SECURITY

  1. A.Hagstrom, F.Parisi-Presicce, A Model for Distribution and Revocations of Certificates, in Proc. ICGT 2010, Lecture Notes in Computer Science 6372 , Springer-Verlag 2010, pp.315-329

  2. M.Majdalawieh, F.Parisi-Presicce, R.Sandhu, RBAC model for SCADA, in “Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications” (Sobh, T.; Elleithy, K.; Mahmood, A.; Karim, M. eds.), Springer 2007, pp. 329-335

  3. X.Zhang, F.Parisi-Presicce, R.Sandhu, Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing, in “Advances in Information and Computer Security”, Proc. IWSEC 2006, Lecture Notes in Computer Science 4266, Springer-Verlag 2006, pp. 179-195     link

  4. X.Zhang, R.Sandhu, F.Parisi-Presicce, Safety Analysis of Usage Control Authorization Models, Proc. ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS06), ACM Press, Mar 2006, pp.243-254

  5. M.Majdalawieh, F.Parisi-Presicce, D.Wijesekera, DNPSec: Distributed Protocol version 3 (DNP3) Security Framework, in “Advances in Computer, Information, and Systems Sciences, and Engineering” (Elleithy, K.; Sobh, T.; Mahmood, A.; Iskander, M.; Karim, M.A. eds.), Springer 2006, pp. 227-234

  6. X.Zhang, F.Parisi-Presicce, R.Sandhu, J.Park, Formal model and policy specification of usage control, ACM Trans. Information and System Security (TISSEC) Vol.8, Issue 4 (November 2005) pp. 351-387    link

  7. A.Motro, F.Parisi-Presicce, Blind Custodians: A Databases service architecture that supports Privacy without Encryption, Proceedings 19th Annual IFIP WG 11.3 Conference on Data and Applications Security, (S.Jajodia, D.Wijesekera eds.), Lecture Notes in Computer Science 3654, Springer-Verlag 2005, pp. 220-235 

  8. M.Koch, L.V.Mancini, F.Parisi-Presicce, Graph-based Specification of Access Control Policies  J. Comput. System Sci. vol.71, no.1, July 2005, pp.1-33 link

  9. Z.Dwaikat, F.Parisi-Presicce, Risky Trust: risk-based analysis of software systems, Proc. Workshop on Software Engineering for Secure Systems—building trustworthy applications (SESS '05), ACM SIGSOFT Software Engineering Notes, vol. 30, issue 4, May 2005  link

  10. M.Koch, L.V.Mancini, F.Parisi-Presicce, Administrative Scope in the Graph-based Framework in Proc. ACM SACMAT 2004 (G.J.Ahn, ed.) ACM Press 2004, pp. 97-104 link  pdf

  11. X.Zhang, J.Park, F.Parisi-Presicce, R.Sandhu, A Logical Specification for Usage Control, in Proc. ACM SACMAT 2004 (G.J.Ahn, ed.) ACM Press 2004, pp. 1-10 link

  12. M.Koch, F.Parisi-Presicce, Formal Access Control Analysis in the Software Development Process, in Proc. ACM Workshop on Formal Methods in Security Engineering (FMSE2003), Washington D.C., Oct 2003, pp.67-76 pdf

  13. D.Wijesekera, S.Jajodia, F.Parisi-Presicce, A.Hagstrom, Removing Permissions in the Flexible Authorization Framework, ACM Trans. On Database Systems (TODS) vol. 28, issue 3 (September 2003) pp. 209-229 link

  14. M.Koch, L.V.Mancini, F.Parisi-Presicce, Decidability of Safety in Graph-based Models for Access Control, in Proc. ESORICS 2002 (D.Gollmann, G.Karjoth, M.Waidner, eds.) Lecture Notes in Computer Science 2502, Springer-Verlag 2002, pp. 229-243 link  pdf

  15. M.Koch, L.V.Mancini, F.Parisi-Presicce, A Graph based Formalism for RBAC, ACM Trans. Information and System Security (TISSEC) Vol.5, Issue 3 (August 2002) pp. 332-365 pdf

  16. M.Koch, L.V.Mancini, F.Parisi-Presicce, Conflict Detection and Resolution in Access Control Policy Specifications, in Proc. FoSSaCS 2002 (M.Nielsen, U.Engberg, eds.)Lecture Notes in Computer Science 2303, Springer-Verlag 2002, pp. 223-237 link

  17. A.Hagstrom, S.Jajodia, F.Parisi-Presicce, D.Wijesekera, Revocations: a classification, in Proc. 14th Comp. Security Foundation Workshop, IEEE Computer Society, June 2001, pp.44-58 pdf

  18. M.Koch, L.V.Mancini, F.Parisi-Presicce, On the Specification and Evolution of Access Control Policies, in Proc. ACM SACMAT 2001 (S.Osborn, ed.) ACM Press 2001, pp. 121-130 pdf

  19. M.Koch, L.V.Mancini, F.Parisi-Presicce, Foundations for a Graph-based approach to the Specification of Access Control Policies, in Proc. FoSSaCS 2001 (F.Honsell, M.Miculan, eds.) Lecture Notes in Computer Science 2030, Springer-Verlag 2001, pp.287-302 pdf


SOFTWARE ENGINEERING

  1. P.Bottoni, R.Navigli, F.Parisi-Presicce, Conditions, constraints and contracts: On the use of annotations for policy modeling. Electronic Communications of the EASST, vol 73 (2015)

  2. P.Bottoni, F.Parisi-Presicce, Annotations on Complex Patterns. in Proceedings of the 12th Int. Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT 2013), Electronic Communications of the EASST, vol 58 (2013) link

  3. P.Bottoni, F.Parisi-Presicce, Annotation processes for flexible management of contextual information. J. Vis. Lang. Comput. (VLC) vol. 24, no.6:, pp.421-440 (2013)

  4. P.Bottoni, F.Parisi-Presicce, Modeling context with graph annotations. in Proceedings of the 11th Int. Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT 2012), Electronic Communications of the EASST, vol 47 (2012) link

  5. P.Bottoni, A. Fish, F.Parisi-Presicce, Preserving constraints in horizontal model transformations, in Proceedings of the 9th Int. Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT 2010), Electronic Communications of the EASST, vol 29 (2010) link

  6. P.Bottoni, F.Parisi-Presicce, S.Pulcini, G.Taentzer, Maintaining coherence between models with distributed rules: from theory to Eclipse, Proc. GT-VMT 2006 Electronic Notes of Theoretical Comp. Sci. (ENTCS) vol.211, (Apr 2008), Elsevier, pp.87-98  link

  7. M.Koch, F.Parisi-Presicce, K.Pauls, Access Control Specification in UML , in   “Integrating Security and Software Engineering: Advances and Future Vision” (H.Mouratidis, P.Giorgini, eds.), Idea Group Publishing 2007, pp.220-243

  8. Francesco Parisi-Presicce (ed.), Special section: International Conference on Graph Transformation ICGT 2004. Software and System Modeling 6(3): 267-268 (2007)

  9. M.Koch, F.Parisi-Presicce, UML Specification of Access Control Policies and their Formal Verification Software and System Modeling, vol.5, no.4 (Dec 2006), pp.429-447

  10. M.Koch, K.Pauls, F.Parisi-Presicce, Generation of Role-base Access Control Requirements from UML Diagrams, in Proc. Symposium on Requirement Engineering for Information Security (SREIS 2005), Paris, Aug 2005

  11. P.Bottoni, F.Parisi-Presicce, G.Taentzer, Specifying Coherent Refactoring of Software Artifacts with Distributed Graph Transformations, in: Transformation of Knowledge, Information, and Data: Theory and Applications (P.v.Bommel,ed.), Information Science Publishing 2005, pp.95-125 -link

  12. P.Bottoni, M.Koch, F.Parisi-Presicce, G.Taentzer, Termination of High-Level Replacement Units with Application to Model Transformation, VLFM 2004, Electronic Notes of Theoretical Comp. Sci. (ENTCS) vol.127, no.4 (2005), Elsevier, pp.71-86  link

  13. Z.Dwaikat, F.Parisi-Presicce, From Misuse cases to Collaboration Diagrams in UML, Proc. 3rd International Workshop on Critical System Development with UML (satellite to UML 2004), (J.Jurjens, E.B.Fernandez, R.France, B.Rumpe Eds.), Lisbon (PT) October 2004, TUM-I0415, pp.130-138

  14. M.Koch, F.Parisi-Presicce, Visual Specifications of Policies and Their Verification, in Proc. FASE 2003 (M.Pezze’, ed.) Lecture Notes in Computer Science 2621, Springer-Verlag 2003, pp.278-293 pdf

  15. P.Bottoni, F.Parisi-Presicce, G.Taentzer, Coordinated Distributed Graph Transformation for Software Evolution, in Proc. SET 02 (satellite workshop to ICGT 2002) (R.Heckel, T.Mens, M.Wermelinger, eds.) Oct 2002, pp. 1-10 (Electronic Notes of Theoretical Comp. Sci. (ENTCS) vol. 72, no.4, Elsevier)

  16. M.Mecella, F.Parisi-Presicce, B.Pernici, Modelling E-service Orchestration through Petri Nets, in Technologies for E-services (TES’02) (A.Buchman et al., eds.) Lecture Notes in Computer Science 2444, Springer-Verlag 2002, pp. 38-47. link

  17. M.Koch, F.Parisi-Presicce, Access Control Policy Specification in UML, Proc. Critical System Development with UML (satellite workshop of UML 2002), Dresden (DE), September 2002, Techn. Univ. München, TUM-I0208, pp.63-8

  18. M.Gajewsky, F.Parisi-Presicce, On Compatibility of Models and Model-Class Transformations, in "Recent Trends in Algebraic Development Techniques" (M.Cerioli, G.Reggio, eds.) Lecture Notes in Computer Science 2267, Springer-Verlag 2002, pp. 109-127. link

  19. P.Bottoni, M.Koch, F.Parisi-Presicce, G.Taentzer, A Visualization of OCL using Collaborations in Proc. Unified Modeling Language <UML 2001>, (M.Gogolla, C.Kobryn, eds.), Lecture Notes in Computer Science 2185, Springer-Verlag 2001, pp.257-271 pdf

  20. P.Bottoni, B.Meyer, F.Parisi-Presicce,On a Uniform Logical Framework for Diagram Reasoning, in Proc. Symp. on Visual Languages and Formal Methods (VLFM'01), IEEE Comp.Sci. Press 2001, pp. 64-71 link  pdf

  21. P.Bottoni, K.Marriott, B.Meyer, F.Parisi-Presicce, Deductive Parsing of Visual Languages, in Proc. 4th Int. Conf. Logical Aspects of Computational Linguistics (P.deGroote, G.Morrill, C.Retore, eds.), Lect.Notes Artificial Intell. 2099, Springer-Verlag 2001, pp.79-94  link

  22. M.Gajewsky, F.Parisi-Presicce, Transformations between Petri Net Classes with applications to Software Development, in Proc. 2nd Internat. Colloq. on Petri Net Techn. for Modeling Communication Based Systems (H.Weber, H.Ehrig, W.Reisig, eds.), Fraunhofer Gesellschaft ISST Berlin Sept 2001, pp. 105-122.

GRAPH TRANSFORMATIONS

  1. P-Bottoni, A.Fish, F.Parisi-Presicce, Spider Graphs: a graph transformation system for spider diagrams. Software and System Modeling 14(4): 1421-1453 (2015)

  2. Francesco Parisi-Presicce, Bernhard Westfechtel (eds.), Graph Transformation - 8th International Conference, ICGT 2015, Held as Part of STAF 2015, L'Aquila, Italy, July 21-23, 2015. Proceedings. Lecture Notes in Computer Science 9151, Springer 2015, ISBN 978-3-319-21144-2

  3. P.Bottoni, A. Fish, F.Parisi-Presicce, Incremental update of constraint-compliant policy rules, in Proc. 3rd Int. Workshop on Graph Computation Models (GCM 2010), Electronic Communications of the EASST, vol 39 (2010) link)

  4. P.Bottoni, F.Parisi-Presicce, A Termination Criterion for Graph Transformations with NACs, in Internat. Colloquium on Graph and Model Transformation, Electronic Communications of the EASST, vol 30 (2010) link

  5. Gregor Engels, Fernando Orejas, Francesco Parisi-Presicce (eds.), Special Issue with Selected Papers from ICGT 2004. Fundam. Inform. 74(1) (2006)

  6. P.Bottoni, K.Hoffmann, F.Parisi-Presicce, Termination of Algebraic Rewriting with Inhibitors, in Proc. 2nd Int. Workshop on Graph and Model Transformation (GraMoT), Electronic Communications of the EASST, vol 4 (2006) link

  7. P.Bottoni, K.Hoffmann, F.Parisi-Presicce, G.Taentzer, High-Level Replacement Units and their Termination Properties  in J. Visual Languages and Computing vol.16, no.6, December 2005, pp.485-507 link

  8. P.Bottoni, M.Koch, F.Parisi-Presicce, G.Taentzer, Termination of High-Level Replacement Units with Application to Model Transformation, VLFM 2004, Electronic Notes of Theoretical Comp. Sci. (ENTCS) vol.127, no.4 (2005), Elsevier, pp.71-86  link

  9. K.Hoffmann, T.Mossakowski, F.Parisi-Presicce, Higher-Order Nets for Mobile Policies, PNGT 2004, Electronic Notes of Theoretical Comp.Sci. (ENTCS) vol.127, no.2 (2005), Elsevier, pp.87-105 link

  10. F.Parisi-Presicce, Y.Zhao, Policy Verification and Analysis by Graph Transformation Tools GraBaTs 2004,  Electronic Notes of Theoretical Comp. Sci. (ENTCS) vol.127, no.1 (2005), Elsevier, pp.101-112

  11. H.Ehrig, G.Engels, F.Parisi-Presicce, G.Rozenberg, Eds., Graph Transformations: Proceedings of the 2nd International Conference ICGT 2004 , Lecture Notes in Computer Science vol.3256, Springer, 2004 (http://www.springeronline.com/3-540-23207-9

  12. P.Bottoni, F.Parisi-Presicce, G.Taentzer, Specifying Integrated Refactoring with Distributed Graph Transformations, in Proc. AGTIVE 2003, Charlottesville, VA, Sept 2003, (J.L.Pfaltz, M.Nagl, B.Böhlen, eds.) Lecture Notes in Computer Science 3062, Springer-Verlag 2004, pp. 220-235

  13. M.Koch, F.Parisi-Presicce, Describing Policies with Graph Constraints and Rules, in Proc. ICGT 2002 (A.Corradini, H.Ehrig, H.-J.Kreowski, G.Rozenberg, eds.) Lecture Notes in Computer Science 2505, Springer-Verlag 2002, pp. 223-238 pdf

  14. F.Parisi-Presicce, A Formal Framework for Petri Net Class Transformations, in Proc. Petri Net Technology for Communication Based Systems (H.Ehrig, W.Reisig, G.Rozenberg, H.Weber, eds.) "Advances in Petri Nets" series, Lecture Notes in Computer Science 2472, Springer-Verlag 2003, pp. 409-430 pdf

  15. P.Bottoni, M.Koch, F.Parisi-Presicce, G.Taentzer, Working on OCL with Graph Transformations, in Proc. AGT 02 (satellite workshop of ETAPS2002) (H.J.Kreowski, P.Knirsch, eds.) Grenoble(FR) April 2002, pp. 1-10

  16. H.Ehrig, A.Habel, F.Parisi-Presicce, Basic results for two types of High Level Replacement Systems, Electronic Notes of Theoretical Comp. Sci. (ENTCS) 51 (2002), Elsevier,12 pages.

  17. M.Koch, L.V.Mancini, F.Parisi-Presicce, Graph Transformations for the Specification of Access Control Policies, Electronic Notes of Theoretical Comp. Sci. (ENTCS) 51 (2002), Elsevier, 11 pages.

  18. P.Bottoni, B.Meyer, F.Parisi-Presicce, Visual Multiset Rewriting: Applications to Diagram Parsing and Reasoning, in "Multiset Processing: Mathematical, Computer Science, and Molecular Computing Points of View" (C.S.Calude, G.Paun, G.Rozenberg, A.Salomaa, eds.), Lecture Notes in Computer Science 2235, Springer-Verlag 2001, pp.45-67

  19. M.Große-Rhode, F.Parisi-Presicce, M.Simeoni: Formal Software Specification with Refinement and Modules for Typed Graph Transformation Systems, J. Comput. System Sci. vol.64, no.2, March 2001, pp.171-218

  20. F.Parisi-Presicce, On Modifying High Level Replacement Systems, (invited) Workshop on Uniform Approaches to Graphical Process Specification Techniques (UNIGRA), Electronic Notes of Theoret. Comp. Sci. (ENTCS) 44, 4 (2001), Elsevier, 12 pages.