BibTeX records: Alessandro Armando

download as .bib file

@article{DBLP:journals/tdsc/RussoCLAM23,
  author       = {Enrico Russo and
                  Gabriele Costa and
                  Giacomo Longo and
                  Alessandro Armando and
                  Alessio Merlo},
  title        = {LiDiTE: {A} Full-Fledged and Featherweight Digital Twin Framework},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {6},
  pages        = {4899--4912},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2023.3236798},
  doi          = {10.1109/TDSC.2023.3236798},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/RussoCLAM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LongoRAM23,
  author       = {Giacomo Longo and
                  Enrico Russo and
                  Alessandro Armando and
                  Alessio Merlo},
  title        = {Attacking (and Defending) the Maritime Radar System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {3575--3589},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3282132},
  doi          = {10.1109/TIFS.2023.3282132},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LongoRAM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamify/RussoROLA23,
  author       = {Enrico Russo and
                  Marina Ribaudo and
                  Alessandro Orlich and
                  Giacomo Longo and
                  Alessandro Armando},
  editor       = {Riccardo Coppola and
                  Luca Ardito and
                  Gordon Fraser and
                  Maurizio Leotta},
  title        = {Cyber Range and Cyber Defense Exercises: Gamification Meets University
                  Students},
  booktitle    = {Proceedings of the 2nd International Workshop on Gamification in Software
                  Development, Verification, and Validation, Gamify 2023, San Francisco,
                  CA, USA, 4 December 2023},
  pages        = {29--37},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617553.3617888},
  doi          = {10.1145/3617553.3617888},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamify/RussoROLA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/RaimondiLMAR22,
  author       = {Marco Raimondi and
                  Giacomo Longo and
                  Alessio Merlo and
                  Alessandro Armando and
                  Enrico Russo},
  title        = {Training the Maritime Security Operations Centre Teams},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2022, Rhodes, Greece, July 27-29, 2022},
  pages        = {388--393},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSR54599.2022.9850324},
  doi          = {10.1109/CSR54599.2022.9850324},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csr2/RaimondiLMAR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-06954,
  author       = {Enrico Russo and
                  Gabriele Costa and
                  Giacomo Longo and
                  Alessandro Armando and
                  Alessio Merlo},
  title        = {LiDiTE: a Full-Fledged and Featherweight Digital Twin Framework},
  journal      = {CoRR},
  volume       = {abs/2202.06954},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.06954},
  eprinttype    = {arXiv},
  eprint       = {2202.06954},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-06954.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-05623,
  author       = {Giacomo Longo and
                  Enrico Russo and
                  Alessandro Armando and
                  Alessio Merlo},
  title        = {Attacking (and defending) the Maritime Radar System},
  journal      = {CoRR},
  volume       = {abs/2207.05623},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.05623},
  doi          = {10.48550/ARXIV.2207.05623},
  eprinttype    = {arXiv},
  eprint       = {2207.05623},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-05623.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/RussoVAM21,
  author       = {Enrico Russo and
                  Luca Verderame and
                  Alessandro Armando and
                  Alessio Merlo},
  title        = {{DIOXIN:} runtime security policy enforcement of fog applications},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {12},
  number       = {2},
  pages        = {126--138},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJGUC.2021.114821},
  doi          = {10.1504/IJGUC.2021.114821},
  timestamp    = {Tue, 25 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/RussoVAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DemetrioBLRA21,
  author       = {Luca Demetrio and
                  Battista Biggio and
                  Giovanni Lagorio and
                  Fabio Roli and
                  Alessandro Armando},
  title        = {Functionality-Preserving Black-Box Optimization of Adversarial Windows
                  Malware},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {3469--3478},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3082330},
  doi          = {10.1109/TIFS.2021.3082330},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DemetrioBLRA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DemetrioCBLAR21,
  author       = {Luca Demetrio and
                  Scott E. Coull and
                  Battista Biggio and
                  Giovanni Lagorio and
                  Alessandro Armando and
                  Fabio Roli},
  title        = {Adversarial EXEmples: {A} Survey and Experimental Evaluation of Practical
                  Attacks on Machine Learning for Windows Malware Detection},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {27:1--27:31},
  year         = {2021},
  url          = {https://doi.org/10.1145/3473039},
  doi          = {10.1145/3473039},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DemetrioCBLAR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itasec/LagorioRA21,
  author       = {Giovanni Lagorio and
                  Marina Ribaudo and
                  Alessandro Armando},
  editor       = {Alessandro Armando and
                  Michele Colajanni},
  title        = {Capture the Flag competitions for Higher Education},
  booktitle    = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021,
                  All Digital Event, April 7-9, 2021},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2940},
  pages        = {447--460},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-2940/paper38.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:11 +0100},
  biburl       = {https://dblp.org/rec/conf/itasec/LagorioRA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/itasec/2021,
  editor       = {Alessandro Armando and
                  Michele Colajanni},
  title        = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021,
                  All Digital Event, April 7-9, 2021},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2940},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-2940},
  urn          = {urn:nbn:de:0074-2940-2},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itasec/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RussoCA20,
  author       = {Enrico Russo and
                  Gabriele Costa and
                  Alessandro Armando},
  title        = {Building next generation Cyber Ranges with {CRACK}},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101837},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101837},
  doi          = {10.1016/J.COSE.2020.101837},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RussoCA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ValenzaCA20,
  author       = {Andrea Valenza and
                  Gabriele Costa and
                  Alessandro Armando},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {17--29},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/valenza},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ValenzaCA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ArmandoGT20,
  author       = {Alessandro Armando and
                  Giorgia Gazzarata and
                  Fatih Turkmen},
  editor       = {Jorge Lobo and
                  Scott D. Stoller and
                  Peng Liu},
  title        = {Benchmarking {UAQ} Solvers},
  booktitle    = {Proceedings of the 25th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2020, Barcelona, Spain, June 10-12, 2020},
  pages        = {145--152},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3381991.3395616},
  doi          = {10.1145/3381991.3395616},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/ArmandoGT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ArmandoGT20a,
  author       = {Alessandro Armando and
                  Giorgia A. Gazzarata and
                  Fatih Turkmen},
  editor       = {Jorge Lobo and
                  Scott D. Stoller and
                  Peng Liu},
  title        = {{AQUA:} An Efficient Solver for the User Authorization Query Problem},
  booktitle    = {Proceedings of the 25th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2020, Barcelona, Spain, June 10-12, 2020},
  pages        = {153--154},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3381991.3396225},
  doi          = {10.1145/3381991.3396225},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/ArmandoGT20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-06681,
  author       = {Gabriele Costa and
                  Enrico Russo and
                  Alessandro Armando},
  title        = {Automating the Generation of Cyber Range Virtual Scenarios with {VSDL}},
  journal      = {CoRR},
  volume       = {abs/2001.06681},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.06681},
  eprinttype    = {arXiv},
  eprint       = {2001.06681},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-06681.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-13526,
  author       = {Luca Demetrio and
                  Battista Biggio and
                  Giovanni Lagorio and
                  Fabio Roli and
                  Alessandro Armando},
  title        = {Efficient Black-box Optimization of Adversarial Windows Malware with
                  Constrained Manipulations},
  journal      = {CoRR},
  volume       = {abs/2003.13526},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.13526},
  eprinttype    = {arXiv},
  eprint       = {2003.13526},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-13526.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-09769,
  author       = {Andrea Valenza and
                  Gabriele Costa and
                  Alessandro Armando},
  title        = {Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners},
  journal      = {CoRR},
  volume       = {abs/2006.09769},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.09769},
  eprinttype    = {arXiv},
  eprint       = {2006.09769},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-09769.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-07125,
  author       = {Luca Demetrio and
                  Scott E. Coull and
                  Battista Biggio and
                  Giovanni Lagorio and
                  Alessandro Armando and
                  Fabio Roli},
  title        = {Adversarial EXEmples: {A} Survey and Experimental Evaluation of Practical
                  Attacks on Machine Learning for Windows Malware Detection},
  journal      = {CoRR},
  volume       = {abs/2008.07125},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.07125},
  eprinttype    = {arXiv},
  eprint       = {2008.07125},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-07125.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/MurinoAT19,
  author       = {Giuseppina Murino and
                  Alessandro Armando and
                  Armando Tacchella},
  editor       = {Tom{\'{a}}s Min{\'{a}}rik and
                  Siim Alatalu and
                  S. Biondi and
                  M. Signoretti and
                  I. Tolga and
                  G. Visky},
  title        = {Resilience of Cyber-Physical Systems: an Experimental Appraisal of
                  Quantitative Measures},
  booktitle    = {11th International Conference on Cyber Conflict, CyCon 2019, Tallinn,
                  Estonia, May 28-31, 2019},
  pages        = {1--19},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.23919/CYCON.2019.8757010},
  doi          = {10.23919/CYCON.2019.8757010},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/MurinoAT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itasec/DemetrioBLRA19,
  author       = {Luca Demetrio and
                  Battista Biggio and
                  Giovanni Lagorio and
                  Fabio Roli and
                  Alessandro Armando},
  editor       = {Pierpaolo Degano and
                  Roberto Zunino},
  title        = {Explaining Vulnerabilities of Deep Learning to Adversarial Malware
                  Binaries},
  booktitle    = {Proceedings of the Third Italian Conference on Cyber Security, Pisa,
                  Italy, February 13-15, 2019},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2315},
  publisher    = {CEUR-WS.org},
  year         = {2019},
  url          = {https://ceur-ws.org/Vol-2315/paper09.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:11 +0100},
  biburl       = {https://dblp.org/rec/conf/itasec/DemetrioBLRA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DejonCVAM19,
  author       = {Nicolas Dejon and
                  Davide Caputo and
                  Luca Verderame and
                  Alessandro Armando and
                  Alessio Merlo},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {Automated Security Analysis of IoT Software Updates},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {223--239},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_14},
  doi          = {10.1007/978-3-030-41702-4\_14},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/DejonCVAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-03583,
  author       = {Luca Demetrio and
                  Battista Biggio and
                  Giovanni Lagorio and
                  Fabio Roli and
                  Alessandro Armando},
  title        = {Explaining Vulnerabilities of Deep Learning to Adversarial Malware
                  Binaries},
  journal      = {CoRR},
  volume       = {abs/1901.03583},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.03583},
  eprinttype    = {arXiv},
  eprint       = {1901.03583},
  timestamp    = {Fri, 01 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-03583.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/CostaMVA18,
  author       = {Gabriele Costa and
                  Alessio Merlo and
                  Luca Verderame and
                  Alessandro Armando},
  title        = {Automatic security verification of mobile app configurations},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {80},
  pages        = {519--536},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2016.06.014},
  doi          = {10.1016/J.FUTURE.2016.06.014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/CostaMVA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/RussoCA18,
  author       = {Enrico Russo and
                  Gabriele Costa and
                  Alessandro Armando},
  title        = {Scenario Design and Validation for Next Generation Cyber Ranges},
  booktitle    = {17th {IEEE} International Symposium on Network Computing and Applications,
                  {NCA} 2018, Cambridge, MA, USA, November 1-3, 2018},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NCA.2018.8548324},
  doi          = {10.1109/NCA.2018.8548324},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/RussoCA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SciarrettaCRA17,
  author       = {Giada Sciarretta and
                  Roberto Carbone and
                  Silvio Ranise and
                  Alessandro Armando},
  title        = {Anatomy of the Facebook solution for mobile single sign-on: Security
                  assessment and improvements},
  journal      = {Comput. Secur.},
  volume       = {71},
  pages        = {71--86},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2017.04.011},
  doi          = {10.1016/J.COSE.2017.04.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SciarrettaCRA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tlsdkcs/MetouiBA17,
  author       = {Nadia Metoui and
                  Michele Bezzi and
                  Alessandro Armando},
  title        = {Risk-Based Privacy-Aware Access Control for Threat Detection Systems},
  journal      = {Trans. Large Scale Data Knowl. Centered Syst.},
  volume       = {36},
  pages        = {1--30},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-56266-6\_1},
  doi          = {10.1007/978-3-662-56266-6\_1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tlsdkcs/MetouiBA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/SudhodananCCDAM17,
  author       = {Avinash Sudhodanan and
                  Roberto Carbone and
                  Luca Compagna and
                  Nicolas Dolgin and
                  Alessandro Armando and
                  Umberto Morelli},
  title        = {Large-Scale Analysis {\&} Detection of Authentication Cross-Site
                  Request Forgeries},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {350--365},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.45},
  doi          = {10.1109/EUROSP.2017.45},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/SudhodananCCDAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/itasec/2017,
  editor       = {Alessandro Armando and
                  Roberto Baldoni and
                  Riccardo Focardi},
  title        = {Proceedings of the First Italian Conference on Cybersecurity (ITASEC17),
                  Venice, Italy, January 17-20, 2017},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1816},
  publisher    = {CEUR-WS.org},
  year         = {2017},
  url          = {https://ceur-ws.org/Vol-1816},
  urn          = {urn:nbn:de:0074-1816-1},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itasec/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/MerloCVA16,
  author       = {Alessio Merlo and
                  Gabriele Costa and
                  Luca Verderame and
                  Alessandro Armando},
  title        = {Android vs. SEAndroid: An empirical assessment},
  journal      = {Pervasive Mob. Comput.},
  volume       = {30},
  pages        = {113--131},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.pmcj.2016.01.006},
  doi          = {10.1016/J.PMCJ.2016.01.006},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/MerloCVA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/ArmandoCC16,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Luca Compagna},
  title        = {{SATMC:} a SAT-based model checker for security protocols, business
                  processes, and security APIs},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {18},
  number       = {2},
  pages        = {187--204},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10009-015-0385-y},
  doi          = {10.1007/S10009-015-0385-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/ArmandoCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ArmandoRTW16,
  author       = {Alessandro Armando and
                  Silvio Ranise and
                  Riccardo Traverso and
                  Konrad S. Wrona},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  title        = {SMT-based Enforcement and Analysis of {NATO} Content-based Protection
                  and Release Policies},
  booktitle    = {Proceedings of the 2016 {ACM} International Workshop on Attribute
                  Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA,
                  March 11, 2016},
  pages        = {35--46},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2875491.2875493},
  doi          = {10.1145/2875491.2875493},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ArmandoRTW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdse/MetouiBA16,
  author       = {Nadia Metoui and
                  Michele Bezzi and
                  Alessandro Armando},
  editor       = {Tran Khanh Dang and
                  Roland R. Wagner and
                  Josef K{\"{u}}ng and
                  Nam Thoai and
                  Makoto Takizawa and
                  Erich J. Neuhold},
  title        = {Trust and Risk-Based Access Control for Privacy Preserving Threat
                  Detection Systems},
  booktitle    = {Future Data and Security Engineering - Third International Conference,
                  {FDSE} 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10018},
  pages        = {285--304},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48057-2\_20},
  doi          = {10.1007/978-3-319-48057-2\_20},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fdse/MetouiBA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SudhodananACC16,
  author       = {Avinash Sudhodanan and
                  Alessandro Armando and
                  Roberto Carbone and
                  Luca Compagna},
  title        = {Attack Patterns for Black-Box Security Testing of Multi-Party Web
                  Applications},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/attack-patterns-black-box-security-testing-multi-party-web-applications.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/SudhodananACC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SciarrettaACR16,
  author       = {Giada Sciarretta and
                  Alessandro Armando and
                  Roberto Carbone and
                  Silvio Ranise},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Security of Mobile Single Sign-On: {A} Rational Reconstruction of
                  Facebook Login Solution},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {147--158},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005969001470158},
  doi          = {10.5220/0005969001470158},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SciarrettaACR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ArmandoCMV15,
  author       = {Alessandro Armando and
                  Gabriele Costa and
                  Alessio Merlo and
                  Luca Verderame},
  title        = {Formal modeling and automatic enforcement of Bring Your Own Device
                  policies},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {2},
  pages        = {123--140},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0252-y},
  doi          = {10.1007/S10207-014-0252-Y},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ArmandoCMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ArmandoBMS15,
  author       = {Alessandro Armando and
                  Michele Bezzi and
                  Nadia Metoui and
                  Antonino Sabetta},
  title        = {Risk-Based Privacy-Aware Information Disclosure},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {6},
  number       = {2},
  pages        = {70--89},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJSSE.2015040104},
  doi          = {10.4018/IJSSE.2015040104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/ArmandoBMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArmandoBCMMRTV15,
  author       = {Alessandro Armando and
                  Gianluca Bocci and
                  Gabriele Costa and
                  Rocco Mammoliti and
                  Alessio Merlo and
                  Silvio Ranise and
                  Riccardo Traverso and
                  Andrea Valenza},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {41--49},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808786},
  doi          = {10.1145/2808783.2808786},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ArmandoBCMMRTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ArmandoRTW15,
  author       = {Alessandro Armando and
                  Silvio Ranise and
                  Riccardo Traverso and
                  Konrad S. Wrona},
  title        = {Compiling {NATO} authorization policies for enforcement in the cloud
                  and SDNs},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {741--742},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346913},
  doi          = {10.1109/CNS.2015.7346913},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ArmandoRTW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ArmandoCCM15,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Gabriele Costa and
                  Alessio Merlo},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {Android Permissions Unleashed},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {320--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.29},
  doi          = {10.1109/CSF.2015.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ArmandoCCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ColettaA15,
  author       = {Alessio Coletta and
                  Alessandro Armando},
  editor       = {Adrien B{\'{e}}cue and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sokratis K. Katsikas and
                  Costas Lambrinoudakis},
  title        = {Security Monitoring for Industrial Control Systems},
  booktitle    = {Security of Industrial Control Systems and Cyber Physical Systems
                  - First Workshop, CyberICS 2015 and First Workshop, {WOS-CPS} 2015,
                  Vienna, Austria, September 21-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9588},
  pages        = {48--62},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-40385-4\_4},
  doi          = {10.1007/978-3-319-40385-4\_4},
  timestamp    = {Mon, 03 Jan 2022 22:15:09 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ColettaA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieeehpcs/ArmandoMV15,
  author       = {Alessandro Armando and
                  Alessio Merlo and
                  Luca Verderame},
  title        = {Trusted host-based card emulation},
  booktitle    = {2015 International Conference on High Performance Computing {\&}
                  Simulation, {HPCS} 2015, Amsterdam, Netherlands, July 20-24, 2015},
  pages        = {221--228},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/HPCSim.2015.7237043},
  doi          = {10.1109/HPCSIM.2015.7237043},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ieeehpcs/ArmandoMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/ArmandoBCM15,
  author       = {Alessandro Armando and
                  Michele Bezzi and
                  Francesco Di Cerbo and
                  Nadia Metoui},
  editor       = {Christophe Debruyne and
                  Herv{\'{e}} Panetto and
                  Robert Meersman and
                  Tharam S. Dillon and
                  Georg Weichhart and
                  Yuan An and
                  Claudio Agostino Ardagna},
  title        = {Balancing Trust and Risk in Access Control},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2015 Conferences
                  - Confederated International Conferences: CoopIS, ODBASE, and C{\&}TC
                  2015, Rhodes, Greece, October 26-30, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9415},
  pages        = {660--676},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26148-5\_45},
  doi          = {10.1007/978-3-319-26148-5\_45},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/ArmandoBCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ArmandoRTW15,
  author       = {Alessandro Armando and
                  Silvio Ranise and
                  Riccardo Traverso and
                  Konrad S. Wrona},
  editor       = {Edgar R. Weippl and
                  Florian Kerschbaum and
                  Adam J. Lee},
  title        = {A SMT-based Tool for the Analysis and Enforcement of {NATO} Content-based
                  Protection and Release Policies},
  booktitle    = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
                  Technologies, Vienna, Austria, June 1-3, 2015},
  pages        = {151--155},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2752952.2752954},
  doi          = {10.1145/2752952.2752954},
  timestamp    = {Mon, 26 Jun 2023 20:45:28 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/ArmandoRTW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/ArmandoBCCMMM15,
  author       = {Alessandro Armando and
                  Gianluca Bocci and
                  Giantonio Chiarelli and
                  Gabriele Costa and
                  Gabriele De Maglie and
                  Rocco Mammoliti and
                  Alessio Merlo},
  editor       = {Christel Baier and
                  Cesare Tinelli},
  title        = {{SAM:} The Static Analysis Module of the {MAVERIC} Mobile App Security
                  Verification Platform},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 21st International Conference, {TACAS} 2015, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2015, London, UK, April 11-18, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9035},
  pages        = {225--230},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46681-0\_19},
  doi          = {10.1007/978-3-662-46681-0\_19},
  timestamp    = {Sat, 30 Sep 2023 09:57:43 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/ArmandoBCCMMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ase/ArmandoBM14,
  author       = {Alessandro Armando and
                  Massimo Benerecetti and
                  Jacopo Mantovani},
  title        = {Counterexample-guided abstraction refinement for linear programs with
                  arrays},
  journal      = {Autom. Softw. Eng.},
  volume       = {21},
  number       = {2},
  pages        = {225--285},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10515-013-0132-0},
  doi          = {10.1007/S10515-013-0132-0},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ase/ArmandoBM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ArmandoP14,
  author       = {Alessandro Armando and
                  Serena Elisa Ponta},
  title        = {Model checking authorization requirements in business processes},
  journal      = {Comput. Secur.},
  volume       = {40},
  pages        = {1--22},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2013.10.002},
  doi          = {10.1016/J.COSE.2013.10.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ArmandoP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ArmandoCVM14,
  author       = {Alessandro Armando and
                  Gabriele Costa and
                  Luca Verderame and
                  Alessio Merlo},
  title        = {Securing the "Bring Your Own Device" Paradigm},
  journal      = {Computer},
  volume       = {47},
  number       = {6},
  pages        = {48--56},
  year         = {2014},
  url          = {https://doi.org/10.1109/MC.2014.164},
  doi          = {10.1109/MC.2014.164},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ArmandoCVM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ArmandoMV14,
  author       = {Alessandro Armando and
                  Alessio Merlo and
                  Luca Verderame},
  title        = {Security considerations related to the use of mobile devices in the
                  operation of critical infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {4},
  pages        = {247--256},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.10.002},
  doi          = {10.1016/J.IJCIP.2014.10.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ArmandoMV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ArmandoCCMMM14,
  author       = {Alessandro Armando and
                  Giantonio Chiarelli and
                  Gabriele Costa and
                  Gabriele De Maglie and
                  Rocco Mammoliti and
                  Alessio Merlo},
  title        = {Mobile App Security Analysis with the MAVeriC Static Analysis Module},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {4},
  pages        = {103--119},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.12.31.103},
  doi          = {10.22667/JOWUA.2014.12.31.103},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ArmandoCCMMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ArmandoBMS14,
  author       = {Alessandro Armando and
                  Michele Bezzi and
                  Nadia Metoui and
                  Antonino Sabetta},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Emil Lupu and
                  Joachim Posegga and
                  Alessandro Aldini and
                  Fabio Martinelli and
                  Neeraj Suri},
  title        = {Risk-Aware Information Disclosure},
  booktitle    = {Data Privacy Management, Autonomous Spontaneous Security, and Security
                  Assurance - 9th International Workshop, {DPM} 2014, 7th International
                  Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014,
                  Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8872},
  pages        = {266--276},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17016-9\_17},
  doi          = {10.1007/978-3-319-17016-9\_17},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ArmandoBMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ArmandoCCR14,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Eyasu Getahun Chekole and
                  Silvio Ranise},
  editor       = {Sylvia L. Osborn and
                  Mahesh V. Tripunitara and
                  Ian M. Molloy},
  title        = {Attribute based access control for APIs in spring security},
  booktitle    = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '14, London, ON, Canada - June 25 - 27, 2014},
  pages        = {85--88},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2613087.2613109},
  doi          = {10.1145/2613087.2613109},
  timestamp    = {Wed, 02 Jun 2021 09:13:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/ArmandoCCR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/RaniseTA14,
  author       = {Silvio Ranise and
                  Anh Tuan Truong and
                  Alessandro Armando},
  editor       = {Sylvia L. Osborn and
                  Mahesh V. Tripunitara and
                  Ian M. Molloy},
  title        = {Scalable and precise automated analysis of administrative temporal
                  role-based access control},
  booktitle    = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '14, London, ON, Canada - June 25 - 27, 2014},
  pages        = {103--114},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2613087.2613102},
  doi          = {10.1145/2613087.2613102},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/RaniseTA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridsec/ArmandoCCPRR14,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Eyasu Getahun Chekole and
                  Claudio Petrazzuolo and
                  Andrea Ranalli and
                  Silvio Ranise},
  editor       = {Jorge Cu{\'{e}}llar},
  title        = {Selective Release of Smart Metering Data in Multi-domain Smart Grids},
  booktitle    = {Smart Grid Security - Second International Workshop, SmartGridSec
                  2014, Munich, Germany, February 26, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8448},
  pages        = {48--62},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10329-7\_4},
  doi          = {10.1007/978-3-319-10329-7\_4},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smartgridsec/ArmandoCCPRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/ArmandoCC14,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Luca Compagna},
  editor       = {Erika {\'{A}}brah{\'{a}}m and
                  Klaus Havelund},
  title        = {{SATMC:} {A} SAT-Based Model Checker for Security-Critical Systems},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 20th International Conference, {TACAS} 2014, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2014, Grenoble, France, April 5-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8413},
  pages        = {31--45},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54862-8\_3},
  doi          = {10.1007/978-3-642-54862-8\_3},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tacas/ArmandoCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ArmandoCMV14,
  author       = {Alessandro Armando and
                  Gabriele Costa and
                  Alessio Merlo and
                  Luca Verderame},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Enabling {BYOD} through secure meta-market},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {219--230},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627410},
  doi          = {10.1145/2627393.2627410},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ArmandoCMV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ArmandoCCCPS13,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Luca Compagna and
                  Jorge Cu{\'{e}}llar and
                  Giancarlo Pellegrino and
                  Alessandro Sorniotti},
  title        = {An authentication flaw in browser-based Single Sign-On protocols:
                  Impact and remediations},
  journal      = {Comput. Secur.},
  volume       = {33},
  pages        = {41--58},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2012.08.007},
  doi          = {10.1016/J.COSE.2012.08.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ArmandoCCCPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ArmandoMMV13,
  author       = {Alessandro Armando and
                  Alessio Merlo and
                  Mauro Migliardi and
                  Luca Verderame},
  title        = {Breaking and fixing the Android Launching Flow},
  journal      = {Comput. Secur.},
  volume       = {39},
  pages        = {104--115},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.03.009},
  doi          = {10.1016/J.COSE.2013.03.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ArmandoMMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aips/ArmandoGMP13,
  author       = {Alessandro Armando and
                  Enrico Giunchiglia and
                  Marco Maratea and
                  Serena Elisa Ponta},
  editor       = {Daniel Borrajo and
                  Subbarao Kambhampati and
                  Angelo Oddi and
                  Simone Fratini},
  title        = {Modeling and Reasoning about Business Processes under Authorization
                  Constraints: {A} Planning-Based Approach},
  booktitle    = {Proceedings of the Twenty-Third International Conference on Automated
                  Planning and Scheduling, {ICAPS} 2013, Rome, Italy, June 10-14, 2013},
  publisher    = {{AAAI}},
  year         = {2013},
  url          = {http://www.aaai.org/ocs/index.php/ICAPS/ICAPS13/paper/view/6033},
  timestamp    = {Wed, 29 Mar 2017 16:45:27 +0200},
  biburl       = {https://dblp.org/rec/conf/aips/ArmandoGMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/ArmandoORW13,
  author       = {Alessandro Armando and
                  Sander Oudkerk and
                  Silvio Ranise and
                  Konrad S. Wrona},
  editor       = {Jean{-}Luc Danger and
                  Mourad Debbabi and
                  Jean{-}Yves Marion and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood},
  title        = {Formal Modelling of Content-Based Protection and Release for Access
                  Control in {NATO} Operations},
  booktitle    = {Foundations and Practice of Security - 6th International Symposium,
                  {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8352},
  pages        = {227--244},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05302-8\_14},
  doi          = {10.1007/978-3-319-05302-8\_14},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/ArmandoORW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/ArmandoCCFMVY13,
  author       = {Alessandro Armando and
                  Aniello Castiglione and
                  Gabriele Costa and
                  Ugo Fiore and
                  Alessio Merlo and
                  Luca Verderame and
                  Ilsun You},
  editor       = {Khabib Mustofa and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Edgar R. Weippl and
                  Ilsun You},
  title        = {Trustworthy Opportunistic Access to the Internet of Services},
  booktitle    = {Information and Communicatiaon Technology - International Conference,
                  ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {469--478},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36818-9\_52},
  doi          = {10.1007/978-3-642-36818-9\_52},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/ArmandoCCFMVY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ArmandoCZ13,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Luca Zanetti},
  editor       = {Javier L{\'{o}}pez and
                  Xinyi Huang and
                  Ravi S. Sandhu},
  title        = {Formal Modeling and Automatic Security Analysis of Two-Factor and
                  Two-Channel Authentication Protocols},
  booktitle    = {Network and System Security - 7th International Conference, {NSS}
                  2013, Madrid, Spain, June 3-4, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7873},
  pages        = {728--734},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38631-2\_63},
  doi          = {10.1007/978-3-642-38631-2\_63},
  timestamp    = {Tue, 09 Feb 2021 08:50:29 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/ArmandoCZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ArmandoCM13,
  author       = {Alessandro Armando and
                  Gabriele Costa and
                  Alessio Merlo},
  editor       = {Sung Y. Shin and
                  Jos{\'{e}} Carlos Maldonado},
  title        = {Bring your own device, securely},
  booktitle    = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing,
                  {SAC} '13, Coimbra, Portugal, March 18-22, 2013},
  pages        = {1852--1858},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480362.2480707},
  doi          = {10.1145/2480362.2480707},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/ArmandoCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ArmandoGORW13,
  author       = {Alessandro Armando and
                  Matteo Grasso and
                  Sander Oudkerk and
                  Silvio Ranise and
                  Konrad S. Wrona},
  editor       = {Mauro Conti and
                  Jaideep Vaidya and
                  Andreas Schaad},
  title        = {Content-based information protection and release in {NATO} operations},
  booktitle    = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '13, Amsterdam, The Netherlands, June 12-14, 2013},
  pages        = {261--264},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462410.2462427},
  doi          = {10.1145/2462410.2462427},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/ArmandoGORW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ArmandoMV13,
  author       = {Alessandro Armando and
                  Alessio Merlo and
                  Luca Verderame},
  editor       = {Lech J. Janczewski and
                  Henry B. Wolfe and
                  Sujeet Shenoi},
  title        = {An Empirical Evaluation of the Android Security Framework},
  booktitle    = {Security and Privacy Protection in Information Processing Systems
                  - 28th {IFIP} {TC} 11 International Conference, {SEC} 2013, Auckland,
                  New Zealand, July 8-10, 2013. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {405},
  pages        = {176--189},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39218-4\_14},
  doi          = {10.1007/978-3-642-39218-4\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ArmandoMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ArmandoL12,
  author       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Preface},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {1},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2011-0438},
  doi          = {10.3233/JCS-2011-0438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ArmandoL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ArmandoR12,
  author       = {Alessandro Armando and
                  Silvio Ranise},
  title        = {Scalable automated symbolic analysis of administrative role-based
                  access control policies by {SMT} solving},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {309--352},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0461},
  doi          = {10.3233/JCS-2012-0461},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ArmandoR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/ArmandoGMP12,
  author       = {Alessandro Armando and
                  Enrico Giunchiglia and
                  Marco Maratea and
                  Serena Elisa Ponta},
  title        = {An action-based approach to the formal specification and automatic
                  analysis of business processes under authorization constraints},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {78},
  number       = {1},
  pages        = {119--141},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jcss.2011.02.015},
  doi          = {10.1016/J.JCSS.2011.02.015},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcss/ArmandoGMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ArmandoCMV12,
  author       = {Alessandro Armando and
                  Gabriele Costa and
                  Alessio Merlo and
                  Luca Verderame},
  title        = {Securing the "Bring Your Own Device" Policy},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {2},
  number       = {3/4},
  pages        = {3--17},
  year         = {2012},
  url          = {https://doi.org/10.22667/JISIS.2012.11.31.003},
  doi          = {10.22667/JISIS.2012.11.31.003},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ArmandoCMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ArmandoRTC12,
  author       = {Alessandro Armando and
                  Silvio Ranise and
                  Fatih Turkmen and
                  Bruno Crispo},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Efficient run-time solving of {RBAC} user authorization queries: pushing
                  the envelope},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {241--248},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133631},
  doi          = {10.1145/2133601.2133631},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ArmandoRTC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ArmandoR12,
  author       = {Alessandro Armando and
                  Silvio Ranise},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Automated and Efficient Analysis of Role-Based Access Control with
                  Attributes},
  booktitle    = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7371},
  pages        = {25--40},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31540-4\_3},
  doi          = {10.1007/978-3-642-31540-4\_3},
  timestamp    = {Fri, 27 Dec 2019 21:29:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ArmandoR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/RaniseA12,
  author       = {Silvio Ranise and
                  Alessandro Armando},
  editor       = {Li Xu and
                  Elisa Bertino and
                  Yi Mu},
  title        = {On the Automated Analysis of Safety in Usage Control: {A} New Decidability
                  Result},
  booktitle    = {Network and System Security - 6th International Conference, {NSS}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7645},
  pages        = {15--28},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34601-9\_2},
  doi          = {10.1007/978-3-642-34601-9\_2},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/RaniseA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ArmandoMMV12,
  author       = {Alessandro Armando and
                  Alessio Merlo and
                  Mauro Migliardi and
                  Luca Verderame},
  editor       = {Dimitris Gritzalis and
                  Steven Furnell and
                  Marianthi Theoharidou},
  title        = {Would You Mind Forking This Process? {A} Denial of Service Attack
                  on Android (and Some Countermeasures)},
  booktitle    = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information
                  Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece,
                  June 4-6, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {376},
  pages        = {13--24},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30436-1\_2},
  doi          = {10.1007/978-3-642-30436-1\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ArmandoMMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridsec/ArmandoCM12,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Alessio Merlo},
  editor       = {Jorge Cu{\'{e}}llar},
  title        = {Formal Analysis of a Privacy-Preserving Billing Protocol},
  booktitle    = {Smart Grid Security - First International Workshop, SmartGridSec 2012,
                  Berlin, Germany, December 3, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7823},
  pages        = {108--119},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38030-3\_8},
  doi          = {10.1007/978-3-642-38030-3\_8},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smartgridsec/ArmandoCM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/RaniseTA12,
  author       = {Silvio Ranise and
                  Anh Tuan Truong and
                  Alessandro Armando},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Boosting Model Checking to Analyse Large {ARBAC} Policies},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {273--288},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_18},
  doi          = {10.1007/978-3-642-38004-4\_18},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/RaniseTA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12,
  author       = {Alessandro Armando and
                  Wihem Arsac and
                  Tigran Avanesov and
                  Michele Barletta and
                  Alberto Calvi and
                  Alessandro Cappai and
                  Roberto Carbone and
                  Yannick Chevalier and
                  Luca Compagna and
                  Jorge Cu{\'{e}}llar and
                  Gabriel Erzse and
                  Simone Frau and
                  Marius Minea and
                  Sebastian M{\"{o}}dersheim and
                  David von Oheimb and
                  Giancarlo Pellegrino and
                  Serena Elisa Ponta and
                  Marco Rocchetto and
                  Micha{\"{e}}l Rusinowitch and
                  Mohammad Torabi Dashti and
                  Mathieu Turuani and
                  Luca Vigan{\`{o}}},
  editor       = {Cormac Flanagan and
                  Barbara K{\"{o}}nig},
  title        = {The {AVANTSSAR} Platform for the Automated Validation of Trust and
                  Security of Service-Oriented Architectures},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 18th International Conference, {TACAS} 2012, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7214},
  pages        = {267--282},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28756-5\_19},
  doi          = {10.1007/978-3-642-28756-5\_19},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tap/ArmandoPCMB12,
  author       = {Alessandro Armando and
                  Giancarlo Pellegrino and
                  Roberto Carbone and
                  Alessio Merlo and
                  Davide Balzarotti},
  editor       = {Achim D. Brucker and
                  Jacques Julliand},
  title        = {From Model-Checking to Automated Testing of Security Protocols: Bridging
                  the Gap},
  booktitle    = {Tests and Proofs - 6th International Conference, TAP@TOOLS 2012, Prague,
                  Czech Republic, May 31 - June 1, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7305},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30473-6\_3},
  doi          = {10.1007/978-3-642-30473-6\_3},
  timestamp    = {Tue, 23 Jun 2020 17:37:39 +0200},
  biburl       = {https://dblp.org/rec/conf/tap/ArmandoPCMB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tgc/ArmandoCM12,
  author       = {Alessandro Armando and
                  Gabriele Costa and
                  Alessio Merlo},
  editor       = {Catuscia Palamidessi and
                  Mark Dermot Ryan},
  title        = {Formal Modeling and Reasoning about the Android Security Framework},
  booktitle    = {Trustworthy Global Computing - 7th International Symposium, {TGC}
                  2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8191},
  pages        = {64--81},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-41157-1\_5},
  doi          = {10.1007/978-3-642-41157-1\_5},
  timestamp    = {Wed, 07 Dec 2022 23:14:04 +0100},
  biburl       = {https://dblp.org/rec/conf/tgc/ArmandoCM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1209-0687,
  author       = {Alessandro Armando and
                  Alessio Merlo and
                  Luca Verderame},
  title        = {Security Issues in the Android Cross-Layer Architecture},
  journal      = {CoRR},
  volume       = {abs/1209.0687},
  year         = {2012},
  url          = {http://arxiv.org/abs/1209.0687},
  eprinttype    = {arXiv},
  eprint       = {1209.0687},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1209-0687.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/AlbertiAR11,
  author       = {Francesco Alberti and
                  Alessandro Armando and
                  Silvio Ranise},
  editor       = {Nikolaj S. Bj{\o}rner and
                  Viorica Sofronie{-}Stokkermans},
  title        = {{ASASP:} Automated Symbolic Analysis of Security Policies},
  booktitle    = {Automated Deduction - {CADE-23} - 23rd International Conference on
                  Automated Deduction, Wroclaw, Poland, July 31 - August 5, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6803},
  pages        = {26--33},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22438-6\_4},
  doi          = {10.1007/978-3-642-22438-6\_4},
  timestamp    = {Mon, 28 Aug 2023 21:17:45 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/AlbertiAR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlbertiAR11,
  author       = {Francesco Alberti and
                  Alessandro Armando and
                  Silvio Ranise},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Efficient symbolic automated analysis of administrative attribute-based
                  RBAC-policies},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {165--175},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966935},
  doi          = {10.1145/1966913.1966935},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AlbertiAR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ArmandoCCCPS11,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Luca Compagna and
                  Jorge Cu{\'{e}}llar and
                  Giancarlo Pellegrino and
                  Alessandro Sorniotti},
  editor       = {Jan Camenisch and
                  Simone Fischer{-}H{\"{u}}bner and
                  Yuko Murayama and
                  Armand Portmann and
                  Carlos Rieder},
  title        = {From Multiple Credentials to Browser-Based Single Sign-On: Are We
                  More Secure?},
  booktitle    = {Future Challenges in Security and Privacy for Academia and Industry
                  - 26th {IFIP} {TC} 11 International Information Security Conference,
                  {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {354},
  pages        = {68--79},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21424-0\_6},
  doi          = {10.1007/978-3-642-21424-0\_6},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/ArmandoCCCPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/semco/ArmandoCR11,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Silvio Ranise},
  title        = {Automated Analysis of Semantic-Aware Access Control Policies: {A}
                  Logic-Based Approach},
  booktitle    = {Proceedings of the 5th {IEEE} International Conference on Semantic
                  Computing {(ICSC} 2011), Palo Alto, CA, USA, September 18-21, 2011},
  pages        = {356--363},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICSC.2011.74},
  doi          = {10.1109/ICSC.2011.74},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/semco/ArmandoCR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ArmandoR11,
  author       = {Alessandro Armando and
                  Silvio Ranise},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Automated Analysis of Infinite State Workflows with Access Control
                  Policies},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {157--174},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_12},
  doi          = {10.1007/978-3-642-29963-6\_12},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/ArmandoR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip1-7/2010wits,
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-16074-5},
  doi          = {10.1007/978-3-642-16074-5},
  isbn         = {978-3-642-16073-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/2010wits.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/ArmandoBD10,
  author       = {Alessandro Armando and
                  Peter Baumgartner and
                  Gilles Dowek},
  title        = {Preface},
  journal      = {J. Autom. Reason.},
  volume       = {45},
  number       = {2},
  pages        = {89},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10817-010-9180-3},
  doi          = {10.1007/S10817-010-9180-3},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/ArmandoBD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MerloA10,
  author       = {Alessio Merlo and
                  Alessandro Armando},
  title        = {Cooperative access control for the Grid},
  booktitle    = {Sixth International Conference on Information Assurance and Security,
                  {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010},
  pages        = {228--233},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISIAS.2010.5604068},
  doi          = {10.1109/ISIAS.2010.5604068},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MerloA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/ArmandoCCLP10,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Luca Compagna and
                  Keqin Li and
                  Giancarlo Pellegrino},
  title        = {Model-Checking Driven Security Testing of Web-Based Applications},
  booktitle    = {Third International Conference on Software Testing, Verification and
                  Validation, {ICST} 2010, Paris, France, April 7-9, 2010, Workshops
                  Proceedings},
  pages        = {361--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICSTW.2010.54},
  doi          = {10.1109/ICSTW.2010.54},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/ArmandoCCLP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ArmandoR10,
  author       = {Alessandro Armando and
                  Silvio Ranise},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner},
  title        = {Automated Symbolic Analysis of ARBAC-Policies},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {17--34},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_2},
  doi          = {10.1007/978-3-642-22444-7\_2},
  timestamp    = {Sat, 19 Oct 2019 20:20:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/ArmandoR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jancl/ArmandoCC09,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Luca Compagna},
  title        = {{LTL} model checking for security protocols},
  journal      = {J. Appl. Non Class. Logics},
  volume       = {19},
  number       = {4},
  pages        = {403--429},
  year         = {2009},
  url          = {https://doi.org/10.3166/jancl.19.403-429},
  doi          = {10.3166/JANCL.19.403-429},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jancl/ArmandoCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/ArmandoMP09,
  author       = {Alessandro Armando and
                  Jacopo Mantovani and
                  Lorenzo Platania},
  title        = {Bounded model checking of software using {SMT} solvers instead of
                  {SAT} solvers},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {11},
  number       = {1},
  pages        = {69--83},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10009-008-0091-0},
  doi          = {10.1007/S10009-008-0091-0},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/ArmandoMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocl/ArmandoBRS09,
  author       = {Alessandro Armando and
                  Maria Paola Bonacina and
                  Silvio Ranise and
                  Stephan Schulz},
  title        = {New results on rewrite-based satisfiability procedures},
  journal      = {{ACM} Trans. Comput. Log.},
  volume       = {10},
  number       = {1},
  pages        = {4:1--4:51},
  year         = {2009},
  url          = {https://doi.org/10.1145/1459010.1459014},
  doi          = {10.1145/1459010.1459014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tocl/ArmandoBRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/frocos/Armando09,
  author       = {Alessandro Armando},
  editor       = {Silvio Ghilardi and
                  Roberto Sebastiani},
  title        = {Building SMT-Based Software Model Checkers: An Experience Report},
  booktitle    = {Frontiers of Combining Systems, 7th International Symposium, FroCoS
                  2009, Trento, Italy, September 16-18, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5749},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04222-5\_1},
  doi          = {10.1007/978-3-642-04222-5\_1},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/frocos/Armando09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/ArmandoP09,
  author       = {Alessandro Armando and
                  Serena Elisa Ponta},
  editor       = {Pierpaolo Degano and
                  Joshua D. Guttman},
  title        = {Model Checking of Security-Sensitive Business Processes},
  booktitle    = {Formal Aspects in Security and Trust, 6th International Workshop,
                  {FAST} 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5983},
  pages        = {66--80},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-12459-4\_6},
  doi          = {10.1007/978-3-642-12459-4\_6},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/ArmandoP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/ArmandoGP09,
  author       = {Alessandro Armando and
                  Enrico Giunchiglia and
                  Serena Elisa Ponta},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul},
  title        = {Formal Specification and Automatic Analysis of Business Processes
                  under Authorization Constraints: An Action-Based Approach},
  booktitle    = {Trust, Privacy and Security in Digital Business, 6th International
                  Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5695},
  pages        = {63--72},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03748-1\_7},
  doi          = {10.1007/978-3-642-03748-1\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/ArmandoGP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ArmandoC08,
  author       = {Alessandro Armando and
                  Luca Compagna},
  title        = {SAT-based model-checking for security protocols analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {1},
  pages        = {3--32},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0041-y},
  doi          = {10.1007/S10207-007-0041-Y},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ArmandoC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/Armando08,
  author       = {Alessandro Armando},
  editor       = {Boris Konev and
                  Renate A. Schmidt and
                  Stephan Schulz},
  title        = {Model Checking: New Challenges and Opportunities for Automated Reasoning
                  (Invited Talk)},
  booktitle    = {Proceedings of the First International Workshop on Practical Aspects
                  of Automated Reasoning, Sydney, Australia, August 10-11, 2008},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {373},
  publisher    = {CEUR-WS.org},
  year         = {2008},
  url          = {https://ceur-ws.org/Vol-373/invited-1.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:14 +0100},
  biburl       = {https://dblp.org/rec/conf/cade/Armando08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArmandoCCCT08,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Luca Compagna and
                  Jorge Cu{\'{e}}llar and
                  Llanos Tobarra},
  editor       = {Vitaly Shmatikov},
  title        = {Formal analysis of {SAML} 2.0 web browser single sign-on: breaking
                  the SAML-based single sign-on for google apps},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456396.1456397},
  doi          = {10.1145/1456396.1456397},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ArmandoCCCT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cade/2008,
  editor       = {Alessandro Armando and
                  Peter Baumgartner and
                  Gilles Dowek},
  title        = {Automated Reasoning, 4th International Joint Conference, {IJCAR} 2008,
                  Sydney, Australia, August 12-15, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5195},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71070-7},
  doi          = {10.1007/978-3-540-71070-7},
  isbn         = {978-3-540-71069-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ArmandoCC07,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Luca Compagna},
  title        = {{LTL} Model Checking for Security Protocols},
  booktitle    = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8
                  July 2007, Venice, Italy},
  pages        = {385--396},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CSF.2007.24},
  doi          = {10.1109/CSF.2007.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ArmandoCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/ArmandoBCMS07,
  author       = {Alessandro Armando and
                  Massimo Benerecetti and
                  Dario Carotenuto and
                  Jacopo Mantovani and
                  Pasquale Spica},
  editor       = {R. E. Kurt Stirewalt and
                  Alexander Egyed and
                  Bernd Fischer},
  title        = {The eureka tool for software model checking},
  booktitle    = {22nd {IEEE/ACM} International Conference on Automated Software Engineering
                  {(ASE} 2007), November 5-9, 2007, Atlanta, Georgia, {USA}},
  pages        = {541--542},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1321631.1321734},
  doi          = {10.1145/1321631.1321734},
  timestamp    = {Tue, 06 Nov 2018 16:58:23 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/ArmandoBCMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/ArmandoBM07,
  author       = {Alessandro Armando and
                  Massimo Benerecetti and
                  Jacopo Mantovani},
  editor       = {Orna Grumberg and
                  Michael Huth},
  title        = {Abstraction Refinement of Linear Programs with Arrays},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems,
                  13th International Conference, {TACAS} 2007, Held as Part of the Joint
                  European Conferences on Theory and Practice of Software, {ETAPS} 2007
                  Braga, Portugal, March 24 - April 1, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4424},
  pages        = {373--388},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71209-1\_29},
  doi          = {10.1007/978-3-540-71209-1\_29},
  timestamp    = {Mon, 11 Sep 2023 15:43:49 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/ArmandoBM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/ArmandoR06,
  author       = {Alessandro Armando and
                  Christophe Ringeissen},
  title        = {Special issue on combining logical systems},
  journal      = {Inf. Comput.},
  volume       = {204},
  number       = {10},
  pages        = {1411--1412},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.ic.2006.04.005},
  doi          = {10.1016/J.IC.2006.04.005},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/ArmandoR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/ArmandoBCRV06,
  author       = {Alessandro Armando and
                  David A. Basin and
                  Jorge Cu{\'{e}}llar and
                  Micha{\"{e}}l Rusinowitch and
                  Luca Vigan{\`{o}}},
  title        = {Automated Reasoning for Security Protocol Analysis},
  journal      = {J. Autom. Reason.},
  volume       = {36},
  number       = {1-2},
  pages        = {1--3},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10817-005-9014-x},
  doi          = {10.1007/S10817-005-9014-X},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/ArmandoBCRV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spin/ArmandoMP06,
  author       = {Alessandro Armando and
                  Jacopo Mantovani and
                  Lorenzo Platania},
  editor       = {Antti Valmari},
  title        = {Bounded Model Checking of Software Using {SMT} Solvers Instead of
                  {SAT} Solvers},
  booktitle    = {Model Checking Software, 13th International {SPIN} Workshop, Vienna,
                  Austria, March 30 - April 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3925},
  pages        = {146--162},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11691617\_9},
  doi          = {10.1007/11691617\_9},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/spin/ArmandoMP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/smt/2005,
  editor       = {Alessandro Armando and
                  Alessandro Cimatti},
  title        = {Proceedings of the Third Workshop on Pragmatics of Decision Procedures
                  in Automated Reasoning, PDPAR@CAV 2005, Edinburgh, UK, July 12, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {144},
  number       = {2},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/144/issue/2},
  timestamp    = {Fri, 16 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smt/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0604054,
  author       = {Alessandro Armando and
                  Maria Paola Bonacina and
                  Silvio Ranise and
                  Stephan Schulz},
  title        = {New results on rewrite-based satisfiability procedures},
  journal      = {CoRR},
  volume       = {abs/cs/0604054},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0604054},
  eprinttype    = {arXiv},
  eprint       = {cs/0604054},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0604054.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/ArmandoCGM05,
  author       = {Alessandro Armando and
                  Claudio Castellini and
                  Enrico Giunchiglia and
                  Marco Maratea},
  title        = {The SAT-based Approach to Separation Logic},
  journal      = {J. Autom. Reason.},
  volume       = {35},
  number       = {1-3},
  pages        = {237--263},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10817-005-9002-1},
  doi          = {10.1007/S10817-005-9002-1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/ArmandoCGM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/ArmandoB05,
  author       = {Alessandro Armando and
                  Clemens Ballarin},
  title        = {A reconstruction and extension of Maple's assume facility via constraint
                  contextual rewriting},
  journal      = {J. Symb. Comput.},
  volume       = {39},
  number       = {5},
  pages        = {503--521},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jsc.2004.12.010},
  doi          = {10.1016/J.JSC.2004.12.010},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/ArmandoB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ArmandoCR05,
  author       = {Alessandro Armando and
                  Luca Compagna and
                  Silvio Ranise},
  editor       = {Dieter Hutter and
                  Werner Stephan},
  title        = {Rewriting and Decision Procedure Laboratory: Combining Rewriting,
                  Satisfiability Checking, and Lemma Speculation},
  booktitle    = {Mechanizing Mathematical Reasoning, Essays in Honor of J{\"{o}}rg
                  H. Siekmann on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {2605},
  pages        = {30--45},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32254-2\_3},
  doi          = {10.1007/978-3-540-32254-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/ArmandoCR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ArmandoCGGT05,
  author       = {Alessandro Armando and
                  Claudio Castellini and
                  Enrico Giunchiglia and
                  Fausto Giunchiglia and
                  Armando Tacchella},
  editor       = {Dieter Hutter and
                  Werner Stephan},
  title        = {SAT-Based Decision Procedures for Automated Reasoning: {A} Unifying
                  Perspective},
  booktitle    = {Mechanizing Mathematical Reasoning, Essays in Honor of J{\"{o}}rg
                  H. Siekmann on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {2605},
  pages        = {46--58},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-32254-2\_4},
  doi          = {10.1007/978-3-540-32254-2\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/ArmandoCGGT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ArmandoBBCCCDHKMMORSTVV05,
  author       = {Alessandro Armando and
                  David A. Basin and
                  Yohan Boichut and
                  Yannick Chevalier and
                  Luca Compagna and
                  Jorge Cu{\'{e}}llar and
                  Paul Hankes Drielsma and
                  Pierre{-}Cyrille H{\'{e}}am and
                  Olga Kouchnarenko and
                  Jacopo Mantovani and
                  Sebastian M{\"{o}}dersheim and
                  David von Oheimb and
                  Micha{\"{e}}l Rusinowitch and
                  Judson Santiago and
                  Mathieu Turuani and
                  Luca Vigan{\`{o}} and
                  Laurent Vigneron},
  editor       = {Kousha Etessami and
                  Sriram K. Rajamani},
  title        = {The {AVISPA} Tool for the Automated Validation of Internet Security
                  Protocols and Applications},
  booktitle    = {Computer Aided Verification, 17th International Conference, {CAV}
                  2005, Edinburgh, Scotland, UK, July 6-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3576},
  pages        = {281--285},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11513988\_27},
  doi          = {10.1007/11513988\_27},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/ArmandoBBCCCDHKMMORSTVV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/frocos/ArmandoBRS05,
  author       = {Alessandro Armando and
                  Maria Paola Bonacina and
                  Silvio Ranise and
                  Stephan Schulz},
  editor       = {Bernhard Gramlich},
  title        = {On a Rewriting Approach to Satisfiability Procedures: Extension, Combination
                  of Theories and an Experimental Appraisal},
  booktitle    = {Frontiers of Combining Systems, 5th International Workshop, FroCoS
                  2005, Vienna, Austria, September 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3717},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11559306\_4},
  doi          = {10.1007/11559306\_4},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/frocos/ArmandoBRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ArmandoC06,
  author       = {Alessandro Armando and
                  Alessandro Cimatti},
  editor       = {Alessandro Armando and
                  Alessandro Cimatti},
  title        = {Preface},
  booktitle    = {Proceedings of the Third Workshop on Pragmatics of Decision Procedures
                  in Automated Reasoning, PDPAR@CAV 2005, Edinburgh, UK, July 12, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {144},
  number       = {2},
  pages        = {1--2},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.12.002},
  doi          = {10.1016/J.ENTCS.2005.12.002},
  timestamp    = {Fri, 16 Dec 2022 10:24:43 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/ArmandoC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ArmandoBM06,
  author       = {Alessandro Armando and
                  Massimo Benerecetti and
                  Jacopo Mantovani},
  editor       = {Byron Cook and
                  Scott D. Stoller and
                  Willem Visser},
  title        = {Model Checking Linear Programs with Arrays},
  booktitle    = {Proceedings of the 3rd Workshop on Software Model Checking, SoftMC@CAV
                  2005, Edinburgh, UK, July 11, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {144},
  number       = {3},
  pages        = {79--94},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2006.01.006},
  doi          = {10.1016/J.ENTCS.2006.01.006},
  timestamp    = {Fri, 16 Dec 2022 10:50:33 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/ArmandoBM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/arspa/2004,
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/125/issue/1},
  timestamp    = {Tue, 13 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arspa/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/ArmandoCM04,
  author       = {Alessandro Armando and
                  Claudio Castellini and
                  Jacopo Mantovani},
  editor       = {Jim Davies and
                  Wolfram Schulte and
                  Michael Barnett},
  title        = {Software Model Checking Using Linear Constraints},
  booktitle    = {Formal Methods and Software Engineering, 6th International Conference
                  on Formal Engineering Methods, {ICFEM} 2004, Seattle, WA, USA, November
                  8-12, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3308},
  pages        = {209--223},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30482-1\_22},
  doi          = {10.1007/978-3-540-30482-1\_22},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icfem/ArmandoCM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jelia/ArmandoCL04,
  author       = {Alessandro Armando and
                  Luca Compagna and
                  Yuliya Lierler},
  editor       = {Jos{\'{e}} J{\'{u}}lio Alferes and
                  Jo{\~{a}}o Alexandre Leite},
  title        = {Automatic Compilation of Protocol Insecurity Problems into Logic Programming},
  booktitle    = {Logics in Artificial Intelligence, 9th European Conference, {JELIA}
                  2004, Lisbon, Portugal, September 27-30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3229},
  pages        = {617--627},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30227-8\_51},
  doi          = {10.1007/978-3-540-30227-8\_51},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/jelia/ArmandoCL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jelia/ArmandoC04,
  author       = {Alessandro Armando and
                  Luca Compagna},
  editor       = {Jos{\'{e}} J{\'{u}}lio Alferes and
                  Jo{\~{a}}o Alexandre Leite},
  title        = {{SATMC:} {A} SAT-Based Model Checker for Security Protocols},
  booktitle    = {Logics in Artificial Intelligence, 9th European Conference, {JELIA}
                  2004, Lisbon, Portugal, September 27-30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3229},
  pages        = {730--733},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30227-8\_68},
  doi          = {10.1007/978-3-540-30227-8\_68},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/jelia/ArmandoC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sat/ArmandoCGM04,
  author       = {Alessandro Armando and
                  Claudio Castellini and
                  Enrico Giunchiglia and
                  Marco Maratea},
  title        = {A SAT-based Decision Procedure for the Boolean Combination of Difference
                  Constraints},
  booktitle    = {{SAT} 2004 - The Seventh International Conference on Theory and Applications
                  of Satisfiability Testing, 10-13 May 2004, Vancouver, BC, Canada,
                  Online Proceedings},
  year         = {2004},
  url          = {http://www.satisfiability.org/SAT04/programme/71.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sat/ArmandoCGM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sat/ArmandoCGM04a,
  author       = {Alessandro Armando and
                  Claudio Castellini and
                  Enrico Giunchiglia and
                  Marco Maratea},
  editor       = {Holger H. Hoos and
                  David G. Mitchell},
  title        = {A SAT-Based Decision Procedure for the Boolean Combination of Difference
                  Constraints},
  booktitle    = {Theory and Applications of Satisfiability Testing, 7th International
                  Conference, {SAT} 2004, Vancouver, BC, Canada, May 10-13, 2004, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3542},
  pages        = {16--29},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11527695\_2},
  doi          = {10.1007/11527695\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sat/ArmandoCGM04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ArmandoV05,
  author       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {Preface},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {1},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.09.035},
  doi          = {10.1016/J.ENTCS.2004.09.035},
  timestamp    = {Tue, 13 Dec 2022 13:06:50 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/ArmandoV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ArmandoCGIM05,
  author       = {Alessandro Armando and
                  Claudio Castellini and
                  Enrico Giunchiglia and
                  Massimo Idini and
                  Marco Maratea},
  editor       = {Wolfgang Ahrendt and
                  Peter Baumgartner and
                  Hans de Nivelle and
                  Silvio Ranise and
                  Cesare Tinelli},
  title        = {{TSAT++:} an Open Platform for Satisfiability Modulo Theories},
  booktitle    = {Selected Papers from the Workshops on Disproving, D@IJCAR 2004, and
                  the Second International Workshop on Pragmatics of Decision Procedures,
                  PDPAR@IJCAR 2004, Cork, Ireland, July 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {3},
  pages        = {25--36},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.06.065},
  doi          = {10.1016/J.ENTCS.2004.06.065},
  timestamp    = {Tue, 13 Dec 2022 13:53:40 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/ArmandoCGIM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ArmandoC05,
  author       = {Alessandro Armando and
                  Luca Compagna},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {An Optimized Intruder Model for SAT-based Model-Checking of Security
                  Protocols},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {91--108},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.05.021},
  doi          = {10.1016/J.ENTCS.2004.05.021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/ArmandoC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/ArmandoRR03,
  author       = {Alessandro Armando and
                  Silvio Ranise and
                  Micha{\"{e}}l Rusinowitch},
  title        = {A rewriting approach to satisfiability procedures},
  journal      = {Inf. Comput.},
  volume       = {183},
  number       = {2},
  pages        = {140--164},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0890-5401(03)00020-8},
  doi          = {10.1016/S0890-5401(03)00020-8},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/ArmandoRR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/ArmandoR03,
  author       = {Alessandro Armando and
                  Silvio Ranise},
  title        = {Constraint contextual rewriting},
  journal      = {J. Symb. Comput.},
  volume       = {36},
  number       = {1-2},
  pages        = {193--216},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0747-7171(03)00025-7},
  doi          = {10.1016/S0747-7171(03)00025-7},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/ArmandoR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/ArmandoCG03,
  author       = {Alessandro Armando and
                  Luca Compagna and
                  Pierre Ganty},
  editor       = {Keijiro Araki and
                  Stefania Gnesi and
                  Dino Mandrioli},
  title        = {SAT-Based Model-Checking of Security Protocols Using Planning Graph
                  Analysis},
  booktitle    = {{FME} 2003: Formal Methods, International Symposium of Formal Methods
                  Europe, Pisa, Italy, September 8-14, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2805},
  pages        = {875--893},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45236-2\_47},
  doi          = {10.1007/978-3-540-45236-2\_47},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/ArmandoCG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sat/ArmandoC03,
  author       = {Alessandro Armando and
                  Luca Compagna},
  editor       = {Enrico Giunchiglia and
                  Armando Tacchella},
  title        = {Abstraction-Driven SAT-based Analysis of Security Protocols},
  booktitle    = {Theory and Applications of Satisfiability Testing, 6th International
                  Conference, {SAT} 2003. Santa Margherita Ligure, Italy, May 5-8, 2003
                  Selected Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2919},
  pages        = {257--271},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24605-3\_20},
  doi          = {10.1007/978-3-540-24605-3\_20},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/sat/ArmandoC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/ArmandoRS02,
  author       = {Alessandro Armando and
                  Micha{\"{e}}l Rusinowitch and
                  Sorin Stratulat},
  title        = {Incorporating Decision Procedures in Implicit Induction},
  journal      = {J. Symb. Comput.},
  volume       = {34},
  number       = {4},
  pages        = {241--258},
  year         = {2002},
  url          = {https://doi.org/10.1006/jsco.2002.0549},
  doi          = {10.1006/JSCO.2002.0549},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/ArmandoRS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ArmandoBBCCMRTVV02,
  author       = {Alessandro Armando and
                  David A. Basin and
                  Mehdi Bouallagui and
                  Yannick Chevalier and
                  Luca Compagna and
                  Sebastian M{\"{o}}dersheim and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani and
                  Luca Vigan{\`{o}} and
                  Laurent Vigneron},
  editor       = {Ed Brinksma and
                  Kim Guldstrand Larsen},
  title        = {The {AVISS} Security Protocol Analysis Tool},
  booktitle    = {Computer Aided Verification, 14th International Conference, {CAV}
                  2002,Copenhagen, Denmark, July 27-31, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2404},
  pages        = {349--353},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45657-0\_27},
  doi          = {10.1007/3-540-45657-0\_27},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/ArmandoBBCCMRTVV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/ArmandoC02,
  author       = {Alessandro Armando and
                  Luca Compagna},
  editor       = {Doron A. Peled and
                  Moshe Y. Vardi},
  title        = {Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction
                  to Planning},
  booktitle    = {Formal Techniques for Networked and Distributed Systems - {FORTE}
                  2002, 22nd {IFIP} {WG} 6.1 International Conference Houston, Texas,
                  USA, November 11-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2529},
  pages        = {210--225},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36135-9\_14},
  doi          = {10.1007/3-540-36135-9\_14},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/forte/ArmandoC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/frocos/2002,
  editor       = {Alessandro Armando},
  title        = {Frontiers of Combining Systems, 4th International Workshop, FroCoS
                  2002, Santa Margherita Ligure, Italy, April 8-10, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2309},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45988-X},
  doi          = {10.1007/3-540-45988-X},
  isbn         = {3-540-43381-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/frocos/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/ArmandoJ01,
  author       = {Alessandro Armando and
                  Tudor Jebelean},
  title        = {Special Issue on Calculemus-99: Integrating Computation and Deduction
                  - Foreword of the Guest Editors},
  journal      = {J. Symb. Comput.},
  volume       = {32},
  number       = {4},
  pages        = {303--304},
  year         = {2001},
  url          = {https://doi.org/10.1006/jsco.2001.0467},
  doi          = {10.1006/JSCO.2001.0467},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/ArmandoJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/ArmandoCGR01,
  author       = {Alessandro Armando and
                  Alessandro Coglio and
                  Fausto Giunchiglia and
                  Silvio Ranise},
  title        = {The Control Layer in Open Mechanized Reasoning Systems: Annotations
                  and Tactics},
  journal      = {J. Symb. Comput.},
  volume       = {32},
  number       = {4},
  pages        = {305--332},
  year         = {2001},
  url          = {https://doi.org/10.1006/jsco.2000.0464},
  doi          = {10.1006/JSCO.2000.0464},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/ArmandoCGR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/ArmandoR01,
  author       = {Alessandro Armando and
                  Silvio Ranise},
  title        = {A Practical Extension Mechanism for Decision Procedures: the Case
                  Study of Universal Presburger Arithmetic},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {7},
  number       = {2},
  pages        = {124--140},
  year         = {2001},
  url          = {https://doi.org/10.3217/jucs-007-02-0124},
  doi          = {10.3217/JUCS-007-02-0124},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/ArmandoR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/ArmandoCR01,
  author       = {Alessandro Armando and
                  Luca Compagna and
                  Silvio Ranise},
  editor       = {Rajeev Gor{\'{e}} and
                  Alexander Leitsch and
                  Tobias Nipkow},
  title        = {System Description: {RDL} : Rewrite and Decision Procedure Laboratory},
  booktitle    = {Automated Reasoning, First International Joint Conference, {IJCAR}
                  2001, Siena, Italy, June 18-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2083},
  pages        = {663--669},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45744-5\_54},
  doi          = {10.1007/3-540-45744-5\_54},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/ArmandoCR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cp/ArmandoPR01,
  author       = {Alessandro Armando and
                  Felice Peccia and
                  Silvio Ranise},
  editor       = {Toby Walsh},
  title        = {The Phase Transition of the Linear Inequalities Problem},
  booktitle    = {Principles and Practice of Constraint Programming - {CP} 2001, 7th
                  International Conference, {CP} 2001, Paphos, Cyprus, November 26 -
                  December 1, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2239},
  pages        = {422--432},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45578-7\_29},
  doi          = {10.1007/3-540-45578-7\_29},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/cp/ArmandoPR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/ArmandoRR01,
  author       = {Alessandro Armando and
                  Silvio Ranise and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Laurent Fribourg},
  title        = {Uniform Derivation of Decision Procedures by Superposition},
  booktitle    = {Computer Science Logic, 15th International Workshop, {CSL} 2001. 10th
                  Annual Conference of the EACSL, Paris, France, September 10-13, 2001,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2142},
  pages        = {513--527},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44802-0\_36},
  doi          = {10.1007/3-540-44802-0\_36},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/csl/ArmandoRR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issac/ArmandoB01,
  author       = {Alessandro Armando and
                  Clemens Ballarin},
  editor       = {Erich L. Kaltofen and
                  Gilles Villard},
  title        = {Maple's evaluation process as constraint contextual rewriting},
  booktitle    = {Proceedings of the 2001 International Symposium on Symbolic and Algebraic
                  Computation, {ISSAC} 2001, {ORCCA} {\&} University of Western
                  Ontario, London, Ontario, Canada, July 22-25, 2001},
  pages        = {32--37},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/384101.384107},
  doi          = {10.1145/384101.384107},
  timestamp    = {Mon, 03 Apr 2023 17:23:32 +0200},
  biburl       = {https://dblp.org/rec/conf/issac/ArmandoB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/frocos/ArmandoR00,
  author       = {Alessandro Armando and
                  Silvio Ranise},
  editor       = {H{\'{e}}l{\`{e}}ne Kirchner and
                  Christophe Ringeissen},
  title        = {Termination of Constraint Contextual Rewriting},
  booktitle    = {Frontiers of Combining Systems, Third International Workshop, FroCoS
                  2000, Nancy, France, March 22-24, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1794},
  pages        = {47--61},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10720084\_4},
  doi          = {10.1007/10720084\_4},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/frocos/ArmandoR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woa/ArmandoZ00,
  author       = {Alessandro Armando and
                  Daniele Zini},
  editor       = {Antonio Corradi and
                  Andrea Omicini and
                  Agostino Poggi},
  title        = {Towards Interoperable Mechanized Reasoning Systems: the Logic Broker
                  Architecture},
  booktitle    = {{WOA} 2000: Dagli Oggetti agli Agenti. 1st AI*IA/TABOO Joint Workshop
                  "From Objects to Agents": Evolutive Trends of Software Systems, 29-30
                  May 2000, Parma, Italy},
  pages        = {70--75},
  publisher    = {Pitagora Editrice Bologna},
  year         = {2000},
  timestamp    = {Mon, 17 Jan 2005 15:51:56 +0100},
  biburl       = {https://dblp.org/rec/conf/woa/ArmandoZ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ase/ArmandoSG99,
  author       = {Alessandro Armando and
                  Alan Smaill and
                  Ian Green},
  title        = {Automatic Synthesis of Recursive Programs: The Proof-Planning Paradigm},
  journal      = {Autom. Softw. Eng.},
  volume       = {6},
  number       = {4},
  pages        = {329--356},
  year         = {1999},
  url          = {https://doi.org/10.1023/A:1008763422061},
  doi          = {10.1023/A:1008763422061},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ase/ArmandoSG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecp/ArmandoCG99,
  author       = {Alessandro Armando and
                  Claudio Castellini and
                  Enrico Giunchiglia},
  editor       = {Susanne Biundo and
                  Maria Fox},
  title        = {SAT-Based Procedures for Temporal Reasoning},
  booktitle    = {Recent Advances in {AI} Planning, 5th European Conference on Planning,
                  ECP'99, Durham, UK, September 8-10, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1809},
  pages        = {97--108},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10720246\_8},
  doi          = {10.1007/10720246\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecp/ArmandoCG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ArmandoJ99,
  author       = {Alessandro Armando and
                  Tudor Jebelean},
  editor       = {Alessandro Armando and
                  Tudor Jebelean},
  title        = {Preface},
  booktitle    = {Systems for Integrated Computation and Deduction, {CALCULEMUS} 1999,
                  associated to FLoC '99, the 1999 Federated Logic Conference, Trento,
                  Italy, July 11-12, 1999},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {23},
  number       = {3},
  pages        = {319--320},
  publisher    = {Elsevier},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1571-0661(05)80604-8},
  doi          = {10.1016/S1571-0661(05)80604-8},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/ArmandoJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ArmandoCG99,
  author       = {Alessandro Armando and
                  Alessandro Coglio and
                  Fausto Giunchiglia},
  editor       = {Alessandro Armando and
                  Tudor Jebelean},
  title        = {The control component of open mechanized reasoning systems},
  booktitle    = {Systems for Integrated Computation and Deduction, {CALCULEMUS} 1999,
                  associated to FLoC '99, the 1999 Federated Logic Conference, Trento,
                  Italy, July 11-12, 1999},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {23},
  number       = {3},
  pages        = {322--339},
  publisher    = {Elsevier},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1571-0661(05)80606-1},
  doi          = {10.1016/S1571-0661(05)80606-1},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/ArmandoCG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/calculemus/1999,
  editor       = {Alessandro Armando and
                  Tudor Jebelean},
  title        = {Systems for Integrated Computation and Deduction, {CALCULEMUS} 1999,
                  associated to FLoC '99, the 1999 Federated Logic Conference, Trento,
                  Italy, July 11-12, 1999},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {23},
  number       = {3},
  publisher    = {Elsevier},
  year         = {1999},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/23/issue/3},
  timestamp    = {Thu, 16 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/calculemus/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amai/ArmandoGSB98,
  author       = {Alessandro Armando and
                  Jason Gallagher and
                  Alan Smaill and
                  Alan Bundy},
  title        = {Automating the Synthesis of Decision Procedures in a Constructive
                  Metatheory},
  journal      = {Ann. Math. Artif. Intell.},
  volume       = {22},
  number       = {3-4},
  pages        = {259--279},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1018943603394},
  doi          = {10.1023/A:1018943603394},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amai/ArmandoGSB98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aimsa/ArmandoMR98,
  author       = {Alessandro Armando and
                  Erica Melis and
                  Silvio Ranise},
  editor       = {Fausto Giunchiglia},
  title        = {Constraint Solving in Logic Programming and in Automated Deduction:
                  {A} Comparison},
  booktitle    = {Artificial Intelligence: Methodology, Systems, and Applications, 8th
                  International Conference, {AIMSA} '98, Sozopol, Bulgaria, September
                  21-13, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1480},
  pages        = {28--38},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0057432},
  doi          = {10.1007/BFB0057432},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/aimsa/ArmandoMR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisc/ArmandoR98,
  author       = {Alessandro Armando and
                  Silvio Ranise},
  editor       = {Jacques Calmet and
                  Jan A. Plaza},
  title        = {From Integrated Reasoning Specialists to "Plug-and-Play"
                  Reasoning Components},
  booktitle    = {Artificial Intelligence and Symbolic Computation, International Conference
                  AISC'98, Plattsburgh, New York, USA, September 16-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1476},
  pages        = {42--54},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055901},
  doi          = {10.1007/BFB0055901},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/aisc/ArmandoR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/ArmandoSG97,
  author       = {Alessandro Armando and
                  Alan Smaill and
                  Ian Green},
  title        = {Automatic Synthesis of Recursive Programs: The Proof-Planning Paradigm},
  booktitle    = {1997 International Conference on Automated Software Engineering, {ASE}
                  1997, Lake Tahoe, CA, USA, November 2-5, 1997},
  pages        = {2--9},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/ASE.1997.632818},
  doi          = {10.1109/ASE.1997.632818},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/ArmandoSG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/GiunchigliaPA96,
  author       = {Fausto Giunchiglia and
                  Paolo Pecchiari and
                  Alessandro Armando},
  title        = {Towards provably correct system synthesis and extension},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {12},
  number       = {2-3},
  pages        = {123--137},
  year         = {1996},
  url          = {https://doi.org/10.1016/0167-739X(96)88792-9},
  doi          = {10.1016/0167-739X(96)88792-9},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/GiunchigliaPA96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/GiunchigliaATC96,
  author       = {Enrico Giunchiglia and
                  Alessandro Armando and
                  Paolo Traverso and
                  Alessandro Cimatti},
  title        = {Visual representation of natural language scene descriptions},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {B}},
  volume       = {26},
  number       = {4},
  pages        = {575--589},
  year         = {1996},
  url          = {https://doi.org/10.1109/3477.517032},
  doi          = {10.1109/3477.517032},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/GiunchigliaATC96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amai/GiunchigliaAP95,
  author       = {Enrico Giunchiglia and
                  Alessandro Armando and
                  Paolo Pecchiari},
  title        = {Structured Proof Procedures},
  journal      = {Ann. Math. Artif. Intell.},
  volume       = {15},
  number       = {1},
  pages        = {1--18},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01535839},
  doi          = {10.1007/BF01535839},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amai/GiunchigliaAP95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aai/TraversoCSAG94,
  author       = {Paolo Traverso and
                  Alessandro Cimatti and
                  Luca Spalazzi and
                  Alessandro Armando and
                  Enrico Giunchiglia},
  title        = {{MRG:} Building planers for real-world complex applications},
  journal      = {Appl. Artif. Intell.},
  volume       = {8},
  number       = {3},
  pages        = {333--357},
  year         = {1994},
  url          = {https://doi.org/10.1080/08839519408945447},
  doi          = {10.1080/08839519408945447},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aai/TraversoCSAG94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amai/ArmandoG93,
  author       = {Alessandro Armando and
                  Enrico Giunchiglia},
  title        = {Embedding Complex Decision Procedures Inside an Interactive Theorem
                  Prover},
  journal      = {Ann. Math. Artif. Intell.},
  volume       = {8},
  number       = {3-4},
  pages        = {475--502},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01530803},
  doi          = {10.1007/BF01530803},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amai/ArmandoG93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiia/ManzoGAP93,
  author       = {Mauro Di Manzo and
                  Enrico Giunchiglia and
                  Alessandro Armando and
                  Paolo Pecchiari},
  editor       = {Pietro Torasso},
  title        = {Proving Formulas through Reduction to Decidable Classes},
  booktitle    = {Advances in Artificial Intelligence, Third Congress of the Italian
                  Association for Artificial Intelligence, AI*IA'93, Torino, Italy,
                  October 26-28, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {728},
  pages        = {1--10},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-57292-9\_36},
  doi          = {10.1007/3-540-57292-9\_36},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aiia/ManzoGAP93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiia/ArmandoCV93,
  author       = {Alessandro Armando and
                  Alessandro Cimatti and
                  Luca Vigan{\`{o}}},
  editor       = {Pietro Torasso},
  title        = {Building and Executing Proof Strategies in a Formal Metatheory},
  booktitle    = {Advances in Artificial Intelligence, Third Congress of the Italian
                  Association for Artificial Intelligence, AI*IA'93, Torino, Italy,
                  October 26-28, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {728},
  pages        = {11--22},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-57292-9\_37},
  doi          = {10.1007/3-540-57292-9\_37},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aiia/ArmandoCV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictai/ArmandoP93,
  author       = {Alessandro Armando and
                  Paolo Pecchiari},
  title        = {{NALIG:} {A} {CAD} System for Interior Design with High Level Interaction
                  Capabilities},
  booktitle    = {Fifth International Conference on Tools with Artificial Intelligence,
                  {ICTAI} '93, Boston, Massachusetts, USA, November 8-11, 1993},
  pages        = {446--447},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/TAI.1993.633995},
  doi          = {10.1109/TAI.1993.633995},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ictai/ArmandoP93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aimsa/TraversoAG92,
  author       = {Paolo Traverso and
                  Alessandro Armando and
                  Enrico Giunchiglia},
  editor       = {Benedict du Boulay and
                  Vassil Stoyanov Sgurev},
  title        = {A Knowledge Based System for Automatic 3D Scene},
  booktitle    = {Artificial Intelligence {V:} Methodology, Systems, Applications -
                  Proceedings of the Fifth International Conference on Artificial Intelligence:
                  Methodology, Systems, Applications, {AIMSA} 1992, Sofia, Bulgaria,
                  September 21-24, 1992},
  pages        = {255--264},
  publisher    = {North-Holland},
  year         = {1992},
  timestamp    = {Thu, 16 Mar 2017 14:36:24 +0100},
  biburl       = {https://dblp.org/rec/conf/aimsa/TraversoAG92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics