BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Austria
1 × Denmark
1 × Estonia
1 × France
1 × Luxembourg
1 × Turkey
1 × United Kingdom
3 × Italy
Collaborated with:
A.Armando R.Carbone G.Pellegrino P.Guilleminot A.D.Brucker T.Morreggia P.Ganty S.Ranise S.E.Ponta A.Panichella Y.Chevalier S.Mödersheim M.Rusinowitch M.Turuani L.Viganò D.A.Basin L.Vigneron J.Cuéllar D.v.Oheimb M.Bouallagui Y.Boichut P.H.Drielsma P.Héam O.Kouchnarenko J.Mantovani J.Santiago W.Arsac T.Avanesov M.Barletta A.Calvi A.Cappai G.Erzse S.Frau M.Minea M.Rocchetto M.T.Dashti
Talks about:
secur (10) protocol (5) base (4) analysi (3) valid (3) tool (3) sat (3) system (2) servic (2) model (2)

Person: Luca Compagna

DBLP DBLP: Compagna:Luca

Contributed to:

ICST 20152015
TACAS 20142014
ICST 20132013
ICTSS 20132013
TACAS 20122012
CAV 20052005
FME 20032003
SAT 20032003
CAV 20022002
IJCAR 20012001

Wrote 10 papers:

ICST-2015-CarboneCPP #identification #security #testing
Security Threat Identification and Testing (RC, LC, AP, SEP), pp. 1–8.
TACAS-2014-ArmandoCC #model checking #named #satisfiability
SATMC: A SAT-Based Model Checker for Security-Critical Systems (AA, RC, LC), pp. 31–45.
ICST-2013-CompagnaGB #as a service #process #security #validation
Business Process Compliance via Security Validation as a Service (LC, PG, ADB), pp. 455–462.
ICTSS-2013-PellegrinoCM #developer #protocol #security
A Tool for Supporting Developers in Analyzing the Security of Web-Based Security Protocols (GP, LC, TM), pp. 277–282.
TACAS-2012-ArmandoAABCCCCCCEFMMOPPRRDTV #architecture #automation #framework #platform #security #trust #validation
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures (AA, WA, TA, MB, AC, AC, RC, YC, LC, JC, GE, SF, MM, SM, DvO, GP, SEP, MR, MR, MTD, MT, LV), pp. 267–282.
CAV-2005-ArmandoBBCCCDHKMMORSTVV #automation #internet #protocol #security #validation
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications (AA, DAB, YB, YC, LC, JC, PHD, PCH, OK, JM, SM, DvO, MR, JS, MT, LV, LV), pp. 281–285.
FME-2003-ArmandoCG #analysis #graph #model checking #protocol #satisfiability #security #using
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis (AA, LC, PG), pp. 875–893.
SAT-2003-ArmandoC #analysis #protocol #satisfiability #security
Abstraction-Driven SAT-based Analysis of Security Protocols (AA, LC), pp. 257–271.
CAV-2002-ArmandoBBCCMRTVV #analysis #protocol #security
The AVISS Security Protocol Analysis Tool (AA, DAB, MB, YC, LC, SM, MR, MT, LV, LV), pp. 349–353.
System Description: RDL : Rewrite and Decision Procedure Laboratory (AA, LC, SR), pp. 663–669.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.