Travelled to:
1 × Denmark
1 × Estonia
1 × Italy
1 × Luxembourg
1 × Spain
1 × USA
1 × United Kingdom
2 × Austria
Collaborated with:
D.A.Basin ∅ S.Mödersheim S.Ranise A.T.Truong D.Benetti M.Merro F.Rittinger S.Matthews M.Backes B.Pfitzmann P.Adão P.Mateus T.Reis A.Armando Y.Chevalier L.Compagna M.Rusinowitch M.Turuani L.Vigneron J.Cuéllar D.v.Oheimb M.Bouallagui Y.Boichut P.H.Drielsma P.Héam O.Kouchnarenko J.Mantovani J.Santiago W.Arsac T.Avanesov M.Barletta A.Calvi A.Cappai R.Carbone G.Erzse S.Frau M.Minea G.Pellegrino S.E.Ponta M.Rocchetto M.T.Dashti
Talks about:
secur (7) protocol (4) analysi (4) servic (3) autom (3) internet (2) valid (2) model (2) logic (2) tool (2)
Person: Luca Viganò
DBLP: Vigan=ograve=:Luca
Facilitated 1 volumes:
Contributed to:
Wrote 10 papers:
- SAC-2015-RaniseTV #analysis #automation #constraints #policy
- Automated analysis of RBAC policies with temporal constraints and static role hierarchies (SR, ATT, LV), pp. 2177–2184.
- ICST-2013-Vigano #internet
- The SPaCIoS Project: Secure Provision and Consumption in the Internet of Services (LV), pp. 497–498.
- TACAS-2012-ArmandoAABCCCCCCEFMMOPPRRDTV #architecture #automation #framework #platform #security #trust #validation
- The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures (AA, WA, TA, MB, AC, AC, RC, YC, LC, JC, GE, SF, MM, SM, DvO, GP, SEP, MR, MR, MTD, MT, LV), pp. 267–282.
- SEFM-2010-BenettiMV #ad hoc #model checking #network #protocol
- Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA (DB, MM, LV), pp. 191–202.
- FoSSaCS-2006-BackesMPV #analysis #encryption
- Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario (MB, SM, BP, LV), pp. 428–445.
- QAPL-2006-AdaoMRV #analysis #protocol #security #towards
- Towards a Quantitative Analysis of Security Protocols (PA, PM, TR, LV), pp. 3–25.
- CAV-2005-ArmandoBBCCCDHKMMORSTVV #automation #internet #protocol #security #validation
- The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications (AA, DAB, YB, YC, LC, JC, PHD, PCH, OK, JM, SM, DvO, MR, JS, MT, LV, LV), pp. 281–285.
- CAV-2002-ArmandoBBCCMRTVV #analysis #protocol #security
- The AVISS Security Protocol Analysis Tool (AA, DAB, MB, YC, LC, SM, MR, MT, LV, LV), pp. 349–353.
- ESEC-FSE-2001-BasinRV #corba #security
- A formal data-model of the CORBA security service (DAB, FR, LV), pp. 303–304.
- KR-1996-BasinMV #framework #implementation #logic
- Implementing Modal and Relevance Logics in a Logical Framework (DAB, SM, LV), pp. 386–397.