Publications

Authors Type of pub
(2012) Expressing Cloud Security Requirements in Deontic Contract Languages
Per H Meland
Astri Undheim
Karin Bernsmed
Humberto Castejon
Martin Jaatun
(2012) Extending AOP Principles for the Description of Network Security Patterns
David Llewellyn-Jones
Qi Shi
Madjid Merabti
Paper - workshop
(2014) Featherweight OCL (Formal Semantics for OCL 2.5) - Achim D. Brucker - AFP - 2014
Achim D. Brucker
Frederic Tuong
Burkhart Wolff
(2014) featherweight-ocl - Achim D. Brucker - afp - 2014
Achim D. Brucker
Frederic Tuong
Burkhart Wolff
(2013) Federated Identity Management - Jostein Jensen%2C Martin Jaatun (SINTEF) IEEE Computer and Reliability March 2013
Jostein Jensen
Martin Gilje Jaatun
(2011) Formal Analysis of Security Metrics and Risk Artsiom Yautsiukhin,Fabio Martinelli,Leanid Krautsevich Paper - workshop
(2012) Formative user-centered evaluation of security modeling: Results from a Case Study
Sandra Trösterer
Elke Beck
Fabiano Dalpiaz
Elda Paja
Paolo Giorgini
and Manfred Tscheligi
Paper - journal
(2011) Gate automata-driven run-time enforcement
Gabriele Costa
Ilaria Matteucci
Paper - journal
Handbook of Service Description - USDL and its Methods: Service levels, Security, and Trust
Achim Brucker
Florian Marienfeld and Edzard H
Book chapter
(2013) HOL-TestGen_FW - Achim D. Brucker (SAP) - ICTAC - 2013
Achim D. Brucker
Lukas Br
Burkhart Wolff
(2011) How will software engineers of the Internet of Things reason about trust?
Andrew J. B. Fugard
Elke Beck
and Magdalena Gärtner
Paper - workshop
(2012) Improving Security For Services Of The Future Internet Erkuden Rios Paper - conference
(2014) Integrating Security Aspects into Business Process Models - Achim D. Brucker - information technology - 2013 Dr. Achim D. Brucker
(2013) Introducing probabilities in contract-based approaches
Gianluca Dini
Fabio Martinelli
Ilaria Matteucci,rea Saracino
Daniele Sgandurra
(2013) Investigating the Privacy vs Forwarding
Gianpiero Costantino
Fabio Martinelli
Paolo Santi
(2013) MADAM A Multi-level Anomaly Detector
Gianluca Dini
Fabio Martinelli,rea Saracino,
Daniele Sgandurra
(2011) Managing Security in Services - a Goal & Process Approach
Fabio Massacci
Fabiano Dalpiaz
Paolo Giorgini
Elda Paja
Yudistira Asnar
Other
(2014) Managing Security Requirements Conflicts in Socio-Technical Systems (UniTN) ER 2013
Elda Paja
Fabiano Dalpiaz
Paolo Giorgini
(2013) Mitigating Security Risks in Service Composition a Contract-based Approach
Gabriele Costa
Roberto Mandati
Fabio Martinelli
Ilaria Matteucci
Artsiom Yautsiukhin
(2012) Modeling and Enforcing Access Control Requirements in Business Processes Achim D. Brucker Paper - conference
(2014) Modeling and Verification of ATM Security Policies with SecBPMN - SALNITRI - SHPCS14 - UNITN
Mattia Salnitri
Paolo Giorgini
(2014) Modeling and Verifying Security Policies in Business Processes - SALNITRI - BPMDS14 - UNITN
Mattia Salnitri
Fabiano Dalpiaz
Paolo Giorgini
(2012) Modelling Security Requirements in Socio-Technical Systems with STS-Tool
Elda Paja
Fabiano Dalpiaz
Mauro Poggianella
Pierluigi Roberti
Paolo Giorgini
Paper - workshop
(2013) Monitoring Security and Safety of Assets in Supply Chains - Achim D. Brucker (SAP - Future Security 2012
Ganna Monakova
Cristina Severin
Achim D. Brucker
Ulrich Flegel
Andreas Schaad
(2013) Multi-dimensional Secure Service Orchestration SBP-13
Gabriele Costa
Fabio Martinelli
Artsiom Yautsiukhin
(2014) On the Semantics of Object-oriented Data Structures and Path Expressions - Achim D. Brucker - CEUR - 2013
Achim D. Brucker
Delphine Longuet
Fr
Burkhart Wolff
(2012) On Theorem Prover-based Testing Achim D. Brucker and Burkhart Wolff 1
(2013) On Theorem Prover-based testing - Achim D. Brucker (SAP) - Acta Informatica - 2013
Achim D. Brucker
Burkhart Wolff
(2012) Priorities-based Review computation
Gianpiero Costantino
Fabio Martinelli
Marinella Petrocchi
Paper - workshop
(2013) Prototype for Design-time Secure and Trustworthy Service Composition
Bo Zhou
David Llewellyn-Jones
Qi Shi
Muhammad Asim
Madjid Merabti
Other
(2013) Remote Policy Enforcement for Trusted Application
Fabio Martinelli
Ilaria Matteucci
Andrea Saracino
Daniele Sgandurra
(2014) Report on the Aachen OCL Meeting - Achim D. Brucker - CEUR - 2013
Achim D. Brucker
Dan Chiorean
Tony Clark
Birgit Demuth
Martin Gogolla
Dimitri Plotnikov
Bernhard Rumpe
Edward D. Willink
Burkhart Wolff
(2013) Requirements for Composite Security Pattern Specification
David Llewellyn-Jones
Muhammad Asim
Qi Shi
Madjid Merabti
Paper - workshop
(2013) Secure and Compliance Implementation of Business Process-driven Systems - Achim D. Brucker (SAP) - SBP 2012
Achim D. Brucker
Isabelle Hang
(2012) Secure Service Composition Adaptation Based on Simulated Annealing
Bo Zhou
David Llewellyn-Jones
Qi Shi
Muhammad Asim
Madjid Merabti
David Lamb
Paper - workshop

ANIKETOS newsletter

Stay informed on our latest news!

Login

Only for users who has an user and a password sent by the administrator.