using Linear Constraints}, booktitle = {Formal Methods and Software Engineering, 6th International Conference on Formal Engineering Methods, {ICFEM} 2004, Seattle, WA, USA, November 8-12, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3308}, pages = {209--223}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30482-1\_22}, doi = {10.1007/978-3-540-30482-1\_22}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfem/ArmandoCM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jelia/ArmandoCL04, author = {Alessandro Armando and Luca Compagna and Yuliya Lierler}, editor = {Jos{\'{e}} J{\'{u}}lio Alferes and Jo{\~{a}}o Alexandre Leite}, title = {Automatic Compilation of Protocol Insecurity Problems into Logic Programming}, booktitle = {Logics in Artificial Intelligence, 9th European Conference, {JELIA} 2004, Lisbon, Portugal, September 27-30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3229}, pages = {617--627}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30227-8\_51}, doi = {10.1007/978-3-540-30227-8\_51}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/jelia/ArmandoCL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jelia/ArmandoC04, author = {Alessandro Armando and Luca Compagna}, editor = {Jos{\'{e}} J{\'{u}}lio Alferes and Jo{\~{a}}o Alexandre Leite}, title = {{SATMC:} {A} SAT-Based Model Checker for Security Protocols}, booktitle = {Logics in Artificial Intelligence, 9th European Conference, {JELIA} 2004, Lisbon, Portugal, September 27-30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3229}, pages = {730--733}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30227-8\_68}, doi = {10.1007/978-3-540-30227-8\_68}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/jelia/ArmandoC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sat/ArmandoCGM04, author = {Alessandro Armando and Claudio Castellini and Enrico Giunchiglia and Marco Maratea}, title = {A SAT-based Decision Procedure for the Boolean Combination of Difference Constraints}, booktitle = {{SAT} 2004 - The Seventh International Conference on Theory and Applications of Satisfiability Testing, 10-13 May 2004, Vancouver, BC, Canada, Online Proceedings}, year = {2004}, url = {http://www.satisfiability.org/SAT04/programme/71.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sat/ArmandoCGM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sat/ArmandoCGM04a, author = {Alessandro Armando and Claudio Castellini and Enrico Giunchiglia and Marco Maratea}, editor = {Holger H. Hoos and David G. Mitchell}, title = {A SAT-Based Decision Procedure for the Boolean Combination of Difference Constraints}, booktitle = {Theory and Applications of Satisfiability Testing, 7th International Conference, {SAT} 2004, Vancouver, BC, Canada, May 10-13, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3542}, pages = {16--29}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11527695\_2}, doi = {10.1007/11527695\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sat/ArmandoCGM04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ArmandoV05, author = {Alessandro Armando and Luca Vigan{\`{o}}}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {Preface}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {1}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.09.035}, doi = {10.1016/J.ENTCS.2004.09.035}, timestamp = {Tue, 13 Dec 2022 13:06:50 +0100}, biburl = {https://dblp.org/rec/journals/entcs/ArmandoV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ArmandoCGIM05, author = {Alessandro Armando and Claudio Castellini and Enrico Giunchiglia and Massimo Idini and Marco Maratea}, editor = {Wolfgang Ahrendt and Peter Baumgartner and Hans de Nivelle and Silvio Ranise and Cesare Tinelli}, title = {{TSAT++:} an Open Platform for Satisfiability Modulo Theories}, booktitle = {Selected Papers from the Workshops on Disproving, D@IJCAR 2004, and the Second International Workshop on Pragmatics of Decision Procedures, PDPAR@IJCAR 2004, Cork, Ireland, July 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {3}, pages = {25--36}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.06.065}, doi = {10.1016/J.ENTCS.2004.06.065}, timestamp = {Tue, 13 Dec 2022 13:53:40 +0100}, biburl = {https://dblp.org/rec/journals/entcs/ArmandoCGIM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ArmandoC05, author = {Alessandro Armando and Luca Compagna}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {91--108}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.05.021}, doi = {10.1016/J.ENTCS.2004.05.021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/ArmandoC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/ArmandoRR03, author = {Alessandro Armando and Silvio Ranise and Micha{\"{e}}l Rusinowitch}, title = {A rewriting approach to satisfiability procedures}, journal = {Inf. Comput.}, volume = {183}, number = {2}, pages = {140--164}, year = {2003}, url = {https://doi.org/10.1016/S0890-5401(03)00020-8}, doi = {10.1016/S0890-5401(03)00020-8}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/ArmandoRR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/ArmandoR03, author = {Alessandro Armando and Silvio Ranise}, title = {Constraint contextual rewriting}, journal = {J. Symb. Comput.}, volume = {36}, number = {1-2}, pages = {193--216}, year = {2003}, url = {https://doi.org/10.1016/S0747-7171(03)00025-7}, doi = {10.1016/S0747-7171(03)00025-7}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/ArmandoR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/ArmandoCG03, author = {Alessandro Armando and Luca Compagna and Pierre Ganty}, editor = {Keijiro Araki and Stefania Gnesi and Dino Mandrioli}, title = {SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis}, booktitle = {{FME} 2003: Formal Methods, International Symposium of Formal Methods Europe, Pisa, Italy, September 8-14, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2805}, pages = {875--893}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45236-2\_47}, doi = {10.1007/978-3-540-45236-2\_47}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/ArmandoCG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sat/ArmandoC03, author = {Alessandro Armando and Luca Compagna}, editor = {Enrico Giunchiglia and Armando Tacchella}, title = {Abstraction-Driven SAT-based Analysis of Security Protocols}, booktitle = {Theory and Applications of Satisfiability Testing, 6th International Conference, {SAT} 2003. Santa Margherita Ligure, Italy, May 5-8, 2003 Selected Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2919}, pages = {257--271}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24605-3\_20}, doi = {10.1007/978-3-540-24605-3\_20}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/sat/ArmandoC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/ArmandoRS02, author = {Alessandro Armando and Micha{\"{e}}l Rusinowitch and Sorin Stratulat}, title = {Incorporating Decision Procedures in Implicit Induction}, journal = {J. Symb. Comput.}, volume = {34}, number = {4}, pages = {241--258}, year = {2002}, url = {https://doi.org/10.1006/jsco.2002.0549}, doi = {10.1006/JSCO.2002.0549}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/ArmandoRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ArmandoBBCCMRTVV02, author = {Alessandro Armando and David A. Basin and Mehdi Bouallagui and Yannick Chevalier and Luca Compagna and Sebastian M{\"{o}}dersheim and Micha{\"{e}}l Rusinowitch and Mathieu Turuani and Luca Vigan{\`{o}} and Laurent Vigneron}, editor = {Ed Brinksma and Kim Guldstrand Larsen}, title = {The {AVISS} Security Protocol Analysis Tool}, booktitle = {Computer Aided Verification, 14th International Conference, {CAV} 2002,Copenhagen, Denmark, July 27-31, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2404}, pages = {349--353}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45657-0\_27}, doi = {10.1007/3-540-45657-0\_27}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/ArmandoBBCCMRTVV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/ArmandoC02, author = {Alessandro Armando and Luca Compagna}, editor = {Doron A. Peled and Moshe Y. Vardi}, title = {Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning}, booktitle = {Formal Techniques for Networked and Distributed Systems - {FORTE} 2002, 22nd {IFIP} {WG} 6.1 International Conference Houston, Texas, USA, November 11-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2529}, pages = {210--225}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36135-9\_14}, doi = {10.1007/3-540-36135-9\_14}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/forte/ArmandoC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/frocos/2002, editor = {Alessandro Armando}, title = {Frontiers of Combining Systems, 4th International Workshop, FroCoS 2002, Santa Margherita Ligure, Italy, April 8-10, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2309}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45988-X}, doi = {10.1007/3-540-45988-X}, isbn = {3-540-43381-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/frocos/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/ArmandoJ01, author = {Alessandro Armando and Tudor Jebelean}, title = {Special Issue on Calculemus-99: Integrating Computation and Deduction - Foreword of the Guest Editors}, journal = {J. Symb. Comput.}, volume = {32}, number = {4}, pages = {303--304}, year = {2001}, url = {https://doi.org/10.1006/jsco.2001.0467}, doi = {10.1006/JSCO.2001.0467}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/ArmandoJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/ArmandoCGR01, author = {Alessandro Armando and Alessandro Coglio and Fausto Giunchiglia and Silvio Ranise}, title = {The Control Layer in Open Mechanized Reasoning Systems: Annotations and Tactics}, journal = {J. Symb. Comput.}, volume = {32}, number = {4}, pages = {305--332}, year = {2001}, url = {https://doi.org/10.1006/jsco.2000.0464}, doi = {10.1006/JSCO.2000.0464}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/ArmandoCGR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/ArmandoR01, author = {Alessandro Armando and Silvio Ranise}, title = {A Practical Extension Mechanism for Decision Procedures: the Case Study of Universal Presburger Arithmetic}, journal = {J. Univers. Comput. Sci.}, volume = {7}, number = {2}, pages = {124--140}, year = {2001}, url = {https://doi.org/10.3217/jucs-007-02-0124}, doi = {10.3217/JUCS-007-02-0124}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/ArmandoR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/ArmandoCR01, author = {Alessandro Armando and Luca Compagna and Silvio Ranise}, editor = {Rajeev Gor{\'{e}} and Alexander Leitsch and Tobias Nipkow}, title = {System Description: {RDL} : Rewrite and Decision Procedure Laboratory}, booktitle = {Automated Reasoning, First International Joint Conference, {IJCAR} 2001, Siena, Italy, June 18-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2083}, pages = {663--669}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45744-5\_54}, doi = {10.1007/3-540-45744-5\_54}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cade/ArmandoCR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cp/ArmandoPR01, author = {Alessandro Armando and Felice Peccia and Silvio Ranise}, editor = {Toby Walsh}, title = {The Phase Transition of the Linear Inequalities Problem}, booktitle = {Principles and Practice of Constraint Programming - {CP} 2001, 7th International Conference, {CP} 2001, Paphos, Cyprus, November 26 - December 1, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2239}, pages = {422--432}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45578-7\_29}, doi = {10.1007/3-540-45578-7\_29}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/cp/ArmandoPR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/ArmandoRR01, author = {Alessandro Armando and Silvio Ranise and Micha{\"{e}}l Rusinowitch}, editor = {Laurent Fribourg}, title = {Uniform Derivation of Decision Procedures by Superposition}, booktitle = {Computer Science Logic, 15th International Workshop, {CSL} 2001. 10th Annual Conference of the EACSL, Paris, France, September 10-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2142}, pages = {513--527}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44802-0\_36}, doi = {10.1007/3-540-44802-0\_36}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/csl/ArmandoRR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issac/ArmandoB01, author = {Alessandro Armando and Clemens Ballarin}, editor = {Erich L. Kaltofen and Gilles Villard}, title = {Maple's evaluation process as constraint contextual rewriting}, booktitle = {Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, {ISSAC} 2001, {ORCCA} {\&} University of Western Ontario, London, Ontario, Canada, July 22-25, 2001}, pages = {32--37}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/384101.384107}, doi = {10.1145/384101.384107}, timestamp = {Mon, 03 Apr 2023 17:23:32 +0200}, biburl = {https://dblp.org/rec/conf/issac/ArmandoB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/frocos/ArmandoR00, author = {Alessandro Armando and Silvio Ranise}, editor = {H{\'{e}}l{\`{e}}ne Kirchner and Christophe Ringeissen}, title = {Termination of Constraint Contextual Rewriting}, booktitle = {Frontiers of Combining Systems, Third International Workshop, FroCoS 2000, Nancy, France, March 22-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1794}, pages = {47--61}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10720084\_4}, doi = {10.1007/10720084\_4}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/frocos/ArmandoR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woa/ArmandoZ00, author = {Alessandro Armando and Daniele Zini}, editor = {Antonio Corradi and Andrea Omicini and Agostino Poggi}, title = {Towards Interoperable Mechanized Reasoning Systems: the Logic Broker Architecture}, booktitle = {{WOA} 2000: Dagli Oggetti agli Agenti. 1st AI*IA/TABOO Joint Workshop "From Objects to Agents": Evolutive Trends of Software Systems, 29-30 May 2000, Parma, Italy}, pages = {70--75}, publisher = {Pitagora Editrice Bologna}, year = {2000}, timestamp = {Mon, 17 Jan 2005 15:51:56 +0100}, biburl = {https://dblp.org/rec/conf/woa/ArmandoZ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ase/ArmandoSG99, author = {Alessandro Armando and Alan Smaill and Ian Green}, title = {Automatic Synthesis of Recursive Programs: The Proof-Planning Paradigm}, journal = {Autom. Softw. Eng.}, volume = {6}, number = {4}, pages = {329--356}, year = {1999}, url = {https://doi.org/10.1023/A:1008763422061}, doi = {10.1023/A:1008763422061}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ase/ArmandoSG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecp/ArmandoCG99, author = {Alessandro Armando and Claudio Castellini and Enrico Giunchiglia}, editor = {Susanne Biundo and Maria Fox}, title = {SAT-Based Procedures for Temporal Reasoning}, booktitle = {Recent Advances in {AI} Planning, 5th European Conference on Planning, ECP'99, Durham, UK, September 8-10, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1809}, pages = {97--108}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10720246\_8}, doi = {10.1007/10720246\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecp/ArmandoCG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ArmandoJ99, author = {Alessandro Armando and Tudor Jebelean}, editor = {Alessandro Armando and Tudor Jebelean}, title = {Preface}, booktitle = {Systems for Integrated Computation and Deduction, {CALCULEMUS} 1999, associated to FLoC '99, the 1999 Federated Logic Conference, Trento, Italy, July 11-12, 1999}, series = {Electronic Notes in Theoretical Computer Science}, volume = {23}, number = {3}, pages = {319--320}, publisher = {Elsevier}, year = {1999}, url = {https://doi.org/10.1016/S1571-0661(05)80604-8}, doi = {10.1016/S1571-0661(05)80604-8}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/ArmandoJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ArmandoCG99, author = {Alessandro Armando and Alessandro Coglio and Fausto Giunchiglia}, editor = {Alessandro Armando and Tudor Jebelean}, title = {The control component of open mechanized reasoning systems}, booktitle = {Systems for Integrated Computation and Deduction, {CALCULEMUS} 1999, associated to FLoC '99, the 1999 Federated Logic Conference, Trento, Italy, July 11-12, 1999}, series = {Electronic Notes in Theoretical Computer Science}, volume = {23}, number = {3}, pages = {322--339}, publisher = {Elsevier}, year = {1999}, url = {https://doi.org/10.1016/S1571-0661(05)80606-1}, doi = {10.1016/S1571-0661(05)80606-1}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/ArmandoCG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/calculemus/1999, editor = {Alessandro Armando and Tudor Jebelean}, title = {Systems for Integrated Computation and Deduction, {CALCULEMUS} 1999, associated to FLoC '99, the 1999 Federated Logic Conference, Trento, Italy, July 11-12, 1999}, series = {Electronic Notes in Theoretical Computer Science}, volume = {23}, number = {3}, publisher = {Elsevier}, year = {1999}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/23/issue/3}, timestamp = {Thu, 16 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/calculemus/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amai/ArmandoGSB98, author = {Alessandro Armando and Jason Gallagher and Alan Smaill and Alan Bundy}, title = {Automating the Synthesis of Decision Procedures in a Constructive Metatheory}, journal = {Ann. Math. Artif. Intell.}, volume = {22}, number = {3-4}, pages = {259--279}, year = {1998}, url = {https://doi.org/10.1023/A:1018943603394}, doi = {10.1023/A:1018943603394}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amai/ArmandoGSB98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aimsa/ArmandoMR98, author = {Alessandro Armando and Erica Melis and Silvio Ranise}, editor = {Fausto Giunchiglia}, title = {Constraint Solving in Logic Programming and in Automated Deduction: {A} Comparison}, booktitle = {Artificial Intelligence: Methodology, Systems, and Applications, 8th International Conference, {AIMSA} '98, Sozopol, Bulgaria, September 21-13, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1480}, pages = {28--38}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0057432}, doi = {10.1007/BFB0057432}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/aimsa/ArmandoMR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisc/ArmandoR98, author = {Alessandro Armando and Silvio Ranise}, editor = {Jacques Calmet and Jan A. Plaza}, title = {From Integrated Reasoning Specialists to "Plug-and-Play" Reasoning Components}, booktitle = {Artificial Intelligence and Symbolic Computation, International Conference AISC'98, Plattsburgh, New York, USA, September 16-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1476}, pages = {42--54}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055901}, doi = {10.1007/BFB0055901}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/aisc/ArmandoR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/ArmandoSG97, author = {Alessandro Armando and Alan Smaill and Ian Green}, title = {Automatic Synthesis of Recursive Programs: The Proof-Planning Paradigm}, booktitle = {1997 International Conference on Automated Software Engineering, {ASE} 1997, Lake Tahoe, CA, USA, November 2-5, 1997}, pages = {2--9}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/ASE.1997.632818}, doi = {10.1109/ASE.1997.632818}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/ArmandoSG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/GiunchigliaPA96, author = {Fausto Giunchiglia and Paolo Pecchiari and Alessandro Armando}, title = {Towards provably correct system synthesis and extension}, journal = {Future Gener. Comput. Syst.}, volume = {12}, number = {2-3}, pages = {123--137}, year = {1996}, url = {https://doi.org/10.1016/0167-739X(96)88792-9}, doi = {10.1016/0167-739X(96)88792-9}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/GiunchigliaPA96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/GiunchigliaATC96, author = {Enrico Giunchiglia and Alessandro Armando and Paolo Traverso and Alessandro Cimatti}, title = {Visual representation of natural language scene descriptions}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {B}}, volume = {26}, number = {4}, pages = {575--589}, year = {1996}, url = {https://doi.org/10.1109/3477.517032}, doi = {10.1109/3477.517032}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/GiunchigliaATC96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amai/GiunchigliaAP95, author = {Enrico Giunchiglia and Alessandro Armando and Paolo Pecchiari}, title = {Structured Proof Procedures}, journal = {Ann. Math. Artif. Intell.}, volume = {15}, number = {1}, pages = {1--18}, year = {1995}, url = {https://doi.org/10.1007/BF01535839}, doi = {10.1007/BF01535839}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amai/GiunchigliaAP95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aai/TraversoCSAG94, author = {Paolo Traverso and Alessandro Cimatti and Luca Spalazzi and Alessandro Armando and Enrico Giunchiglia}, title = {{MRG:} Building planers for real-world complex applications}, journal = {Appl. Artif. Intell.}, volume = {8}, number = {3}, pages = {333--357}, year = {1994}, url = {https://doi.org/10.1080/08839519408945447}, doi = {10.1080/08839519408945447}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aai/TraversoCSAG94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amai/ArmandoG93, author = {Alessandro Armando and Enrico Giunchiglia}, title = {Embedding Complex Decision Procedures Inside an Interactive Theorem Prover}, journal = {Ann. Math. Artif. Intell.}, volume = {8}, number = {3-4}, pages = {475--502}, year = {1993}, url = {https://doi.org/10.1007/BF01530803}, doi = {10.1007/BF01530803}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amai/ArmandoG93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiia/ManzoGAP93, author = {Mauro Di Manzo and Enrico Giunchiglia and Alessandro Armando and Paolo Pecchiari}, editor = {Pietro Torasso}, title = {Proving Formulas through Reduction to Decidable Classes}, booktitle = {Advances in Artificial Intelligence, Third Congress of the Italian Association for Artificial Intelligence, AI*IA'93, Torino, Italy, October 26-28, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {728}, pages = {1--10}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-57292-9\_36}, doi = {10.1007/3-540-57292-9\_36}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aiia/ManzoGAP93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiia/ArmandoCV93, author = {Alessandro Armando and Alessandro Cimatti and Luca Vigan{\`{o}}}, editor = {Pietro Torasso}, title = {Building and Executing Proof Strategies in a Formal Metatheory}, booktitle = {Advances in Artificial Intelligence, Third Congress of the Italian Association for Artificial Intelligence, AI*IA'93, Torino, Italy, October 26-28, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {728}, pages = {11--22}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-57292-9\_37}, doi = {10.1007/3-540-57292-9\_37}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aiia/ArmandoCV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictai/ArmandoP93, author = {Alessandro Armando and Paolo Pecchiari}, title = {{NALIG:} {A} {CAD} System for Interior Design with High Level Interaction Capabilities}, booktitle = {Fifth International Conference on Tools with Artificial Intelligence, {ICTAI} '93, Boston, Massachusetts, USA, November 8-11, 1993}, pages = {446--447}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/TAI.1993.633995}, doi = {10.1109/TAI.1993.633995}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ictai/ArmandoP93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aimsa/TraversoAG92, author = {Paolo Traverso and Alessandro Armando and Enrico Giunchiglia}, editor = {Benedict du Boulay and Vassil Stoyanov Sgurev}, title = {A Knowledge Based System for Automatic 3D Scene}, booktitle = {Artificial Intelligence {V:} Methodology, Systems, Applications - Proceedings of the Fifth International Conference on Artificial Intelligence: Methodology, Systems, Applications, {AIMSA} 1992, Sofia, Bulgaria, September 21-24, 1992}, pages = {255--264}, publisher = {North-Holland}, year = {1992}, timestamp = {Thu, 16 Mar 2017 14:36:24 +0100}, biburl = {https://dblp.org/rec/conf/aimsa/TraversoAG92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.