Publications

Authors Type of pub
(2013) A Collaborative Framework for Generating
Fabio Martinelli,rea Saracino
Daniele Sgandurra
Alessandro Aldini
(2012) A Compose Language-based Framework for Secure Service Composition
Bo Zhou
David Llewellyn-Jones
Qi Shi
Muhammad Asim
Madjid Merabti
David Lamb
Paper - conference
(2011) A Design Phase for Data Sharing Agreements
Ilaria Matteucci
Marinella Petrocchi
Marco Luca Sbodio
and Luca Wiegand.
Paper - workshop
(2013) A Formal Support for Collaborative Data Sharing
Fabio Martinelli
Ilaria Matteucci
Marinella Petrocchi
Luca Wiegand
A Framework for Managing and Analyzing Changes of Security Policies Achim Brucker,Helmut Petritsch Paper - conference
(2013) A Framework for Secure Service Composition
Achim D. Brucker
Francesco Malmignati
Madjid Merabti Qi Shi Bo Zhou
Paper - conference
(2012) A Heuristic Approach for Secure Service Composition Adaptation
Bo Zhou
David Llewellyn-Jones
David Lamb
Muhammad Asim
Qi Shi and Madjid Merabti
(2013) A Multi-criteria-Based Evaluation
Michela D
Francesco Malmignati
Giovanni Fausto,reotti
(2014) A Platform for Secure and Trustworthy Service Composition (SERVICE COMPUTATION 2014)
V. Ciancia
F. Martinelli
I. Matteucci
M. Petrocchi
J. A. Mart
E. Pimentel
(2012) A study on rating services based on users' categories
Fabio Martinelli
Marinella Petrocchi
Paper - conference
(2013) A tool for the synthesis of cryptographic orchestrators
Mattia Salnitri
Fabiano Dalpiaz
Paolo Giorgini
(2010) Adaptation in Open Systems: Giving Interaction its Rightful Place
Fabiano Dalpiaz
Amit Chopra
Paolo Giorgini
John Mylopoulos
Paper - conference
(2012) Aligning Service-Oriented Architectures with Security Requirements
Mattia Salnitri
Fabiano Dalpiaz
Paolo Giorgini
Paper - conference
(2014) Aligning Service-Oriented Architectures with Security Requirements- SALNITRI -CoopIS12 - UNITN
Gianpiero Costantino
Fabio Martinelli
Paolo Santi
Dario Amoruso
(2012) Aligning Software Configuration with Business and IT Context
Fabiano Dalpiaz
Raian Ali
Paolo Giorgini
Paper - conference
(2011) An experimental testbed to predict the performance of XACML Policy Decision Points
Bernard Butler
Brendan Jennings
and Dmitri Botvich
Paper - conference
(2013) An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast
V. Ciancia
F. Martinelli
I. Matteucci
M. Petrocchi
(2011) Analyzing Access Control Overrides
Achim D. Brucker
Helmut Petritsch
(2012) Aniketos: Challenges and Results
Miguel Ponce de Leon
Richard Sanders
Per Håkon Meland
Marina Egea
and Zeta Dooly 1
(2012) Attribute Decoration of Attack–Defense Trees
Alessandra Bagnato
Barbara Kordy
Per Håkon Meland
and Patrick Schweitzer 1
Paper - journal
(2013) Automated synthesis and ranking of secure BPMN orchestrators
J. A. Mart
E. Pimentel
(2011) Business Driven Optimisation of Service Compositions
Hisain Elshaafi
Jimmy McGibney & Dmitri Botvich
(2011) Business Driven Optimisation of Service Compositions
Hisain Elshaafi
Dmitri Botvich
Jimmy McGibney
Paper - conference
(2013) Business Process Compliance via Security Validation as a Service - Achim D. Brucker (SAP) - ICST 2012
Luca Compagna
Pierre Guilleminot
Achim D. Brucker
(2013) CheR Cheating Resilience in the Cloud via
Roberto Di Pietro
Flavio Lombardi
Fabio Martinelli
Daniele Sgandurra
(2013) Classifying Android Malware through Subgraph
Fabio Martinelli,rea Saracino
Daniele Sgandurra
(2013) Combining Declarative and Procedural Views in the Specification and Analysis of Product Families
Maurice H. ter Beek
Alberto Lluch Lafuente
Marinella Petrocchi
COMPRO: A Methodological Approach for Business Process Contextualisation
Raian Ali
Fabiano Dalpiaz
Paolo Giorgini
Jose Luis de la Vara
Juan Sanchez
Paper - conference
(2014) Deploying SAST at large scale - Achim D. Brucker -GI Sicherheit 2014
Achim D. Brucker
Uwe Sodan
(2013) Designing Secure Socio-Technical Systems with STS-ml PAJA (UNiTN) iStar'13
Elda Paja
Fabiano Dalpiaz
Paolo Giorgini
(2012) Dynamic Monitoring of Composed Services
Muhammad Asim
David Llewellyn-Jones
Madjid Merabti
Qi Shi
Bo Zhou
Paper - workshop
(2011) Elective Temporal Logic
Gabriele Costa
Ilaria Matteucci
Paper - workshop
(2013) Evaluating the Trust of Android Applications through
Gianluca Dini
Fabio Martinelliy
Ilaria Matteucciy
Marinella Petrocchiy,rea Saracino
Daniele Sgandurra
(2013) Event Driven Monitoring of Composite Services
Muhammad Asim
David Llewellyn-Jones
Brett Lempereur
Bo Zhou
Qi Shi
Madjid Merabti
Paper - conference
(2010) Experimental Threat Model Reuse with Misuse Case Diagrams
Jostein Jensen
Per H Meland
Inger Anne
Paper - conference

ANIKETOS newsletter

Stay informed on our latest news!

Login

Only for users who has an user and a password sent by the administrator.