Parisi-Presicce, Francesco
98  Ergebnisse:
Personensuche X
?
1

Maintaining Coherence Between Models With Distributed Rules..:

Bottoni, Paolo ; Parisi-Presicce, Francesco ; Pulcini, Simone.
Electronic Notes in Theoretical Computer Science.  211 (2008)  - p. 87-98 , 2008
 
?
 
?
4

Safety analysis of usage control authorization models:

, In: Proceedings of the 2006 ACM Symposium on Information, computer and communications security,
 
?
5

Graph-based specification of access control policies:

Koch, Manuel ; Mancini, L.V. ; Parisi-Presicce, Francesco
Journal of Computer and System Sciences.  71 (2005)  1 - p. 1-33 , 2005
 
?
6

Termination of High-Level Replacement Units with Applicatio..:

Bottoni, Paolo ; Koch, Manuel ; Parisi-Presicce, Francesco.
Electronic Notes in Theoretical Computer Science.  127 (2005)  4 - p. 71-86 , 2005
 
?
7

Policy Analysis and Verification by Graph Transformation To..:

Parisi-Presicce, Francesco ; Zhao, Yujie
Electronic Notes in Theoretical Computer Science.  127 (2005)  1 - p. 101-112 , 2005
 
?
8

Higher-Order Nets for Mobile Policies:

Hoffmann, Kathrin ; Mossakowski, Till ; Parisi-Presicce, Francesco
Electronic Notes in Theoretical Computer Science.  127 (2005)  2 - p. 87-105 , 2005
 
?
9

Formal model and policy specification of usage control:

Zhang, Xinwen ; Parisi-Presicce, Francesco ; Sandhu, Ravi.
ACM Transactions on Information and System Security.  8 (2005)  4 - p. 351-387 , 2005
 
?
10

Formal model and policy specification of usage control:

Zhang, Xinwen ; Parisi-Presicce, Francesco ; Sandhu, Ravi.
ACM Transactions on Information and System Security (TISSEC).  8 (2005)  4 - p. 351-387 , 2005
 
?
11

Risky trust : risk-based analysis of software systems:

, In: Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications,
 
?
12

Graph Transformations 

Second International Conference, ICGT 2004, Rome, Italy, Se...  Lecture Notes in Computer Science ; 3256
 
?
13

A logical specification for usage control:

, In: Proceedings of the ninth ACM symposium on Access control models and technologies,
 
?
15

Formal access control analysis in the software development ..:

, In: Proceedings of the 2003 ACM workshop on Formal methods in security engineering,
 
1-15