default search action
Sandro Etalle
Person information
- affiliation: Eindhoven University of Technology, Netherlands
- affiliation: University of Twente, Enschede, Netherlands
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Guillaume Dupont, Daniel Ricardo dos Santos, Stanislav Dashevskyi, Sangavi Vijayakumar, Sashaank P. Murali, Elisa Costante, Jerry den Hartog, Sandro Etalle:
Demonstration of new attacks on three healthcare network protocols in a lab environment. J. Comput. Virol. Hacking Tech. 20(2): 301-314 (2024) - 2022
- [c110]Xi Qin, Martin Rosso, Alvaro A. Cárdenas, Sandro Etalle, Jerry den Hartog, Emmanuele Zambon:
You Can't Protect What You Don't Understand: Characterizing an Operational Gas SCADA Network. SP (Workshops) 2022: 243-250 - 2021
- [c109]Guillaume Dupont, Cristoffer Leite, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:
Similarity-Based Clustering For IoT Device Classification. COINS 2021: 1-7 - 2020
- [c108]Guillaume Dupont, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:
A Matter of Life and Death: Analyzing the Security of Healthcare Networks. SEC 2020: 355-369 - [i18]Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle:
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems. CoRR abs/2007.02307 (2020)
2010 – 2019
- 2019
- [c107]Sandro Etalle:
Network Monitoring of Industrial Control Systems: The Lessons of SecurityMatters. CPS-SPC@CCS 2019: 1 - [c106]Davide Fauri, Michail Kapsalakis, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:
Role Inference + Anomaly Detection = Situational Awareness in BACnet Networks. DIMVA 2019: 461-481 - [c105]Ali Abbasi, Jos Wetzels, Thorsten Holz, Sandro Etalle:
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems. EuroS&P 2019: 31-46 - [c104]Guillaume Dupont, Jerry den Hartog, Sandro Etalle, Alexios Lekidis:
Evaluation Framework for Network Intrusion Detection Systems for In-Vehicle CAN. ICCVE 2019: 1-6 - [c103]Guillaume Dupont, Jerry den Hartog, Sandro Etalle, Alexios Lekidis:
A Survey of Network Intrusion Detection Systems for Controller Area Network. ICVES 2019: 1-6 - [i17]Guillaume Dupont, Jerry den Hartog, Sandro Etalle, Alexios Lekidis:
Network intrusion detection systems for in-vehicle network - Technical report. CoRR abs/1905.11587 (2019) - 2018
- [c102]Davide Fauri, Michail Kapsalakis, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle:
Leveraging Semantics for Actionable Intrusion Detection in Building Automation Systems. CRITIS 2018: 113-125 - [c101]Mahdi Alizadeh, Sander Peters, Sandro Etalle, Nicola Zannone:
Behavior analysis in the medical sector: theory and practice. SAC 2018: 1637-1646 - [c100]Bram C. M. Cappers, Paulus N. Meessen, Sandro Etalle, Jarke J. van Wijk:
Eventpad: Rapid Malware Analysis and Reverse Engineering using Visual Analytics. VizSEC 2018: 1-8 - [i16]Luca Allodi, Sandro Etalle:
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions. CoRR abs/1801.04569 (2018) - 2017
- [j29]Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiy:
A white-box anomaly-based framework for database leakage detection. J. Inf. Secur. Appl. 32: 27-46 (2017) - [c99]Ali Abbasi, Thorsten Holz, Emmanuele Zambon, Sandro Etalle:
ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. ACSAC 2017: 437-448 - [c98]Davide Fauri, Daniel Ricardo dos Santos, Elisa Costante, Jerry den Hartog, Sandro Etalle, Stefano Tonetta:
From System Specification to Anomaly Detection (and back). CPS-SPC@CCS 2017: 13-24 - [c97]Sandro Etalle:
From Intrusion Detection to Software Design. ESORICS (1) 2017: 1-10 - [c96]Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle:
\mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems. NSS 2017: 694-709 - [c95]Luca Allodi, Sandro Etalle:
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions. SafeConfig@CCS 2017: 23-26 - [c94]Davide Fauri, Bart de Wijs, Jerry den Hartog, Elisa Costante, Emmanuele Zambon, Sandro Etalle:
Encryption in ICS networks: A blessing or a curse? SmartGridComm 2017: 289-294 - 2016
- [c93]Ali Abbasi, Majid Hashemi, Emmanuele Zambon, Sandro Etalle:
Stealth Low-Level Manipulation of Programmable Logic Controllers I/O by Pin Control Exploitation. CRITIS 2016: 1-12 - [c92]Ömer Yüksel, Jerry den Hartog, Sandro Etalle:
Towards Useful Anomaly Detection for Back Office Networks. ICISS 2016: 509-520 - [c91]Ömer Yüksel, Jerry den Hartog, Sandro Etalle:
Reading between the fields: practical, effective intrusion detection for industrial control systems. SAC 2016: 2063-2070 - [c90]Elisa Costante, Davide Fauri, Sandro Etalle, Jerry den Hartog, Nicola Zannone:
A Hybrid Framework for Data Loss Prevention and Detection. IEEE Symposium on Security and Privacy Workshops 2016: 324-333 - 2015
- [c89]Eelco Vriezekolk, Sandro Etalle, Roel J. Wieringa:
Validating the Raster Risk Assessment Method in Practice. ISCRAM 2015 - [c88]Eelco Vriezekolk, Sandro Etalle, Roel J. Wieringa:
Experimental Validation of a Risk Assessment Method. REFSQ 2015: 1-16 - 2014
- [j28]Sandro Etalle, Nicola Zannone:
Understanding Computer Security. Frontiers ICT 1: 3 (2014) - [j27]Daniel Trivellato, Nicola Zannone, Sandro Etalle:
GEM: A distributed goal evaluation algorithm for trust management. Theory Pract. Log. Program. 14(3): 293-337 (2014) - [c87]Elisa Costante, Jerry den Hartog, Milan Petkovic, Sandro Etalle, Mykola Pechenizkiy:
Hunting the Unknown - White-Box Database Leakage Detection. DBSec 2014: 243-259 - [c86]Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle:
On Emulation-Based Network Intrusion Detection Systems. RAID 2014: 384-404 - 2013
- [j26]Daniel Trivellato, Nicola Zannone, Maurice Glaundrup, Jacek Skowronek, Sandro Etalle:
A Semantic Security Framework for Systems of Systems. Int. J. Cooperative Inf. Syst. 22(1) (2013) - [j25]Bruno P. S. Rocha, Mauro Conti, Sandro Etalle, Bruno Crispo:
Hybrid Static-Runtime Information Flow and Declassification Enforcement. IEEE Trans. Inf. Forensics Secur. 8(8): 1294-1305 (2013) - [c85]Elisa Costante, Sokratis Vavilis, Sandro Etalle, Jerry den Hartog, Milan Petkovic, Nicola Zannone:
Database Anomalous Activities - Detection and Quantification. SECRYPT 2013: 603-608 - [p3]Daniel Trivellato, Sandro Etalle, Erik Luit, Nicola Zannone:
The POLIPO Security Framework. Situation Awareness with Systems of Systems 2013: 189-208 - 2012
- [j24]Emmanuele Zambon, Sandro Etalle, Roel J. Wieringa:
A2thOS: availability analysis and optimisation in SLAs. Int. J. Netw. Manag. 22(2): 104-130 (2012) - [c84]Dina Hadziosmanovic, Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel:
Challenges and opportunities in securing industrial control systems. COMPENG 2012: 1-6 - [c83]Sandro Etalle, Timothy L. Hinrichs, Adam J. Lee, Daniel Trivellato, Nicola Zannone:
Policy Administration in Tag-Based Authorization. FPS 2012: 162-179 - [c82]Eelco Vriezekolk, Roel J. Wieringa, Sandro Etalle:
Design and initial validation ofthe Rastermethod for telecom service availability risk assessment. ISCRAM 2012 - [c81]Dina Hadziosmanovic, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle:
N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols. RAID 2012: 354-373 - [c80]Mayla Brusò, Konstantinos Chatzikokolakis, Sandro Etalle, Jerry den Hartog:
Linking Unlinkability. TGC 2012: 129-144 - [e9]Gilles Barthe, Anupam Datta, Sandro Etalle:
Formal Aspects of Security and Trust - 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Lecture Notes in Computer Science 7140, Springer 2012, ISBN 978-3-642-29419-8 [contents] - [i15]Daniel Trivellato, Nicola Zannone, Sandro Etalle:
GEM: a Distributed Goal Evaluation Algorithm for Trust Management. CoRR abs/1210.0368 (2012) - 2011
- [j23]Lujo Bauer, Sandro Etalle, Jerry den Hartog, Luca Viganò:
Preface of Special Issue on "Computer Security: Foundations and Automated Reasoning". J. Autom. Reason. 46(3-4): 223-224 (2011) - [j22]Emmanuele Zambon, Sandro Etalle, Roel J. Wieringa, Pieter H. Hartel:
Model-based qualitative risk assessment for availability of IT infrastructures. Softw. Syst. Model. 10(4): 553-580 (2011) - [c79]Andrea Herrmann, Ayse Morali, Sandro Etalle, Roel J. Wieringa:
Risk and Business Goal Based Security Requirement and Countermeasure Prioritization. BIR Workshops 2011: 64-76 - [c78]Daniel Trivellato, Nicola Zannone, Sandro Etalle:
Poster: protecting information in systems of systems. CCS 2011: 865-868 - [c77]Dina Hadziosmanovic, Damiano Bolzoni, Pieter H. Hartel, Sandro Etalle:
MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures. EC2ND 2011: 41-48 - [c76]Eelco Vriezekolk, Roel J. Wieringa, Sandro Etalle:
A new method to assess telecom service availability risks. ISCRAM 2011 - [c75]Damiano Bolzoni, Christiaan Schade, Sandro Etalle:
A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks. LISA 2011 - [c74]Daniel Trivellato, Nicola Zannone, Sandro Etalle:
A Security Framework for Systems of Systems. POLICY 2011: 182-183 - [e8]Pierpaolo Degano, Sandro Etalle, Joshua D. Guttman:
Formal Aspects of Security and Trust - 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers. Lecture Notes in Computer Science 6561, Springer 2011, ISBN 978-3-642-19750-5 [contents] - 2010
- [j21]Klemens Böhm, Sandro Etalle, Jerry den Hartog, Christian Hütter, Slim Trabelsi, Daniel Trivellato, Nicola Zannone:
A Flexible Architecture for Privacy-Aware Trust Management. J. Theor. Appl. Electron. Commer. Res. 5(2): 77-96 (2010) - [c73]Ayse Morali, Emmanuele Zambon, Sandro Etalle, Roel J. Wieringa:
CRAC: Confidentiality risk assessment and IT-infrastructure comparison. CNSM 2010: 322-325 - [c72]Nicola Zannone, Milan Petkovic, Sandro Etalle:
Towards Data Protection Compliance. SECRYPT 2010: 213-216 - [c71]Bruno P. S. Rocha, Sruthi Bandhakavi, Jerry den Hartog, William H. Winsborough, Sandro Etalle:
Towards Static Flow-Based Declassification for Legacy and Untrusted Programs. IEEE Symposium on Security and Privacy 2010: 93-108 - [e7]Sandro Etalle, Alexander Pretschner, Ravi S. Sandhu, Marianne Winslett:
Distributed Usage Control, 06.04. - 09.04.2010. Dagstuhl Seminar Proceedings 10141, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2010 [contents] - [i14]Sandro Etalle, Alexander Pretschner, Ravi S. Sandhu, Marianne Winslett:
10141 Abstracts Collection - Distributed Usage Control. Distributed Usage Control 2010 - [i13]Sandro Etalle, Alexander Pretschner, Ravi S. Sandhu, Marianne Winslett:
10141 Summary - Distributed Usage Control. Distributed Usage Control 2010
2000 – 2009
- 2009
- [j20]Sandro Etalle, William H. Winsborough:
Maintaining control while delegating trust: Integrity constraints in trust management. ACM Trans. Inf. Syst. Secur. 13(1): 5:1-5:27 (2009) - [c70]Daniel Trivellato, Fred Spiessens, Nicola Zannone, Sandro Etalle:
Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control. CSE (3) 2009: 252-258 - [c69]Ayse Morali, Emmanuele Zambon, Siv Hilde Houmb, Karin Sallhammar, Sandro Etalle:
Extended eTVRA vs. security checklist: Experiences in a value-web. ICSE Companion 2009: 130-140 - [c68]Marcin Czenko, Sandro Etalle:
LP with Flexible Grouping and Aggregates Using Modes. LOPSTR 2009: 67-81 - [c67]Daniel Trivellato, Fred Spiessens, Nicola Zannone, Sandro Etalle:
POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy. POLICY 2009: 110-113 - [c66]Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel:
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems. RAID 2009: 1-20 - 2008
- [c65]Ayse Morali, Emmanuele Zambon, Sandro Etalle, Paul L. O. Re:
IT confidentiality risk assessment for an architecture-based approach. BDIM 2008: 31-40 - [c64]Fred Spiessens, Jerry den Hartog, Sandro Etalle:
Know What You Trust. Formal Aspects in Security and Trust 2008: 129-142 - [c63]Marcin Czenko, Jeroen Doumen, Sandro Etalle:
Trust Management in P2P Systems Using Standard TuLiP. IFIPTM 2008: 1-16 - [c62]Damiano Bolzoni, Sandro Etalle:
Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. OTM Conferences (2) 2008: 938-955 - [c61]M. A. C. Dekker, Jason Crampton, Sandro Etalle:
RBAC administration in distributed systems. SACMAT 2008: 93-102 - 2007
- [j19]J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini:
Audit-based compliance control. Int. J. Inf. Sec. 6(2-3): 133-151 (2007) - [j18]Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader:
Timed analysis of security protocols. J. Comput. Secur. 15(6): 619-645 (2007) - [c60]Sandro Etalle, Jerry den Hartog, Stephen Marsh:
Trust and punishment. Autonomics 2007: 5 - [c59]Emmanuele Zambon, Damiano Bolzoni, Sandro Etalle, Marco Salvato:
Model-Based Mitigation of Availability Risks. BDIM 2007: 75-83 - [c58]M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle:
Extended privilege inheritance in RBAC. AsiaCCS 2007: 383-385 - [c57]Marcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough:
An Introduction to the Role Based Trust Management Framework RT. FOSAD 2007: 246-281 - [c56]Marcin Czenko, Sandro Etalle:
Core TuLiP Logic Programming for Trust Management. ICLP 2007: 380-394 - [c55]Damiano Bolzoni, Bruno Crispo, Sandro Etalle:
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. LISA 2007: 141-152 - [c54]Sandro Etalle, William H. Winsborough:
A posteriori compliance control. SACMAT 2007: 11-20 - [c53]M. A. C. Dekker, Sandro Etalle:
Refinement for Administrative Policies. Secure Data Management 2007: 33-46 - [c52]Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin:
The Meaning of Logs. TrustBus 2007: 145-154 - [p2]Marnix Dekker, Sandro Etalle, Jerry den Hartog:
Privacy Policies. Security, Privacy, and Trust in Modern Data Management 2007: 383-397 - [e6]Sandro Etalle, Stephen Marsh:
Trust Management - Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30- August 2, 2007, Moncton, New Brunswick, Canada. IFIP 238, Springer 2007, ISBN 978-0-387-73654-9 [contents] - [e5]Sandro Etalle, Pierangela Samarati:
Proceedings of the Second International Workshop on Security and Trust Management, STM 2006, Hamburg, Germany, September 20-21, 2006. Electronic Notes in Theoretical Computer Science 179, Elsevier 2007 [contents] - 2006
- [j17]Cheun Ngen Chong, Ricardo Corin, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Yee Wei Law, Andrew Tokmakoff:
LicenseScript: a logical language for digital rights management. Ann. des Télécommunications 61(3-4): 284-331 (2006) - [j16]Giorgio Delzanno, Sandro Etalle, Maurizio Gabbrielli:
Introduction to the Special Issue on Specification Analysis and Verification of Reactive Systems. Theory Pract. Log. Program. 6(3): 225-226 (2006) - [c51]Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, Emmanuele Zambon:
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System. IWIA 2006: 144-156 - [c50]Ricardo Corin, Sandro Etalle, Ari Saptawijaya:
A Logic for Constraint-based Security Protocol Analysis. S&P 2006: 155-168 - [c49]Sandro Etalle, Pierangela Samarati:
Preface. STM 2006: 1-2 - [c48]M. A. C. Dekker, Sandro Etalle:
Audit-Based Access Control for Electronic Health Records. VODCA@FOSAD 2006: 221-236 - [e4]Sandro Etalle, Miroslaw Truszczynski:
Logic Programming, 22nd International Conference, ICLP 2006, Seattle, WA, USA, August 17-20, 2006, Proceedings. Lecture Notes in Computer Science 4079, Springer 2006, ISBN 3-540-36635-0 [contents] - [i12]Damiano Bolzoni, Sandro Etalle:
APHRODITE: an Anomaly-based Architecture for False Positive Reduction. CoRR abs/cs/0604026 (2006) - 2005
- [c47]Ricardo Corin, Gaetano Di Caprio, Sandro Etalle, Stefania Gnesi, Gabriele Lenzini, Corrado Moiso:
A Formal Security Analysis of an OSA/Parlay Authentication Interface. FMOODS 2005: 131-146 - [c46]Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, Rieks Joosten, Geert Kleinhuis:
Service Brokerage in Prolog. ICEIS (3) 2005: 409-412 - [c45]Ricardo Corin, Ari Saptawijaya, Sandro Etalle:
PS-LTL for Constraint-Based Security Protocol Analysis. ICLP 2005: 439-440 - [c44]J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog:
An Audit Logic for Accountability. POLICY 2005: 34-43 - [c43]Sandro Etalle, William H. Winsborough:
Integrity constraints in trust management. SACMAT 2005: 1-10 - [c42]Jieyin Cheng, Cheun Ngen Chong, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus:
StreamTo: Streaming Content using a Tamper-Resistant Token. SEC 2005: 601-612 - [c41]Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications. STM 2005: 113-130 - [e3]Sandro Etalle, Supratik Mukhopadhyay, Abhik Roychoudhury:
Proceedings of the International Workshop on Software Verification and Validation, SVV@ICLP 2003, Mumbai, India, December 14, 2003. Electronic Notes in Theoretical Computer Science 118, Elsevier 2005 [contents] - [e2]Sandro Etalle:
Logic Based Program Synthesis and Transformation, 14th International Symposium, LOPSTR 2004, Verona, Italy, August 26-28, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3573, Springer 2005, ISBN 3-540-26655-0 [contents] - [i11]J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog:
An Audit Logic for Accountability. CoRR abs/cs/0502091 (2005) - [i10]Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader:
Timed Analysis of Security Protocols. CoRR abs/cs/0503036 (2005) - [i9]Sandro Etalle, William H. Winsborough:
Integrity Constraints in Trust Management. CoRR abs/cs/0503061 (2005) - [i8]Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Jerry den Hartog:
Nonmonotonic Trust Management for P2P Applications. CoRR abs/cs/0510061 (2005) - [i7]Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle, Pieter H. Hartel:
Poseidon: a 2-tier Anomaly-based Intrusion Detection System. CoRR abs/cs/0511043 (2005) - 2004
- [j15]Annalisa Bossi, Sandro Etalle, Sabina Rossi, Jan-Georg Smaus:
Termination of simply moded logic programs with dynamic scheduling. ACM Trans. Comput. Log. 5(3): 470-507 (2004) - [c40]Pieter H. Hartel, Pascal van Eck, Sandro Etalle, Roel J. Wieringa:
Modelling Mobility Aspects of Security Policies. CASSIS 2004: 172-191 - [c39]Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader:
Timed model checking of security protocols. FMSE 2004: 23-32 - [c38]Ricardo Corin, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini, I. Staicu:
A Logic for Auditing Accountability in Decentralized Systems. Formal Aspects in Security and Trust 2004: 187-201 - [c37]Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin:
License Protection with a Tamper-Resistant Token. WISA 2004: 223-237 - [c36]Ricardo Corin, Jeroen Doumen, Sandro Etalle:
Analysing Password Protocol Security Against Off-line Dictionary Attacks. WISP@ICATPN 2004: 47-63 - [p1]Annalisa Bossi, Nicoletta Cocco, Sandro Etalle, Sabina Rossi:
Declarative Semantics of Input Consuming Logic Programs. Program Development in Computational Logic 2004: 90-114 - [i6]Ricardo Corin, Antonio Durante, Sandro Etalle, Pieter H. Hartel:
A Trace Logic for Local Security Properties. CoRR cs.CR/0411010 (2004) - 2003
- [c35]Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel, Yee Wei Law:
Approximating Fair Use in LicenseScript. ICADL 2003: 432-443 - [c34]Roberto Di Pietro, Luigi V. Mancini, Yee Wei Law, Sandro Etalle, Paul J. M. Havinga:
LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. ICPP Workshops 2003: 397- - [c33]Yee Wei Law, Ricardo Corin, Sandro Etalle, Pieter H. Hartel:
A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. PWC 2003: 27-39 - [c32]Paul J. M. Havinga, Sandro Etalle, Holger Karl, Chiara Petrioli, Michele Zorzi, Harry Kip, Thomas Lentsch:
EYES - Energy Efficient Sensor Networks. PWC 2003: 198-201 - [c31]Cheun Ngen Chong, Sandro Etalle, Pieter H. Hartel:
Comparing Logic-Based and XML-Based Rights Expression Languages. OTM Workshops 2003: 779-792 - [c30]Yee Wei Law, Sandro Etalle, Pieter H. Hartel:
Assessing Security in Energy-Efficient Sensor Networks. SEC 2003: 459-463 - [c29]Cheun Ngen Chong, Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Willem Jonker, Yee Wei Law:
LicenseScript: a novel digital rights language and its semantics. WEDELMUSIC 2003: 122-129 - [c28]Sandro Etalle, Supratik Mukhopadhyay, Abhik Roychoudhury:
Preface. SVV@ICLP 2003: 1- - [c27]Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Antonio Durante:
A Trace Logic for Local Security Properties. SVV@ICLP 2003: 129-143 - 2002
- [j14]Annalisa Bossi, Sandro Etalle, Sabina Rossi:
Properties of input-consuming derivations. Theory Pract. Log. Program. 2(2): 125-154 (2002) - [j13]Annalisa Bossi, Nicoletta Cocco, Sandro Etalle, Sabina Rossi:
On modular termination proofs of general logic programs. Theory Pract. Log. Program. 2(3): 263-291 (2002) - [c26]Annalisa Bossi, Nicoletta Cocco, Sandro Etalle:
Transformation Systems and Nondeclarative Properties. Computational Logic: Logic Programming and Beyond 2002: 162-186 - [c25]Ricardo Corin, Sandro Etalle:
An Improved Constraint-Based System for the Verification of Security Protocols. SAS 2002: 326-341 - 2001
- [j12]Sandro Etalle, Maurizio Gabbrielli, Maria Chiara Meo:
Transformations of CCP programs. ACM Trans. Program. Lang. Syst. 23(3): 304-395 (2001) - [c24]Annalisa Bossi, Sandro Etalle, Sabina Rossi, Jan-Georg Smaus:
Semantics and Termination of Simply-Moded Logic Programs with Dynamic Scheduling. ESOP 2001: 402-416 - [c23]Giorgio Delzanno, Sandro Etalle:
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols. LOPSTR 2001: 76-90 - [i5]Annalisa Bossi, Sandro Etalle, Sabina Rossi, Jan-Georg Smaus:
Semantics and Termination of Simply-Moded Logic Programs with Dynamic Scheduling. CoRR cs.LO/0101022 (2001) - [i4]Annalisa Bossi, Sandro Etalle, Sabina Rossi:
Properties of Input-Consuming Derivations. CoRR cs.PL/0101023 (2001) - [i3]Sandro Etalle, Maurizio Gabbrielli, Maria Chiara Meo:
Transformations of CCP programs. CoRR cs.PL/0107014 (2001) - 2000
- [j11]Annalisa Bossi, Sandro Etalle, Sabina Rossi:
Semantics of well-moded input-consuming logic programs. Comput. Lang. 26(1): 1-25 (2000) - [c22]Annalisa Bossi, Sandro Etalle, Sabina Rossi:
Semantics of Input-Consuming Logic Programs. Computational Logic 2000: 194-208 - [c21]Sandro Etalle, Jon Mountjoy:
The lazy functional side of logic programming. LOPSTR 2000 - [i2]Annalisa Bossi, Nicoletta Cocco, Sandro Etalle, Sabina Rossi:
On Modular Termination Proofs of General Logic Programs. CoRR cs.LO/0005018 (2000) - [i1]Sandro Etalle, Jon Mountjoy:
The (Lazy) Functional Side of Logic Programming. CoRR cs.PL/0003070 (2000)
1990 – 1999
- 1999
- [j10]Sandro Etalle, Annalisa Bossi, Nicoletta Cocco:
Termination of Well-Moded Programs. J. Log. Program. 38(2): 243-257 (1999) - [j9]Sandro Etalle, Maurizio Gabbrielli:
Layered Modes. J. Log. Program. 39(1-3): 225-244 (1999) - [j8]Sandro Etalle, Pieter H. Hartel, Willem G. Vree:
Declarative solutions to partitioned-grid problems. Softw. Pract. Exp. 29(13): 1173-1200 (1999) - [c20]Marco Bertolino, Sandro Etalle, Catuscia Palamidessi:
The Replacement Operation for CCP Programs. APPIA-GULP-PRODE 1999: 441-454 - [c19]Sandro Etalle, Femke van Raamsdonk:
Logic Programming with Requests. ICLP 1999: 558-572 - [c18]Annalisa Bossi, Nicoletta Cocco, Sandro Etalle:
Transformation of Left Terminating Programs. LOPSTR 1999: 156-175 - [c17]Marco Bertolino, Sandro Etalle, Catuscia Palamidessi:
The Replacement Operation for CCP Programs. LOPSTR 1999: 216-233 - [c16]Annalisa Bossi, Sandro Etalle, Sabina Rossi:
Properties of Input-Consuming Derivations. Verification of Logic Programs@ICLP 1999: 102-124 - [c15]Sandro Etalle, Jan-Georg Smaus:
Preface - Workshop on Verification of Logic Programs. Verification of Logic Programs@ICLP 1999: 125 - [e1]Sandro Etalle, Jan-Georg Smaus:
Workshop on Verification of Logic Programs 1999, in connection with the International Conference on Logic Programming, ICLP 1999, Las Cruces, New Mexico, USA, December 1, 1999. Electronic Notes in Theoretical Computer Science 30(1), Elsevier 1999 [contents] - 1998
- [j7]Sandro Etalle, Maurizio Gabbrielli:
Partial Evaluation of Concurrent Constraint Languages. ACM Comput. Surv. 30(3es): 11 (1998) - [j6]Sandro Etalle:
A Semantics for Modular General Logic Programs. Theor. Comput. Sci. 206(1-2): 51-80 (1998) - [c14]Sandro Etalle, Maurizio Gabbrielli, Maria Chiara Meo:
Unfold/Fold Transformations of CCP Programs. CONCUR 1998: 348-365 - [c13]Sandro Etalle, Femke van Raamsdonk:
Beyond Success and Failure. IJCSLP 1998: 190-205 - 1997
- [c12]Sandro Etalle, Maurizio Gabbrielli, Elena Marchiori:
A Transformation System for CLP with Dynamic Scheduling and CCP. PEPM 1997: 137-150 - 1996
- [j5]Sandro Etalle, Maurizio Gabbrielli:
On the Correctness of the Replacement Operation for CLP Modules. J. Funct. Log. Program. 1996(1) (1996) - [j4]Sandro Etalle:
Unification-free Prolog programs revisited. J. Program. Lang. 4(4): 187-210 (1996) - [j3]Annalisa Bossi, Nicoletta Cocco, Sandro Etalle:
Simultaneous Replacement in Normal Programs. J. Log. Comput. 6(1): 79-120 (1996) - [j2]Sandro Etalle, Maurizio Gabbrielli:
Transformations of CLP Modules. Theor. Comput. Sci. 166(1&2): 101-146 (1996) - [c11]Sandro Etalle, Maurizio Gabbrielli:
Layered Modes. APPIA-GULP-PRODE 1996: 41-52 - [c10]Sandro Etalle, Frank Teusink:
A Compositional Semantics for Normal Open Programs. JICSLP 1996: 468-482 - 1995
- [c9]Sandro Etalle, Maurizio Gabbrielli:
A Transformation System for Modular CLP Programs. ICLP 1995: 681-695 - [c8]Annalisa Bossi, Nicoletta Cocco, Sandro Etalle:
Transformation of Left Terminating Programs: the Reordering Problem. LOPSTR 1995: 33-45 - [c7]Sandro Etalle, Maurizio Gabbrielli:
The Replacement Operation for CLP Modules. PEPM 1995: 168-177 - 1994
- [j1]Annalisa Bossi, Sandro Etalle:
Transforming Acyclic Programs. ACM Trans. Program. Lang. Syst. 16(4): 1081-1096 (1994) - [c6]Sandro Etalle, Maurizio Gabbrielli:
Modular Transformations of CLP Programs. GULP-PRODE (1) 1994: 218-233 - [c5]Annalisa Bossi, Sandro Etalle:
More on Unfold/Fold Transformations of Normal Programs: Preservation of Fitting's Semantics. META 1994: 311-331 - [c4]Sandro Etalle, Maurizio Gabbrielli:
Modular Transformations of CLP Programs. ILPS Workshop: Constraints and Databases 1994 - 1993
- [c3]Krzysztof R. Apt, Sandro Etalle:
On the Unification Free Prolog Programs. MFCS 1993: 1-19 - 1992
- [c2]Annalisa Bossi, Nicoletta Cocco, Sandro Etalle:
Transforming Normal Programs by Replacement. META 1992: 265-279 - [c1]Annalisa Bossi, Nicoletta Cocco, Sandro Etalle:
On Safe Folding. PLILP 1992: 172-186
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint