Fabio Massacci focuses on Computer security, Computer security model, Security engineering, Method of analytic tableaux and Key. His Computer security research includes themes of Credit card and Source code. His Security engineering research integrates issues from Requirements engineering, Delegation and Security testing.
His Security testing research is multidisciplinary, incorporating elements of Software security assurance, Security through obscurity and Risk analysis. Within one scientific family, Fabio Massacci focuses on topics pertaining to Algorithm under Method of analytic tableaux, and may sometimes address concerns connected to Sequent and Propositional calculus. Fabio Massacci has researched Key in several fields, including Exploit, Encryption, Cryptography and Vulnerability.
Fabio Massacci mostly deals with Computer security, Security policy, Access control, Computer security model and Software engineering. His research in Computer security intersects with topics in Protocol and Service. His studies deal with areas such as Trust management, Web service and Server as well as Access control.
His Computer security model study combines topics from a wide range of disciplines, such as Security through obscurity and Security testing. His Security service research is multidisciplinary, incorporating perspectives in Security information and event management and Cloud computing security. Fabio Massacci combines subjects such as Software and Software development with his study of Software security assurance.
Fabio Massacci focuses on Computer security, Artificial intelligence, Software, Risk management and Malware. His Computer security study combines topics from a wide range of disciplines, such as Fog computing and Software deployment. His Artificial intelligence research includes elements of Observational study, Risk assessment and Natural language processing.
The study incorporates disciplines such as Software security assurance and Code in addition to Software. In his study, which falls under the umbrella issue of Software security assurance, Key is strongly linked to Privilege. His work in the fields of Cyber-Insurance overlaps with other areas such as Work.
His scientific interests lie mostly in Computer security, Software, Artificial intelligence, Risk assessment and Natural language processing. Fabio Massacci does research in Computer security, focusing on Anonymity specifically. The various areas that Fabio Massacci examines in his Software study include Dependency and Android.
His Artificial intelligence study incorporates themes from Binary number and Malware. His Risk assessment research is multidisciplinary, relying on both Exploit, Financial institution and Risk appetite. His study on Natural language processing also encompasses disciplines like
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A survey of autonomic communications
Simon Dobson;Spyros Denazis;Antonio Fernández;Dominique Gaïti.
ACM Transactions on Autonomous and Adaptive Systems (2006)
Modeling security requirements through ownership, permission and delegation
P. Giorgini;F. Massacci;J. Mylopoulos;N. Zannone.
Logical Cryptanalysis as a SAT Problem
Fabio Massacci;Laura Marraro.
Journal of Automated Reasoning (2000)
EXP TIME tableaux for ALC
Francesco M. Donini;Fabio Massacci.
Artificial Intelligence (2000)
Comparing Vulnerability Severity and Exploits Using Case-Control Studies
Luca Allodi;Fabio Massacci.
ACM Transactions on Information and System Security (2014)
Requirements Engineering Meets Trust Management
Paolo Giorgini;Fabio Massacci;John Mylopoulos;John Mylopoulos;Nicola Zannone.
Strongly Analytic Tableaux for Normal Modal Logics
conference on automated deduction (1994)
An access control framework for business processes for web services
Hristo Koshutanski;Fabio Massacci.
workshop on xml security (2003)
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
Fabio Massacci;Marco Prest;Nicola Zannone.
Computer Standards & Interfaces (2005)
Combining deduction and model checking into Tableaux and algorithms for converse-PDL
Giuseppe de Giacomo;Fabio Massacci.
Information & Computation (2000)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: