var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/dblp/Daoudagh:Said?jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/dblp/Daoudagh:Said?jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/dblp/Daoudagh:Said?jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2024\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Towards enhanced monitoring framework with smart predictions.\n \n \n \n \n\n\n \n Calabrò, A.; Daoudagh, S.; and Marchetti, E.\n\n\n \n\n\n\n Log. J. IGPL, 32(2): 321–333. 2024.\n \n\n\n\n
\n\n\n\n \n \n \"TowardsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/igpl/CalabroDM24,\n  author       = {Antonello Calabr{\\`{o}} and\n                  Said Daoudagh and\n                  Eda Marchetti},\n  title        = {Towards enhanced monitoring framework with smart predictions},\n  journal      = {Log. J. {IGPL}},\n  volume       = {32},\n  number       = {2},\n  pages        = {321--333},\n  year         = {2024},\n  url          = {https://doi.org/10.1093/jigpal/jzae010},\n  doi          = {10.1093/JIGPAL/JZAE010},\n  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/igpl/CalabroDM24.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Assessment of Dance Movement Therapy Outcomes: A Preliminary Proposal.\n \n \n \n \n\n\n \n Daoudagh, S.; Ignesti, G.; Moroni, D.; Sebastiani, L.; and Paradisi, P.\n\n\n \n\n\n\n In Computer-Human Interaction Research and Applications - 8th International Conference, CHIRA 2024, Porto, Portugal, November 21-22, 2024, Proceedings, Part II, pages 382–395, 2024. \n \n\n\n\n
\n\n\n\n \n \n \"AssessmentPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/chira/DaoudaghIMSP24,\n  author       = {Said Daoudagh and\n                  Giacomo Ignesti and\n                  Davide Moroni and\n                  Laura Sebastiani and\n                  Paolo Paradisi},\n  title        = {Assessment of Dance Movement Therapy Outcomes: {A} Preliminary Proposal},\n  booktitle    = {Computer-Human Interaction Research and Applications - 8th International\n                  Conference, {CHIRA} 2024, Porto, Portugal, November 21-22, 2024, Proceedings,\n                  Part {II}},\n  pages        = {382--395},\n  year         = {2024},\n  crossref     = {DBLP:conf/chira/2024-2},\n  url          = {https://doi.org/10.1007/978-3-031-83845-3\\_23},\n  doi          = {10.1007/978-3-031-83845-3\\_23},\n  timestamp    = {Tue, 08 Apr 2025 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/chira/DaoudaghIMSP24.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Human-Centric Dev-X-Ops Process for Trustworthiness in AI-Based Systems.\n \n \n \n \n\n\n \n Calabrò, A.; Daoudagh, S.; Marchetti, E.; Aktouf, O.; and Mercier, A.\n\n\n \n\n\n\n In Proceedings of the 20th International Conference on Web Information Systems and Technologies, WEBIST 2024, Porto, Portugal, November 17-19, 2024, pages 288–295, 2024. \n \n\n\n\n
\n\n\n\n \n \n \"Human-CentricPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/webist/CalabroDMAM24,\n  author       = {Antonello Calabr{\\`{o}} and\n                  Said Daoudagh and\n                  Eda Marchetti and\n                  Oum{-}El{-}Kheir Aktouf and\n                  Annabelle Mercier},\n  title        = {Human-Centric Dev-X-Ops Process for Trustworthiness in AI-Based Systems},\n  booktitle    = {Proceedings of the 20th International Conference on Web Information\n                  Systems and Technologies, {WEBIST} 2024, Porto, Portugal, November\n                  17-19, 2024},\n  pages        = {288--295},\n  year         = {2024},\n  crossref     = {DBLP:conf/webist/2024},\n  url          = {https://doi.org/10.5220/0012998700003825},\n  doi          = {10.5220/0012998700003825},\n  timestamp    = {Thu, 12 Dec 2024 14:47:47 +0100},\n  biburl       = {https://dblp.org/rec/conf/webist/CalabroDMAM24.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n 2HCDL: Holistic Human-Centered Development Lifecycle.\n \n \n \n \n\n\n \n Daoudagh, S.; Marchetti, E.; and Aktouf, O.\n\n\n \n\n\n\n CoRR, abs/2405.01566. 2024.\n \n\n\n\n
\n\n\n\n \n \n \"2HCDL:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2405-01566,\n  author       = {Said Daoudagh and\n                  Eda Marchetti and\n                  Oum{-}El{-}Kheir Aktouf},\n  title        = {2HCDL: Holistic Human-Centered Development Lifecycle},\n  journal      = {CoRR},\n  volume       = {abs/2405.01566},\n  year         = {2024},\n  url          = {https://doi.org/10.48550/arXiv.2405.01566},\n  doi          = {10.48550/ARXIV.2405.01566},\n  eprinttype    = {arXiv},\n  eprint       = {2405.01566},\n  timestamp    = {Sun, 09 Jun 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-01566.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2023\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n An automated framework for continuous development and testing of access control systems.\n \n \n \n \n\n\n \n Daoudagh, S.; Lonetti, F.; and Marchetti, E.\n\n\n \n\n\n\n J. Softw. Evol. Process., 35(3). 2023.\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/smr/DaoudaghLM23,\n  author       = {Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti},\n  title        = {An automated framework for continuous development and testing of access\n                  control systems},\n  journal      = {J. Softw. Evol. Process.},\n  volume       = {35},\n  number       = {3},\n  year         = {2023},\n  url          = {https://doi.org/10.1002/smr.2306},\n  doi          = {10.1002/SMR.2306},\n  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/smr/DaoudaghLM23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n DAEMON: A Domain-Based Monitoring Ontology for IoT Systems.\n \n \n \n \n\n\n \n Daoudagh, S.; Marchetti, E.; Calabrò, A.; Ferrada, F.; Oliveira, A.; Barata, J.; Peres, R. S.; and Marques, F.\n\n\n \n\n\n\n SN Comput. Sci., 4(5): 632. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"DAEMON:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sncs/DaoudaghMCFOBPM23,\n  author       = {Said Daoudagh and\n                  Eda Marchetti and\n                  Antonello Calabr{\\`{o}} and\n                  Filipa Ferrada and\n                  Ana{-}In{\\^{e}}s Oliveira and\n                  Jos{\\'{e}} Barata and\n                  Ricardo Silva Peres and\n                  Francisco Marques},\n  title        = {{DAEMON:} {A} Domain-Based Monitoring Ontology for IoT Systems},\n  journal      = {{SN} Comput. Sci.},\n  volume       = {4},\n  number       = {5},\n  pages        = {632},\n  year         = {2023},\n  url          = {https://doi.org/10.1007/s42979-023-01975-y},\n  doi          = {10.1007/S42979-023-01975-Y},\n  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sncs/DaoudaghMCFOBPM23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Breakthroughs in Testing and Certification in Cybersecurity: Research Gaps and Open Problems.\n \n \n \n \n\n\n \n Daoudagh, S.; and Marchetti, E.\n\n\n \n\n\n\n In Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), Bari, Italy, May 2-5, 2023, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"BreakthroughsPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/itasec/DaoudaghM23,\n  author       = {Said Daoudagh and\n                  Eda Marchetti},\n  title        = {Breakthroughs in Testing and Certification in Cybersecurity: Research\n                  Gaps and Open Problems},\n  booktitle    = {Proceedings of the Italian Conference on Cyber Security {(ITASEC}\n                  2023), Bari, Italy, May 2-5, 2023},\n  year         = {2023},\n  crossref     = {DBLP:conf/itasec/2023},\n  url          = {https://ceur-ws.org/Vol-3488/paper15.pdf},\n  timestamp    = {Tue, 12 Nov 2024 10:12:41 +0100},\n  biburl       = {https://dblp.org/rec/conf/itasec/DaoudaghM23.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities.\n \n \n \n \n\n\n \n Daoudagh, S.; and Marchetti, E.\n\n\n \n\n\n\n In Proceedings of the 8th International Conference on Information Systems Security and Privacy, ICISSP 2022, Online Streaming, February 9-11, 2022, pages 571–578, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icissp/DaoudaghM22,\n  author       = {Said Daoudagh and\n                  Eda Marchetti},\n  title        = {The {GDPR} Compliance and Access Control Systems: Challenges and Research\n                  Opportunities},\n  booktitle    = {Proceedings of the 8th International Conference on Information Systems\n                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,\n                  2022},\n  pages        = {571--578},\n  year         = {2022},\n  crossref     = {DBLP:conf/icissp/2022},\n  url          = {https://doi.org/10.5220/0010912300003120},\n  doi          = {10.5220/0010912300003120},\n  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},\n  biburl       = {https://dblp.org/rec/conf/icissp/DaoudaghM22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Predictive Simulation for Building Trust Within Service-Based Ecosystems.\n \n \n \n \n\n\n \n Cioroaica, E.; Daoudagh, S.; and Marchetti, E.\n\n\n \n\n\n\n In 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom 2022 Workshops, Pisa, Italy, March 21-25, 2022, pages 34–37, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"PredictivePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/percom/CioroaicaDM22,\n  author       = {Emilia Cioroaica and\n                  Said Daoudagh and\n                  Eda Marchetti},\n  title        = {Predictive Simulation for Building Trust Within Service-Based Ecosystems},\n  booktitle    = {2022 {IEEE} International Conference on Pervasive Computing and Communications\n                  Workshops and other Affiliated Events, PerCom 2022 Workshops, Pisa,\n                  Italy, March 21-25, 2022},\n  pages        = {34--37},\n  year         = {2022},\n  crossref     = {DBLP:conf/percom/2022w},\n  url          = {https://doi.org/10.1109/PerComWorkshops53856.2022.9767457},\n  doi          = {10.1109/PERCOMWORKSHOPS53856.2022.9767457},\n  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/percom/CioroaicaDM22.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n The GDPR Compliance Through Access Control Systems.\n \n \n \n \n\n\n \n Daoudagh, S.\n\n\n \n\n\n\n Ph.D. Thesis, University of Pisa, Italy, 2021.\n \n\n\n\n
\n\n\n\n \n \n \"ThePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@phdthesis{DBLP:phd/it/Daoudagh21,\n  author       = {Said Daoudagh},\n  title        = {The {GDPR} Compliance Through Access Control Systems},\n  school       = {University of Pisa, Italy},\n  year         = {2021},\n  url          = {https://etd.adm.unipi.it/theses/available/etd-07112021-124810/},\n  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/phd/it/Daoudagh21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n COVID-19 & privacy: Enhancing of indoor localization architectures towards effective social distancing.\n \n \n \n \n\n\n \n Barsocchi, P.; Calabrò, A.; Crivello, A.; Daoudagh, S.; Furfari, F.; Girolami, M.; and Marchetti, E.\n\n\n \n\n\n\n Array, 9: 100051. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"COVID-19Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/array/BarsocchiCCDFGM21,\n  author       = {Paolo Barsocchi and\n                  Antonello Calabr{\\`{o}} and\n                  Antonino Crivello and\n                  Said Daoudagh and\n                  Francesco Furfari and\n                  Michele Girolami and\n                  Eda Marchetti},\n  title        = {{COVID-19} {\\&} privacy: Enhancing of indoor localization architectures\n                  towards effective social distancing},\n  journal      = {Array},\n  volume       = {9},\n  pages        = {100051},\n  year         = {2021},\n  url          = {https://doi.org/10.1016/j.array.2020.100051},\n  doi          = {10.1016/J.ARRAY.2020.100051},\n  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/array/BarsocchiCCDFGM21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Data Protection by Design in the Context of Smart Cities: A Consent and Access Control Proposal.\n \n \n \n \n\n\n \n Daoudagh, S.; Marchetti, E.; Savarino, V.; Bernabé, J. B.; Rodríguez, J. G.; Moreno, R. T.; Martínez, J. A.; and Skarmeta, A. F.\n\n\n \n\n\n\n Sensors, 21(21): 7154. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"DataPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sensors/DaoudaghMSBRMMS21,\n  author       = {Said Daoudagh and\n                  Eda Marchetti and\n                  Vincenzo Savarino and\n                  Jorge Bernal Bernab{\\'{e}} and\n                  Jes{\\'{u}}s Garc{\\'{\\i}}a Rodr{\\'{\\i}}guez and\n                  Rafael Torres Moreno and\n                  Juan Antonio Mart{\\'{\\i}}nez and\n                  Antonio F. Skarmeta},\n  title        = {Data Protection by Design in the Context of Smart Cities: {A} Consent\n                  and Access Control Proposal},\n  journal      = {Sensors},\n  volume       = {21},\n  number       = {21},\n  pages        = {7154},\n  year         = {2021},\n  url          = {https://doi.org/10.3390/s21217154},\n  doi          = {10.3390/S21217154},\n  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/sensors/DaoudaghMSBRMMS21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n BIECO Runtime Auditing Framework.\n \n \n \n \n\n\n \n Calabrò, A.; Cioroaica, E.; Daoudagh, S.; and Marchetti, E.\n\n\n \n\n\n\n In 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), Bilbao, Spain, 22-24 September, 2021, pages 181–191, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"BIECOPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cisis-spain/CalabroCDM21,\n  author       = {Antonello Calabr{\\`{o}} and\n                  Emilia Cioroaica and\n                  Said Daoudagh and\n                  Eda Marchetti},\n  title        = {{BIECO} Runtime Auditing Framework},\n  booktitle    = {14th International Conference on Computational Intelligence in Security\n                  for Information Systems and 12th International Conference on European\n                  Transnational Educational {(CISIS} 2021 and {ICEUTE} 2021), Bilbao,\n                  Spain, 22-24 September, 2021},\n  pages        = {181--191},\n  year         = {2021},\n  crossref     = {DBLP:conf/cisis-spain/2021},\n  url          = {https://doi.org/10.1007/978-3-030-87872-6\\_18},\n  doi          = {10.1007/978-3-030-87872-6\\_18},\n  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/cisis-spain/CalabroCDM21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n How to Improve the GDPR Compliance through Consent Management and Access Control.\n \n \n \n \n\n\n \n Daoudagh, S.; Marchetti, E.; Savarino, V.; Bernardo, R. D.; and Alessi, M.\n\n\n \n\n\n\n In Proceedings of the 7th International Conference on Information Systems Security and Privacy, ICISSP 2021, Online Streaming, February 11-13, 2021, pages 534–541, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"HowPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icissp/DaoudaghMSBA21,\n  author       = {Said Daoudagh and\n                  Eda Marchetti and\n                  Vincenzo Savarino and\n                  Roberto Di Bernardo and\n                  Marco Alessi},\n  title        = {How to Improve the {GDPR} Compliance through Consent Management and\n                  Access Control},\n  booktitle    = {Proceedings of the 7th International Conference on Information Systems\n                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,\n                  2021},\n  pages        = {534--541},\n  year         = {2021},\n  crossref     = {DBLP:conf/icissp/2021},\n  url          = {https://doi.org/10.5220/0010260205340541},\n  doi          = {10.5220/0010260205340541},\n  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/icissp/DaoudaghMSBA21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n GROOT: A GDPR-Based Combinatorial Testing Approach.\n \n \n \n \n\n\n \n Daoudagh, S.; and Marchetti, E.\n\n\n \n\n\n\n In Testing Software and Systems - 33rd IFIP WG 6.1 International Conference, ICTSS 2021, London, UK, November 10-12, 2021, Proceedings, pages 210–217, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"GROOT:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/pts/DaoudaghM21,\n  author       = {Said Daoudagh and\n                  Eda Marchetti},\n  title        = {{GROOT:} {A} GDPR-Based Combinatorial Testing Approach},\n  booktitle    = {Testing Software and Systems - 33rd {IFIP} {WG} 6.1 International\n                  Conference, {ICTSS} 2021, London, UK, November 10-12, 2021, Proceedings},\n  pages        = {210--217},\n  year         = {2021},\n  crossref     = {DBLP:conf/pts/2021},\n  url          = {https://doi.org/10.1007/978-3-031-04673-5\\_17},\n  doi          = {10.1007/978-3-031-04673-5\\_17},\n  timestamp    = {Wed, 28 Dec 2022 14:29:12 +0100},\n  biburl       = {https://dblp.org/rec/conf/pts/DaoudaghM21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n GRADUATION: A GDPR-Based Mutation Methodology.\n \n \n \n \n\n\n \n Daoudagh, S.; and Marchetti, E.\n\n\n \n\n\n\n In Quality of Information and Communications Technology - 14th International Conference, QUATIC 2021, Algarve, Portugal, September 8-11, 2021, Proceedings, pages 311–324, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"GRADUATION:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/quatic/DaoudaghM21,\n  author       = {Said Daoudagh and\n                  Eda Marchetti},\n  title        = {{GRADUATION:} {A} GDPR-Based Mutation Methodology},\n  booktitle    = {Quality of Information and Communications Technology - 14th International\n                  Conference, {QUATIC} 2021, Algarve, Portugal, September 8-11, 2021,\n                  Proceedings},\n  pages        = {311--324},\n  year         = {2021},\n  crossref     = {DBLP:conf/quatic/2021},\n  url          = {https://doi.org/10.1007/978-3-030-85347-1\\_23},\n  doi          = {10.1007/978-3-030-85347-1\\_23},\n  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/quatic/DaoudaghM21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n MENTORS: Monitoring Environment for System of Systems.\n \n \n \n \n\n\n \n Calabrò, A.; Daoudagh, S.; and Marchetti, E.\n\n\n \n\n\n\n In Proceedings of the 17th International Conference on Web Information Systems and Technologies, WEBIST 2021, October 26-28, 2021, pages 291–298, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"MENTORS:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/webist/CalabroDM21,\n  author       = {Antonello Calabr{\\`{o}} and\n                  Said Daoudagh and\n                  Eda Marchetti},\n  title        = {{MENTORS:} Monitoring Environment for System of Systems},\n  booktitle    = {Proceedings of the 17th International Conference on Web Information\n                  Systems and Technologies, {WEBIST} 2021, October 26-28, 2021},\n  pages        = {291--298},\n  year         = {2021},\n  crossref     = {DBLP:conf/webist/2021},\n  url          = {https://doi.org/10.5220/0010658900003058},\n  doi          = {10.5220/0010658900003058},\n  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/webist/CalabroDM21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n XACMET: XACML Testing & Modeling.\n \n \n \n \n\n\n \n Daoudagh, S.; Lonetti, F.; and Marchetti, E.\n\n\n \n\n\n\n Softw. Qual. J., 28(1): 249–282. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"XACMET:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sqj/DaoudaghLM20,\n  author       = {Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti},\n  title        = {{XACMET:} {XACML} Testing {\\&} Modeling},\n  journal      = {Softw. Qual. J.},\n  volume       = {28},\n  number       = {1},\n  pages        = {249--282},\n  year         = {2020},\n  url          = {https://doi.org/10.1007/s11219-019-09470-5},\n  doi          = {10.1007/S11219-019-09470-5},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sqj/DaoudaghLM20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Continuous Development and Testing of Access and Usage Control: A Systematic Literature Review.\n \n \n \n \n\n\n \n Daoudagh, S.; Lonetti, F.; and Marchetti, E.\n\n\n \n\n\n\n In ESSE 2020: 2020 European Symposium on Software Engineering, Rome, Italy, November 6-8, 2020, pages 51–59, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"ContinuousPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/esse/DaoudaghLM20,\n  author       = {Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti},\n  title        = {Continuous Development and Testing of Access and Usage Control: {A}\n                  Systematic Literature Review},\n  booktitle    = {{ESSE} 2020: 2020 European Symposium on Software Engineering, Rome,\n                  Italy, November 6-8, 2020},\n  pages        = {51--59},\n  year         = {2020},\n  crossref     = {DBLP:conf/esse/2020},\n  url          = {https://doi.org/10.1145/3393822.3432330},\n  doi          = {10.1145/3393822.3432330},\n  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/esse/DaoudaghLM20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Assessing Testing Strategies for Access Control Systems: A Controlled Experiment.\n \n \n \n \n\n\n \n Daoudagh, S.; Lonetti, F.; and Marchetti, E.\n\n\n \n\n\n\n In Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020, pages 107–118, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"AssessingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icissp/DaoudaghLM20,\n  author       = {Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti},\n  title        = {Assessing Testing Strategies for Access Control Systems: {A} Controlled\n                  Experiment},\n  booktitle    = {Proceedings of the 6th International Conference on Information Systems\n                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,\n                  2020},\n  pages        = {107--118},\n  year         = {2020},\n  crossref     = {DBLP:conf/icissp/2020},\n  url          = {https://doi.org/10.5220/0008974201070118},\n  doi          = {10.5220/0008974201070118},\n  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/icissp/DaoudaghLM20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Life Cycle for Authorization Systems Development in the GDPR Perspective.\n \n \n \n \n\n\n \n Daoudagh, S.; and Marchetti, E.\n\n\n \n\n\n\n In Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020, pages 128–140, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/itasec/DaoudaghM20,\n  author       = {Said Daoudagh and\n                  Eda Marchetti},\n  title        = {A Life Cycle for Authorization Systems Development in the {GDPR} Perspective},\n  booktitle    = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona,\n                  Italy, February 4th to 7th, 2020},\n  pages        = {128--140},\n  year         = {2020},\n  crossref     = {DBLP:conf/itasec/2020},\n  url          = {https://ceur-ws.org/Vol-2597/paper-12.pdf},\n  timestamp    = {Fri, 10 Mar 2023 16:22:11 +0100},\n  biburl       = {https://dblp.org/rec/conf/itasec/DaoudaghM20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Defining Controlled Experiments Inside the Access Control Environment.\n \n \n \n \n\n\n \n Daoudagh, S.; and Marchetti, E.\n\n\n \n\n\n\n In Proceedings of the 8th International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2020, Valletta, Malta, February 25-27, 2020, pages 167–176, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"DefiningPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/modelsward/DaoudaghM20,\n  author       = {Said Daoudagh and\n                  Eda Marchetti},\n  title        = {Defining Controlled Experiments Inside the Access Control Environment},\n  booktitle    = {Proceedings of the 8th International Conference on Model-Driven Engineering\n                  and Software Development, {MODELSWARD} 2020, Valletta, Malta, February\n                  25-27, 2020},\n  pages        = {167--176},\n  year         = {2020},\n  crossref     = {DBLP:conf/modelsward/2020},\n  url          = {https://doi.org/10.5220/0009358201670176},\n  doi          = {10.5220/0009358201670176},\n  timestamp    = {Tue, 06 Jun 2023 14:58:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/modelsward/DaoudaghM20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Privacy-By-Design Architecture for Indoor Localization Systems.\n \n \n \n \n\n\n \n Barsocchi, P.; Calabrò, A.; Crivello, A.; Daoudagh, S.; Furfari, F.; Girolami, M.; and Marchetti, E.\n\n\n \n\n\n\n In Quality of Information and Communications Technology - 13th International Conference, QUATIC 2020, Faro, Portugal, September 9-11, 2020, Proceedings, pages 358–366, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/quatic/BarsocchiCCDFGM20,\n  author       = {Paolo Barsocchi and\n                  Antonello Calabr{\\`{o}} and\n                  Antonino Crivello and\n                  Said Daoudagh and\n                  Francesco Furfari and\n                  Michele Girolami and\n                  Eda Marchetti},\n  title        = {A Privacy-By-Design Architecture for Indoor Localization Systems},\n  booktitle    = {Quality of Information and Communications Technology - 13th International\n                  Conference, {QUATIC} 2020, Faro, Portugal, September 9-11, 2020, Proceedings},\n  pages        = {358--366},\n  year         = {2020},\n  crossref     = {DBLP:conf/quatic/2020},\n  url          = {https://doi.org/10.1007/978-3-030-58793-2\\_29},\n  doi          = {10.1007/978-3-030-58793-2\\_29},\n  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/quatic/BarsocchiCCDFGM20.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A Framework for the Validation of Access Control Systems.\n \n \n \n \n\n\n \n Daoudagh, S.; Lonetti, F.; and Marchetti, E.\n\n\n \n\n\n\n In Emerging Technologies for Authorization and Authentication - Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings, pages 35–51, 2019. \n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/esorics/DaoudaghLM19,\n  author       = {Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti},\n  title        = {A Framework for the Validation of Access Control Systems},\n  booktitle    = {Emerging Technologies for Authorization and Authentication - Second\n                  International Workshop, {ETAA} 2019, Luxembourg City, Luxembourg,\n                  September 27, 2019, Proceedings},\n  pages        = {35--51},\n  year         = {2019},\n  crossref     = {DBLP:conf/esorics/2019etaa},\n  url          = {https://doi.org/10.1007/978-3-030-39749-4\\_3},\n  doi          = {10.1007/978-3-030-39749-4\\_3},\n  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/esorics/DaoudaghLM19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Decentralized Solution for Combinatorial Testing of Access Control Engine.\n \n \n \n \n\n\n \n Daoudagh, S.; Lonetti, F.; and Marchetti, E.\n\n\n \n\n\n\n In Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, pages 126–135, 2019. \n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icissp/DaoudaghLM19,\n  author       = {Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti},\n  title        = {A Decentralized Solution for Combinatorial Testing of Access Control\n                  Engine},\n  booktitle    = {Proceedings of the 5th International Conference on Information Systems\n                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February\n                  23-25, 2019},\n  pages        = {126--135},\n  year         = {2019},\n  crossref     = {DBLP:conf/icissp/2019},\n  url          = {https://doi.org/10.5220/0007379401260135},\n  doi          = {10.5220/0007379401260135},\n  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/icissp/DaoudaghLM19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of Application.\n \n \n \n \n\n\n \n Daoudagh, S.; Lonetti, F.; and Marchetti, E.\n\n\n \n\n\n\n In Information Systems Security and Privacy - 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers, pages 207–229, 2019. \n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icissp/DaoudaghLM19a,\n  author       = {Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti},\n  title        = {A General Framework for Decentralized Combinatorial Testing of Access\n                  Control Engine: Examples of Application},\n  booktitle    = {Information Systems Security and Privacy - 5th International Conference,\n                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised\n                  Selected Papers},\n  pages        = {207--229},\n  year         = {2019},\n  crossref     = {DBLP:conf/icissp/2019s},\n  url          = {https://doi.org/10.1007/978-3-030-49443-8\\_10},\n  doi          = {10.1007/978-3-030-49443-8\\_10},\n  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/icissp/DaoudaghLM19a.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards a Lawful Authorized Access: A Preliminary GDPR-based Authorized Access.\n \n \n \n \n\n\n \n Bartolini, C.; Daoudagh, S.; Lenzini, G.; and Marchetti, E.\n\n\n \n\n\n\n In Proceedings of the 14th International Conference on Software Technologies, ICSOFT 2019, Prague, Czech Republic, July 26-28, 2019, pages 331–338, 2019. \n \n\n\n\n
\n\n\n\n \n \n \"TowardsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icsoft/BartoliniDLM19,\n  author       = {Cesare Bartolini and\n                  Said Daoudagh and\n                  Gabriele Lenzini and\n                  Eda Marchetti},\n  title        = {Towards a Lawful Authorized Access: {A} Preliminary GDPR-based Authorized\n                  Access},\n  booktitle    = {Proceedings of the 14th International Conference on Software Technologies,\n                  {ICSOFT} 2019, Prague, Czech Republic, July 26-28, 2019},\n  pages        = {331--338},\n  year         = {2019},\n  crossref     = {DBLP:conf/icsoft/2019},\n  url          = {https://doi.org/10.5220/0007978703310338},\n  doi          = {10.5220/0007978703310338},\n  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},\n  biburl       = {https://dblp.org/rec/conf/icsoft/BartoliniDLM19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Integrating Access Control and Business Process for GDPR Compliance: A Preliminary Study.\n \n \n \n \n\n\n \n Calabrò, A.; Daoudagh, S.; and Marchetti, E.\n\n\n \n\n\n\n In Proceedings of the Third Italian Conference on Cyber Security, Pisa, Italy, February 13-15, 2019, 2019. \n \n\n\n\n
\n\n\n\n \n \n \"IntegratingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/itasec/CalabroDM19,\n  author       = {Antonello Calabr{\\`{o}} and\n                  Said Daoudagh and\n                  Eda Marchetti},\n  title        = {Integrating Access Control and Business Process for {GDPR} Compliance:\n                  {A} Preliminary Study},\n  booktitle    = {Proceedings of the Third Italian Conference on Cyber Security, Pisa,\n                  Italy, February 13-15, 2019},\n  year         = {2019},\n  crossref     = {DBLP:conf/itasec/2019},\n  url          = {https://ceur-ws.org/Vol-2315/paper07.pdf},\n  timestamp    = {Fri, 10 Mar 2023 16:22:11 +0100},\n  biburl       = {https://dblp.org/rec/conf/itasec/CalabroDM19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n GDPR-Based User Stories in the Access Control Perspective.\n \n \n \n \n\n\n \n Bartolini, C.; Daoudagh, S.; Lenzini, G.; and Marchetti, E.\n\n\n \n\n\n\n In Quality of Information and Communications Technology - 12th International Conference, QUATIC 2019, Ciudad Real, Spain, September 11-13, 2019, Proceedings, pages 3–17, 2019. \n \n\n\n\n
\n\n\n\n \n \n \"GDPR-BasedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/quatic/BartoliniDLM19,\n  author       = {Cesare Bartolini and\n                  Said Daoudagh and\n                  Gabriele Lenzini and\n                  Eda Marchetti},\n  title        = {GDPR-Based User Stories in the Access Control Perspective},\n  booktitle    = {Quality of Information and Communications Technology - 12th International\n                  Conference, {QUATIC} 2019, Ciudad Real, Spain, September 11-13, 2019,\n                  Proceedings},\n  pages        = {3--17},\n  year         = {2019},\n  crossref     = {DBLP:conf/quatic/2019},\n  url          = {https://doi.org/10.1007/978-3-030-29238-6\\_1},\n  doi          = {10.1007/978-3-030-29238-6\\_1},\n  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/quatic/BartoliniDLM19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n An automated model-based test oracle for access control systems.\n \n \n \n \n\n\n \n Bertolino, A.; Daoudagh, S.; Lonetti, F.; and Marchetti, E.\n\n\n \n\n\n\n In Proceedings of the 13th International Workshop on Automation of Software Test, AST@ICSE 2018, Gothenburg, Sweden, May 28-29, 2018, pages 2–8, 2018. \n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icse/BertolinoDLM18,\n  author       = {Antonia Bertolino and\n                  Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti},\n  title        = {An automated model-based test oracle for access control systems},\n  booktitle    = {Proceedings of the 13th International Workshop on Automation of Software\n                  Test, AST@ICSE 2018, Gothenburg, Sweden, May 28-29, 2018},\n  pages        = {2--8},\n  year         = {2018},\n  crossref     = {DBLP:conf/icse/2018ast},\n  url          = {https://doi.org/10.1145/3194733.3194743},\n  doi          = {10.1145/3194733.3194743},\n  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icse/BertolinoDLM18.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An automated model-based test oracle for access control systems.\n \n \n \n \n\n\n \n Bertolino, A.; Daoudagh, S.; Lonetti, F.; and Marchetti, E.\n\n\n \n\n\n\n CoRR, abs/1809.02724. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1809-02724,\n  author       = {Antonia Bertolino and\n                  Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti},\n  title        = {An automated model-based test oracle for access control systems},\n  journal      = {CoRR},\n  volume       = {abs/1809.02724},\n  year         = {2018},\n  url          = {http://arxiv.org/abs/1809.02724},\n  eprinttype    = {arXiv},\n  eprint       = {1809.02724},\n  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-02724.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Testing access control policies against intended access rights.\n \n \n \n \n\n\n \n Bertolino, A.; Daoudagh, S.; Lonetti, F.; and Marchetti, E.\n\n\n \n\n\n\n In Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, April 4-8, 2016, pages 1641–1647, 2016. \n \n\n\n\n
\n\n\n\n \n \n \"TestingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sac/BertolinoDLM16,\n  author       = {Antonia Bertolino and\n                  Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti},\n  title        = {Testing access control policies against intended access rights},\n  booktitle    = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing,\n                  Pisa, Italy, April 4-8, 2016},\n  pages        = {1641--1647},\n  year         = {2016},\n  crossref     = {DBLP:conf/sac/2016},\n  url          = {https://doi.org/10.1145/2851613.2851829},\n  doi          = {10.1145/2851613.2851829},\n  timestamp    = {Sun, 19 Jan 2025 13:12:54 +0100},\n  biburl       = {https://dblp.org/rec/conf/sac/BertolinoDLM16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Similarity testing for access control.\n \n \n \n \n\n\n \n Bertolino, A.; Daoudagh, S.; Kateb, D. E.; Henard, C.; Traon, Y. L.; Lonetti, F.; Marchetti, E.; Mouelhi, T.; and Papadakis, M.\n\n\n \n\n\n\n Inf. Softw. Technol., 58: 355–372. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"SimilarityPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/infsof/BertolinoDKHTLMMP15,\n  author       = {Antonia Bertolino and\n                  Said Daoudagh and\n                  Donia El Kateb and\n                  Christopher Henard and\n                  Yves Le Traon and\n                  Francesca Lonetti and\n                  Eda Marchetti and\n                  Tejeddine Mouelhi and\n                  Mike Papadakis},\n  title        = {Similarity testing for access control},\n  journal      = {Inf. Softw. Technol.},\n  volume       = {58},\n  pages        = {355--372},\n  year         = {2015},\n  url          = {https://doi.org/10.1016/j.infsof.2014.07.003},\n  doi          = {10.1016/J.INFSOF.2014.07.003},\n  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/infsof/BertolinoDKHTLMMP15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Assessment of Access Control Systems Using Mutation Testing.\n \n \n \n \n\n\n \n Daoudagh, S.; Lonetti, F.; and Marchetti, E.\n\n\n \n\n\n\n In 1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, TELERISE 2015, Florence, Italy, May 18, 2015, pages 8–13, 2015. \n \n\n\n\n
\n\n\n\n \n \n \"AssessmentPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icse/DaoudaghLM15,\n  author       = {Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti},\n  title        = {Assessment of Access Control Systems Using Mutation Testing},\n  booktitle    = {1st {IEEE/ACM} International Workshop on TEchnical and LEgal aspects\n                  of data pRIvacy and SEcurity, {TELERISE} 2015, Florence, Italy, May\n                  18, 2015},\n  pages        = {8--13},\n  year         = {2015},\n  crossref     = {DBLP:conf/icse/2015telerise},\n  url          = {https://doi.org/10.1109/TELERISE.2015.10},\n  doi          = {10.1109/TELERISE.2015.10},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icse/DaoudaghLM15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Toolchain for Model-based Design and Testing of Access Control Systems.\n \n \n \n \n\n\n \n Daoudagh, S.; Kateb, D. E.; Lonetti, F.; Marchetti, E.; and Mouelhi, T.\n\n\n \n\n\n\n In MODELSWARD 2015 - Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development, ESEO, Angers, Loire Valley, France, 9-11 February, 2015, pages 411–418, 2015. \n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/modelsward/DaoudaghKLMM15,\n  author       = {Said Daoudagh and\n                  Donia El Kateb and\n                  Francesca Lonetti and\n                  Eda Marchetti and\n                  Tejeddine Mouelhi},\n  title        = {A Toolchain for Model-based Design and Testing of Access Control Systems},\n  booktitle    = {{MODELSWARD} 2015 - Proceedings of the 3rd International Conference\n                  on Model-Driven Engineering and Software Development, ESEO, Angers,\n                  Loire Valley, France, 9-11 February, 2015},\n  pages        = {411--418},\n  year         = {2015},\n  crossref     = {DBLP:conf/modelsward/2015},\n  url          = {https://doi.org/10.5220/0005330604110418},\n  doi          = {10.5220/0005330604110418},\n  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/modelsward/DaoudaghKLMM15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Testing of PolPA-based usage control systems.\n \n \n \n \n\n\n \n Bertolino, A.; Daoudagh, S.; Lonetti, F.; Marchetti, E.; Martinelli, F.; and Mori, P.\n\n\n \n\n\n\n Softw. Qual. J., 22(2): 241–271. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"TestingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/sqj/BertolinoDLMMM14,\n  author       = {Antonia Bertolino and\n                  Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti and\n                  Fabio Martinelli and\n                  Paolo Mori},\n  title        = {Testing of PolPA-based usage control systems},\n  journal      = {Softw. Qual. J.},\n  volume       = {22},\n  number       = {2},\n  pages        = {241--271},\n  year         = {2014},\n  url          = {https://doi.org/10.1007/s11219-013-9216-0},\n  doi          = {10.1007/S11219-013-9216-0},\n  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/sqj/BertolinoDLMMM14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Automated Testing Framework of Model-Driven Tools for XACML Policy Specification.\n \n \n \n \n\n\n \n Bertolino, A.; Daoudagh, S.; Lonetti, F.; and Marchetti, E.\n\n\n \n\n\n\n In 9th International Conference on the Quality of Information and Communications Technology, QUATIC 2014, Guimaraes, Portugal, September 23-26, 2014, pages 75–84, 2014. \n \n\n\n\n
\n\n\n\n \n \n \"AnPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/quatic/BertolinoDLM14,\n  author       = {Antonia Bertolino and\n                  Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti},\n  title        = {An Automated Testing Framework of Model-Driven Tools for {XACML} Policy\n                  Specification},\n  booktitle    = {9th International Conference on the Quality of Information and Communications\n                  Technology, {QUATIC} 2014, Guimaraes, Portugal, September 23-26, 2014},\n  pages        = {75--84},\n  year         = {2014},\n  crossref     = {DBLP:conf/quatic/2014},\n  url          = {https://doi.org/10.1109/QUATIC.2014.17},\n  doi          = {10.1109/QUATIC.2014.17},\n  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/quatic/BertolinoDLM14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Toolchain for Designing and Testing Access Control Policies.\n \n \n \n \n\n\n \n Bertolino, A.; Busch, M.; Daoudagh, S.; Lonetti, F.; and Marchetti, E.\n\n\n \n\n\n\n In Engineering Secure Future Internet Services and Systems - Current Research, pages 266–286. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@incollection{DBLP:series/lncs/BertolinoBDLM14,\n  author       = {Antonia Bertolino and\n                  Marianne Busch and\n                  Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti},\n  title        = {A Toolchain for Designing and Testing Access Control Policies},\n  booktitle    = {Engineering Secure Future Internet Services and Systems - Current\n                  Research},\n  pages        = {266--286},\n  year         = {2014},\n  crossref     = {DBLP:series/lncs/8431},\n  url          = {https://doi.org/10.1007/978-3-319-07452-8\\_11},\n  doi          = {10.1007/978-3-319-07452-8\\_11},\n  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/series/lncs/BertolinoBDLM14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Automated testing of eXtensible Access Control Markup Language-based access control systems.\n \n \n \n \n\n\n \n Bertolino, A.; Daoudagh, S.; Lonetti, F.; Marchetti, E.; and Schilders, L.\n\n\n \n\n\n\n IET Softw., 7(4): 203–212. 2013.\n \n\n\n\n
\n\n\n\n \n \n \"AutomatedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/iee/BertolinoDLMS13,\n  author       = {Antonia Bertolino and\n                  Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti and\n                  Louis Schilders},\n  title        = {Automated testing of eXtensible Access Control Markup Language-based\n                  access control systems},\n  journal      = {{IET} Softw.},\n  volume       = {7},\n  number       = {4},\n  pages        = {203--212},\n  year         = {2013},\n  url          = {https://doi.org/10.1049/iet-sen.2012.0101},\n  doi          = {10.1049/IET-SEN.2012.0101},\n  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/iee/BertolinoDLMS13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n XACMUT: XACML 2.0 Mutants Generator.\n \n \n \n \n\n\n \n Bertolino, A.; Daoudagh, S.; Lonetti, F.; and Marchetti, E.\n\n\n \n\n\n\n In Sixth IEEE International Conference on Software Testing, Verification and Validation, ICST 2013 Workshops Proceedings, Luxembourg, Luxembourg, March 18-22, 2013, pages 28–33, 2013. \n \n\n\n\n
\n\n\n\n \n \n \"XACMUT:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icst/BertolinoDLM13,\n  author       = {Antonia Bertolino and\n                  Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti},\n  title        = {{XACMUT:} {XACML} 2.0 Mutants Generator},\n  booktitle    = {Sixth {IEEE} International Conference on Software Testing, Verification\n                  and Validation, {ICST} 2013 Workshops Proceedings, Luxembourg, Luxembourg,\n                  March 18-22, 2013},\n  pages        = {28--33},\n  year         = {2013},\n  crossref     = {DBLP:conf/icst/2013w},\n  url          = {https://doi.org/10.1109/ICSTW.2013.11},\n  doi          = {10.1109/ICSTW.2013.11},\n  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icst/BertolinoDLM13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Toolchain for Designing and Testing XACML Policies.\n \n \n \n \n\n\n \n Bertolino, A.; Busch, M.; Daoudagh, S.; Koch, N.; Lonetti, F.; and Marchetti, E.\n\n\n \n\n\n\n In Sixth IEEE International Conference on Software Testing, Verification and Validation, ICST 2013, Luxembourg, Luxembourg, March 18-22, 2013, pages 495–496, 2013. \n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icst/BertolinoBDKLM13,\n  author       = {Antonia Bertolino and\n                  Marianne Busch and\n                  Said Daoudagh and\n                  Nora Koch and\n                  Francesca Lonetti and\n                  Eda Marchetti},\n  title        = {A Toolchain for Designing and Testing {XACML} Policies},\n  booktitle    = {Sixth {IEEE} International Conference on Software Testing, Verification\n                  and Validation, {ICST} 2013, Luxembourg, Luxembourg, March 18-22,\n                  2013},\n  pages        = {495--496},\n  year         = {2013},\n  crossref     = {DBLP:conf/icst/2013},\n  url          = {https://doi.org/10.1109/ICST.2013.70},\n  doi          = {10.1109/ICST.2013.70},\n  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icst/BertolinoBDKLM13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Testing of PolPA authorization systems.\n \n \n \n \n\n\n \n Bertolino, A.; Daoudagh, S.; Lonetti, F.; Marchetti, E.; Martinelli, F.; and Mori, P.\n\n\n \n\n\n\n In 7th International Workshop on Automation of Software Test, AST 2012, Zurich, Switzerland, June 2-3, 2012, pages 8–14, 2012. \n \n\n\n\n
\n\n\n\n \n \n \"TestingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icse/BertolinoDLMMM12,\n  author       = {Antonia Bertolino and\n                  Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti and\n                  Fabio Martinelli and\n                  Paolo Mori},\n  title        = {Testing of PolPA authorization systems},\n  booktitle    = {7th International Workshop on Automation of Software Test, {AST} 2012,\n                  Zurich, Switzerland, June 2-3, 2012},\n  pages        = {8--14},\n  year         = {2012},\n  crossref     = {DBLP:conf/icse/2012ast},\n  url          = {https://doi.org/10.1109/IWAST.2012.6228997},\n  doi          = {10.1109/IWAST.2012.6228997},\n  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icse/BertolinoDLMMM12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Automatic XACML Requests Generation for Policy Testing.\n \n \n \n \n\n\n \n Bertolino, A.; Daoudagh, S.; Lonetti, F.; and Marchetti, E.\n\n\n \n\n\n\n In Fifth IEEE International Conference on Software Testing, Verification and Validation, ICST 2012, Montreal, QC, Canada, April 17-21, 2012, pages 842–849, 2012. \n \n\n\n\n
\n\n\n\n \n \n \"AutomaticPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icst/BertolinoDLM12,\n  author       = {Antonia Bertolino and\n                  Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti},\n  title        = {Automatic {XACML} Requests Generation for Policy Testing},\n  booktitle    = {Fifth {IEEE} International Conference on Software Testing, Verification\n                  and Validation, {ICST} 2012, Montreal, QC, Canada, April 17-21, 2012},\n  pages        = {842--849},\n  year         = {2012},\n  crossref     = {DBLP:conf/icst/2012},\n  url          = {https://doi.org/10.1109/ICST.2012.185},\n  doi          = {10.1109/ICST.2012.185},\n  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icst/BertolinoDLM12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n The X-CREATE Framework - A Comparison of XACML Policy Testing Strategies.\n \n \n \n\n\n \n Bertolino, A.; Daoudagh, S.; Lonetti, F.; and Marchetti, E.\n\n\n \n\n\n\n In WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18 - 21 April, 2012, pages 155–160, 2012. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/webist/BertolinoDLM12,\n  author       = {Antonia Bertolino and\n                  Said Daoudagh and\n                  Francesca Lonetti and\n                  Eda Marchetti},\n  title        = {The {X-CREATE} Framework - {A} Comparison of {XACML} Policy Testing\n                  Strategies},\n  booktitle    = {{WEBIST} 2012 - Proceedings of the 8th International Conference on\n                  Web Information Systems and Technologies, Porto, Portugal, 18 - 21\n                  April, 2012},\n  pages        = {155--160},\n  year         = {2012},\n  crossref     = {DBLP:conf/webist/2012},\n  timestamp    = {Fri, 25 May 2012 12:31:27 +0200},\n  biburl       = {https://dblp.org/rec/conf/webist/BertolinoDLM12.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);