Analyzing Security Scenarios Using Defence Trees and Answer Set Programming. Bistarelli, S., Peretti, P., & Trubitsyna, I. In Compagna, L., Lotz, V., & Massacci, F., editors, Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007, volume 197, of Electronic Notes in Theoretical Computer Science, pages 121–129, 2007. Elsevier. Paper doi bibtex @inproceedings{DBLP:journals/entcs/BistarelliPT08,
author = {Stefano Bistarelli and
Pamela Peretti and
Irina Trubitsyna},
editor = {Luca Compagna and
Volkmar Lotz and
Fabio Massacci},
title = {Analyzing Security Scenarios Using Defence Trees and Answer Set Programming},
booktitle = {Proceedings of the 3rd International Workshop on Security and Trust
Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
series = {Electronic Notes in Theoretical Computer Science},
volume = {197},
number = {2},
pages = {121--129},
publisher = {Elsevier},
year = {2007},
url = {https://doi.org/10.1016/j.entcs.2007.12.021},
doi = {10.1016/J.ENTCS.2007.12.021},
timestamp = {Mon, 13 Feb 2023 09:13:20 +0100},
biburl = {https://dblp.org/rec/journals/entcs/BistarelliPT08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"b2hvZME2eHFmJbzuh","bibbaseid":"bistarelli-peretti-trubitsyna-analyzingsecurityscenariosusingdefencetreesandanswersetprogramming-2007","author_short":["Bistarelli, S.","Peretti, P.","Trubitsyna, I."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Stefano"],"propositions":[],"lastnames":["Bistarelli"],"suffixes":[]},{"firstnames":["Pamela"],"propositions":[],"lastnames":["Peretti"],"suffixes":[]},{"firstnames":["Irina"],"propositions":[],"lastnames":["Trubitsyna"],"suffixes":[]}],"editor":[{"firstnames":["Luca"],"propositions":[],"lastnames":["Compagna"],"suffixes":[]},{"firstnames":["Volkmar"],"propositions":[],"lastnames":["Lotz"],"suffixes":[]},{"firstnames":["Fabio"],"propositions":[],"lastnames":["Massacci"],"suffixes":[]}],"title":"Analyzing Security Scenarios Using Defence Trees and Answer Set Programming","booktitle":"Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007","series":"Electronic Notes in Theoretical Computer Science","volume":"197","number":"2","pages":"121–129","publisher":"Elsevier","year":"2007","url":"https://doi.org/10.1016/j.entcs.2007.12.021","doi":"10.1016/J.ENTCS.2007.12.021","timestamp":"Mon, 13 Feb 2023 09:13:20 +0100","biburl":"https://dblp.org/rec/journals/entcs/BistarelliPT08.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:journals/entcs/BistarelliPT08,\n author = {Stefano Bistarelli and\n Pamela Peretti and\n Irina Trubitsyna},\n editor = {Luca Compagna and\n Volkmar Lotz and\n Fabio Massacci},\n title = {Analyzing Security Scenarios Using Defence Trees and Answer Set Programming},\n booktitle = {Proceedings of the 3rd International Workshop on Security and Trust\n Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},\n series = {Electronic Notes in Theoretical Computer Science},\n volume = {197},\n number = {2},\n pages = {121--129},\n publisher = {Elsevier},\n year = {2007},\n url = {https://doi.org/10.1016/j.entcs.2007.12.021},\n doi = {10.1016/J.ENTCS.2007.12.021},\n timestamp = {Mon, 13 Feb 2023 09:13:20 +0100},\n biburl = {https://dblp.org/rec/journals/entcs/BistarelliPT08.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Bistarelli, S.","Peretti, P.","Trubitsyna, I."],"editor_short":["Compagna, L.","Lotz, V.","Massacci, F."],"key":"DBLP:journals/entcs/BistarelliPT08","id":"DBLP:journals/entcs/BistarelliPT08","bibbaseid":"bistarelli-peretti-trubitsyna-analyzingsecurityscenariosusingdefencetreesandanswersetprogramming-2007","role":"author","urls":{"Paper":"https://doi.org/10.1016/j.entcs.2007.12.021"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/53/6380.bib","dataSources":["LXyJ7X9n6g55d9qgh","DjivyTGGA5qit7Mf4","NMm7YpyiDxjcnpopo","WXL4P7BKHQy7Qss6y"],"keywords":[],"search_terms":["analyzing","security","scenarios","using","defence","trees","answer","set","programming","bistarelli","peretti","trubitsyna"],"title":"Analyzing Security Scenarios Using Defence Trees and Answer Set Programming","year":2007}