• 1712 Citations
1992 …2019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2019

A survey of network intrusion detection systems for controller area network

Dupont, G., den Hartog, J., Etalle, S. & Lekidis, A., Sep 2019, 2019 IEEE International Conference on Vehicular Electronics and Safety, ICVES 2019. Piscataway: Institute of Electrical and Electronics Engineers, 6 p. 8906465

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Challenges in designing exploit mitigations for deeply embedded systems

Abbasi, A., Wetzels, J., Holz, T. & Etalle, S., 1 Jun 2019, Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019. Piscataway: Institute of Electrical and Electronics Engineers, p. 31-46 16 p. 8806725

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
1 Downloads (Pure)

Eventpad: Rapid malware analysis and reverse engineering using visual analytics

Cappers, B. C. M., Meessen, P. N., Etalle, S. & Van Wijk, J. J., 9 May 2019, 2018 IEEE Symposium on Visualization for Cyber Security, VizSec 2018. Trent, S., Kohlhammer, J., Sauer, G., Gove, R., Best, D., Paul, C. L., Prigent, N. & Staheli, D. (eds.). Institute of Electrical and Electronics Engineers, 8 p. 8709230

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
3 Citations (Scopus)
132 Downloads (Pure)

Leveraging semantics for actionable intrusion detection in building automation systems

Fauri, D., Kapsalakis, M., dos Santos, D. R., Costante, E., den Hartog, J. & Etalle, S., 1 Jan 2019, Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Revised Selected Papers. Luiijf, E., Žutautaitė, I. & Hämmerli, B. M. (eds.). Springer, p. 113-125 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11260 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
2 Downloads (Pure)

Role inference + anomaly detection = situational awareness in bacnet networks

Fauri, D., Kapsalakis, M., dos Santos, D. R., Costante, E., den Hartog, J. & Etalle, S., 6 Jun 2019, Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Proceedings. Maurice, C., Giacinto, G., Perdisci, R. & Almgren, M. (eds.). Cham: Springer, p. 461-481 21 p. (Lecture Notes in Computer Science; vol. 11543).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
1 Downloads (Pure)
2018

Behavior analysis in the medical sector: theory and practice

Alizadeh, M., Peters, S., Etalle, S. & Zannone, N., 9 Apr 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018. New York: Association for Computing Machinery, Inc, p. 1637-1646 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Encryption in ICS networks : a blessing or a curse?

Fauri, D., de Wijs, B., den Hartog, J. I., Costante, E., Zambon, E. & Etalle, S., 17 Apr 2018, IEEE SmartGridCom : Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 23-26 October 2017, Dresden, Germany. Brussels: IEEE Computer Society, p. 289-294 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
2 Citations (Scopus)
4 Downloads (Pure)
2017

ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers

Abbasi, A., Holz, T., Zambon, E. & Etalle, S., 4 Dec 2017, ACSAC 2017 Proceedings of the 33rd Annual Computer Security Applications Conference, 4-8 December 2017, Orlando, Florida. New York: Association for Computing Machinery, Inc, p. 437-448 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
11 Citations (Scopus)
88 Downloads (Pure)

From intrusion detection to software design

Etalle, S., 11 Sep 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Foley, S., Gollmann, D. & Snekkens, E. (eds.). Springer, Vol. Part I. p. 1-10 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10492 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
9 Citations (Scopus)
89 Downloads (Pure)

From system specification to anomaly detection (and back)

Fauri, D., Dos Santos, D. R., Costante, E., den Hartog, J. J., Etalle, S. & Tonetta, S., 3 Nov 2017, CPS'17 : Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 3 November 2017, Dallas, Texas. New York: Association for Computing Machinery, Inc, p. 13-24 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

11 Citations (Scopus)
3 Downloads (Pure)

Towards realistic threat modeling : attack commodification, irrelevant vulnerabilities, and unrealistic assumptions

Allodi, L. & Etalle, S., 2017, SafeConfig 2017 - Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, co-located with CCS 2017. New York: Association for Computing Machinery, Inc, p. 23-26 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
2016

A hybrid framework for data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., Den Hartog, J. & Zannone, N., 1 Aug 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, 23-25 May 2016, San Jose, California. Piscataway: Institute of Electrical and Electronics Engineers, p. 324-333 10 p. 7527785

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

14 Citations (Scopus)

Reading between the fields: practical, effective intrusion detection for industrial control systems

den Hartog, J., Etalle, S. & Yüksel, O. S., 2016, SAC '16 Proceedings of the 31st Annual ACM Symposium on Applied Computing. New York: Association for Computing Machinery, Inc, p. 2063-2070

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

14 Citations (Scopus)
18 Downloads (Pure)

Stealth low-level manipulation of programmable logic controllers I/O by pin control exploitation

Abbasi, A., Hashemi, M., Zambon, E. & Etalle, S., 10 Oct 2016, Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers. Havarneanu, G., Setola, R., Nassopoulos, H. & Wolthusen, S. (eds.). Dordrecht: Springer, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10242 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

39 Citations (Scopus)

Towards useful anomaly detection for back office networks

den Hartog, J., Etalle, S. & Yüksel, O. S., 24 Nov 2016, Information Systems Security 12th International Conference, ICISS 2016 Jaipur, India, December 16–20, 2016 Proceedings. Cham: Springer, p. 509-520

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
4 Downloads (Pure)
2015

Auditing with incomplete logs

Mian, U. S., Hartog, den, J. I., Etalle, S. & Zannone, N., 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust (2015, London, UK, April 18, 2015; affiliated with ETAPS 2015). p. 1-23

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
54 Downloads (Pure)

Experimental validation of a risk assessment method

Vriezekolk, E., Etalle, S. & Wieringa, R. J., 2015, Requirements Engineering (21st International Working Conference, REFSQ 2015, Essen, Germany, March 23-26, 2015. Proceedings). Fricker, S. A. & Schneider, K. (eds.). Springer, p. 1-16 (Lecture Notes in Computer Science; vol. 9013).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Validating the raster risk assessment method in practice

Vriezekolk, E., Etalle, S. & Wieringa, R., 1 Jan 2015, ISCRAM 2015 Conference Proceedings - 12th International Conference on Information Systems for Crisis Response and Management. Palen, L. (ed.). Information Systems for Crisis Response and Management (ISCRAM)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
2014

Hunting the unknown: White-box database leakage detection

Costante, E., Hartog, den, J. I., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2014, Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014). Atluri, V. & Pernul, G. (eds.). Springer, p. 243-259 (Lecture Notes in Computer Science; vol. 8566).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

10 Citations (Scopus)
5 Downloads (Pure)

On emulation-based network intrusion detection systems

Abbasi, A., Wetzels, J., Bokslag, W., Zambon, E. & Etalle, S., 2014, Research in Attacks, Intrusions and Defenses (17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings). Stavrou, A., Bos, H. & Portokalidis, G. (eds.). Berlin: Springer, p. 384-404 (Lecture Notes in Computer Science; vol. 8688).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)
2013

Database anomalous activities: Detection and quantification

Costante, E., Vavilis, S., Etalle, S., Petkovic, M. & Zannone, N., 2013, SECRYPT 2013 (Proceedings of the 10th International Conference on Security and Cryptography, Reykjavik, Iceland, July 29-31, 2013). SCITEPRESS-Science and Technology Publications, Lda., p. 603-608

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)
2 Downloads (Pure)

Linking unlinkability

Brusò, M., Chatzikokolakis, K., Etalle, S. & Hartog, den, J. I., 2013, Trustworthy Global Computing (7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers). Palamidessi, C. & Ryan, M. D. (eds.). Berlin: Springer, p. 129-144 (Lecture Notes in Computer Science; vol. 8191).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

8 Citations (Scopus)

Policy administration in tag-based authorization

Etalle, S., Hinrichs, T. L., Lee, A. J., Trivellato, D. & Zannone, N., 2013, Foundations and Practice of Security (5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers). Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Miri, A. & Tawbi, N. (eds.). Berlin: Springer, p. 162-179 (Lecture Notes in Computer Science; vol. 7743).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
3 Downloads (Pure)
2012

Challenges and opportunities in securing industrial control systems

Hadziosmanovic, D., Bolzoni, D., Etalle, S. & Hartel, P. H., 2012, Proceedings of the IEEE Workshop on Complexity in Engineering (COMPENG'12, Aachen, Germany, June 11-13, 2012). Piscataway: Institute of Electrical and Electronics Engineers, 6 p. 6242970

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

20 Citations (Scopus)

Design and initial validation of the Raster method for telecom service availability risk assessment

Vriezekolk, E., Wieringa, R. & Etalle, S., 2012, ISCRAM 2012 Conference Proceedings - 9th International Conference on Information Systems for Crisis Response and Management. Rothkrantz, L., Ristvej, J. & Franco, Z. (eds.). Vancouver: Simon Fraser University, p. 1-10

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

How to assess telecom service availability risks for crisis organisations?

Vriezekolk, E., Wieringa, R. J. & Etalle, S., 2012, Advances in Safety, Reliability and Risk Management (Proceedings of the European Safety and Reliability Conference, ESREL 2011, Troyes, France, September 18-22, 2011). Berenguer, C., Grall, A. & Guedes Soares, C. (eds.). CRC Press, p. 2653-2661

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

N-gram against the machine : on the feasibility of the N-gram network analysis for binary protocols

Hadziosmanovic, D., Simionato, L., Bolzoni, D., Zambon, E. & Etalle, S., 2012, Research in attacks, intrusions, and defenses (15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings). Balzarotti, D., Stolfo, S. J. & Cova, M. (eds.). Berlin: Springer, p. 354-373 (Lecture Notes in Computer Science; vol. 7462).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

53 Citations (Scopus)
2 Downloads (Pure)

Risk and business goal based security requirement and countermeasure prioritization

Herrmann, A., Morali, A., Etalle, S. & Wieringa, R. J., 2012, Workshops on Business Informatics Research (BIR 2011 International Workshops and Doctoral Consortium, Riga, Latvia, October 6, 2011, Revised Selected Papers). Niedrite, L., Strazdina, R. & Wangler, B. (eds.). Berlin: Springer, p. 64-76 (Lecture Notes in Business Information Processing; vol. 106).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)
2011

A cuckoo's egg in the malware nest: On-the-fly signature-less malware analysis, detection, and containment for large networks

Bolzoni, D., Schade, C. L. & Etalle, S., 2011, Proceedings of the 25th Large Installation System Administration Conference (LISA 2011, Boston MA, USA, December 4-9, 2011). Usenix Association, p. 201-215

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

A new method to assess telecom service availability risks

Vriezekolk, E., Wieringa, R. J. & Etalle, S., 2011, Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2011, Lisbon, Portugal, May 8-11, 2011). Lisbon: Information Systems for Crisis Response and Management (ISCRAM), p. 1-5

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
7 Citations (Scopus)
40 Downloads (Pure)

A security framework for systems of systems

Trivellato, D., Zannone, N. & Etalle, S., 2011, Proceedings 12th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2011, Pisa, Italy, June 6-8, 2011). IEEE Computer Society, p. 182-183

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
6 Citations (Scopus)
81 Downloads (Pure)

MELISSA: Towards automated detection of undesirable user actions in critical infrastructures

Hadziosmanovic, D., Bolzoni, D., Hartel, P. H. & Etalle, S., 2011, Proceedings of the European Conference on Computer Network Defense (EC2ND, Gothenburg, Sweden, September 6-7, 2011). IEEE Computer Society, p. 41-48

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
12 Citations (Scopus)
105 Downloads (Pure)

Protecting information in systems of systems

Trivellato, D., Zannone, N. & Etalle, S., 2011, Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS'11, Chicago IL, USA, October 17-21, 2011). Association for Computing Machinery, Inc, p. 865-867

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
4 Downloads (Pure)

RiskREP : risk-based security requirements elicitation and prioritization

Herrmann, A., Morali, A., Etalle, S. & Wieringa, R. J., 2011, Proceedings of the The First International Workshop on Alignment of Business Process and Security Modelling (ABPSM’11, Riga, Latvia, October 6-8, 2011). Riga: Riga Technical University, p. 155-162

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2010

CRAC : Confidentiality risk analysis and IT-architecture comparison of business networks

Morali, A., Zambon, E., Etalle, S. & Wieringa, R. J., 2010, Proceedings of the 6th International Conference on Network and Service Management (CNSM 2010, Niagara Falls, Canada, October 25-29, 2010). Institute of Electrical and Electronics Engineers, p. 322-325

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

LP with flexible grouping and aggregates using modes

Czenko, M. & Etalle, S., 2010, Proceedings of the 19th International Symposium on Logic-based Program Synthesis and Transformation (LOPSTR 2009), 9-11 September 2009, Coimbra, Portugal. De Schreye, D. (ed.). Berlin: Springer, p. 67-81 (Lecture Notes in Computer Science; vol. 6037).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Towards data protection compliance

Zannone, N., Petkovic, M. & Etalle, S., 2010, SECRYPT 2010 (Proceedings of the 5th International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010). INSTICC Press, p. 213-216

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
2 Citations (Scopus)
68 Downloads (Pure)

Towards static flow-based declassification for legacy and untrusted programs

Pontes Soares Rocha, B., Bandhakavi, S., Hartog, den, J. I., Winsborough, W. H. & Etalle, S., 2010, Proceedings IEEE Symposium on Security and Privacy (SP, Oakland CA, USA, May 16-19, 2010). Institute of Electrical and Electronics Engineers, p. 93-108

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

11 Citations (Scopus)
2009

Extended eTVRA vs. security checklist: Experiences in a value-web

Morali, A., Zambon, E., Houmb, S. H., Sallhammar, K. & Etalle, S., 2009, Proceedings 31st International Conference on Software Engineering (ICSE'09, Vancouver, Canada, May 16-24, 2009). IEEE Computer Society, p. 130-140

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Know what you trust: Analyzing and designing trust policies with Scoll

Spiessens, F., Hartog, den, J. I. & Etalle, S., 2009, Formal Aspects in Security and Trust (5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008. Revised Selected Papers). Degano, P., Guttman, J. & Martinelli, F. (eds.). Berlin: Springer, p. 129-142 (Lecture Notes in Computer Science; vol. 5491).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Panacea: automating attack classification for anomaly-based network intrusion detection systems

Bolzoni, D., Etalle, S. & Hartel, P. H., 2009, Recent Advances in Intrusion Detection: 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings. Kirda, E., Jha, S. & Balzarotti, D. (eds.). Berlin: Springer, p. 1-20 20 p. (Lecture Notes in Computer Science (LNCS); vol. 5758).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

19 Citations (Scopus)

POLIPO : Policies & ontologies for interoperability, portability, and autonomy

Trivellato, D., Spiessens, A. O. D., Zannone, N. & Etalle, S., 2009, Proceedings IEEE International Symposium on Policies for Distributed Systems and Networks (London, UK, July 20-22, 2009). Institute of Electrical and Electronics Engineers, p. 110-113

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

11 Citations (Scopus)
2 Downloads (Pure)

Reputation-based ontology alignment for autonomy and interoperability in distributed access control

Trivellato, D., Spiessens, A. O. D., Zannone, N. & Etalle, S., 2009, Proceedings 12th IEEE International Conference on Computational Science and Engineering (CSE'09, Vancouver BC, Canada, August 29-31, 2009). Institute of Electrical and Electronics Engineers, Vol. 3. p. 252-258

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

10 Citations (Scopus)
3 Downloads (Pure)
2008

Boosting web intrusion detection systems by inferring positive signatures

Bolzoni, D. & Etalle, S., 2008, On the Move to Meaningful Internet Systems 2008: OTM 2008 Confederated International Conferences (Monterrey, Mexico, November 9-14, 2008), Part II. Meersman, R. & Tari, Z. (eds.). Berlin: Springer, p. 938-955 (Lecture Notes in Computer Science; vol. 5332).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
2 Downloads (Pure)

IT confidentiality risk assessment for an architecture-based approach

Morali, A., Zambon, E., Etalle, S. & Overbeek, P. L., 2008, Proceedings 3rd IEEE/IFIP International Workshop on Business-driven IT Management (BDIM 2008, Salvador, Brazil, April 7, 2008). Bartolini, C., Sahai, A. & Sauvé, J. P. (eds.). Institute of Electrical and Electronics Engineers, p. 31-40

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
1 Downloads (Pure)

RBAC administration in distributed systems

Dekker, M. A. C., Crampton, J. & Etalle, S., 2008, SACMAT 2008 (13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA, June 11-13, 2008, Proceedings). Ray, I. & Li, N. (eds.). New York: Association for Computing Machinery, Inc, p. 93-102

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

13 Citations (Scopus)

Trust management in P2P systems using standard TuLiP

Czenko, M., Doumen, J. M. & Etalle, S., 2008, Trust Management II (Proceedings of IFIPTM2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, Trondheim, Norway, June 18-20, 2008). Karabulut, Y., Mitchell, J. C., Herrmann, P. & Jensen, C. D. (eds.). Berlin: Springer, p. 1-16 (IFIP Conference Proceedings; vol. 263).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)
2007

A model supporting business continuity auditing and planning in information systems

Zambon, E., Bolzoni, D., Etalle, S. & Salvato, M., 2007, Proceedings of the 2nd International Conference on Internet Monitoring and Protection (ICIMP2007) 1 - 5 July 2007, San Jose, California, USA. Los Alamitos, California, USA: Institute of Electrical and Electronics Engineers, p. 33-33

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

10 Citations (Scopus)
3 Downloads (Pure)

An introduction to the role based trust management framework RT

Czenko, M., Etalle, S., Li, D. & Winsborough, W. H., 2007, Foundations of Security Analysis and Design IV (FOSAD 2006/2007 Tutorial Lectures). Aldini, A. & Gorrieri, R. (eds.). Berlin: Springer, p. 246-281 (Lecture Notes in Computer Science; vol. 4677).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

Open Access
File
8 Citations (Scopus)
99 Downloads (Pure)

A posteriori compliance control

Etalle, S. & Winsborough, W. H., 2007, Proceedings 12th ACM Symposium on Access Control Models and Technologies (SACMAT 2007) 20-22 June 2007, Sophia Antipolis, France. New York, New York: Association for Computing Machinery, Inc, p. 11-20

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

39 Citations (Scopus)
1 Downloads (Pure)