• No results found

Curriculum Vitae. Alessandro Armando. November 2014

N/A
N/A
Protected

Academic year: 2021

Share "Curriculum Vitae. Alessandro Armando. November 2014"

Copied!
11
0
0

Loading.... (view fulltext now)

Full text

(1)

Curriculum Vitae

Alessandro Armando

November 2014

Personal Information

Name: Alessandro Armando Date of Birth: February 1, 1964 Birthplace: Pietra Ligure (SV), Italy Citizenship: Italian

Marital Status: Married Languages: Italian, English

Addresses

Office:

Dipartimento di Informatica, Bioingegneria, Robotica e Ingegneria dei Sistemi (DIBRIS) Universit`a di Genova

Viale Causa, 13, 16145 – Genova Phone: +39 0103532216 Mobile: +39 3281003201 Fax: +39 0103532948 Email:alessandro.armando@unige.it WWW:http://www.csec.it Office:

Security & Trust Research Unit Center for Information Technology Fondazione Bruno Kessler

Povo - Via Sommarive 18 38123 Trento, Italy Phone: +39 0461314193 Fax: +39 0461302040 Email:armando@fbk.eu WWW:http://st.fbk.eu Home:

Via Isonzo, 12/6, 16147 – Genova

Current Positions

• Associate Professor in the scientific area ING-INF/05 (Computer Engineering) at Dipartimento di Informatica, Sistemistica e Telematica (DIST) of the University of Genova.

• Head of the Security & Trust Research Unit at the Center for Information Technology, Fondazione Bruno Kessler (FBK), Trento, Italy.

(2)

Military Service

• Officer of the Technical Corp of the Italian Army (Ufficiale di Complemento del Corpo Tecnico dell’Esercito), 1990-1991.

Degrees

• National Scientific Qualification (Abilitazione Scientifica Nazionale) for University Professor (Full Professor) in the following Scientific Areas: 09/H1 - Sistemi di Elaborazione delle Informazioni (Computer Engineering) and 01/B1 - Informatica (Computer Science).http://abilitazione. miur.it/

• Ph.D. in Electronic and Computer Engineering (Dottore di Ricerca in Ingegneria Elettronica ed Infor-matica), specialisation in Computer Engineering. Rome, September 15, 1994.

• Professional qualification in Electronic Engineering (April 1989). (Esame di Stato in Ingegneria Elet-tronica.)

• MSc in Electronic Engineering (Laurea in Ingegneria Elettronica), specialisation in Computer Engi-neering, University of Genova, Faculty of Engineering (December 21, 1988). Score: 110/110 with honor (Lode). The thesis has been declared worthy of publication by the evaluation committee.

Academic and Research Appointments

• September 2011-February 2014: Chair of the TrentoRISE Research Area on Privacy, Security and Trust (http://www.trentorise.eu), Trento, Italy.

• Since April 2010:Head of the Security & Trust Research Unit (http://st.fbk.eu) at the Center for Information Technologies, Fondazione Bruno Kessler (FBK), Trento, Italy.

• Since January 2004:Associate professor at the Dipartimento di Informatica, Bioingegneria, Robot-ica e Ingegneria dei Sistemi (DIBRIS), formerly named Dipartimento di InformatRobot-ica, SistemistRobot-ica e Telematica (DIST). Scientific area ING-INF/05 (Computer Engineering).

• July 1995 - December 2003: Researcher (assistant professor with tenure) at Dipartimento di Infor-matica, Sistemistica e Telematica of the University of Genova. Scientific area ING-INF/05 (Computer Engineering).

• October 1998 - September 1999: visiting researcher at the Research Institute INRIA Lorraine in Nancy (France) in thePROTHEO Groupled by Dr. H´el`ene Kirchner.

• July 1994 - June 1995:research fellow at the Department of Artificial Intelligence of the University of Edinburgh (UK) in theMathematical Reasoning Groupled by Prof. Alan Bundy.

• March-June 1993: visiting researcher at Department of Computer Science at Stanford University (California) in theFormal Reasoning Groupled by Prof. John McCarthy.

• April 1989 - December 1993:research consultant at Istituto per la Ricerca Scientifica e Tecnologica (IRST), Trento, in theMechanized Reasoning Groupled by Prof. Fausto Giunchiglia. The research activity took place in different periods for a total of 16 months.

Research Grants

• April 2010-March 2013: 3 year grant titled Automated Security Analysis of Identity and Access Management Systems (SIAM)funded by Provincia Autonoma di Trento in the context of the EU “Team 2009 - Incoming” COFUND action.

(3)

issued by the French Ministry of Foreign Affairs to visit the research institute of INRIA-Lorraine (Institut National de Recherche en Informatique et en Automatique) in Nancy (France).

• November 1994:6 months grant issued by the Department of Artificial Intelligence of the University of Edinburgh (UK) in the context of theHuman Capital and Mobility Programme funded by the European Union.

• January 1994:1 year grant for specialisation at the University of Edinburgh issued by the University of Genova.

• November 1990: 3 year grant for PhD in Electronic and Computer Engineering at the University of Genova.

Invited Talks and Lectures

1. Invited talk on “Android Security & Secure Meta-Markets”, NeSSoS Meeting, September 5, 2013, Bertinoro, Italy.

2. Invited talk on “The SPaCIoS Tool: property-driven and vulnerability-driven security testing for Web-based apps”, 13th International School on Foundations of Security Analysis and Design (FOSAD’13), September 4, 2013, Bertinoro, Italy.

3. Keynote talk on “Security and Privacy of Web-based Single Sign-On Protocols: Pitfalls and Solu-tions”, IFIP Summer School on Privacy and Identity Management for Life, September 7, 2011, Trento, Italy.

4. Invited Lecture on “The Rewriting Approach to Decision Procedures”, Summer School on Verifi-cation Technology, Systems & AppliVerifi-cations (VTSA’11), September 23, 2011, Montefiore Institute (University of Liege), Belgium.

5. Invited Lecture on “Automatic Symbolic Analysis of Access Control Policies”, Summer School on Verification Technology, Systems & Applications (VTSA’11), September 23, 2011, Montefiore Insti-tute (University of Liege), Belgium.

6. Invited Talk “Building SMT-based Software Model Checkers: an Experience Report”, 7th Interna-tional Symposium on Frontiers of Combining Systems, Trento, Italy, September 16-18, 2009. 7. “Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single

Sign-On for Google Apps”, Istituto per la Ricerca Scientifica e Tecnologica, Trento, Italy, March 2, 2009.

8. Invited Talk “LTL Model Checking for Security Protocol Analysis”, Workshop on Logic and Infor-mation Security, September 22-28, 2008, Lorentz Center, Leiden, Holland.

9. Invited Talk “Verifica Automatica della Sicurezza delle Applicazioni Web: come abbiamo scoperto la vulnerabilit`a al servizio di Single Sign-On di Google”, Security Seminar after the Silicon Valley Study Tour 2008, Genova, Italy, November 4, 2008.

10. Invited Talk “LTL Model Checking for Security Protocol Analysis”, Workshop on Workshop Logic and Information Security, Leiden University, Holland, September 22-28, 2008.

11. Invited Talk “Software Model Checking: new challenges and opportunities for Automated Reason-ing”, joint invited talk at Workshop on Practical Aspects of Automated Reasoning (PAAR-2008) and at the Workshop on Complexity, Expressibility, and Decidability in Automated Reasoning (CEDAR’08), Sydney, Australia, August 10, 2008.

12. Invited Lecture “Automatic Validation of Internet Security Protocols”, lecture at the AEOLUS Sum-mer School on Global Computing, Salerno, September 20, 2007.

13. “Big proof engines as little proof engines: new results on rewrite-based satisfiability procedures”, CISA Talk, Division of Informatics, University of Edinburgh, August 23, 2007.

14. Invited Lecture “Decision Procedures for Automated Verification”, lecture at the Scuola Estiva di Logica, Palazzo Feltrinelli, Gargnano, September 5, 2006.

(4)

Decision Procedures, Microsoft Research, Cambridge (UK), September 13, 2005.

16. “The AVISPA Project: Automatic Validation of Internet Security Protocols”, Security Area Advisory Group (SAAG) Meeting, in the context of the 62nd IETF Meeting, Minneapolis, March 5, 2005. 17. “Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning”, Computer

Science Department, University of Texas, November 11, 2002.

18. Invited Lecture “Integration of Decision Procedures in Automated Reasoning” lecture series at the CALCULEMUS Autumn School, Pisa, September 30 - Oct 1, 2002.

19. Invited Talk “An Overview of the AVISS Project”, Workshop on Specification, Analysis and Valida-tion for Emerging Technologies (SAVE 2002), Copenhagen, Denmark, July 27, 2002.

20. “Proof-planning: an Overview”, DEIS - University of Bologna, July 2, 2002.

21. “A Rule-Based Approach to Specifying the Integration of Decision Procedures in Formula Simplifi-cation”, INRIA-Lorraine, Nancy, June 29, 2001.

22. Invited Talk “An Overview of the Open Mechanized Reasoning Systems Project”, Prosper Research Workshop, University of Cambridge, November 22, 1999.

23. “Integrating decision procedures with rewriting”, NASA Ames Research Center (California), Novem-ber 7, 1997.

24. “Constraint Contextual Rewriting”, Institute for Algorithms and Cognitive Systems, University of Karlsruhe (Germany), 1997.

Involvement in Scientific Events

I have served in the Steering Committees of the following scientific events: 1. International Workshop on Security Testing, 2011-present.

2. Workshop on Semantic Computing for Security and Privacy, sponsored by the IEEE Computer Soci-ety’s Technical Committees Security and Privacy (TCSP) and Semantic Computing (TCSEM), 2011-present.

3. International Conference on Automated Deduction (ex-officio, since July 2007), http://www. cadeconference.org/.

4. International Joint Conference on Automated Reasoning, (2002-2005 and ex-officio since February 2007),http://www.ijcar.org/.

5. theFirst Order Theorem Proving(FTP) Workshop Series. (Elected for the period 2001-2004, renewed in 2005),http://www.csc.liv.ac.uk/FTP-WS/

6. Frontiers of Combining Systems(FroCoS) Workshop Series (ex-officio 2001-2005), http://combination.cs.uiowa.edu/frocos/.

7. CALCULEMUS Interest Group. (Ex-officio from 1999 to 2001; elected for the period 2001-2004), http://www.calculemus.net.

I am also member of the Management Committee of

1. COST Action IC0901:Rich-Model Toolkit - An Infrastructure for Reliable Computer Systems. I have been Program Chair of the following scientific events:

1. (with Hilarie Orman)2nd Workshop on Semantic Computing for Security and Privacy(WSCS’12), May 24, 2012.

2. (with Maria Paola Bonacina)Rich-Model Toolkit Meeting, Torino, Italy October 3-4, 2011.

3. (with G. Lowe)Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS 2010), Cyprus, March 2010.

4. (with P. Baumgartner and G. Dowek) 4th International Joint Conference on Automated Reasoning (IJCAR 2008), Sidney, August 11-16, 2008.

(5)

(PDPAR’05), Edinburgh (UK), July 12, 2005.

6. (with Luca Vigan`o)Automated Reasoning for Security Protocols Analysis (ARSPA’04), Cork, Ireland, July 4, 2004.

7. 4th International Workshop on Frontiers of Combining Systems(FroCoS 2002), Santa Margherita Ligure, April 8-10, 2002.

8. (with Tudor Jabelean) 7th SymposiumCALCULEMUS: Systems for Integrated Computation and De-ductionheld in Trento on July 11-12, 1999 in the context of the 1999 Federated Logic Conference (FLoC’99).

I served in the Program Committee of more than 40 international conferences.

Research Projects

I am (or have been) scientific coordinator of the following research projects:

• Security Threat Identification and Testing (STIATE), funded by the European Institute for Innovation and Technology (EIT ICT Labs). Partner Institutions: FBK, DFKY, Reply, SAP AG. Duration: 12 months, starting on Juanuary 1, 2014. STIATE is focused on the development of a methodology and software toolkit for in-depth security evaluation and assurance of collaborative, distributed business applications.

• A European Industrial Doctorate on Security and Trust of Next Generation Enterprise Information Systems (SECENTIS)funded by the European Commission in the context of the 2012 PEOPLE Work Programme. Partner Institutions: FBK and SAP AG (main beneficiaries), University of Trento and TrentoRISE (associated partners). Duration: 48 months, starting on April 1, 2013. The goal of the SECENTIS project is to provide an innovative training program at the Doctoral level to educate a new generation of security experts capable to tackle the scientific and technical challenges raised by the combination of new technologies (e.g. cloud computing, mobile applications, and the Software-as-a-Service paradigm) and to manage the impact of these changes in industry. The SECENTIS training program stems from a carefully selected set of research activities aiming at devising cutting-edge solutions that will improve the security of the next generation of Enterprise Information Systems and Process Management solutions.

• Formal specification of security model for the High Assurance Automated Guard, funded by the NATO Communications and Information (NCI) Agency. Duration: 2 years, starting on July 15, 2012. The goal of the project is to formally specify and validate the Content-based Protection and Release (CPR) security model to be used within the High Assurance Automated Guard and the NATO Future Mission Network.

• Integrating automated reasoning in model checking: towards push-button formal verification of large-scale and infinite-state systems(20079E5KM8) funded by the Italian Ministry of Scientific and Tech-nological Research in the context of the PRIN 2007 Programme. Partner Institutions: DIST, Universit`a di Genova (Prof. A. Armando, coordinator); Universit`a di Napoli (Prof. M. Benerecetti); Universit`a di Trento (Prof. R. Sebastiani); Universit`a di Verona (Prof. M. P. Bonacina). Duration: 24 months, starting on September 23, 2008.

• IST FET Open ProjectAVISPA: Automated Validation of Internet Security Protocols and Applica-tions(IST-2001-39252) funded by the European Commission in the context of the 5th Framework Programme. Partner Institutions: DIST, Universit`a di Genova (Prof. A. Armando, coordinator); Ei-dgenoessische Technische Hochschule Zurich (ETHZ), Switzerland (Prof. D. Basin); INRIA Lor-raine, France (Dr. M. Rusinowitch); Siemens AG, Munich, Germany (Dr. J. Cuellar). URL:www. avispa-project.org. Duration: 30 months, starting on January 1, 2003.

The AVISPA project has led to the development of a push-button, industrial-strength technology for the analysis of large-scale Internet security-sensitive protocols and applications. This technology is already speeding the development of the new generation of network protocols, is improving their security, and therefore is increasing the public acceptance of advanced, distributed IT applications

(6)

based on them. In 2006 the AVISPA Project received the nomination for the Descartes Prize for excellence in scientific collaborative research. (It was one the 13 projects shortlisted out of 65 sub-missions.) This prize is described in the Descartes Prizes web page (http://cordis.europa. eu/science-society/descartes/home.html) in the following way:

“This prize is awarded to teams of researchers who have achieved outstanding scientific or tech-nological results through collaborative research in any field of science, including the social sci-ences, humanities and economics.”

• International project for the co-tutoring of PhD students and mutual recognition of the degree in the area of integration of Deduction and Symbolic Computation. The project has been funded by the Italian Ministry of Scientific and Technological Research in the context of the Program of Interna-tionalisation of the Italian University System (D.M. 21.6.99, art. 7 - Internazionalizzazione, URL: interlink.murst.it).

• Verifica automatica dei protocolli di sicurezza(RBAU01P5SS) funded by the Italian Ministry of Sci-entific and Technological Research in the context of the FIRB 2001 Programme. Partner Institutions: DIST, Universit`a di Genova (Prof. A. Armando, coordinator); University of Trento (Prof. F. Massacci); University of Napoli (Prof. M. Benerecetti). Duration: 36 months starting from July 1, 2003.

Principal investigator for DIST of the following research projects:

• Security Horizons(2010XSEMLC 006), funded by the Italian Ministry of Scientific and Technologi-cal Research in the context of the PRIN 2011 Programme.

• Secure Provision and Consumption in the Internet of Services (SPaCIoS), STREP project number 257876, funded by the EU in the context of the 7th Framework Programme, THEME ICT-1-1.4 – Secure, dependable and trusted Infrastructures. Partner Institutions: U. of Verona (coordinator), U. of Genova, ETHZ, SAP Research, Siemens AG, Karlsruhe Institute of Technology, Institut Polytech-nique de Grenoble. Duration: 36 months from October 11, 2010.

• Automated Validation of Trust and Security of Service-oriented Architectures (AVANTSSAR), STREP project number 216471, funded by the EU in the context of the 7th Framework Programme, THEME ICT-1-1.4 – Secure, dependable and trusted Infrastructures. Partner Institutions: U. of Verona (co-ordinator), U. of Genova, ETHZ, SAP Research, Siemens AG, INRIA-Lorraine, IRIT, OpenTrust, Institute e-Austria Timis¸oara. Duration: 36 months from January 1, 2008.

• Sistema INTEgrato per la Sicurezza ad Intelligenza diStribuita(SINTESIS),Distretto Tecnologico Ligure. Duration: 18 months from March 1, 2009.

• Decision Procedures for Software Model Checking(2003097383-002) funded by the Italian Ministry of Scientific and Technological Research in the context of the PRIN 2003 Programme. Duration: 24 months from November 1, 2003.

• AVISS: Automated Verification of Infinite State Systems(IST-2000-26410) funded by the European Commission in the context of theFuture and Emerging TechnologiesProgramme of the 5th Frame-work Programme. Duration: 12 months from May 1, 2001.

• Integration of Decision Procedures in Automated Deductionin collaboration with Dr. Michael Rusi-nowitch (INRIA Lorraine). Funded by the French Ministry of Foreign Affairs and CRUI(Conferenza dei Rettori delle Universit`a Italiane) through the Italian Ministry of Scientific and Technological Re-search (MURST) in the context of the ProgrammeGalileo 1999.

• Research Training Network CALCULEMUS: Systems for Integrated Computation and Deduction

(HPRN-CT-2000-00102), Funded by the European Commission in the context of the Programme Im-proving Human Research Potential and the Socio-Economic Knowledge Baseof the 5th Framework Program. Duration: 48 months from January 1, 2000.

• The Use of Metatheoretic and Analogical Reasoning in Proof Planningin collaboration with Prof. J¨org Siekmann of the Department of Computer Science of the University of Saarbr¨ucken (Germania). Funded by CRUI(Conferenza dei Rettori delle Universit`a Italiane) and DAAD in the context of the ProgrammeVigoni 1996.

• Automation of Program Synthesis in Proof-Planningin collaboration with Prof. Alan Bundy of the Department of Artificial Intelligence of the University of Edinburgh. Funded by CRUI(Conferenza

(7)

dei Rettori delle Universit`a Italiane) and the British Council in the context of the British-Italian Co-operation Programme for Research and High Education (1996 Edition).

• Reflective Architectures for Automated Deductionin collaboration with Prof. Alan Bundy (University of Edinburgh), Prof. David Basin (Max-Planck Institut f¨ur Informatik – Saarbr¨ucken), Prof. Fausto Giunchiglia (University of Trento). Funded by CNR(Consiglio Nazionale delle Ricerche).

Teaching

I have taught the following courses:

• 2013–present (1 academic year)Computer Security, MSc in Computer Engineering, University of Genova.

• 2010–2013 (4 academic years)Sistemi Operativi e Sicurezza Informatica, (Operating Systems and Computer Security), MSc in Computer Engineering, University of Genova.

• 2007–2009 (2 academic years)Tecnologie Software per il Web 1(Software Technologies for the Web 1), MSc in Computer Engineering, University of Genova.

• 2005–2009 (4 academic years)Sicurezza Informatica 1(Computer Security 1), MSc in Computer Engineering, University of Genova.

• 2005–2007 (2 academic years) Fondamenti di Informatica (Fundamentals of Computer Science), MSc in Mechanical Engineering, University of Genova.

• 2003–2005 (2 academic years)Internet e E-Government(Internet and E-Government), MSc in Sci-ence of Communication, University of Genova.

• 1999–2009 (10 academic years)Intelligenza Artificiale 1(Artificial Intelligence 1), MSc in Computer Engineering, University of Genova.

• 2001–2002 (1 academic year)Fondamenti di Informatica(Fundamentals of Computer Science), MSc in Telecommunication Engineering, University of Genova.

• 1999–2001 (2 academic years)Fondamenti di Informatica – II Modulo(Fundamentals of Computer Science – Module 2), MSc in Computer Engineering and MSc in Telecommunication Engineering, University of Genova.

• 1995–1999 (4 academic years) Fondamenti di Informatica (Fundamentals of Computer Science), MSc in Computer Engineering and MSc in Telecommunication Engineering, University of Genova.

• 1995–98 (3 academic years)Fondamenti di Informatica(Fundamentals of Computer Science), course of “Diploma Universitario” in Logistics and Production Engineering, University of Genova.

Supervision

I have supervised 7 PhD students and more than 30 students during the preparation of their MSc Thesis.

Reviewing Activities

• Member of the evaluation committee for posts of assistant professor at the University of Trento, at Politecnico di Torino, at the University of Chieti, at the University of Brescia, and at the University of Genova.

• External reviewer and member of the evaluation committee of the following PhD students:

– Dr. Daniele Zucchelli, Universit´e Henri Poincar´e, Nancy, joint degree ofDoctorat UHP Informa-tique and Dottorato di Ricerca in Matematica, U. of Milan, January 2008. Title: “Combination

(8)

Methods for Software Verification”.

– Dr. Enrica Nicolini, University of Milan, Dottorato di Ricerca in Matematica. Title: “Combined Decision Procedures for Constraint Satisfiability”, January 2007.

– Dr. Sebastian M¨odersheim, Eidgenoessische Technische Hochschule Zurich (ETHZ), Switzerland. Title: “Models and Methods for the Automated Analysis of Security Protocols”, December 2006.

– Dr. Sorin Stratulat, Universit´e Henri Poincar´e, Nancy,Doctorat UHP Informatique. Title: “Preuves par r´ecurrence avec ensembles couvrants contextuels. Applications `a la v´erification de logiciels de t´el´ecommunications”, November 2000.

• Reviewer for the following funding agencies:

– The International Bureau (IB) of the German Ministry of Education and Science, Russian call ”Mea-sures to Attract Leading Scientists to Russian Educational Institutions” by the New Eurasia Foun-dation (2 grant proposals since 2010),

– European Commission in the context of the INTAS Programme (4 grant proposals since 2004),

– Engineering and Physical Sciences Research Council (EPSRC), United Kingdom (4 grant proposals since 2001),

– Netherlands Organisation for Scientific Research (NWO), Holland (1 grant proposal),

– Swiss National Science Foundation (1 research grant),

– Italian Ministry of Instruction, University, and Research (MIUR) in the context of the PRIN Pro-gramme (3 grant proposals since 2008).

– International Scientific Peer Review of the Center of Excellence Applications (HERIC project) of the Ministry of Science of Montenegro (2 grant proposals in 2013).

• Reviewer of one book for McGraw-Hill and for several international scientific journals including the Journal of Computer Security, Journal of Symbolic Computation, the Journal of Automated Reason-ing, Theoretical Computer Science, Information Processing Letters, and the Journal of Systems and Software.

Academic Activity

• Deputy Director of Dipartimento di Informatica, Sistemistica e Telematica dell’Universit`a di Genova from 12/2/2008 to 30/6/2009.

• Member of the Executive Committee (“Giunta di Dipartimento”) del DIST from 12/2/2008 to 30/6/2009.

• Member of the Executive Committee (“Giunta di Facolt`a”) of the Faculty of Engineering of the Uni-versity of Genova for the period 2001-2004. (Elected by the Faculty Council on 16/11/2001.)

• Member of the Service Center (“Centro Servizi”) of the Faculty of Engineering of the University of Genova for the period 2001-2004. (Elected by the Faculty Council on 16/11/2001.)

• Member of the Committee for the International Relations of the Faculty of Engineering of the Univer-sity of Genova.

• Coordinator of theEuropean Community Course Credit Transfer System(ECTS) for the MSc in Com-puter Engineering of the University of Genova.

• Representative of DIST of several bilateral agreements with foreign academic institutions for the exchange of students in the context of the Socrates/Erasmus Program.

• Representative for the University of Genova of bilateral agreements for the co-tutoring of PhD students with

– the University of Henri Poincar´e–Nancy 1. (The Italian Ministry of Scientific and Technological Research has selected and financially supported the agreement in the context of the Programme

(9)

– the University of Edinburgh.

– the Universit´e Libre de Bruxelles.

Editorial Activity

[E1] A. Armando and T. Jabelean. Special Issue on “Systems for Integrated Computation and Deduc-tion” of theElectronic Notes in Theoretical Computer Science(Elsevier), Volume 23, Issue 3, 1999. [E2] A. Armando and T. Jabelean. Special Issue on “Integrated Symbolic Computation and Automated Deduction” of theJournal of Symbolic Computation(Academic Press), Volume 32, No. 4, Septem-ber 1, 2001.

[E3] A. Armando. Proceedings of the 4th “International Workshop on Frontiers of Combining Systems” (FroCoS 2002) held in Santa Margherita Ligure, April 8-10, 2002. Published as Volume 2309 of the Lecture Notes in Artificial Intelligence, Springer Verlag, 2002.

[E4] A. Armando and L. Vigan`o. Proceedings of the 1st Workshop on “Automated Reasoning for Secu-rity Protocol Analysis (ARSPA’04)”. Special issue of theElectronic Notes in Theoretical Computer Science, Volume 125, Issue 1, 3 March 2005.

[E5] A. Armando and A. Cimatti. Post-workshop proceedings of the 3rd Workshop on “Pragmatics of Decision Procedures in Automated Reasoning (PDPAR’05)”. Special Issue of theElectronic Notes in Theoretical Computer Science, Volume 144, Issue 2, 2006.

[E6] A. Armando, D. Basin, J. Cuellar, M. Rusinowitch, and L. Vigan`o. Special Issue of theJournal of Automated Reasoningon “Automated Reasoning for Security Protocol Analysis”, Volume 36, Numbers 1-2, 2006.

[E7] A. Armando and C. Ringeissen. Special Issue on “Combining Logical Systems” of the journal

Information and Computation, Volume 204, Issue 10, 2006.

[E8] A. Armando, P. Baumgartner, and G. Dowek. Proceedings of the 4th International Joint Conference of Automated Reasoning (IJCAR 2008), Sydney, Australia, August 12-15, 2008. Lecture Notes in Computer Science, Vol. 5195.

[E9] A. Armando, P. Baumgartner, and G. Dowek. Special Issue onSelected Papers from the 4th In-ternational Joint Conference of Automated Reasoning (IJCAR 2008)of theJournal of Automated Reasoning, Vol. 45, Number 2, 2010.

[E10] A. Armando and G. Lowe. Proceedings of the Joint Workshop on Automated Reasoning for Secu-rity Protocol Analysis and Issues in the Theory of SecuSecu-rity (ARSPA-WITS 2010), Paphos, Cyprus, March 27-28, 2010. Lecture Notes in Computer Science, Vol. 6186, Vol. 45, Number 2, 2010.

International Journals

[J1] A. Armando and E. Giunchiglia. Embedding Complex Decision Procedures inside an Interactive Theorem Prover. Annals of Mathematics and Artificial Intelligence, 8:475–502, 1993.

[J2] P. Traverso, A. Cimatti, L. Spalazzi, A. Armando, and E. Giunchiglia. MRG: Building Planners for Real World Complex Applications. Applied Artificial Intelligence, 8(3):333–357, 1994.

[J3] E. Giunchiglia, A. Armando, and P. Pecchiari. Structured Proof Procedures. Annals of Mathematics and Artificial Intelligence, 15(I):1–18, 1995.

[J4] E. Giunchiglia, A. Armando, P. Traverso, and A. Cimatti. Visual Representation of Natural Language Scene Descriptions. IEEE Transactions on Systems, Man and Cybernetics, 26(04):575–589, 1996. IEEE Inc., New York (USA).

[J5] A. Armando, A. Cimatti, E. Giunchiglia, P. Pecchiari, L. Spalazzi, and P. Traverso. Flexible Planning by Integrating Multilevel Reasoning. Journal of Engineering Applications of Artificial Intelligence, 4:401–412, July 1995.

(10)

[J6] F. Giunchiglia, P. Pecchiari, and A. Armando. Towards Provably Correct System Synthesis and Extension.Future Generation Computer Systems, 12(2/3):123–137, 1996.

[J7] A. Armando, J. Gallagher, A. Smaill, and A. Bundy. Automating the Synthesis of Decision Proce-dures in a Constructive Metatheory.Annals of Mathematics and Artificial Intelligence, 22(3,4):259– 279, 1998.

[J8] A. Armando, A. Smaill, and I. Green. Automatic Synthesis of Recursive Programs: The Proof-Planning Paradigm.Automated Software Engineering, 6(4):329–356, 1999.

[J9] A. Armando and S. Ranise. A Practical Extension Mechanism for Decision Procedures: the Case Study of Universal Presburger Arithmetic. Journal of Universal Computer Science vol. 7:2, pp. 124-140, 2001.

[J10] A. Armando, A. Coglio, F. Giunchiglia, and S. Ranise. The Control Layer in Open Mechanized Reasoning Systems: Annotations and Tactics. Journal of Symbolic Computation, Vol. 32, No. 4, October 2001, pp. 305-332. Academic Press.

[J11] A. Armando, M. Rusinowitch and S. Stratulat. Incorporating Decision Procedures in Implicit Induc-tion. Journal of Symbolic Computation, Vol. 34, 2002, pp. 241-258.

[J12] A. Armando and S. Ranise. Constraint Contextual Rewriting. Journal of Symbolic Computation, Volume 36, Issues 1-2, pp. 193-216, 2003.

[J13] A. Armando, M. Rusinowitch and S. Ranise. The Rewriting Approach to Satisfiability Procedures.

Information and Computation, 183 (2003), pp. 140-164.

[J14] A. Armando and C. Ballarin. A Reconstruction and Extension of Maple’s Assume Facility via Con-straint Contextual Rewriting. Journal of Symbolic Computation, Vol. 39/5, 2005, pp. 503-521. [J15] A. Armando, C. Castellini, E. Giunchiglia, M. Maratea. The SAT-based Approach to Separation

Logic.Journal of Automated Reasoning, Vol. 35. Nos. 1-3, pp. 237-263, 2005.

[J16] A. Armando and L. Compagna. SAT-based Model-Checking for Security Protocols Analysis. Inter-national Journal of Information Security, vol. 7, no. 1. January 2008.

[J17] A. Armando, M. P. Bonacina, S. Ranise, and S. Schulz. New results on rewrite-based satisfiability procedures. ACM Transactions on Computational Logic (TOCL), vol. 10, no. 1, 2009.

[J18] A. Armando, J. Mantovani, and L. Platania. Bounded Model Checking of Software using SMT Solvers instead of SAT Solvers.International Journal on Software Tools for Technology Transfer

(STTT), vol. 11, issue 1, pages 69-83, 2009.

[J19] A. Armando, R. Carbone and L. Compagna. LTL Model Checking for Security Protocols.Journal of Applied Non-Classical Logics, special issue on Logic and Information Security, vol. 19/4, pp. 403-429, 2009.

[J20] A. Armando, E. Giunchiglia, M. Maratea and S. E. Ponta. An Action-based Approach to the Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints. In the

Journal of Computer and System Sciences, vol. 1, pages 119-141, 2012.

[J21] A. Armando and S. Ranise. Scalable Automated Symbolic Analysis of Administrative Role-Based Access Control Policies by SMT solving. In theJournal of Computer Security, Volume 20, Number 4, pages 309-352, 2012.

[J22] A. Armando, R. Carbone, L. Compagna, J. Cu´ellar, G. Pellegrino, A. Sorniotti. An authentica-tion flaw in browser-based Single Sign-On protocols: Impact and remediaauthentica-tions. In theComputer & Security, Volume 33, pages 41-58, 2013.

[J23] A. Armando, A. Merlo, M. Migliardi, L. Verderame. Breaking and fixing the Android Launching Flow. InComputers & Security. In press.

[J24] A. Armando, M. Benerecetti, J. Mantovani. Counterexample-guided Abstraction Refinement for Linear Programs with Arrays. InAutomated Software Engineering, Springer, vol. 21, no. 2, pp. 225-285, 2014.

[J25] A. Armando, G. Costa, A. Merlo, L. Verderame, Formal modeling and automatic enforcement of Bring Your Own Device policies, In International Journal of Information Security, Springer, pp. 1-18, 2014.

(11)

[J26] A. Armando, S. E. Ponta, Model Checking Authorization Requirements in Business Processes, In

Computers & Security, vol. 40, no. 0, pp. 1 - 22, 2014.

[J27] A. Armando, G. Costa, L. Verderame, A. Merlo,Securing the “Bring Your Own Device” Paradigm, In IEEE Computer, vol. 47, no. 6, pp. 48-56, 2014.

I am also (co-)authors of more than 90 publications appeared in the proceeding of international conferences and 6 invited book chapters.

References

Related documents

Standardization of herbal raw drugs include passport data of raw plant drugs, botanical authentification, microscopic & molecular examination, identification of

Also, both diabetic groups there were a positive immunoreactivity of the photoreceptor inner segment, and this was also seen among control ani- mals treated with a

In general, this equation, with or without some modification, applies to all other type of osmotic systems. Several simplifications in Rose-Nelson pump were made by Alza

(B) Bar chart illustrating the relative magnitude and direction of change in transcript levels produced by microarray for the genes differentially expressed in both

To conduct biosorption under best conditions and to obtain the highest yield, Central Composite Design (CCD), one of response surface methods (RSM), was

19% serve a county. Fourteen per cent of the centers provide service for adjoining states in addition to the states in which they are located; usually these adjoining states have

lurine ty)hus occurs principally in the southeastern United States. The natural cycle of this disease imivolves the common rat and its siphonapteran parasite, Xcno-. PsYlla