BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Canada
1 × Germany
1 × India
1 × Italy
1 × Luxembourg
1 × Sweden
2 × United Kingdom
3 × France
3 × USA
Collaborated with:
L.M.S.Tran J.Mylopoulos N.Zannone P.Giorgini P.Baumgartner G.D.Giacomo F.Paci M.Ngo D.Milushev F.Piessens F.Bouquet S.Debricon V.Bryl F.M.Donini P.Liberatore M.Schaerf M.d.Gramatica K.Labunets A.Tedeschi L.F.d.Cerro D.Fauthoux O.Gasquet A.Herzig D.Longin
Talks about:
secur (6) requir (5) tableaux (3) evolut (3) model (3) logic (3) modal (2) engin (2) tool (2) uncertainti (1)

Person: Fabio Massacci

DBLP DBLP: Massacci:Fabio

Contributed to:

POPL 20152015
REFSQ 20152015
RE 20142014
ICST 20122012
CAiSE 20112011
CAiSE 20062006
RE 20062006
RE 20052005
KR 20022002
IJCAR 20012001
CL 20002000
KR 20002000
CADE 19961996
CADE 19941994

Wrote 15 papers:

POPL-2015-NgoMMP #black box #policy #runtime #security #source code
Runtime Enforcement of Security Policies on Black Box Reactive Programs (MN, FM, DM, FP), pp. 43–54.
REFSQ-2015-GramaticaLMPT #assessment #empirical #risk management #security
The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals (MdG, KL, FM, FP, AT), pp. 98–114.
RE-2014-TranM #approach #evolution #feature model #nondeterminism
An Approach for Decision Support on the Uncertainty in Feature Model Evolution (LMST, FM), pp. 93–102.
ICST-2012-PaciMBD #evolution #process #requirements #testing
Managing Evolution by Orchestrating Requirements and Testing Engineering Processes (FP, FM, FB, SD), pp. 834–841.
CAiSE-2011-TranM #evolution #game studies #requirements #towards
Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution (LMST, FM), pp. 62–76.
CAiSE-2006-BrylMMZ #design #modelling #requirements #security
Designing Security Requirements Models Through Planning (VB, FM, JM, NZ), pp. 33–47.
RE-2006-GiorginiMMZ #detection
Detecting Conflicts of Interest (PG, FM, JM, NZ), pp. 308–311.
RE-2005-GiorginiMMZ #modelling #requirements #security
Modeling Security Requirements Through Ownership, Permission and Delegation (PG, FM, JM, NZ), pp. 167–176.
RE-2005-GiorginiMMZ05a #automation #named #requirements #security
ST-Tool: A CASE Tool for Security Requirements Engineering (PG, FM, JM, NZ), pp. 451–452.
Solving QBF by SMV (FMD, PL, FM, MS), pp. 578–592.
IJCAR-2001-CerroFGHLM #logic #proving
Lotrec : The Generic Tableau Prover for Modal and Description Logics (LFdC, DF, OG, AH, DL, FM), pp. 453–458.
The Taming of the (X)OR (PB, FM), pp. 508–522.
KR-2000-Massacci #first-order #reduction
Reduction rules and universal variables for first order tableaux and DPLL (FM), pp. 186–197.
CADE-1996-GiacomoM #algorithm #logic
Tableaux and Algorithms for Propositional Dynamic Logic with Converse (GDG, FM), pp. 613–627.
CADE-1994-Massacci #logic
Strongly Analytic Tableaux for Normal Modal Logics (FM), pp. 723–737.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.