Serena Elisa Ponta
TitleCited byYear
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction andá…, 2012
1062012
Model checking of security-sensitive business processes
A Armando, SE Ponta
International Workshop on Formal Aspects in Security and Trust, 66-80, 2009
522009
Security validation of business processes via model-checking
W Arsac, L Compagna, G Pellegrino, SE Ponta
International Symposium on Engineering Secure Software and Systems, 29-42, 2011
462011
Impact assessment for vulnerabilities in open-source software libraries
H Plate, SE Ponta, A Sabetta
2015 IEEE International Conference on Software Maintenance and Evolutioná…, 2015
242015
Multi-context exploit test management
A Sabetta, L Compagna, S Ponta, S Dashevskyi, D Dos Santos, ...
US Patent 9,811,668, 2017
142017
Model checking authorization requirements in business processes
A Armando, SE Ponta
Computers & Security 40, 1-22, 2014
132014
Formal specification and automatic analysis of business processes under authorization constraints: An action-based approach
A Armando, E Giunchiglia, SE Ponta
International Conference on Trust, Privacy and Security in Digital Businessá…, 2009
122009
An action-based approach to the formal specification and automatic analysis of business processes under authorization constraints
A Armando, E Giunchiglia, M Maratea, SE Ponta
Journal of Computer and System Sciences 78 (1), 119-141, 2012
102012
Security validation tool for business processes
W Arsac, L Compagna, SP Kaluvuri, SE Ponta
Proceedings of the 16th ACM symposium on Access control models andá…, 2011
92011
Vulnerable open source dependencies: Counting those that matter
I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci
Proceedings of the 12th ACM/IEEE International Symposium on Empiricalá…, 2018
82018
Detection of configuration vulnerabilities in distributed (web) environments
MM Casalino, M Mangili, H Plate, SE Ponta
International Conference on Security and Privacy in Communication Systemsá…, 2012
82012
Beyond Metadata: Code-centric and Usage-based Analysis of Known Vulnerabilities in Open-source Software
SE Ponta, H Plate, A Sabetta
72018
Modular synthesis of enforcement mechanisms for the workflow satisfiability problem: scalability and reusability
DR dos Santos, SE Ponta, S Ranise
Proceedings of the 21st ACM on Symposium on Access Control Models andá…, 2016
72016
Aegis: automatic enforcement of security policies in workflow-driven web applications
L Compagna, DR dos Santos, SE Ponta, S Ranise
Proceedings of the Seventh ACM on Conference on Data and Applicationá…, 2017
62017
Cerberus: Automated synthesis of enforcement mechanisms for security-sensitive business processes
L Compagna, DR Dos Santos, SE Ponta, S Ranise
International Conference on Tools and Algorithms for the Construction andá…, 2016
62016
Assisting the deployment of security-sensitive workflows by finding execution scenarios
DR dos Santos, S Ranise, L Compagna, SE Ponta
IFIP Annual Conference on Data and Applications Security and Privacy, 85-100, 2015
62015
Towards formal validation of trust and security in the internet of services
R Carbone, M Minea, SA M÷dersheim, SE Ponta, M Turuani, L Vigan˛
The Future Internet Assembly, 193-207, 2011
62011
Runtime configuration checks for composite applications
H Plate, S Ponta, MM Casalino, T Scholte
US Patent 9,009,534, 2015
52015
Assessing vulnerability impact using call graphs
H Plate, S Ponta, A Sabetta
US Patent 9,792,200, 2017
32017
Automatically finding execution scenarios to deploy security-sensitive workflows
DR dos Santos, S Ranise, L Compagna, SE Ponta
Journal of Computer Security 25 (3), 255-282, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20