• 1728 Citations
1992 …2019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
1992

On safe folding

Bossi, A., Cocco, N. & Etalle, S., 1992, Programming Language Implementation and Logic Programming (Proceedings 4th International Symposium, PLILP'92, Leuven, Belgium, August 26-28, 1992). Bruynooghe, M. & Wirsing, M. (eds.). Springer, p. 172-186 (Lecture Notes in Computer Science; vol. 631).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

13 Citations (Scopus)

Transforming normal programs by replacement

Bossi, A., Cocco, N. & Etalle, S., 1992, Meta-Programming in Logic (Proceedings 3rd International Workshop, META-92, Uppsala, Sweden, June 10-12, 1992). Pettorossi, A. (ed.). Springer, p. 265-279 (Lecture Notes in Computer Science; vol. 649).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

14 Citations (Scopus)
1993

On the unification free Prolog programs

Apt, K. R. & Etalle, S., 1993, Mathematical Foundations of Computer Science 1993 (Proceedings 18th International Symposium, MFCS'93, Gdansk, Poland, August 30-September 3, 1993). Borzyszkowski, A. M. & Sokolowski, S. (eds.). Springer, p. 1-19 (Lecture Notes in Computer Science; vol. 711).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1994

Modular transformations of CLP programs

Etalle, S. & Gabbrielli, M., 1994, 1994 Joint Conference on Declarative Programming (Proceedings GULP-PRODE'94, Peñiscola, Spain, September 19-22, 1994). Alpuente, M., Barbuti, R. & Ramos, I. (eds.). Vol. 1. p. 218-233

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

More on unfold/fold transformations of normal programs : preservation of fitting's semantics

Bossi, A. & Etalle, S., 1994, Logic Programming Synthesis and Transformation - Meta-Programming in Logic (Proceedings 4th Internation Workshops, LOPSTR'94 and META'94, Pisa, Italy, June 20-21, 1994). Fribourg, L. & Turini, F. (eds.). Springer, p. 311-331 (Lecture Notes in Computer Science; vol. 883).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)
1995

A transformation system for modular CLP programs

Etalle, S. & Gabbrielli, M., 1995, Logic Programming (Proceedings 12th International Conference on Logic Programming, Tokyo, Japan, June 13-16, 1995). Sterling, L. (ed.). MIT Press, p. 681-695

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

The replacement operation for CLP modules

Etalle, S. & Gabbrielli, M., 1995, Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (La Jolla CA, USA, June 21-23, 1995). Association for Computing Machinery, Inc, p. 168-177

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)
1996

A compositional semantics for normal open programs

Etalle, S. & Teusink, F., 1996, Logic Programing (Proceedings of the 1996 Joint International Conference and Symposium on Logic Programming, Bonn, Germany, September 2-6, 1996). Mahler, M. J. (ed.). MIT Press, p. 468-482

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Layered modes

Etalle, S. & Gabbrielli, M., 1996, 1996 Joint Conference on Declarative Programming (Proceedings APPIA-GULP-PRODE'96, Donostia-San Sebastian, Spain, July 15-18, 1996). Lucio, P., Martelli, M. & Navarro, M. (eds.). p. 41-52

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Transformation of left terminating programs : the reordering problem

Bossi, A., Cocco, N. & Etalle, S., 1996, Logic Programming Synthesis and Transformation (Proceedings 5th International Workshop, LOPSTR'95, Utrecht, The Netherlands, September 20-22, 1995). Proietti, M. (ed.). Springer, p. 33-45 (Lecture Notes in Computer Science; vol. 1048).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

14 Citations (Scopus)
1 Downloads (Pure)
1997

A transformation system for CLP with dynamic scheduling and CCP

Etalle, S., Gabbrielli, M. & Marchiori, E., 1997, Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM '97, Amsterdam, The Netherlands, June 12-13, 1997). p. 137-150 (ACM Sigplan Notices; vol. 32(12)).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
1998

Beyond success and failure

Etalle, S. & Raamsdonk, van, F., 1998, Proceedings of the 1998 Joint International Conference and Symposium on Logic Programming (Manchester, UK, June 15-19, 1998). Jaffar, J. (ed.). MIT Press, p. 190-205

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Unfold/fold transformations of CCP programs

Etalle, S., Gabbrielli, M. & Meo, M. C., 1998, CONCUR '98: Concurrency Theory (Proceedings 9th International Conference, Nice, France, September 8-11, 1998). Sangiorgi, D. & Simone, de, R. (eds.). Springer, p. 348-363 (Lecture Notes in Computer Science; vol. 1466).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)
1999

Logic programming with requests

Etalle, S. & Raamsdonk, van, F., 1999, Logic Programming (Proceedings of the 1999 International Conference, Las Cruces NM, USA, November 29-December 4, 1999). Schreye, de, D. (ed.). MIT Press, p. 558-572

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Properties of input-consuming derivations

Bossi, A., Etalle, S. & Rossi, S., 1999, Workshop on Verification of Logic Programs (in connection with ICLP'99, International Conference on Logic Programming, Las Cruces NM, USA, December 1, 1999). Amsterdam: Elsevier, p. 102-124 (Electronic Notes in Theoretical Computer Science; vol. 30).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
4 Citations (Scopus)
63 Downloads (Pure)

The replacement operation for CCP programs

Bertolino, M., Etalle, S. & Palamidessi, C., 1999, 1999 Joint Conference on Declarative Programming (Proceedings AGP'99, L'Aquila, Italy, September 6-9, 1999). Meo, M. C. & Vilares Ferro, M. (eds.). p. 441-454

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2000

Semantics of input-consuming logic programs

Bossi, A., Etalle, S. & Rossi, S., 2000, Computational logic - CL 2000 : proceedings 1st international conference, London, UK, 24-28 july, 2000. Lloyd, J. W. & et al, X. (eds.). Springer, p. 194-208 (Lecture Notes in Computer Science; vol. 1861).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

The lazy functional side of logic programming (Extended Abstract)

Etalle, S. & Mountjoy, J., 2000, Extended Abstracts of the 10th International Workshop on Logic-based Program Synthesis and Transformation (LOPSTR 2000, Imperial College London, July 2000), Technical Report UMCS-00-6-1. Lau, K. K. (ed.). University of Manchester

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

The replacement operation for CCP programs

Bertolino, M., Etalle, S. & Palamidessi, C., 2000, Logic Programming Synthesis and Transformation (9th International Workshop, LOPSTR'99, Venezia, Italy, September 22-24, 1999, Selected Papers). Bossi, A. (ed.). Springer, p. 216-233 (Lecture Notes in Computer Science; vol. 1817).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Transformation of left terminating programs

Bossi, A., Cocco, N. & Etalle, S., 2000, Logic Programming Synthesis and Transformation (9th International Workshop, LOPSTR'99, Venezia, Italy, September 22-24, 1999, Selected Papers). Bossi, A. (ed.). Springer, p. 156-175 (Lecture Notes in Computer Science; vol. 1817).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
2001

Proof theory, transformations, and logic programming for debugging security protocols

Delzanno, G. & Etalle, S., 2001, Logic based program synthesis and transformation : 11th international workshop, LOPSTR 2001, Paphos, Cyprus, november 28-30, 2001, selected papers. Petterossi, A. (ed.). Springer, p. 76-90 (Lecture Notes in Computer Science; vol. 2372).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Scheduling and allocation of non-manifest loops on hardware graph-models

Mansour, O., Etalle, S. & Krol, T., 2001, Proceedings 2nd PROGRESS Workshop on Embedded Systems (Utrecht, The Netherlands, October 18, 2001). Karelse, F. (ed.). STW Technology Foundation, p. 153-160

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

Semantics and termination of simply-moded logic programs with dynamic scheduling

Bossi, A., Etalle, S., Rossi, S. & Smaus, J. G., 2001, Programming languages and systems : proceedings 10th European symposium on programming, ESOP 2001, held as part of the joint European conferences on theory and practice of software, ETAPS 2001, Genova, Italy, april 2-6, 2001. Sands, D. (ed.). Springer, p. 402-416 (Lecture Notes in Computer Science; vol. 2028).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)
2002

An improved constraint-based system for the verification of security protocols

Corin, R. J. & Etalle, S., 2002, Static analysis : proceedings 9th international symposium, SAS 2002, Madrid, Spain, September 17-20, 2002. Hermenegildo, M. V. & Puebla, G. (eds.). Springer, p. 326-341 (Lecture Notes in Computer Science; vol. 2477).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

43 Citations (Scopus)
2003

A formally verified decentralized key management architecture for wireless sensor networks

Law, Y. W., Corin, R. J., Etalle, S. & Hartel, P. H., 2003, Personal Wireless Communications (Proceedings IFIP-TC6 8th International Conference, PWC 2003, Venice, Italy, September 23-25, 2003). Conti, M., Giordano, S., Gregori, E. & Olariu, S. (eds.). Springer, p. 27-39 (Lecture Notes in Computer Science; vol. 2775).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

21 Citations (Scopus)

Approximating fair use in LicenseScript

Chong, C. N., Etalle, S., Hartel, P. H. & Law, Y. W., 2003, Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access (Proceedings 6th International Conference on Asian Digital Libraries, ICADL 2003, Kuala Lumpur, Malaysia, December 8-12, 2003). Sembok, T. M. T., Zaman, H. B., Chen, H., Urs, S. R. & Myaeng, S. H. (eds.). Springer, p. 432-443 (Lecture Notes in Computer Science; vol. 2911).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
2 Downloads (Pure)

Assessing security in energy-efficient sensor networks

Law, Y. W., Etalle, S. & Hartel, P. H., 2003, Security and Privacy in the Age of Uncertainty (Proceedings IFIP TC11 18th International Conference on Information Security, SEC2003, Athens, Greece, May 26-28, 2003). Gritzalis, D., De Capitani di Vimercati, S., Samarati, P. & Katsikas, S. K. (eds.). Kluwer, p. 459-463 (IFIP Conference Proceedings; vol. 250).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Comparing logic-based and XML-based rights expression languages

Chong, C. N., Etalle, S. & Hartel, P. H., 2003, On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops (Proceedings OTM Confederated International Workshops, HCI-SWWA, IPW, JTRES, WORM, WMS, and WRSM 2003, Catania, Sicily, Italy, November 3-7, 2003). Meersman, R. & Tari, Z. (eds.). Springer, p. 779-792 (Lecture Notes in Computer Science; vol. 2889).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)
1 Downloads (Pure)

EYES - Energy Efficient Sensor Networks

Havinga, P. J. M., Etalle, S., Karl, H., Petrioli, C., Zorzi, M., Kip, H. & Lentsch, T., 2003, Personal wireless communications : proceedings IFIP-TC6 8th international conference, PWC 2003, Venice, Italy, September 23-25, 2003. Conti, M., Giordano, S., Gregori, E. & Olariu, S. (eds.). Springer, p. 198-201 (Lecture Notes in Computer Science; vol. 2775).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)

Guess what? here is a new tool that finds some new guessing attacks

Corlin, R., Sreekanth, M., Alves Foss, J. & Etalle, S., 2003, Workshop on Issues in the Theory of Security (WITS, part of European Joint Conferences on Theory and Practice of Software, ETAPS'2003, Warsaw, Poland, April 5-13, 2003). Gorrieri, R. & Lucchi, R. (eds.). p. 62-71

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Guess what? Here is a new tool that finds some new guessing attacks (Extended Abstract)

Corin, R. J., Malladi, S., Alves-Foss, J. & Etalle, S., 2003, Proceedings IFIP WG 1.7 and ACM SIGPLAN Workshop on Issues in the Theory of Security (WITS'03, Warsaw, Poland, April 5-6, 2003). Dipartamento di Scienze dell'Informazione, Università di Bologna, p. 62-71

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

LicenseScript : a novel digital rights language

Chong, C. N., Corin, R. J., Etalle, S., Hartel, P. H. & Law, Y. W., 2003, Proceedings IFIP TC6 WG6.11 International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods (Ilmenau, Germany, May 22-24, 2003). Technische Universität Ilmenau, p. 104-115

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

32 Citations (Scopus)
1 Downloads (Pure)

LicenseScript: a novel digital rights language and its semantics

Chong, C. N., Corin, R. J., Etalle, S., Hartel, P. H., Jonker, W. & Law, Y. W., 2003, Proceedings 3rd International Conference on Web Delivering of Music (Wedelmusic'03, Leeds, UK, September 15-17, 2003). Ng, K., Busch, C. & Nesi, P. (eds.). Institute of Electrical and Electronics Engineers, p. 122-129

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

32 Citations (Scopus)

LKHW : a directed diffusion-based secure multicast scheme for wireless sensor networks

Di Pietro, R., Mancini, L. V., Law, Y. W., Etalle, S. & Havinga, P. J. M., 2003, 32nd International Conference on Parallel Processing Workshops (Proceedings ICPP 2003 Workshops, Kaohsiung, Taiwan, October 6-9, 2003). IEEE Computer Society, p. 397-406

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
95 Citations (Scopus)
99 Downloads (Pure)
2004

Licensing structured data with ease

Law, Y. W., Chong, C. N., Etalle, S., Hartel, P. H. & Corin, R. J., 2004, Proceedings 2nd IFIP TC6 WG6.11 International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods (Ilmenau, Germany, May 27-29, 2004). Technische Universität Ilmenau, p. 113-124

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Security analysis of Parlay/OSA framework

Corin, R. J., Di Caprio, G., Etalle, S., Gnesi, S., Lenzini, G. & Moiso, C., 2004, Proceedings 9th International Conference on Intelligence in Service Delivery Networks (ICIN'04, Bordeaux, France, October 18-21, 2004). IOS Press, p. 54-59

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Timed model checking of security protocols

Corin, R. J., Etalle, S., Hartel, P. H. & Mader, A. H., 2004, Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering (FMSE 2004, Washingtion DC, USA, October 29, 2004). Atluri, V., Backes, M., Basin, D. A. & Waidner, M. (eds.). Association for Computing Machinery, Inc, p. 23-32

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

27 Citations (Scopus)
2005

A formal security analysis of an OSA/Parlay authentication interface

Corin, R. J., Di Caprio, G., Etalle, S., Gnesi, S., Lenzini, G. & Moiso, C., 2005, Formal Methods for Open Object-Based Distributed Systems (Proceedings 7th IFIP WG 6.1 International Conference, FMOODS 2005, Athens, Greece, June 15-17, 2005). Steffen, M. & Zavattaro, G. (eds.). Springer, p. 131-146 (Lecture Notes in Computer Science; vol. 3535).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
1 Downloads (Pure)

A logic for auditing accountability in decentralized systems

Corin, R. J., Etalle, S., Hartog, den, J. I., Lenzini, G. & Staicu, I. S., 2005, Formal Aspects in Security and Trust (Proceedings IFIP TC1 WG1.7 Workshop, FAST, Toulouse, France, August 26-27, 2004). Dimitrakos, T. & Martinelli, F. (eds.). Boston: Springer, p. 187-201 15 p. (IFIP International Federation for Information Processing (IFIPAICT); vol. 173).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

25 Citations (Scopus)

Analysing password protocol security against off-line dictionary attacks

Corin, R. J., Etalle, S. & Doumen, J. M., 2005, Proceedings 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP 2004, Bologna, Italy, June 26, 2004). p. 47-63 (Electronic Notes in Theoretical Computer Science; vol. 121).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

31 Citations (Scopus)

An audit logic for accountability

Cederquist, J. G., Corin, R. J., Dekker, M. A. C., Etalle, S. & Hartog, den, J. I., 2005, Policies for Distributed Systems and Networks 2006 (Proceedings 6th IEEE International Workshop, POLICY 2005, Stockholm, Sweden, June 6-8, 2005). IEEE Computer Society, p. 34-43

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

43 Citations (Scopus)

A trace logic for local security properties

Corin, R. J., Etalle, S., Hartel, P. H. & Durante, A., 2005, Proceedings of the International Workshop on Software Verification and Validation (SVV 2003, Mumbai, India, December 14, 2003). p. 129-143 (Electronic Notes in Theoretical Computer Science; vol. 118).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Integrity constraints in trust management

Etalle, S. & Winsborough, W. H., 2005, SACMAT 2005 (Proceedings 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, June 1-3, 2005). Association for Computing Machinery, Inc, p. 1-10

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

8 Citations (Scopus)

License protection with a tamper-resistant token

Chong, C. N., Ren, B., Doumen, J. M., Etalle, S., Hartel, P. H. & Corin, R. J., 2005, Information Security Applications (5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers). Lim, C. H. & Yung, M. (eds.). Springer, p. 223-237 (Lecture Notes in Computer Science; vol. 3325).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Modelling mobility aspects of security policies

Hartel, P. H., Eck, van, P. A. T., Etalle, S. & Wieringa, R. J., 2005, Construction and Analysis of Safe, Secure, and Interoperable Smart Devices (International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers). Barthe, G., Burdy, L., Huisman, M., Lanet, J. L. & Muntean, T. (eds.). Springer, p. 172-191 (Lecture Notes in Computer Science; vol. 3362).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

PS-LTL for constraint-based security protocol analysis

Corin, R. J., Saptawijaya, A. & Etalle, S., 2005, Logic Programming (Proceedings 21st International Conference, ICLP 2005, Sitges, Spain, October 2-5, 2005). Gabbrielli, M. & Gupta, G. (eds.). Springer, p. 439-440 (Lecture Notes in Computer Science; vol. 3668).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Service brokerage in Prolog

Etalle, S., Hartel, P. H., Joosten, R. & Kleinhuis, G., 2005, ICEIS 2005 (Proceedings 7th International Conference on Enterprise Information Systems, Miami FL, USA, May 25-28, 2005). Chen, C. S., Filipe, J., Seruca, I. & Cordeiro, J. (eds.). INSTICC Press, p. 409-412

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

StreamTo : streaming content using a tamper-resistant token

Cheng, J., Chong, C. N., Doumen, J. M., Etalle, S., Hartel, P. H. & Nikolaus, S., 2005, Security and Privacy in the Age of Ubiquitous Computing (Proceedings IFIP TC11 20th International Conference on Information Security, SEC 2005, Chiba, Japan, May 30-June 1, 2005). Sasaki, R., Qing, S., Okamoto, E. & Yoshiura, H. (eds.). Berlin: Springer, p. 601-612 (IFIP Conference Proceedings; vol. 181).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
2006

A logic for constraint-based security protocol analysis

Corin, R. J., Etalle, S. & Saptawijaya, A., 2006, Proceedings 2006 IEEE Symposium on Security and Privacy (S&P 2006, Oakland CA, USA, May 21-24, 2006). IEEE Computer Society, p. 155-168

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

31 Citations (Scopus)

Nonmonotonic trust management for P2P applications

Czenko, M., Tran, H., Doumen, J. M., Etalle, S., Hartel, P. H. & Hartog, den, J. I., 2006, Proceedings of the First International Workshop on Security and Trust Management (STM'05, Milan, Italy, September 15, 2005). Mauw, S., Isarny, V. & Cremers, C. (eds.). p. 113-130 (Electronic Notes in Theoretical Computer Science; vol. 157(3)).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

20 Citations (Scopus)