BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Denmark
1 × Estonia
1 × Italy
1 × Luxembourg
1 × Spain
1 × USA
1 × United Kingdom
2 × Austria
Collaborated with:
D.A.Basin S.Mödersheim S.Ranise A.T.Truong D.Benetti M.Merro F.Rittinger S.Matthews M.Backes B.Pfitzmann P.Adão P.Mateus T.Reis A.Armando Y.Chevalier L.Compagna M.Rusinowitch M.Turuani L.Vigneron J.Cuéllar D.v.Oheimb M.Bouallagui Y.Boichut P.H.Drielsma P.Héam O.Kouchnarenko J.Mantovani J.Santiago W.Arsac T.Avanesov M.Barletta A.Calvi A.Cappai R.Carbone G.Erzse S.Frau M.Minea G.Pellegrino S.E.Ponta M.Rocchetto M.T.Dashti
Talks about:
secur (7) protocol (4) analysi (4) servic (3) autom (3) internet (2) valid (2) model (2) logic (2) tool (2)

Person: Luca Viganò

DBLP DBLP: Vigan=ograve=:Luca

Facilitated 1 volumes:

TAP 2013Ed

Contributed to:

SAC 20152015
ICST 20132013
TACAS 20122012
SEFM 20102010
FoSSaCS 20062006
QAPL 20062006
CAV 20052005
CAV 20022002
ESEC/FSE 20012001
KR 19961996

Wrote 10 papers:

SAC-2015-RaniseTV #analysis #automation #constraints #policy
Automated analysis of RBAC policies with temporal constraints and static role hierarchies (SR, ATT, LV), pp. 2177–2184.
ICST-2013-Vigano #internet
The SPaCIoS Project: Secure Provision and Consumption in the Internet of Services (LV), pp. 497–498.
TACAS-2012-ArmandoAABCCCCCCEFMMOPPRRDTV #architecture #automation #framework #platform #security #trust #validation
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures (AA, WA, TA, MB, AC, AC, RC, YC, LC, JC, GE, SF, MM, SM, DvO, GP, SEP, MR, MR, MTD, MT, LV), pp. 267–282.
SEFM-2010-BenettiMV #ad hoc #model checking #network #protocol
Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA (DB, MM, LV), pp. 191–202.
FoSSaCS-2006-BackesMPV #analysis #encryption
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario (MB, SM, BP, LV), pp. 428–445.
QAPL-2006-AdaoMRV #analysis #protocol #security #towards
Towards a Quantitative Analysis of Security Protocols (PA, PM, TR, LV), pp. 3–25.
CAV-2005-ArmandoBBCCCDHKMMORSTVV #automation #internet #protocol #security #validation
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications (AA, DAB, YB, YC, LC, JC, PHD, PCH, OK, JM, SM, DvO, MR, JS, MT, LV, LV), pp. 281–285.
CAV-2002-ArmandoBBCCMRTVV #analysis #protocol #security
The AVISS Security Protocol Analysis Tool (AA, DAB, MB, YC, LC, SM, MR, MT, LV, LV), pp. 349–353.
ESEC-FSE-2001-BasinRV #corba #security
A formal data-model of the CORBA security service (DAB, FR, LV), pp. 303–304.
KR-1996-BasinMV #framework #implementation #logic
Implementing Modal and Relevance Logics in a Logical Framework (DAB, SM, LV), pp. 386–397.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.