default search action
Luca Viganò 0001
Person information
- affiliation: King's College London, UK
Other persons with the same name
- Luca Viganò 0002 — EU Engergy, Concorezzo, Italy
- Luca Viganò 0003 — Politecnico di Milano, Italy
- Luca Viganò 0004 — University of Milan, Department of Oncology and Hemato-Oncology, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]Luca Viganò:
The cybersecurity of fairy tales. J. Cybersecur. 10(1) (2024) - [c95]Francesco Greco, Giuseppe Desolda, Luca Viganò:
Supporting the Design of Phishing Education, Training and Awareness interventions: an LLM-based approach. CSE4IA@AVI 2024 - [c94]Laouen Fernet, Sebastian Mödersheim, Luca Viganò:
A Decision Procedure for Alpha-Beta Privacy for a Bounded Number of Transitions. CSF 2024: 17-32 - [c93]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta, Luca Viganò:
A Logic for Policy Based Resource Exchanges in Multiagent Systems. ECAI 2024: 1405-1412 - [i30]Ioana Sandu, Rita Borgo, Prokar Dasgupta, Ramesh Thurairaja, Luca Viganò:
A Formal Approach For Modelling And Analysing Surgical Procedures (Extended Version). CoRR abs/2408.05001 (2024) - [i29]Lorenzo Ceragioli, Pierpaolo Degano, Letterio Galletta, Luca Viganò:
A Logic for Policy Based Resource Exchanges in Multiagent Systems. CoRR abs/2408.09516 (2024) - 2023
- [j48]Diego Sempreboni, Luca Viganò:
A mutation-based approach for the formal and automated analysis of security ceremonies. J. Comput. Secur. 31(4): 293-364 (2023) - [c92]Luca Viganò:
Cybersecurity, Nicolas Cage and Peppa Pig. ICISSP 2023: 7 - [c91]Andrew Cook, Luca Viganò:
Formal Analysis of Security Protocols with Movement. ITASEC 2023 - 2022
- [j47]Paul Lukowicz, Anton Nijholt, Kaleem Siddiqi, Marcello Pelillo, Kristof Van Laerhoven, Luca Viganò, Nicola Zannone:
Editorial: 2021 editors' pick: Computer science. Frontiers Comput. Sci. 4 (2022) - [j46]Thomas Groß, Luca Viganò:
Special issue on socio-technical aspects in security - editorial. J. Comput. Secur. 30(3): 325-326 (2022) - [c90]Luca Viganò:
Formal Methods for Socio-technical Security - (Formal and Automated Analysis of Security Ceremonies). COORDINATION 2022: 3-14 - [c89]Sébastien Gondron, Sebastian Mödersheim, Luca Viganò:
Privacy as Reachability. CSF 2022: 130-146 - [c88]Luca Viganò:
Don't Tell Me The Cybersecurity Moon Is Shining... (Cybersecurity Show and Tell). SECRYPT 2022: 7 - [e8]Simon E. Parkin, Luca Viganò:
Socio-Technical Aspects in Security - 11th International Workshop, STAST 2021, Virtual Event, October 8, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13176, Springer 2022, ISBN 978-3-031-10182-3 [contents] - [i28]Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, Luca Viganò:
Automatic Fair Exchanges. CoRR abs/2207.12326 (2022) - 2021
- [j45]Matteo Zavatteri, Carlo Combi, Romeo Rizzi, Luca Viganò:
Consistency checking of STNs with decisions: Managing temporal and access-control constraints in a seamless way. Inf. Comput. 280: 104637 (2021) - [j44]João Rasga, Cristina Sernadas, Erisa Karafili, Luca Viganò:
Time-stamped claim logic. Log. J. IGPL 29(3): 303-332 (2021) - [j43]Jaime Ramos, João Rasga, Cristina Sernadas, Luca Viganò:
Event-Based Time-Stamped Claim Logic. J. Log. Algebraic Methods Program. 121: 100684 (2021) - [j42]Matteo Zavatteri, Carlo Combi, Luca Viganò:
Resource Controllability of Business Processes Under Conditional Uncertainty. J. Data Semant. 10(1-2): 19-39 (2021) - [c87]Luca Viganò:
Nicolas Cage is the Center of the Cybersecurity Universe. INTERACT (1) 2021: 14-33 - [e7]Thomas Groß, Luca Viganò:
Socio-Technical Aspects in Security and Trust - 10th International Workshop, STAST 2020, Virtual Event, September 14, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12812, Springer 2021, ISBN 978-3-030-79317-3 [contents] - [i27]Luca Viganò:
Don't Tell Me The Cybersecurity Moon Is Shining... (Cybersecurity Show And Tell). CoRR abs/2103.11030 (2021) - 2020
- [j41]Federico De Meo, Luca Viganò:
A formal and automated approach to exploiting multi-stage attacks of web applications. J. Comput. Secur. 28(5): 525-576 (2020) - [j40]Ruggero Lanotte, Massimo Merro, Andrei Munteanu, Luca Viganò:
A Formal Approach to Physics-based Attacks in Cyber-physical Systems. ACM Trans. Priv. Secur. 23(1): 3:1-3:41 (2020) - [j39]Giada Sciarretta, Roberto Carbone, Silvio Ranise, Luca Viganò:
Formal Analysis of Mobile Multi-Factor Authentication with Single Sign-On Login. ACM Trans. Priv. Secur. 23(3): 13:1-13:37 (2020) - [c86]Diego Sempreboni, Luca Viganò:
X-Men: A Mutation-Based Approach for the Formal Analysis of Security Ceremonies. EuroS&P 2020: 87-104 - [c85]Andrew Cook, Luca Viganò:
A Game Of Drones: Extending the Dolev-Yao Attacker Model With Movement. EuroS&P Workshops 2020: 280-292 - [c84]Luca Viganò, Daniele Magazzeni:
Explainable Security. EuroS&P Workshops 2020: 293-300 - [c83]Diego Sempreboni, Luca Viganò:
Privacy, Security and Trust in the Internet of Neurons. STAST 2020: 191-205
2010 – 2019
- 2019
- [j38]Matteo Cristani, Francesco Olivieri, Claudio Tomazzoli, Luca Viganò, Margherita Zorzi:
Diagnostics as a Reasoning Process: From Logic Structure to Software Design. J. Comput. Inf. Technol. 27(1): 43-57 (2019) - [j37]Carlo Combi, Roberto Posenato, Luca Viganò, Matteo Zavatteri:
Conditional Simple Temporal Networks with Uncertainty and Resources. J. Artif. Intell. Res. 64: 931-985 (2019) - [j36]Matteo Zavatteri, Luca Viganò:
Last man standing: Static, decremental and dynamic resiliency via controller synthesis. J. Comput. Secur. 27(3): 343-373 (2019) - [j35]Matteo Zavatteri, Luca Viganò:
Conditional simple temporal networks with uncertainty and decisions. Theor. Comput. Sci. 797: 77-101 (2019) - [j34]Sebastian Mödersheim, Luca Viganò:
Alpha-Beta Privacy. ACM Trans. Priv. Secur. 22(1): 7:1-7:35 (2019) - [c82]Matteo Zavatteri, Carlo Combi, Luca Viganò:
Resource Controllability of Workflows Under Conditional Uncertainty. Business Process Management Workshops 2019: 68-80 - [c81]Giampaolo Bella, Karen Renaud, Diego Sempreboni, Luca Viganò:
An Investigation into the "Beautification" of Security Ceremonies. ICETE (2) 2019: 125-136 - [c80]Diego Sempreboni, Giampaolo Bella, Rosario Giustolisi, Luca Viganò:
What Are the Threats? (Charting the Threat Models of Security Ceremonies). ICETE (2) 2019: 161-172 - [c79]Matteo Zavatteri, Carlo Combi, Romeo Rizzi, Luca Viganò:
Hybrid SAT-Based Consistency Checking Algorithms for Simple Temporal Networks with Decisions. TIME 2019: 16:1-16:17 - [i26]Matteo Cristani, Francesco Domenichini, Claudio Tomazzoli, Luca Viganò, Margherita Zorzi:
It could be worse, it could be raining: reliable automatic meteorological forecasting. CoRR abs/1901.09867 (2019) - [i25]Ruggero Lanotte, Massimo Merro, Andrei Munteanu, Luca Viganò:
A Formal Approach to Physics-Based Attacks in Cyber-Physical Systems (Extended Version). CoRR abs/1902.04572 (2019) - [i24]Luca Viganò:
Explaining Cybersecurity with Films and the Arts (Extended Abstract). CoRR abs/1905.01730 (2019) - [i23]João Rasga, Cristina Sernadas, Erisa Karafili, Luca Viganò:
Time-Stamped Claim Logic. CoRR abs/1907.06541 (2019) - 2018
- [j33]Silvio Ranise, Anh Tuan Truong, Luca Viganò:
Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies. J. Comput. Secur. 26(4): 423-458 (2018) - [j32]Michele Peroli, Federico De Meo, Luca Viganò, Davide Guardini:
MobSTer: A model-based security testing framework for web applications. Softw. Test. Verification Reliab. 28(8) (2018) - [c78]Erisa Karafili, Matteo Cristani, Luca Viganò:
A Formal Approach to Analyzing Cyber-Forensics Evidence. ESORICS (1) 2018: 281-301 - [c77]Matteo Zavatteri, Luca Viganò:
Constraint Networks Under Conditional Uncertainty. ICAART (2) 2018: 41-52 - [c76]Matteo Zavatteri, Luca Viganò:
Conditional Uncertainty in Constraint Networks. ICAART (Revised Selected Papers) 2018: 130-160 - [c75]Giada Sciarretta, Roberto Carbone, Silvio Ranise, Luca Viganò:
Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience. POST 2018: 188-213 - [c74]Luca Viganò, Diego Sempreboni:
Gnirut: The Trouble With Being Born Human In An Autonomous World. WWW (Companion Volume) 2018: 1567-1571 - [c73]Diego Sempreboni, Luca Viganò:
MMM: May I Mine Your Mind. WWW (Companion Volume) 2018: 1573-1576 - [i22]Erisa Karafili, Matteo Cristani, Luca Viganò:
A Formal Approach to Analyzing Cyber-Forensics Evidence. CoRR abs/1804.09970 (2018) - [i21]Luca Viganò, Daniele Magazzeni:
Explainable Security. CoRR abs/1807.04178 (2018) - [i20]Diego Sempreboni, Luca Viganò:
Privacy, Security and Trust in the Internet of Neurons. CoRR abs/1807.06077 (2018) - [i19]Luca Viganò, Diego Sempreboni:
Gnirut: The Trouble With Being Born Human In An Autonomous World. CoRR abs/1807.06078 (2018) - [i18]Diego Sempreboni, Luca Viganò:
MMM: May I Mine Your Mind? CoRR abs/1812.05388 (2018) - [i17]Diego Sempreboni, Luca Viganò:
Smart Humans... WannaDie? CoRR abs/1812.05834 (2018) - [i16]Luca Viganò, Diego Sempreboni:
Schrödinger's Man. CoRR abs/1812.05839 (2018) - 2017
- [j31]Luca Viganò, Marco Volpe, Margherita Zorzi:
A branching distributed temporal logic for reasoning about entanglement-free quantum state transformations. Inf. Comput. 255: 311-333 (2017) - [j30]Marco Rocchetto, Luca Viganò, Marco Volpe:
An interpolation-based method for the verification of security protocols. J. Comput. Secur. 25(6): 463-510 (2017) - [j29]Carlos Caleiro, Luca Viganò:
Compositional Meaning in Logic. Logica Universalis 11(3): 283-295 (2017) - [c72]Matteo Zavatteri, Carlo Combi, Roberto Posenato, Luca Viganò:
Weak, Strong and Dynamic Controllability of Access-Controlled Workflows Under Conditional Uncertainty. BPM 2017: 235-251 - [c71]Ruggero Lanotte, Massimo Merro, Riccardo Muradore, Luca Viganò:
A Formal Approach to Cyber-Physical Attacks. CSF 2017: 436-450 - [c70]Federico De Meo, Luca Viganò:
A Formal Approach to Exploiting Multi-stage Attacks Based on File-System Vulnerabilities of Web Applications. ESSoS 2017: 196-212 - [c69]Carlo Combi, Roberto Posenato, Luca Viganò, Matteo Zavatteri:
Access Controlled Temporal Networks. ICAART (2) 2017: 118-131 - [i15]Federico De Meo, Luca Viganò:
A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version). CoRR abs/1705.03658 (2017) - 2016
- [c68]Carlo Combi, Luca Viganò, Matteo Zavatteri:
Security Constraints in Temporal Role-Based Access-Controlled Workflows. CODASPY 2016: 207-218 - [c67]Katia Santacà, Matteo Cristani, Marco Rocchetto, Luca Viganò:
A Topological Categorization of Agents for the Definition of Attack States in Multi-agent Systems. EUMAS/AT 2016: 261-276 - [c66]Alberto Calvi, Luca Viganò:
An automated approach for testing the security of web applications against chained attacks. SAC 2016: 2095-2102 - [c65]Giampaolo Bella, Bruce Christianson, Luca Viganò:
Invisible Security. Security Protocols Workshop 2016: 1-9 - [c64]Federico De Meo, Marco Rocchetto, Luca Viganò:
Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection. STM 2016: 179-195 - [e6]Frank Piessens, Luca Viganò:
Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings. Lecture Notes in Computer Science 9635, Springer 2016, ISBN 978-3-662-49634-3 [contents] - [i14]Federico De Meo, Marco Rocchetto, Luca Viganò:
Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection (Extended Version). CoRR abs/1605.00358 (2016) - [i13]Ruggero Lanotte, Massimo Merro, Riccardo Muradore, Luca Viganò:
A Formal Approach to Cyber-Physical Attacks. CoRR abs/1611.01377 (2016) - 2015
- [j28]Maria-Camilla Fiazza, Michele Peroli, Luca Viganò:
Defending Vulnerable Security Protocols by Means of Attack Interference in Non-Collaborative Scenarios. Frontiers ICT 2: 11 (2015) - [j27]Luca Spalazzi, Luca Viganò:
Special issue on security and high performance computing systems. J. Comput. Secur. 23(5): 539-540 (2015) - [c63]Omar Almousa, Sebastian Mödersheim, Luca Viganò:
Alice and Bob: Reconciling Formal Models and Implementation. Programming Languages with Applications to Biology and Security 2015: 66-85 - [c62]Omar Almousa, Sebastian Mödersheim, Paolo Modesti, Luca Viganò:
Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment. ESORICS (2) 2015: 209-229 - [c61]Silvio Ranise, Anh Tuan Truong, Luca Viganò:
Automated analysis of RBAC policies with temporal constraints and static role hierarchies. SAC 2015: 2177-2184 - [c60]Giampaolo Bella, Luca Viganò:
Security is Beautiful. Security Protocols Workshop 2015: 247-250 - [c59]Luca Viganò:
Security is Beautiful (Transcript of Discussion). Security Protocols Workshop 2015: 251-260 - [e5]Cédric Fournet, Michael W. Hicks, Luca Viganò:
IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7538-2 [contents] - [i12]Carlo Combi, Luca Viganò, Matteo Zavatteri:
Security Constraints in Temporal Role-Based Access-Controlled Workflows (Extended Version). CoRR abs/1512.06404 (2015) - 2014
- [j26]Matteo Cristani, Erisa Karafili, Luca Viganò:
Tableau systems for reasoning about risk. J. Ambient Intell. Humaniz. Comput. 5(2): 215-247 (2014) - [j25]Pedro Adão, Paulo Mateus, Luca Viganò:
Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete. Theor. Comput. Sci. 538: 2-15 (2014) - [c58]Sebastian Mödersheim, Luca Viganò:
Sufficient conditions for vertical composition of security protocols. AsiaCCS 2014: 435-446 - [c57]Michele Peroli, Luca Viganò, Matteo Zavatteri:
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version). Security Protocols Workshop 2014: 69-90 - [c56]Luca Viganò:
Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion). Security Protocols Workshop 2014: 91-99 - [c55]Luca Viganò, Marco Volpe, Margherita Zorzi:
Quantum State Transformations and Branching Distributed Temporal Logic - (Invited Paper). WoLLIC 2014: 1-19 - [i11]Michele Peroli, Luca Viganò, Matteo Zavatteri:
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version). CoRR abs/1405.6912 (2014) - 2013
- [j24]Carlos Caleiro, Luca Viganò, Marco Volpe:
On the Mosaic Method for Many-Dimensional Modal Logics: A Case Study Combining Tense and Modal Operators. Logica Universalis 7(1): 33-69 (2013) - [c54]Matteo Cristani, Erisa Karafili, Luca Viganò:
A complete tableau procedure for risk analysis. CRiSIS 2013: 1-8 - [c53]Luca Viganò:
The SPaCIoS Project: Secure Provision and Consumption in the Internet of Services. ICST 2013: 497-498 - [c52]Sebastian Mödersheim, Thomas Groß, Luca Viganò:
Defining Privacy Is Supposed to Be Easy. LPAR 2013: 619-635 - [c51]Marco Rocchetto, Luca Viganò, Marco Volpe, Giacomo Dalle Vedove:
Using Interpolation for the Verification of Security Protocols. STM 2013: 99-114 - [c50]Carlos Caleiro, Luca Viganò, Marco Volpe:
A Labeled Deduction System for the Logic UB. TIME 2013: 45-53 - [e4]Margus Veanes, Luca Viganò:
Tests and Proofs - 7th International Conference, TAP@STAF 2013, Budapest, Hungary, June 16-20, 2013. Proceedings. Lecture Notes in Computer Science 7942, Springer 2013, ISBN 978-3-642-38915-3 [contents] - 2012
- [c49]Matteo Cristani, Erisa Karafili, Luca Viganò:
Towards a Logical Framework for Reasoning about Risk. CD-ARES 2012: 609-623 - [c48]Maria-Camilla Fiazza, Michele Peroli, Luca Viganò:
An environmental paradigm for defending security protocols. CTS 2012: 427-438 - [c47]Luca Viganò:
Automated validation of trust and security of service-oriented architectures with the AVANTSSAR platform. HPCS 2012: 444-447 - [c46]Michele Barletta, Silvio Ranise, Luca Viganò:
Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities. STM 2012: 49-64 - [c45]Alessandro Armando, Wihem Arsac, Tigran Avanesov, Michele Barletta, Alberto Calvi, Alessandro Cappai, Roberto Carbone, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Gabriel Erzse, Simone Frau, Marius Minea, Sebastian Mödersheim, David von Oheimb, Giancarlo Pellegrino, Serena Elisa Ponta, Marco Rocchetto, Michaël Rusinowitch, Mohammad Torabi Dashti, Mathieu Turuani, Luca Viganò:
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures. TACAS 2012: 267-282 - [c44]Luca Viganò:
Towards the Secure Provision and Consumption in the Internet of Services. TrustBus 2012: 214-215 - [i10]Michele Barletta, Silvio Ranise, Luca Viganò:
Automated Analysis of Scenario-based Specifications of Distributed Access Control Policies with Non-Mechanizable Activities (Extended Version). CoRR abs/1206.3180 (2012) - 2011
- [j23]Lujo Bauer, Sandro Etalle, Jerry den Hartog, Luca Viganò:
Preface of Special Issue on "Computer Security: Foundations and Automated Reasoning". J. Autom. Reason. 46(3-4): 223-224 (2011) - [j22]Andrea Masini, Luca Viganò, Marco Volpe:
Labelled natural deduction for a bundled branching temporal logic. J. Log. Comput. 21(6): 1093-1163 (2011) - [j21]Andrea Masini, Luca Viganò, Margherita Zorzi:
Modal Deduction Systems for Quantum State Transformations. J. Multiple Valued Log. Soft Comput. 17(5-6): 475-519 (2011) - [j20]Michele Barletta, Alberto Calvi, Silvio Ranise, Luca Viganò, Luca Zanetti:
Workflow and Access Control Reloaded: a Declarative Specification Framework for the Automated Analysis of Web Services. Scalable Comput. Pract. Exp. 12(1) (2011) - [j19]Michele Barletta, Silvio Ranise, Luca Viganò:
A declarative two-level framework to specify and verify workflow and authorization policies in service-oriented architectures. Serv. Oriented Comput. Appl. 5(2): 105-137 (2011) - [j18]David A. Basin, Carlos Caleiro, Jaime Ramos, Luca Viganò:
Distributed temporal logic for the analysis of security protocol models. Theor. Comput. Sci. 412(31): 4007-4043 (2011) - [c43]Maria-Camilla Fiazza, Michele Peroli, Luca Viganò:
Security protocols as environments: A lesson from non-collaboration. CollaborateCom 2011: 479-486 - [c42]Simone Marchesini, Luca Viganò:
A Hierarchy of Knowledge for the Formal Analysis of Security-Sensitive Business Processes. CRiSIS 2011: 78-87 - [c41]Roberto Carbone, Marius Minea, Sebastian Mödersheim, Serena Elisa Ponta, Mathieu Turuani, Luca Viganò:
Towards Formal Validation of Trust and Security in the Internet of Services. Future Internet Assembly 2011: 193-208 - [c40]Matteo Cristani, Erisa Karafili, Luca Viganò:
Blocking Underhand Attacks by Hidden Coalitions. ICAART (2) 2011: 311-320 - [c39]Maria-Camilla Fiazza, Michele Peroli, Luca Viganò:
Attack Interference: A Path to Defending Security Protocols. ICETE (Selected Papers) 2011: 296-314 - [c38]Maria-Camilla Fiazza, Michele Peroli, Luca Viganò:
Attack Interference in Non-collaborative Scenarios for Security Protocol Analysis. SECRYPT 2011: 144-156 - [i9]Elisa Burato, Matteo Cristani, Luca Viganò:
Meaning Negotiation as Inference. CoRR abs/1101.4356 (2011) - [i8]Maria-Camilla Fiazza, Michele Peroli, Luca Viganò:
Attack Interference in Non-Collaborative Scenarios for Security Protocol Analysis [Extended Version]. CoRR abs/1106.3746 (2011) - 2010
- [j17]Andrea Masini, Luca Viganò, Marco Volpe:
Back from the future. J. Appl. Non Class. Logics 20(3): 241-277 (2010) - [j16]Sebastian Mödersheim, Luca Viganò, David A. Basin:
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols. J. Comput. Secur. 18(4): 575-618 (2010) - [c37]Elisa Burato, Matteo Cristani, Luca Viganò:
A Deduction System for Meaning Negotiation. DALT 2010: 78-95 - [c36]Davide Benetti, Massimo Merro, Luca Viganò:
Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA. SEFM 2010: 191-202 - [c35]Michele Barletta, Alberto Calvi, Silvio Ranise, Luca Viganò, Luca Zanetti:
WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications. SYNASC 2010: 417-424 - [c34]Alberto Calvi, Silvio Ranise, Luca Viganò:
Automated Validation of Security-Sensitive Web Services Specified in BPEL and RBAC. SYNASC 2010: 456-464 - [i7]Alberto Calvi, Silvio Ranise, Luca Viganò:
Automated Validation of Security-sensitive Web Services specified in BPEL and RBAC (Extended Version). CoRR abs/1009.4625 (2010) - [i6]Matteo Cristani, Erisa Karafili, Luca Viganò:
Blocking Underhand Attacks by Hidden Coalitions (Extended Version). CoRR abs/1010.4786 (2010)
2000 – 2009
- 2009
- [j15]David A. Basin, Carlos Caleiro, Jaime Ramos, Luca Viganò:
Labelled Tableaux for Distributed Temporal Logic. J. Log. Comput. 19(6): 1245-1279 (2009) - [c33]Michele Barletta, Silvio Ranise, Luca Viganò:
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures. CSE (3) 2009: 289-296 - [c32]Sebastian Mödersheim, Luca Viganò:
Secure Pseudonymous Channels. ESORICS 2009: 337-354 - [c31]Sebastian Mödersheim, Luca Viganò:
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols. FOSAD 2009: 166-194 - [c30]Andrea Masini, Luca Viganò, Marco Volpe:
A Labeled Natural Deduction System for a Fragment of CTL*. LFCS 2009: 338-353 - [c29]Andrea Masini, Luca Viganò, Marco Volpe:
A History of Until. M4M 2009: 189-204 - [e3]Pierpaolo Degano, Luca Viganò:
Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5511, Springer 2009, ISBN 978-3-642-03458-9 [contents] - [i5]Michele Barletta, Silvio Ranise, Luca Viganò:
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures (Full version). CoRR abs/0906.4570 (2009) - [i4]Andrea Masini, Luca Viganò, Marco Volpe:
A History of Until. CoRR abs/0910.4500 (2009) - 2008
- [j14]Pierpaolo Degano, Ralf Küsters, Luca Viganò, Steve Zdancewic:
Joint workshop on foundations of computer security and automated reasoning for security protocol analysis (FCS-ARSPA '06). Inf. Comput. 206(2-4): 129 (2008) - [j13]Pierpaolo Degano, Luca Viganò:
Preface. Int. J. Inf. Sec. 7(1): 1 (2008) - [c28]Andrea Masini, Luca Viganò, Margherita Zorzi:
A Qualitative Modal Representation of Quantum Register Transformations. ISMVL 2008: 131-137 - [c27]David A. Basin, Carlos Caleiro, Jaime Ramos, Luca Viganò:
A Labeled Tableaux Systemfor the Distributed Temporal Logic DTL. TIME 2008: 101-109 - [c26]Luca Viganò, Marco Volpe:
Labeled Natural Deduction Systems for a Family of Tense Logics. TIME 2008: 118-126 - [i3]Andrea Masini, Luca Viganò, Margherita Zorzi:
A Qualitative Modal Representation of Quantum Register Transformations. CoRR abs/0802.4057 (2008) - [i2]Luca Viganò, Marco Volpe:
Labeled Natural Deduction Systems for a Family of Tense Logics. CoRR abs/0803.3187 (2008) - 2006
- [j12]Alessandro Armando, David A. Basin, Jorge Cuéllar, Michaël Rusinowitch, Luca Viganò:
Automated Reasoning for Security Protocol Analysis. J. Autom. Reason. 36(1-2): 1-3 (2006) - [j11]Pierpaolo Degano, Luca Viganò:
Preface. Theor. Comput. Sci. 367(1-2): 1 (2006) - [j10]Carlos Caleiro, Luca Viganò, David A. Basin:
On the semantics of Alice&Bob specifications of security protocols. Theor. Comput. Sci. 367(1-2): 88-122 (2006) - [c25]Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò:
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. FoSSaCS 2006: 428-445 - [c24]Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò, David A. Basin:
Formalizing and Analyzing Sender Invariance. Formal Aspects in Security and Trust 2006: 80-95 - [c23]Pedro Adão, Paulo Mateus, Tiago Reis, Luca Viganò:
Towards a Quantitative Analysis of Security Protocols. QAPL 2006: 3-25 - [i1]Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò:
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. IACR Cryptol. ePrint Arch. 2006: 58 (2006) - 2005
- [j9]Carlos Caleiro, Luca Viganò, David A. Basin:
Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis. Log. J. IGPL 13(6): 637-663 (2005) - [j8]David A. Basin, Sebastian Mödersheim, Luca Viganò:
OFMC: A symbolic model checker for security protocols. Int. J. Inf. Sec. 4(3): 181-208 (2005) - [c22]Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, Laurent Vigneron:
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. CAV 2005: 281-285 - [c21]David A. Basin, Sebastian Mödersheim, Luca Viganò:
Algebraic Intruder Deductions. LPAR 2005: 549-564 - [c20]Pierpaolo Degano, Luca Viganò:
Preface. ARSPA@ICALP 2005: 1-2 - [c19]Carlos Caleiro, Luca Viganò, David A. Basin:
Deconstructing Alice and Bob. ARSPA@ICALP 2005: 3-22 - [c18]Luca Viganò:
Automated Security Protocol Analysis With the AVISPA Tool. MFPS 2005: 61-86 - [e2]Alessandro Armando, Luca Viganò:
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004. Electronic Notes in Theoretical Computer Science 125(1), Elsevier 2005 [contents] - [e1]Pierpaolo Degano, Luca Viganò:
Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005. Electronic Notes in Theoretical Computer Science 135(1), Elsevier 2005 [contents] - 2004
- [j7]Paulo Mateus, Amílcar Sernadas, Cristina Sernadas, Luca Viganò:
Modal Sequent Calculi Labelled with Truth Values: Completeness, Duality and Analyticity. Log. J. IGPL 12(3): 227-274 (2004) - [c17]Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò:
A Formalization of Off-Line Guessing for Security Protocol Analysis. LPAR 2004: 363-379 - [c16]Alessandro Armando, Luca Viganò:
Preface. ARSPA@IJCAR 2004: 1 - [c15]Carlos Caleiro, Luca Viganò, David A. Basin:
Metareasoning about Security Protocols using Distributed Temporal Logic. ARSPA@IJCAR 2004: 67-89 - 2003
- [j6]Cristina Sernadas, Luca Viganò, João Rasga, Amílcar Sernadas:
Truth-values as Labels: A General Recipe for Labelled Deduction. J. Appl. Non Class. Logics 13(3-4): 277-315 (2003) - [c14]David A. Basin, Sebastian Mödersheim, Luca Viganò:
CDiff: a new reduction technique for constraint-based analysis of security protocols. CCS 2003: 335-344 - [c13]David A. Basin, Sebastian Mödersheim, Luca Viganò:
An On-the-Fly Model-Checker for Security Protocol Analysis. ESORICS 2003: 253-270 - 2002
- [j5]João Rasga, Amílcar Sernadas, Cristina Sernadas, Luca Viganò:
Fibring Labelled Deduction Systems. J. Log. Comput. 12(3): 443-473 (2002) - [c12]Alessandro Armando, David A. Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, Sebastian Mödersheim, Michaël Rusinowitch, Mathieu Turuani, Luca Viganò, Laurent Vigneron:
The AVISS Security Protocol Analysis Tool. CAV 2002: 349-353 - [c11]João Rasga, Amílcar Sernadas, Cristina Sernadas, Luca Viganò:
Labelled Deduction over Algebras of Truth-Values. FroCoS 2002: 222-238 - [c10]David A. Basin, Frank Rittinger, Luca Viganò:
A Formal Analysis of the CORBA Security Service. ZB 2002: 330-349 - 2001
- [c9]David A. Basin, Frank Rittinger, Luca Viganò:
A formal data-model of the CORBA security service. ESEC / SIGSOFT FSE 2001: 303-304 - [c8]Rafael Accorsi, David A. Basin, Luca Viganò:
Towards an awareness-based semantics for security protocol analysis. LACPV@CAV 2001: 5-24 - 2000
- [b2]Luca Viganò:
Labelled non-classical logics. Kluwer 2000, ISBN 978-0-7923-7749-8, pp. I-XIV, 1-291 - [j4]Luca Viganò:
An O(n log n)-Space Decision Procedure for the Relevance Logic B+. Stud Logica 66(3): 385-407 (2000)
1990 – 1999
- 1998
- [j3]David A. Basin, Seán Matthews, Luca Viganò:
Labelled Modal Logics: Quantifiers. J. Log. Lang. Inf. 7(3): 237-263 (1998) - [j2]David A. Basin, Seán Matthews, Luca Viganò:
Natural Deduction for Non-Classical Logics. Stud Logica 60(1): 119-160 (1998) - [c7]David A. Basin, Luca Viganò:
A Recipe for the Complexity Analysis of Non-Classical Logics. FroCoS 1998: 57-76 - 1997
- [b1]Luca Viganò:
A framework for non-classical logics. Saarland University, 1997, pp. 1-272 - [j1]David A. Basin, Seán Matthews, Luca Viganò:
Labelled Propositional Modal Logics: Theory and Practice. J. Log. Comput. 7(6): 685-717 (1997) - [c6]David A. Basin, Seán Matthews, Luca Viganò:
A New Method for Bounding the Complexity of Modal Logics. Kurt Gödel Colloquium 1997: 89-102 - [c5]David A. Basin, Seán Matthews, Luca Viganò:
Labelled Quantified Modal Logics. KI 1997: 171-182 - 1996
- [c4]David A. Basin, Seán Matthews, Luca Viganò:
A Topography of Labelled Modal Logics. FroCoS 1996: 75-92 - [c3]David A. Basin, Seán Matthews, Luca Viganò:
Implementing Modal and Relevance Logics in a Logical Framework. KR 1996: 386-397 - 1993
- [c2]Alessandro Armando, Alessandro Cimatti, Luca Viganò:
Building and Executing Proof Strategies in a Formal Metatheory. AI*IA 1993: 11-22 - 1992
- [c1]Giancarlo Succi, Giuseppe A. Martino, Giancarlo Colla, Diego Cò, Sergio Novella, Amedeo Pata, Alexandro Regoli, Luca Viganò:
SEL Compiler & Abstract Analyzers. ALPUK 1992: 108-123
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-28 20:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint