DISCLAIMER
The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
The documents distributed by this server are the authors' personal copies of pre-prints of such papers.
Journals
-
[DJM+08] L. Desmet, W. Joosen, F. Massacci, P. Philippaerts, F. Piessens, I. Siahaan and D. Vanoverberghe.
Security-by-contract on the .NET platform
In Information Security Technical Report, Volume 13 Issue 1, 2008. -
[BDM+09] N. Bielova, N. Dragoni, F. Massacci, K. Naliuka and I. Siahaan
Matching in Security-by-Contract for Mobile Code
In Journal of Logic and Algebraic Programming. doi:10.1016/j.jlap.2009.02.013, 2009.
Conferences
-
[BTDS08] N. Bielova, M. DallaTore, N. Dragoni, and I. Siahaan.
Matching Policies with Security Claims of Mobile Applications
In Proc. of The 3rd International Conference on Availability, Reliability and Security (ARES'08). IEEE Computer Society Press, 2008. PDF Slides
Workshops
-
[DMNS07] N. Dragoni, F. Massacci, K. Naliuka, and I. Siahaan.
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code.
In Proc. of The 4th European PKI Workshop (EuroPKI'07) . Springer-Verlag, 2007. PDF Slides -
[MS07] F. Massacci and I. Siahaan.
Matching midlet's security claims with a platform security policy using automata modulo theory.
In Proc. of The 12th Nordic Workshop on Secure IT Systems (NordSec'07), 2007. PDF Slides -
[MS08] F. Massacci and I. Siahaan.
Simulating Midlet's Security Claims with Automata Modulo Theory
In Proc. of ACM SIGPLAN 3rd Workshop on Programming Languages and Analysis for Security (PLAS 2008). ACM Digital Library, 2008. PDF Slides -
[BMS08a] N. Bielova and I. Siahaan.
Testing Decision Procedures for Security-by-Contract
In Proc. of Joint Workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (FCS-ARSPA-WITS'08), 2008. PDF Slides -
[FMS08a] F. Massacci, F. Piessens and I. Siahaan.
Security-By-Contract for the Future Internet
In Future Internet Symposium 2008 (FIS'08). PDF Slides -
[MS09] F. Massacci and I. Siahaan
Optimizing IRM with Automata Modulo Theory
In 5th International Workshop on Security and Trust Management (STM 2009). PDF Slides
Technical Reports
-
F. Massacci and I. Siahaan
Automata Modulo Theory (AMT)
Department of Information Engineering and Computer Science Technical Report DISI-09-027. PDF -
F. Massacci and I. Siahaan
Inclusion Matching Implementation of Automata Modulo Theory
Department of Information Engineering and Computer Science Technical Report DISI-09-073. PDF -
F. Massacci and I. Siahaan
Simulation Matching Implementation of Automata Modulo Theory
Department of Information Engineering and Computer Science Technical Report DISI-09-074. PDF
Miscellaneous
-
[MDS07] N. Dragoni, F. Massacci, and I. Siahaan
A Security-by-Contracts Architecture for Pervasive Services
In First Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS 2007). PDF Slides -
[FMS08b] F. Massacci, F. Piessens and I. Siahaan.
Security-By-Contract for the Future Internet ?
In Second Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS 2008). PDF Slides -
[BMS08b] N. Bielova and I. Siahaan.
Testing Decision Procedures for Security-by-Contract
In IEEE Symposium on Logic in Computer Science and Computer Security Foundations Symposium: Short talk joint session (LICS-CSF'08), 2008. PDF Slides