The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ... International Conference on Tools and Algorithms for the Construction and …, 2012 | 121 | 2012 |
Security validation of business processes via model-checking W Arsac, L Compagna, G Pellegrino, SE Ponta International Symposium on Engineering Secure Software and Systems, 29-42, 2011 | 58 | 2011 |
Model checking of security-sensitive business processes A Armando, SE Ponta International Workshop on Formal Aspects in Security and Trust, 66-80, 2009 | 57 | 2009 |
Impact assessment for vulnerabilities in open-source software libraries H Plate, SE Ponta, A Sabetta 2015 IEEE International Conference on Software Maintenance and Evolution …, 2015 | 45 | 2015 |
Beyond Metadata: Code-centric and Usage-based Analysis of Known Vulnerabilities in Open-source Software SE Ponta, H Plate, A Sabetta | 32 | 2018 |
Vulnerable open source dependencies: Counting those that matter I Pashchenko, H Plate, SE Ponta, A Sabetta, F Massacci Proceedings of the 12th ACM/IEEE International Symposium on Empirical …, 2018 | 25 | 2018 |
Model checking authorization requirements in business processes A Armando, SE Ponta Computers & Security 40, 1-22, 2014 | 17 | 2014 |
Multi-context exploit test management A Sabetta, L Compagna, S Ponta, S Dashevskyi, D Dos Santos, ... US Patent 9,811,668, 2017 | 13 | 2017 |
Cerberus: Automated synthesis of enforcement mechanisms for security-sensitive business processes L Compagna, DR Dos Santos, SE Ponta, S Ranise International Conference on Tools and Algorithms for the Construction and …, 2016 | 12 | 2016 |
Assessing vulnerability impact using call graphs H Plate, S Ponta, A Sabetta US Patent 9,792,200, 2017 | 11 | 2017 |
An action-based approach to the formal specification and automatic analysis of business processes under authorization constraints A Armando, E Giunchiglia, M Maratea, SE Ponta Journal of Computer and System Sciences 78 (1), 119-141, 2012 | 11 | 2012 |
Formal specification and automatic analysis of business processes under authorization constraints: an action-based approach A Armando, E Giunchiglia, SE Ponta International Conference on Trust, Privacy and Security in Digital Business …, 2009 | 11 | 2009 |
Security validation tool for business processes W Arsac, L Compagna, SP Kaluvuri, SE Ponta Proceedings of the 16th ACM symposium on Access control models and …, 2011 | 10 | 2011 |
Software patch evaluator H Plate, S Ponta, A Sabetta US Patent 9,880,832, 2018 | 9 | 2018 |
Secure and compliant execution of processes S Ponta, L Compagna, D Dos Santos, S Ranise US Patent App. 15/097,304, 2017 | 9 | 2017 |
Aegis: automatic enforcement of security policies in workflow-driven web applications L Compagna, DR dos Santos, SE Ponta, S Ranise Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 9 | 2017 |
Modular synthesis of enforcement mechanisms for the workflow satisfiability problem: Scalability and reusability DR dos Santos, SE Ponta, S Ranise Proceedings of the 21st ACM on Symposium on Access Control Models and …, 2016 | 9 | 2016 |
Detection of configuration vulnerabilities in distributed (web) environments MM Casalino, M Mangili, H Plate, SE Ponta International Conference on Security and Privacy in Communication Systems …, 2012 | 9 | 2012 |
Prioritization of software patches H Plate, S Ponta, A Sabetta US Patent 9,959,111, 2018 | 8 | 2018 |
Assisting the deployment of security-sensitive workflows by finding execution scenarios DR dos Santos, S Ranise, L Compagna, SE Ponta IFIP Annual Conference on Data and Applications Security and Privacy, 85-100, 2015 | 8 | 2015 |