Author Publications

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Date | Item Type
Number of items: 188.

Article

Bauer, Lujo and Etalle, Sandro and Hartog, Jerry den and Viganò, Luca (2010) Preface of Special Issue on “Computer Security: Foundations and Automated Reasoning”. Journal of Automated Reasoning, 46 (3-4). pp. 223-224. ISSN 0168-7433

Bossi, Annalisa and Cocco, Nicoletta and Etalle, Sandro (1996) Simultaneous Replacement in Normal Programs. Journal of Logic and Computation, 6 (1). pp. 79-120. ISSN 0955-792X

Bossi, Annalisa and Cocco, Nicoletta and Rossi, Sabina and Etalle, Sandro (2002) On Modular Termination Proofs of General Logic Programs. Theory and Practice of Logic Programming, 2 (3). pp. 263-291. ISSN 1471-0684

Bossi, Annalisa and Etalle, Sandro (1994) Transforming acyclic programs. ACM Transactions on Programming Languages and Systems (TOPLAS), 16 (4). pp. 1081-1096. ISSN 0164-0925

Bossi, Annalisa and Etalle, Sandro and Rossi, Sabina (2000) Semantics of Well-Moded Input-Consuming Programs. Computer Languages, 26 (1). pp. 1-25. ISSN 0096-0551

Bossi, Annalisa and Etalle, Sandro and Rossi, Sabina and Smaus, Jan-Georg (2004) Termination of Simply Moded Logic Programs with Dynamic Scheduling. ACM Transactions on Computational Logic, 15 (3). pp. 470-507. ISSN 1529-3785

Bossi, Annalisa and Rossi, Sabina and Etalle, Sandro (2002) Properties of Input-Consuming Derivations. Theory and Practice of Logic Programming, 2 (2). pp. 125-154. ISSN 1471-0684

Böhm, Klemens and Etalle, Sandro and Hartog, Jerry den and Hütter, Christian and Trabelsi, Slim and Trivellato, Daniel and Zannone, Nicola (2010) A flexible architecture for privacy-aware trust management. Journal of Theoretical and Applied Electronic Commerce Research, 5 (2). pp. 77-96. ISSN 0718-1876

Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den and Lenzini, G. (2007) Audit-based compliance control. International Journal of Information Security, 6 (2-3). pp. 133-151. ISSN 1615-5262

Chong, C.N. and Corin, R.J. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Law, Y.W. and Tokmakoff, A. (2006) LicenseScript: A Logical Language for Digital Rights Management. Annals of telecommunications special issue on Network and Information systems security, 61 (3-4). pp. 284-331. ISSN 0003-4347

Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2007) Timed Analysis of Security Protocols. Journal of Computer Security, 15 (6). pp. 619-645. ISSN 0926-227X

Czenko, Marcin and Doumen, Jeroen and Etalle, Sandro (2005) Trust in Virtual Communities. ERCIM News -- Special: Security and Trust Management, 63 . pp. 29-30.

Czenko, Marcin and Tran, Ha and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Hartog, Jerry den (2006) Nonmonotonic Trust Management for P2P Applications. Electronic Notes in Theoretical Computer Science (ENTCS), 157 (3). pp. 113-130. ISSN 1571-0661

Dekker, M.A.C. and Veugen, P.J.M. and Etalle, S. (2006) Audit-based Access Control in de Zorg. Informatiebeveiliging, 8 . pp. 19-23. ISSN 1569-1063

Delzanno, Giorgio and Etalle, Sandro and Gabbrielli, Maurizio (2006) Introduction to the Special Issue on Specification Analysis and Verification of Reactive Systems. Theory and Practice of Logic Programming, 6 (3). pp. 225-226. ISSN 1471-0684

Etalle, S. and Bossi, A. and Cocco, N. (1999) Termination of well-moded programs. The Journal of Logic Programming, 38 (2). pp. 243-257. ISSN 0743-1066

Etalle, Sandro (1998) A semantics for modular general logic programs. Theoretical Computer Science, 206 (1-2). pp. 51-80. ISSN 0304-3975

Etalle, Sandro (2013) Innovatie en R&D – Een inleiding. Magazine nationale veiligheid en crisisbeheersing, 11 (1). pp. 3-5. ISSN 1875-7561

Etalle, Sandro and Gabbrielli, Maurizio (1999) Layered modes. The Journal of Logic Programming, 39 (1-3). pp. 225-244. ISSN 0743-1066

Etalle, Sandro and Gabbrielli, Maurizio (1996) Transformations of CLP modules. Theoretical Computer Science, 166 (1). pp. 101-146. ISSN 0304-3975

Etalle, Sandro and Gabbrielli, Maurizio and Meo, Maria Chiara (2001) Transformations of CCP programs. ACM Transactions on Programming Languages and Systems (TOPLAS), 23 (3). pp. 304-395. ISSN 0164-0925

Etalle, Sandro and Hartel, Pieter H. and Vree, Willem G. (1999) Declarative solutions to partitioned-grid problems. Software: Practice and Experience, 29 (13). pp. 1173-1200. ISSN 0038-0644

Etalle, Sandro and Samarati, Pierangela (2007) Preface of special issue of the proceedings of theSecond International Workshop on Security and Trust Management (STM 2006). Electronic Notes in Theoretical Computer Science, 179 . pp. 1-2. ISSN 1571-0661

Etalle, Sandro and Winsborough, William H. (2009) Maintaining control while delegating trust: Integrity constraints in trust management. ACM Transactions on Information and System Security, 13 (1). p. 5. ISSN 1094-9224

Rocha, Bruno P.S. and Conti, Mauro and Etalle, Sandro and Crispo, Bruno (2013) Hybrid static-runtime information flow and declassification enforcement. IEEE transactions on information forensics and security, 8 (8). pp. 1294-1305. ISSN 1556-6013

Trivellato, Daniel and Zannone, Nicola and Glaundrup, Maurice and Skowronek, Jacek and Etalle, Sandro (2013) A semantic security framework for systems of systems. International journal of cooperative information systems, 22 (1). pp. 1-35. ISSN 0218-8430

Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel J. (2012) $A^2$thOS: availability analysis and optimisation in SLAs. International Journal of Network Management, 22 (2). pp. 104-130. ISSN 1055-7148

Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel J. and Hartel, Pieter (2010) Model-based Qualitative Risk Assessment for Availability of IT Infrastructures. Software and Systems Modeling . ISSN 1619-1366

Article News

Corin, R. and Etalle, S. and Hartel, P.H. and Mader, A. (2005) Timed Analysis of Security Protocols (version 2, oct. 2005).

Book

Barthe, Gilles and Datta, Anupam and Etalle, Sandro , eds. (2011) Formal aspects of security and trust : 8th international workshop, FAST 2011 Leuven, Belgium, September 12-14, 2011: revised selected papers. Lecture notes in computer science, 7140 . Springer Verlag, Berlin, Germany. ISBN 9783642294198

Degano, Pierpaolo and Etalle, Sandro and Guttman, Joshua , eds. (2011) Formal aspects of security and trust : 7th international workshop, FAST 2010 Pisa, Italy, September 16-17, 2010: revised selected papers. Lecture notes in computer science, 6561 . Springer Verlag, Berlin, Germany. ISBN 9783642197512

Etalle, S. , ed. (2004) Logic Based Program Synthesis and Transformation 14th International Symposium, LOPSTR 2004, Verona, Italy, August 26 – 28, 2004, Revised Selected Papers. Lecture Notes in Computer Science, 3573 . Springer-Verlag, Berlin. ISBN 9783540266556

Book Section

Bolzoni, D. and Etalle, S. (2008) Approaches in Anomaly-based Network Intrusion Detection Systems. In: Intrusion Detection Systems. Advances in Information Security, 38 . Springer Verlag, London, pp. 1-15. ISBN 9780387772653

Bossi, Annalisa and Cocco, Nicoletta and Etalle, Sandro (2002) Transformation Systems and Nondeclarative Properties. In: Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski Part 1. Lecture Notes in Computer Science, 2407 . Springer-Verlag, Berlin, Germany, pp. 162-186. ISBN 9783540439592

Bossi, Annalisa and Cocco, Nicoletta and Etalle, Sandro and Rossi, Sabina (2004) Declarative Semantics of Input Consuming Logic Programs. In: Program Development in Computational Logic. Lecture Notes in Computer Science (3049). Springer Verlag, Berlin, Germany, pp. 90-114. ISBN 9783540221524

Bossi, Annalisa and Etalle, Sandro and Rossi, Sabina (1999) Properties of Input-Consuming Derivations. In: Workshop on Verification of Logic Programs. Electronic Notes in Theoretical Computer Science, 30 (1). Elsevier, pp. 102-124.

Corin, Ricardo and Doumen, Jeroen and Etalle, Sandro (2004) Analysing Password Protocol Security Against Off-line Dictionary Attacks. In: Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP 2004). Electronic Notes in Theoretical Computer Science, 121 (4). Elsevier, pp. 47-63.

Corin, Ricardo and Durante, Antonio and Etalle, Sandro and Hartel, Pieter (2005) A Trace Logic for Local Security Properties. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003). Electronic Notes in Theoretical Computer Science, 118 (1). Elsevier, pp. 129-143.

Czenko, Marcin and Etalle, Sandro and Li, Dongyi and Winsborough, William H. (2007) An Introduction to the Role Based Trust Management Framework RT. In: Foundations of Security Analysis and Design IV - FOSAD 2006/2007 Tutorial Lectures. Lecture Notes in Computer Science, 4677 . Springer Verlag, Berlin, Germany, pp. 246-281. ISBN 9783540748090

Dekker, Marnix and Etalle, Sandro and Hartog, Jerry den (2007) Privacy Policies. In: Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications, XVIII . Springer Verlag, Berlin, Germany, pp. 383-397. ISBN 9783540698609

Etalle, Sandro and Mukhopadhyay, Supratik and Roychoudhury, Abhik (2003) Preface [of the proceedings of the First international Workshop on Software Verification and Validation (SVV)]. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003). Electronic Notes in Theoretical Computer Science, 118 (1). Elsevier.

Trivellato, Daniel and Etalle, Sandro and Luit, Erik and Zannone, Nicola (2013) The POLIPO security framework. In: Situation awareness with systems of systems. Springer, New York, NY, USA, pp. 189-208. ISBN 9781461462293

Conference or Workshop Item

Apt, Krzysztof R. and Etalle, Sandro (1993) On the unification free Prolog programs. In: 18th International Symposium on Mathematical Foundations of Computer Science, MFCS 1993, August 30 - September 3, 1993 , Gdansk, Poland (pp. pp. 1-19).

Bertolino, Marco and Etalle, Sandro and Palamidessi, Catuscia (2000) The Replacement Operation for CCP Programs. In: 9th International Workshop on Logic Program Synthesis and Transformation, LOPSTR, September 22-24, 1999, Venezia, Italy (pp. pp. 216-233).

Bertolino, Marco and Etalle, Sandro and Palamidessi, Catuscia (1999) The Replacement Operation for CCP Programs. In: Joint Conference on Declarative Programming, AGP, September 6-9, 1999, L'Aquila, Italy (pp. pp. 441-454).

Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. In: Confederated International Conferences On the Move to Meaningful Internet Systems (OTM), November 9-14, 2008, Monterrey, Mexico (pp. pp. 938-955).

Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. In: Recent Advances in Intrusion Detection (pp. pp. 1-20).

Bolzoni, Damiano and Crispo, Bruno and Etalle, Sandro (2007) ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. In: 21st Large Installation System Administration Conference, LISA 2007, 11-16 November 2007, Dallas, TX, USA (pp. pp. 141-152).

Bolzoni, Damiano and Schade, Christiaan and Etalle, Sandro (2011) A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks. In: 25th Large Installation System Administration Conference, LISA 2011, 4-9 December 2011, Boston, MA, USA (pp. pp. 201-216).

Bolzoni, Damiano and Zambon, Emmanuele and Etalle, Sandro and Hartel, Pieter (2006) Poseidon: a 2-tier Anomaly-based Network Intrusion Detection System. In: Fourth IEEE International Workshop on Information Assurance, IWIA 2006, 13-14 Apr 2006, London, UK (pp. pp. 144-156).

Bossi, Annalisa and Cocco, Nicoletta and Etalle, Sandro (2000) Transformation of Left Terminating Programs. In: 9th International Workshop on Logic Program Synthesis and Transformation, LOPSTR '99, September 22-24, 1999, Venezia, Italy (pp. pp. 156-175).

Bossi, Annalisa and Cocco, Nicoletta and Etalle, Sandro (2000) Transformation of left terminating programs: The reordering problem. In: 5th International Workshop on Logic Program Synthesis and Transformation, LOPSTR '95, September 20-22, 1995, Utrecht, The Netherlands (pp. pp. 33-45).

Bossi, Annalisa and Cocco, Nicoletta and Etalle, Sandro (1993) On Safe Folding. In: 4th International Symposium on Programming Language Implementation and Logic Programming, PLILP 1992, August 26-28, 1992, Leuven, Belgique (pp. pp. 172-186).

Bossi, Annalisa and Cocco, Nicoletta and Etalle, Sandro (1992) Transforming Normal Programs by Replacement. In: 3rd International Workshop on Meta Programming in Logic, META 1992, June 10-12, 1992, Uppsala, Sweden (pp. pp. 265-279).

Bossi, Annalisa and Etalle, Sandro (1994) More on Unfold/Fold Transformations of Normal Programs: Preservation of Fitting's Semantics. In: 4th International Workshop on Meta Programming in Logic, META '94, June 20-21, 1994, Pisa, Italy (pp. pp. 311-331).

Bossi, Annalisa and Etalle, Sandro and Rossi, Sabina (2000) Semantics of Input-Consuming Logic Programs. In: First International Conference on Computational Logic, CL 2000, July 24-28, 2000, London, UK (pp. pp. 194-208).

Brusó, Mayla and Chatzikokolakis, Konstantinos and Etalle, Sandro and Hartog, Jerry den (2013) Linking unlinkability. In: 7th International Symposium on Trustworthy Global Computing, TGC 2012, September 7-8, 2012, Newcastle upon Tyne, UK (pp. pp. 129-144).

Cederquist, J.G. and Corin, R. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den (2005) An Audit Logic for Accountability. In: Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2005, 6-8 June 2005, Stockholm, Sweden (pp. pp. 34-43).

Cheng, Jieyin and Chong, Cheun Ngen and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Nikolaus, Stefan (2005) STREAMTO: Streaming Content using a Tamper-Resistant Token (Workshop paper). In: IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan (pp. pp. 601-612).

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Joosten, Rieks and Kleinhuis, Geert (2005) Service brokerage with Prolog (Poster paper). In: 7th International Conference on Enterprise Information Systems, ICEIS 2005, May 24-28, 2005, Miami, FL, USA (pp. pp. 409-412).

Chong, Cheun Ngen and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Jonker, Willem and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language and its Semantics. In: Third International Conference on Web Delivering of Music, WEDELMUSIC 2003, 15-17 September 2003, Leeds, UK (pp. pp. 122-129).

Chong, Cheun Ngen and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language. In: IFIP TC6 WG6.11 International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, May 22-24, 2003, Ilmenau, Germany (pp. pp. 104-115).

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter H. (2003) Comparing Logic-based and XML-based Rights Expression Languages. In: OTM Confederated International Workshops: On The Move to Meaningful Internet Systems, November 3-7, 2003, Catania, Sicily, Italy (pp. pp. 779-792).

Chong, Cheun Ngen and Law, Yee Wei and Etalle, Sandro and Hartel, Pieter (2002) LicenseScript- A Language and Framework for Calculating Licenses on Information over Constrained Domains. In: 7th Cabernet Radicals Workshop, 13-16 October 2002, Bertinoro (Forlì), Italy.

Chong, Cheun Ngen and Law, Yee Wei and Etalle, Sandro and Hartel, Pieter H. (2003) Approximating Fair Use in LicenseScript. In: 6th International Conference on Asian Digital Libraries, ICADL 2003, December 8-12, 2003, Kuala Lumpur, Malaysia (pp. pp. 432-443).

Chong, Cheun Ngen and Ren, Bin and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter H. and Corin, Ricardo (2004) License protection with a tamper-resistant token. In: 5th International Workshop Information Security Applications, WISA 2004, August 23-25, 2004, Jeju Island, Korea (pp. pp. 223-238).

Corin, R. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2004) Security Analysis of Parlay/OSA Framework. In: 9th International Conference on Intelligence in Service Delivery Networks, ICIN '04, October 18-21, 2004, Bordeaux, France (pp. pp. 54-59).

Corin, R. and Etalle, S. and Hartel, P.H. and Mader, A. (2004) Timed Model Checking of Security Protocols. In: 2nd ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, October 25-29, 2004, Washington, DC, USA (pp. pp. 23-32).

Corin, R. and Etalle, S. and Hartog, J. den and Lenzini, G. and Staicu, I. (2004) A Logic for Auditing Accountability in Decentralized Systems. In: IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, 2004, Toulouse, France (pp. pp. 187-201).

Corin, R.J. and Saptawijaya, A. and Etalle, S. (2006) A Logic for Constraint-based Security Protocol Analysis. In: IEEE Symposium on Security and Privacy, 21-25 May 2006, Oakland, US (pp. pp. 155-168).

Corin, Ricardo and Di Caprio, Gaetano and Etalle, Sandro and Gnesi, Stefania and Lenzini, Gabriele and Moiso, Corrado (2005) A Formal Security Analysis of an OSA/Parlay Authentication interface. In: 7th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems, FMOODS 2005, June 15-17, 2005, Athens, Greece (pp. pp. 131-146).

Corin, Ricardo and Durante, Antonio and Etalle, Sandro and Hartel, Pieter (2002) Using Trace Formulae for Security Protocol Design. In: 7th Cabernet Radicals Workshop, 13-16 October 2002, Bertinoro (Forlì), Italy.

Corin, Ricardo and Etalle, Sandro (2002) An Improved Constraint-based system for the verification of security protocols. In: 9th International Symposium on Static Analysis, SAS 2002, September 17-20, 2002 , Madrid, Spain (pp. pp. 239-265).

Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Mader, Angelika (2003) On Modelling Real-time and Security properties of Distributed Systems. In: 5th Plenary Cabernet Workshop, 5-7 November 2003, Porto Santo, Portugal.

Corin, Ricardo and Malladi, Sreekanth and Alves-Foss, Jim and Etalle, Sandro (2003) Guess what? Here is a new tool that finds some new guessing attacks. In: IFIP WG 1.7 and ACM SIGPLAN Workshop on Issues in the Theory of Security, WITS '03, April 5-6, 2003, Warsaw, Poland (pp. pp. 62-71).

Corin, Ricardo and Saptawijaya, Ari and Etalle, Sandro (2005) PS-LTL for Constraint-based Security Protocol Analysis. In: International Conference [on] Logic Programming, ICLP : 21 (Sitges), October 2-5, 2005, Sitges, Spain (pp. pp. 439-440).

Czenko, Marcin and Doumen, Jeroen and Etalle, Sandro (2008) Trust Management in P2P Systems Using Standard TuLiP. In: IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway (pp. pp. 1-16).

Czenko, Marcin and Etalle, Sandro (2009) LP with Flexible Grouping and Aggregates Using Modes. In: 19th International Symposium on Logic-Based Program Synthesis and Transformation LOPSTR 2009, 9-11 Sep 2009, Coimbra, Portugal (pp. pp. 59-73).

Czenko, Marcin and Etalle, Sandro (2007) Core TuLiP - Logic Programming for Trust Management. In: 23rd International Conference on Logic Programming, ICLP 2007, 8-13 September 2007, Porto, Portugal (pp. pp. 380-394).

Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2007) Extended Privilege Inheritance in RBAC. In: 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, March 20-22, 2007, Singapore, Thailand (pp. pp. 383-385).

Dekker, M.A.C. and Crampton, J. and Etalle, S. (2008) RBAC administration in distributed systems. In: Proceedings of the 13th ACM symposium on Access control models and technologies, 11-13 June 2008, Estes Park, Colorado, USA (pp. pp. 93-102).

Dekker, M.A.C. and Etalle, S. (2007) Refinement for Administrative Policies. In: 4th VLDB Workshop on Secure Data Management, SDM 2007, 23-24 September 2007, Vienna, Austria (pp. pp. 33-46).

Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. In: Proceedings of the Second International Workshop on Views on Designing Complex Architectures (VODCA), 16-17 Sept 2006, Bertinoro, Italy (pp. pp. 221-236).

Delzanno, Giorgio and Etalle, Sandro (2001) Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols. In: 11th International Workshop on Logic Based Program Synthesis and Transformation, LOPSTR 2001, November 28-30, 2001, Paphos, Greece (pp. pp. 76-90).

Di Pietro, Roberto and Mancini, Luigi V. and Law, Yee Wei and Etalle, Sandro and Havinga, Paul (2003) LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. In: 32nd International Conference on Parallel Processing Workshops, 6-9 October 2003, Kaohsiung, Taiwan (pp. pp. 397-406).

Etalle, S. and Hartog, J.I. den and Marsh, S. (2007) Trust and Punishment (Invited paper). In: Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics, Rome, Italy.

Etalle, S. and Massacci, F. and Yautsiukhin, A. (2007) The Meaning of Logs. In: Fourth Int. Conf. on Trust, Privacy and Security in Digital Business, TRUSTBUS 2007, 4-6 September 2007, Germany (pp. pp. 145-154).

Etalle, Sandro and Bossi, Annalisa and Rossi, Sabina and Smaus, Jan-Georg (2001) Semantics and Termination of Simply-Moded Logic Programs with Dynamic Scheduling. In: 10th European Symposium on Programming, ESOP 2001, April 2-6, 2001, Genova, Italy (pp. pp. 402-416).

Etalle, Sandro and Gabbrielli, Maurizio (1996) Layered Modes. In: Joint Conference on Declarative Programming, APPIA-GULP-PRODE 1996, July 15-18, 1996, Donostia-San Sebastian, Spain (pp. pp. 41-52).

Etalle, Sandro and Gabbrielli, Maurizio (1995) A Transformation System for Modular CLP Programs. In: 12th International Conference on Logic Programming, ICLP 1996, 13-18 June 1995, Tokyo, Japan (pp. pp. 681-695).

Etalle, Sandro and Gabbrielli, Maurizio (1995) The replacement operation for CLP modules. In: Partial Evaluation and Semantics-Based Program Manipulation, PEPM, June 21-23, 1995, La Jolla, CA, USA (pp. pp. 168-177).

Etalle, Sandro and Gabbrielli, Maurizio and Marchiori, Elena (1997) A transformation system for CLP with dynamic scheduling and CCP. In: ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation, PEPM 1997, June 12-13, 1997, Amsterdam, the Netherlands (pp. pp. 137-150).

Etalle, Sandro and Hinrichs, Timothy L. and Lee, Adam J. and Trivellato, Daniel and Zannone, Nicola (2013) Policy administration in tag-based authorization. In: 5th International Symposium on Foundations and Practice of Security, FPS 2012, October 25-26, 2012, Montreal, QC, Canada (pp. pp. 162-179).

Etalle, Sandro and Mountjoy, Jon (2000) The lazy functional side of logic programming. In: 10th International Workshop on Logic Based Program Synthesis and Transformation, LOPSTR 2000, July 24-28, 2000, London, UK.

Etalle, Sandro and Raamsdonk, Femke van (1999) Logic Programming with Requests. In: 16th International Conference Logic Programming, ICLP 1999, November 29 - December 4, 1999 , Las Cruces, New Mexico (pp. pp. 558-572).

Etalle, Sandro and Raamsdonk, Femke van (1998) Beyond Success and Failure. In: Joint International Conference and Symposium on Logic Programming, JICSLP 1998, 15-19 June 1998, Manchester, UK (pp. pp. 190-205).

Etalle, Sandro and Teusink, Frank (1996) A Compositional Semantics for Normal Open Programs. In: Joint International Conference and Symposium on Logic Programming, JICSLP 1996, September 2-6, 1996, Bonn, Germany (pp. pp. 468-482).

Etalle, Sandro and Winsborough, William H. (2005) Integrity Constraints in Trust Management (Extended Abstract). In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, June 1-3, 2005, Stockholm, Sweden.

Etalle, Sandro and Winsborough, William H. (2007) A Posteriori Compliance Control. In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, 20-22 June 2007, Nice, France (pp. pp. 11-20).

Hadziosmanovic, Dina and Bolzoni, Damiano and Etalle, Sandro and Hartel, Pieter (2012) Challenges and opportunities in securing industrial control systems. In: IEEE Workshop on Complexity in Engineering, COMPENG 2012, 11-13 June 2012, Aachen, Germany (pp. pp. 1-6).

Hadziosmanovic, Dina and Bolzoni, Damiano and Hartel, Pieter and Etalle, Sandro (2011) MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures. In: European Conference on Computer Network Defense, EC2ND 2011, 6-8 Sept 2011, Gothenburg, Sweden (pp. pp. 41-48).

Hadžiosmanović, Dina and Simionato, Lorenzo and Bolzoni, Damiano and Zambon, Emmanuele and Etalle, Sandro (2012) N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols. In: 15th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2012, 12-14 September 2012, Amsterdam, The Netherlands (pp. pp. 354-373).

Hartel, Pieter and Eck, Pascal van and Etalle, Sandro and Wieringa, Roel (2004) Modelling mobility aspects of security policies (Invited paper). In: Construction and Analysis of Safe, Secure and Interoperable Smart Cards, CASSIS, March 10-14, 2004, Marseille, France (pp. pp. 172-191).

Havinga, Paul and Etalle, Sandro and Karl, Holger and Petrioli, Chiara and Zorzi, Michele and Kip, Harry and Lentsch, Thomas (2003) EYES - Energy Efficient Sensor Networks. In: IFIP-TC6 8th International Conference on Personal Wireless Communications, PWC 2003, September 23-25, 2003, Venice, Italy (pp. pp. 198-201).

Herrmann, Andrea and Morali, Ayse and Etalle, Sandro and Wieringa, Roel (2011) RiskREP: Risk-Based Security Requirements Elicitation and Prioritization. In: 1st International Workshop on Alignment of Business Process and Security Modelling, ABPSM 2011, 6-8 Oct 2011, Riga, Latvia (pp. pp. 1-8).

Herrmann, Andrea and Morali, Ayse and Etalle, Sandro and Wieringa, Roel (2012) Risk and Business Goal Based Security Requirement and Countermeasure Prioritization. In: Workshops on Business Informatics Research, BIR 2011, 6-8 October 2011, Riga, Latvia (pp. pp. 64-76).

Law, Y.W. and Dulman, S. and Etalle, S. and Havinga, P. (2003) Assessing Security-Critical Energy-Efficient Sensor Networks. In: 18th IFIP TC11 International Conference on Information Security, Security and Privacy in the Age of Uncertainty, SEC 2003, May 26-28, 2003, Athens, Greece (pp. pp. 459-463).

Law, Yee Wei and Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Corin, Ricardo (2004) Licensing Structured Data with Ease. In: IFIP TC6 WG6.11 International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, May 22-24, 2003, Ilmenau, Germany.

Law, Yee Wei and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter H. (2003) A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. In: IFIP-TC6 8th International Conference on Personal Wireless Communications, PWC 2003, September 23-25, 2003, Venice, Italy (pp. pp. 27-39).

Mansour, O. and Etalle, S. and Krol, T. (2001) Scheduling and Allocation of Non-Manifest Loops on Hardware Graph-Models. In: 2nd PROGRESS Workshop on Embedded Systems, 2001, 18 October 2001, Veldhoven, The Netherlands (pp. pp. 153-160).

Morali, Ayse and Zambon, Emmanuele and Etalle, Sandro and Overbeek, Paul (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. In: Third IEEE International Workshop on Business-Driven IT Management, 07 Apr 2008, Salvador, Brazil (pp. pp. 31-40).

Morali, Ayse and Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel (2010) CRAC: Confidentiality Risk Assessment and IT-Infrastructure Comparison. In: 25th IFIP International Information Security Conference, SEC 2010: "Security & Privacy - Silver Linings in the Cloud", 20-23 Sep 2010, Brisbane, Australia. (In Press)

Morali, Ayse and Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel (2010) CRAC: Confidentiality Risk Assessment and IT-Architecture Comparison. In: Proceedings of the 6th International Conference on Network and Service Management, CNSM 2010, 25-29 Oct 2010, Niagara Falls, Canada. (In Press)

Morali, Ayse and Zambon, Emmanuele and Houmb, Siv Hilde and Sallhammar, Karin and Etalle, Sandro (2009) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. In: 31th IEEE International Conference on Software Engineering, ICSE 2009, 16-24 May 2009, Vancouver, Canada. (In Press)

Rocha, Bruno P.S. and Bandhakavi, Sruthi and Hartog, Jerry den and Winsborough, William H. and Etalle, Sandro (2010) Towards static flow-based declassification for legacy and untrusted programs. In: IEEE Symposium on Security and Privacy, May 16-19, 2010, Oakland, California (pp. pp. 93-108).

Spiessens, F. and Hartog, J.I. den and Etalle, S. (2009) Know what you trust. In: Formal Aspects in Security and Trust, 5th International Workshop, Malaga, Spain (pp. pp. 129-142).

Trivellato, Daniel and Spiessens, Fred and Zannone, Nicola and Etalle, Sandro (2009) POLIPO: Policies & ontologies for interoperability, portability, an autonomy. In: IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY, 20-22 July 2009, London, UK (pp. pp. 110-113).

Trivellato, Daniel and Spiessens, Fred and Zannone, Nicola and Etalle, Sandro (2009) Reputation-based ontology alignment for autonomy and interoperability in distributed access control. In: 12th IEEE International conference on Computational Science and Engineering, CSE, 29-31 Aug. 2009, Vancouver BC, Canada (pp. pp. 252-258).

Trivellato, Daniel and Zannone, Nicola and Etalle, Sandro (2011) A Security Framework for Systems of Systems. In: IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2011, 6-8 June 2011, Pisa, Italy (pp. pp. 182-183).

Trivellato, Daniel and Zannone, Nicola and Etalle, Sandro (2011) Protecting Information in Systems of Systems. In: 18th ACM conference on Computer and Communications Security, CCS 2011, 17-21 October 2011 , Chicago, IL, USA (pp. pp. 865-867).

Vriezekolk, E. and Wieringa, R. and Etalle, S. (2011) How to assess telecom service availability risks for crisis organisations? In: 20th European Safety and Reliability Annual Conference, ESREL 2011, 18-22 September 2011, Troyes, France (pp. pp. 2653-2661).

Vriezekolk, Eelco and Wieringa, Roel and Etalle, Sandro (2011) A New Method to Assess Telecom Service Availability Risks. In: 8th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2011, 8-11 May 2011, Lisbon, Portugal.

Vriezekolk, Eelco and Wieringa, Roel and Etalle, Sandro (2012) Design and initial validation of the Raster method for telecom service availability risk assessment. In: 9th International Conference on Information Systems for Crisis Response and Managemen, ISCRAM 2012, 22-25 April 2012, Vancouver, Canada (pp. p. 117).

Zambon, Emmanuele and Bolzoni, Damiano and Etalle, Sandro and Salvato, Marco (2007) A model supporting Business Continuity auditing & planning in Information Systems. In: Second International Conference on Internet Monitoring and Protection, ICIMP 2007, 1-5 July 2007, San Jose, CA, USA (pp. p. 33).

Zambon, Emmanuele and Bolzoni, Damiano and Etalle, Sandro and Salvato, Marco (2007) Model-Based Mitigation of Availability Risks. In: Second IEEE/IFIP International Workshop on Business-Driven IT Management, 21 May 2007, Munich, Germany (pp. pp. 75-83).

Zannone, Nicola and Petkovic, Milan and Etalle, Sandro (2010) Towards Data Protection Compliance. In: 5th International Conference on Security and Cryptography, SECRYPT 2010, 26-28 July 2010, Athens, Greece (pp. pp. 213-216).

Lecture

Etalle, Sandro (2008) Nice to know. [Lecture]

Report

Bolzoni, D. and Crispo, B. and Etalle, S. (2008) ATLANTIDES: Automatic Configuration for Alert Verification in Network Intrusion Detection Systems. [Report]

Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. [Report]

Bolzoni, D. and Etalle, S. (2006) APHRODITE: an Anomaly-based Architecture for False Positive Reduction. [Report]

Bolzoni, Damiano and Etalle, Sandro and Hartel, Pieter (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. [Report]

Bolzoni, Damiano and Zambon, Emmanuele and Etalle, Sandro and Hartel, Pieter (2005) Poseidon: a 2-tier anomaly-based intrusion detection system. [Report]

Bossi, Annalisa and Cocco, Nicoletta and Etalle, Sandro and Rossi, Sabina (2004) Declarative semantics of input consuming logic programs. [Report]

Bossi, Annalisa and Etalle, Sandro and Rossi, Sabina and Smaus, Jan-Georg (2003) Termination of simply moded logic programs with dynamic scheduling. [Report]

Brinkman, Richard and Feng, Ling and Etalle, Sandro and Hartel, Pieter and Jonker, Willem (2003) Experimenting with linear search in encrypted data. [Report]

Cederquist, J.G. and Corin, R. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den (2005) An audit logic for accountability. [Report]

Cederquist, J.G. and Corin, R. and Dekker, M.A.C. and Etalle, S. and Hartog, J.I. den and Lenzini, G. (2006) The Audit Logic: Policy Compliance in Distributed Systems. [Report]

Cheng, Jieyin and Chong, Cheun Ngen and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter H. and Nikolaus, Stefan (2004) STREAMTO: streaming content using a tamper-resistant token. [Report]

Chong, C.N. and Law, Y.W. and Etalle, S. and Hartel, P.H. (2002) LicenseScript : a language and framework for calculating licenses on information over constrained domains. [Report]

Chong, Cheun Ngen and Corin, Ricardo and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Law, Yee Wei and Tokmakoff, Andrew (2005) LicenseScript : a logical language for digital rights management. [Report]

Chong, Cheun Ngen and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Jonker, Willem and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language and its Semantics. [Report]

Chong, Cheun Ngen and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Law, Yee Wei (2003) LicenseScript: a novel digital rights language. [Report]

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Joosten, Rieks and Kleinhuis, Geert (2005) Service brokerage with Prolog. [Report]

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Joosten, Rieks and Kleinhuis, Geert (2004) Inter-library service brokerage in LicenseScript. [Report]

Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter H. (2003) Comparing logic-based and XML-based rights expression languages. [Report]

Chong, Cheun Ngen and Law, Yee Wei and Etalle, Sandro and Hartel, Pieter H. (2003) Approximating fair use in LicenseScript. [Report]

Chong, Cheun Ngen and Ren, Bin and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter H. and Corin, Ricardo (2004) License protection with a tamper-resistant token. [Report]

Corin, R. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2004) Security analysis of parlay/OSA framework. [Report]

Corin, R. and Etalle, S. and Hartel, P.H. and Mader, A. (2004) Timed model checking of security protocols. [Report]

Corin, R. and Etalle, S. and Hartel, P.H. and Mader, A. (2005) Timed analysis of security protocols. [Report]

Corin, R. and Etalle, S. and Hartog, J. den and Lenzini, G. and Staicu, I. (2004) A logic for auditing accountability in decentralized systems. [Report]

Corin, R. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2005) A formal security analysis of an OSA/Parlay authentication interface. [Report]

Corin, R.J. and Durante, A. and Etalle, S. and Hartel, P.H. (2002) Using Trace Formulae for Security Protocol Design. [Report]

Corin, R.J. and Malladi, S. and Alves-Foss, J. and Etalle, S. (2003) Guess what? Here is a new tool that finds some new guessing attacks (Extended abstract). [Report]

Corin, Ricardo and Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter (2003) How to pay in LicenseScript. [Report]

Corin, Ricardo and Doumen, Jeroen and Etalle, Sandro (2003) Analysing password protocol security against off-line dictionary attacks. [Report]

Corin, Ricardo and Durante, Antonio and Etalle, Sandro and Hartel, Pieter (2003) trace logic for local security properties. [Report]

Corin, Ricardo and Etalle, Sandro (2004) A Simple procedure for finding guessing attacks (extended abstract). [Report]

Corin, Ricardo and Etalle, Sandro (2002) An improved constraint-based system for the verification of security protocols. [Report]

Corin, Ricardo and Etalle, Sandro and Hartel, Pieter and Mader, Angelika (2003) On modelling real-time and security properties of distributed systems. [Report]

Czenko, Marcin and Doumen, Jeroen and Etalle, Sandro (2008) Trust Management in P2P systems using Standard TuLiP. [Report]

Czenko, Marcin and Etalle, Sandro (2008) LP with Flexible Grouping and Aggregates Using Modes. [Report]

Czenko, Marcin and Etalle, Sandro (2007) Core TuLiP. [Report]

Czenko, Marcin and Etalle, Sandro and Li, Dongyi and Winsborough, William H. (2007) An Introduction to the Role Based Trust Management Framework RT. [Report]

Czenko, Marcin and Tran, Ha and Doumen, Jeroen and Etalle, Sandro and Hartel, Pieter and Hartog, Jerry den (2005) Nonmonotonic trust management for P2P applications. [Report]

Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. [Report]

Dekker, M.A.C. and Crampton, J. and Etalle, S. (2007) RBAC Administration in Distributed Systems. [Report]

Dekker, M.A.C. and Etalle, S. (2007) Refinement for Administrative Policies. [Report]

Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. [Report]

Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2006) Privacy in an Ambient World. [Report]

Dekker, M.A.C. and Hartog, J.I. den and Etalle, S. (2007) Audit-based Compliance Control (AC2) for EHR Systems. [Report] (In Press)

Di Pietro, Roberto and Mancini, Luigi V. and Law, Yee Wei and Etalle, Sandro and Havinga, Paul (2003) LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks. [Report]

Etalle, Sandro and Massacci, Fabio and Yautsiukhin, Artsiom (2007) The Meaning of Logs. [Report]

Etalle, Sandro and Winsborough, William H. (2005) Integrity constraints in trust management. [Report]

Hartel, Pieter and Eck, Pascal van and Etalle, Sandro and Wieringa, Roel (2004) Modelling mobility aspects of security policies. [Report]

Law, Y.W. and Dulman, S. and Etalle, S. and Havinga, P. (2002) Assessing Security-Critical Energy-Efficient Sensor Networks. [Report]

Law, Yee Wei and Chong, Cheun Ngen and Etalle, Sandro and Hartel, Pieter and Corin, Ricardo (2003) Licensing structured data with ease. [Report]

Law, Yee Wei and Corin, Ricardo and Etalle, Sandro and Hartel, Pieter H. (2003) A formally verified decentralized key management architecture for wireless sensor networks. [Report]

Law, Yee Wei and Etalle, Sandro and Hartel, Peter (2002) Key management with group-wise pre-deployed keying and secret sharing pre-deployed keying. [Report]

Law, Yee Wei and Hartel, Pieter and Etalle, Sandro and Havinga, Paul and Di Pietro, Roberto and Mancini, Luigi (2005) Overview of security research in EYES. [Report]

Morali, Ayse and Zambon, Emmanuele and Etalle, Sandro and Overbeek, Paul (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. [Report]

Morali, Ayse and Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel (2009) CRAC: Confidentiality Risk Analysis and IT-Architecture Comparison of Business Networks. [Report]

Morali, Ayse and Zambon, Emmanuele and Houmb, Siv Hilde and Sallhammar, Karin and Etalle, Sandro (2008) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. [Report]

Zambon, Emmanuele and Bolzoni, Damiano and Etalle, Sandro and Salvato, Marco (2007) Model-Based Mitigation of Availability Risks. [Report]

Zambon, Emmanuele and Bolzoni, Damiano and Etalle, Sandro and Salvato, Marco (2007) A model supporting Business Continuity auditing & planning in Information Systems. [Report]

Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel J. (2010) A2THOS: Availability Analysis and Optimisation in SLAs. [Report]

Zambon, Emmanuele and Etalle, Sandro and Wieringa, Roel J. and Hartel, Pieter (2009) Architecture-based Qualitative Risk Analysis for Availability of IT Infrastructures. [Report]

Thesis

Etalle, Sandro (1995) Transformation and analysis of (constraint) logic programs. thesis.

This list was generated on Wed Jul 30 05:23:56 2014 CEST.