Luca Compagna
Luca Compagna
SAP Security Research
Verified email at sap.com - Homepage
TitleCited byYear
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
International conference on computer aided verification, 281-285, 2005
9642005
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
A Armando, R Carbone, L Compagna, J Cuellar, L Tobarra
Proceedings of the 6th ACM workshop on Formal methods in security …, 2008
2892008
A high level protocol specification language for industrial security-sensitive protocols
Y Chevalier, L Compagna, J Cuellar, PH Drielsma, J Mantovani, ...
1622004
SAT-based model-checking for security protocols analysis
A Armando, L Compagna
International Journal of Information Security 7 (1), 3-32, 2008
1302008
LTL model checking for security protocols
A Armando, R Carbone, L Compagna
Journal of Applied Non-Classical Logics 19 (4), 403-429, 2009
1172009
SATMC: a SAT-based model checker for security protocols
A Armando, L Compagna
European workshop on logics in artificial intelligence, 730-733, 2004
1082004
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction and …, 2012
1062012
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
International Conference on Computer Aided Verification, 349-354, 2002
972002
An authentication flaw in browser-based single sign-on protocols: Impact and remediations
A Armando, R Carbone, L Compagna, J Cuéllar, G Pellegrino, A Sorniotti
Computers & Security 33, 41-58, 2013
672013
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
L Compagna, P El Khoury, A Krausová, F Massacci, N Zannone
Artificial Intelligence and Law 17 (1), 1-30, 2009
502009
An optimized intruder model for SAT-based model-checking of security protocols
A Armando, L Compagna
electronic notes in theoretical computer science 125 (1), 91-108, 2005
502005
SAT-based model-checking of security protocols using planning graph analysis
A Armando, L Compagna, P Ganty
International Symposium of Formal Methods Europe, 875-893, 2003
492003
Security validation of business processes via model-checking
W Arsac, L Compagna, G Pellegrino, SE Ponta
International Symposium on Engineering Secure Software and Systems, 29-42, 2011
462011
Automatic SAT-compilation of protocol insecurity problems via reduction to planning
A Armando, L Compagna
International Conference on Formal Techniques for Networked and Distributed …, 2002
402002
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
L Compagna, PE Khoury, F Massacci, R Thomas, N Zannone
Proceedings of the 11th international conference on Artificial intelligence …, 2007
382007
SATMC: a SAT-based Model Checker for Security-critical Systems
A Armando, R Carbone, L Compagna
International Conference on Tools and Algorithms for the Construction and …, 2014
362014
From multiple credentials to browser-based single sign-on: Are we more secure?
A Armando, R Carbone, L Compagna, J Cuellar, G Pellegrino, A Sorniotti
IFIP International Information Security Conference, 68-79, 2011
332011
Model-checking driven security testing of web-based applications
A Armando, R Carbone, L Compagna, K Li, G Pellegrino
2010 Third International Conference on Software Testing, Verification, and …, 2010
332010
SAT-based model-checking of security protocols
L Compagna
Phd, Universita di Genova, Italy, and University of Edinburgh, UK, 2005
252005
Abstraction-driven sat-based analysis of security protocols
A Armando, L Compagna
International Conference on Theory and Applications of Satisfiability …, 2003
252003
The system can't perform the operation now. Try again later.
Articles 1–20