All work published here is provided for the timely dissemination of results and copyright rest with legitimate copyright holders. Since the inception of DOI, I only put the last submitted copy available here. The final version (the one you should eventually check) is pointed by the DOI.
I know I should sort them by topic, I know it...
RESEARCH SOFTWARE
- SI*-Tool --- http://sesa.dit.unitn.it/sistar_tool
A tool supporting security and risk requirements engineering.
- F. Massacci, J. Mylopoulos and N. Zannone. Computer-Aided Support for Secure Tropos. Automated Software Engineering Journal. 2007. (40-pages) PDF
- Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone: ST-Tool: A CASE Tool for Security Requirements Engineering. Proc. of IEEE RE'05. IEEE Press, 2005. (2-Pages) PDF
- Security-by-Contract for Mobile code --- www.s3ms.org
A framework for matching and inlining security policies over midlets.
- L. Desmet, W. Joosen, F. Massacci, P. Philippaerts, F. Piessensa, I. Siahaan, D. Vanoverberghe,
Security-by-contract on the .NET platform. Information Security Technical Report. 2008.PDF
- interactiveAccess --- www.interactiveaccess.org
A system for Interactive Access Control.
- H. Koshutanski and F. Massacci: Interactive Access Control for Autonomic Systems: from Theory to Implementation. ACM Transactions on Autonomous and Adaptive Systems 2008. Final Version. Local PDF
PUBLICATIONS FOR THE GENERAL PUBLIC
- N. Dragoni, F. Massacci: Security-By-Contract (SxC) for Mobile Systems -- or how to download software on your mobile without regretting it. Telektronik 2009. Final Version at Telenor. It is free so no local copy.
- (in Italian) N. Dragoni, F. Massacci. Security-by-Contract: come scaricare software sul proprio cellulare senza pentirsene. In Le Scienze. Web News 2008. PDF
- Y. Asnar, H. W. Lim, F. Massacci, C. Worledge: Realizing Trustworthy Business Services by A New GRC. To appear in the ISACA Journal 2010. Draft PDF.
- V. Lotz, E. Pigout, P. M. Fischer, D. Kossmann, F. Massacci, A. Pretschner: Towards Systematic Achievement of Compliance in Service-Oriented Architectures: The MASTER Approach. Wirtschaftsinformatik 2008.
INTERNATIONAL JOURNALS
2009-now
- G. M. Kuper, F. Massacci, N. Rassadko: Generalized XML security views. International Journal of Information Security 2009. Final Version @ Springer. PDF Draft.
- N. Bielova, N. Dragoni, F. Massacci, K. Naliuka, I. Siahaan: Matching in security-by-contract for mobile code. Journal of Logic and Algebraic Programming 2009. Computer Networks
2009. Final Version @ Elsevier. PDF Draft
- N. Dragoni, F. Massacci, A. Saidane: A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems. Computer Networks
2009. Final Version @ Elsevier.
- N. Dragoni, F. Massacci, T. Walter, C. Schaefer: What the heck is this application doing? – A security-by-contract architecture for pervasive services. Computers and Security 2009. Final Version @ Elsevier. Local PDF Draft.
- L. Compagna, P. El Khoury, A. Krausová, F. Massacci, N. Zannone: How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artificial Intelligence and Law 2009.
Final Version @ Springer. PDF Draft.
2005-2008
- H. Koshutanski and F. Massacci: Interactive Access Control for Autonomic Systems: from Theory to Implementation. ACM Transactions on Autonomous and Adaptive Systems 2008. Final Version @ ACM. Local PDF
- L. Desmet, W. Joosen, F. Massacci, P. Philippaerts, F. Piessensa, I. Siahaan, D. Vanoverberghe: Security-by-contract on the .NET platform. Information Security Technical Report. 2008. Final Version @ Elsevier. Local PDF Draft
- H. Kohutanski, F. Massacci: A Negotiation Scheme for Access Rights Establishment in Autonomic Communication.
Journal of Network and Systems Management 2007. PDF
- F. Massacci, J. Mylopoulos and N. Zannone. Computer-Aided Support for Secure Tropos. Automated Software
Engineering Journal. 2007. PDF
- F. Massacci, J. Mylopoulos and N. Zannone. From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach. International Journal of Software and Knowledge Engineering. 2007. PDF
- G. Bella, F. Massacci, L. C. Paulson: Verification of an Industrial Payment Protocol. Journal of Automated Reasoning. 2006. PDF
- S. Dobson, S. Denazis, A. Fernandez, D. Gaiti, E. Gelenbe, F. Massacci, P. Nixon, F. Saffre, N. Schmidt, F. Zambonelli: A survey of autonomic communications. ACM Transactions of Autonomous and Adaptive Systems2006. Local PDF (My most cited paper, the security section is mine).
- P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone. Requirements Engineering for Trust Management: Model, Methodology, and Reasoning. International Journal of Information Security. 2006. PDF
- F. Massacci, J. Mylopoulos and N. Zannone. Hierarchical Hippocratic Databases with Minimal Disclosure for Virtual
Organizations. The VLDB Journal. 2006. PDF
- G. Bella, F. Massacci, L. C. Paulson: An overview of the verification of SET. International
Journal of Information Security 2005. PDF
- F. Massacci, M. Prest, and N. Zannone. Using a Security Requirements Engineering Methodology in Practice: the
compliance with the Italian Data Protection Legislation. Computer Standards and Interfaces 2005. PDF
2001-2004
- G. Bella, F. Massacci, L. C. Paulson: Verifying the SET registration protocols. IEEE Journal of Selected Areas on Communications 2003. PDF
- C. Fiorini, E. Martinelli, F. Massacci. How to fake an RSA signature by encoding modular root finding as a sat problem. Discrete Applied Mathematics 130, 2. 2003. ISSN 0166-218X101-127. PDF
- L. Carlucci Aiello, F. Massacci. Verifying security protocols as planning in logic programming. ACM Transactions on Computational Logic (TOCL) 2, 4. 2001. ISSN 1529-3785542-580. PDF
1997-2000
- G. De Giacomo, F. Massacci. Combining deduction and model checking into tableaux and algorithms for Converse-PDL. Information and Computation 162. 2000. ISSN 0890-5401117-137. Accepted in 1997. PDF
- F. M. Donini, F. Massacci. EXPTIME tableaux for ALC. Artificial Intelligence Journal 124, 1. 2000. ISSN 0004-370287-138. PDF
- F. Massacci. Single step tableaux for modal logics: methodology, computations, algorithms. Journal of Automated Reasoning 24, 3. 2000. ISSN 0168-7433319-364. PDF
- F. Massacci. The complexity of analytic and clausal tableaux. Theoretical Computer Science 243, 1. 2000. ISSN 0304-3975477-487. PDF
- F. Massacci, L. Marraro. Logical cryptanalysis as a SAT-problem: Encoding and analysis of the U.SS. Data Encryption Standard. Journal of Automated Reasoning 24, 1-2. 2000. ISSN 0168-7433165-203. PDF
- F. Massacci. Tableaux methods for formal verification in multi-agent distributed systems. Journal of Logic and Computation 8, 3. 1998. ISSN 0955-792X373-400. PDF
EDITED BOOKS, PROCEEDINGS AND JOURNAL SPECIAL ISSUES
-
- J. Camenish, J. Lopez, F. Massacci, T. Skordas. Special issue on EU Funded Research in Security, Privacy and Trust. Journal of Computer Security to appear in 2010.
- F. Massacci, F. Piessens, S. Mauw: Special issue on Security and Trust. Science of Computer Programming 74(1-2): 1 (2008). here
- Fabio Massacci, Samuel T. Redwine Jr., Nicola Zannone eds: Engineering Secure Software and Systems, First International Symposium (ESSoS 2009), Springer-Verlag, 2009. Available as LNCS 5429 volume.
- L. Compagna, V. Lotz, F. Massacci.eds: Proc. of the ERCIM Security and Trust Management Workshop.(STM'07) Electronic Notes in Theoretical Computer Science, Elsevier, 2007.
- F. Massacci, F. Piessens eds: Proc. of the 1st Workshop on Run-time Monitoring for Embedded and Mobile Systems (REM'07). Electronic Notes in Theoretical Computer Science, Elsevier, 2007.
- G. Karjoth, F. Massacci eds. Proc. of the 2nd Workshop on Quality of Protection: Security measurements
and metrics. ACM Press, 2006.
- D. Gollman, F. Massacci and A. Yautsiukhin eds. Quality of Protection: Security measurements and metrics.
Springer Verlag, 2006.
- K. Stolen, W. H. Winsborough, F. Martinelli, F. Massacci eds: Trust Management, 4th International Conference,
iTrust 2006, Springer-Verlag, 2006.
- M. Barley, F. Massacci, H. Mouratidis, P. Scerri: Eds. Proceedings of the AAMAS International Workshop on on Safety and Security in Multiagent Systems. 2004. http://www.cs.auckland.ac.nz/research/safeagent/2004/
- E. Giunchiglia, F. Massacci: Eds. Proceedings of the IJCAR International Workshop on Issues in the Design and Experimental Evaluation of Systems for Modal and Temporal Logics. 2001. Technical Report 10/2001 of Dip. Ingegneria dell’Informazione, Univ. di Siena. PDF
BOOK CHAPTERS
-
- N. Dragoni, F. Martinelli, F. Massacci, P. Mori, C. Schaefer, T. Walter, E. Vetillard. Security-by-Contract (SxC) for Software and Services of Mobile Systems. In At Your Service, Selected Papers on EU research on Software and Services. MIT Press 2008. PDF
- F. Massacci and N. Zannone. Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank. In Social Modeling for Requirements Engineering. MIT Press, To appear in 2009. PDF
- K. Koshutanski, F. Massacci. Interactive Access Control with Trust Negotiation for
Autonomic Communication. In Advances in Enterprise Information Technology
Security. Idea Group. 2007. PDF
- F. Massacci, J. Mylopoulos, and N. Zannone. An Ontology for Secure Socio-Technical Systems. In Handbook of Ontologies for Business Interaction. Idea Group, 2007. PDF
- P. Giorgini, F. Massacci, N. Zannone: Security and Trust Requirements Engineering. In Foundations of Security Analysis and Design III - Tutorial Lectures: 237-272, 2005.
Springer Verlag. PDF
- L. Carlucci Aiello, F. Massacci. Planning attacks to security protocols: Case studies in logic programming. In Computational Logic: Logic Programming and Beyond, A. C. Kakas and F. Sadri, Eds., vol. 2407 of Lecture Notes in Artificial Intelligence. Springer-Verlag Heidelberg, ISBN 3-540-43959-52002. PDF
- F. Massacci, L. Marraro. Logical cryptanalysis as a SAT-problem: Encoding and analysis of the u.s. Data Encryption Standard1. In SAT-2000: Highlights of Satisfiability Research at the Year 2000, J. Gent, H. van Maaren, and T. Walsh, Eds., vol. 63 of Frontiers in Artificial Intelligence and Applications. IOS Press, Amsterdam, 2000, ISBN 1-58603-061-2pp. 343-376.
REFEREED INTERNATIONAL CONFERENCES AND WORKSHOPS
THESES
- F. Massacci. Efficient Approximate Deduction and an Application to Computer Security. PhD thesis, Universitá di Roma "La Sapienza", Dipartimento di Informatica e Sistemistica, June 1998. PS.GZ
TEACHING BOOKS
- D. CALVANESE, P. LIBERATORE, F. MASSACCI, R. ROSATI. Complementi ed Esercizi di Programmazione in PASCAL, 2 ed. Progetto Leonardo. Esculapio Editore, Bologna, ISBN 88-86524-23-41999. http://www.dis.uniroma1.it/~pascal
- D. CALVANESE, P. LIBERATORE, F. MASSACCI, R. ROSATI. Programmazione con Strutture Dati in C, 1 ed. Progetto Leonardo. Esculapio Editore, Bologna, ISBN 88-86524-52-82001. In Italian. Programs available on the web. http://www.dis.uniroma1.it/~progc