EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Author: Etalle, S.
Home Policy Brochure Browse Search User Area Contact Help

2014

Abbasi, A. and Wetzel, J. and Bokslag, W. and Zambon, Emmanuele and Etalle, S. (2014) On Emulation-Based Network Intrusion Detection Systems. In: Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 17-19 September 2014, Gothenburg, Sweden. pp. 384-404. Lecture Notes in Computer Science 8688. Springer. ISSN 0302-9743 ISBN 978-3-319-11379-1

2013

Etalle, S. (2013) Innovatie en R&D -- een Inleiding. Magazine nationale veiligheid en crisisbeheersing, 11 (1). pp. 3-5. ISSN 1875-7561
Etalle, S. and Hinrichs, T. and Lee, A. and Trivellato, D. and Zannone, N. (2013) Policy administration in tag-based authorization. In: 5th International Symposium on Foundations and Practice of Security, FPS 2012, 25-26 Oct 2012, Montreal, QC, Canada. pp. 162-179. Lecture Notes in Computer Science 7743. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-37119-6
Rocha, B.P.S. and Conti, M. and Etalle, S. and Crispo, B. (2013) Hybrid static-runtime information flow and declassification enforcement. IEEE transactions on information forensics and security, 8 (8). pp. 1294-1305. ISSN 1556-6013 *** ISI Impact 1,90 ***
Trivellato, D. and Etalle, S. and Luit, E. and Zannone, N. (2013) The POLIPO Security Framework. In: Situation Awareness with Systems of Systems. Springer Verlag, New York, pp. 189-208. ISBN 978-1-4614-6229-3
Trivellato, D. and Zannone, N. and Glaundrup, M. and Skowronek, J. and Etalle, S. (2013) A semantic security framework for systems of systems. International journal of cooperative information systems, 22 (1). pp. 1-35. ISSN 0218-8430 *** ISI Impact 0,53 ***

2012

Brusó, M. and Chatzikokolakis, K. and Etalle, S. and den Hartog, J.I. (2012) Linking unlinkability. In: 7th International Symposium on Trustworthy Global Computing (TGC 2012), 07-08 Sep 2012, Newcastle upon Tyne, UK. pp. 129-144. Lecture Notes in Computer Science 8191. Springer Verlag. ISBN 978-3-642-41156-4
Hadžiosmanović, D. and Bolzoni, D. and Etalle, S. and Hartel, P.H. (2012) Challenges and opportunities in securing industrial control systems. In: Proceedings of the IEEE Workshop on Complexity in Engineering, COMPENG 2012, 11-13 June 2012, Aachen, Germany. pp. 1-6. IEEE. ISBN 978-1-4673-1614-9
Hadžiosmanović, D. and Simionato, L. and Bolzoni, D. and Zambon, Emmanuele and Etalle, S. (2012) N-gram Against the Machine: On the Feasibility of the N-gram Network Analysis for Binary Protocols. In: Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2012), 12-14 Sep 2012, Amsterdam, The Netherlands. pp. 354-373. Lecture Notes in Computer Science 7462. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-33337-8
Herrmann, A. and Morali, A. and Etalle, S. and Wieringa, R.J. (2012) Risk and Business Goal Based Security Requirement and Countermeasure Prioritization. In: Workshops on Business Informatics Research (BIR 2011), 6-8 Oct 2011, Riga, Latvia. pp. 64-76. Lecture Notes in Business Information Processing 106. Springer Verlag. ISSN 1865-1348 ISBN 978-3-642-29230-9
Vriezekolk, E. and Wieringa, R.J. and Etalle, S. (2012) Design and initial validation of the Raster method for telecom service availability risk assessment. In: Proceedings of the 9th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2012), 22-25 April 2012, Vancouver, Canada. 117. Simon Fraser University. ISBN 978-0-86491-332-6
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2012) A2thOS: availability analysis and optimisation in SLAs International Journal of Network Management, 22 (2). pp. 104-130. ISSN 1055-7148 *** ISI Impact 0,51 ***

2011

Bolzoni, D. and Schade, C. L. and Etalle, S. (2011) A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks. In: Proceedings of the 25th Large Installation System Administration Conference (LISA 2011), 4-9 Dec 2011, Boston, USA. pp. 201-216. The USENIX Association. ISBN 978-931971-881-3
Hadžiosmanović, D. and Bolzoni, D. and Hartel, P.H. and Etalle, S. (2011) MELISSA: Towards Automated Detection of Undesirable User Actions in Critical Infrastructures. In: Proceedings of the European Conference on Computer Network Defense, EC2ND 2011, 6-8 Sept 2011, Gothenburg, Sweden. pp. 41-48. IEEE Computer Society. ISBN 978-0-7695-4762-6
Herrmann, A. and Morali, A. and Etalle, S. and Wieringa, R.J. (2011) RiskREP: Risk-Based Security Requirements Elicitation and Prioritization. In: Perspectives in Business Informatics Research, 6-8 Oct 2011, Riga, Latvia. pp. 155-162. Riga Technical University. ISBN 978-9984-30-197-6
Trivellato, D. and Zannone, N. and Etalle, S. (2011) A Security Framework for Systems of Systems. In: 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY , 6-8 Jun 2011, Pisa, Italy. pp. 182-183. IEEE Computer Society. ISBN 978-1-4244-9879-6
Trivellato, D. and Zannone, N. and Etalle, S. (2011) Protecting Information in Systems of Systems. In: 18th ACM Conference on Computer and Communications Security (CCS), 17-21 Oct 2011, Chicago, USA . pp. 865-867. ACM. ISBN 978-1-4503-0948-6
Vriezekolk, E. and Wieringa, R.J. and Etalle, S. (2011) A New Method to Assess Telecom Service Availability Risks. In: Proceedings of the 8th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2011, 8-11 May 2011, Lisbon, Portugal. 196. LNEC. ISBN 978-972-49-2247-8
Vriezekolk, E. and Wieringa, R.J. and Etalle, S. (2011) How to assess telecom service availability risks for crisis organisations? In: Advances in Safety, Reliability and Risk Management, 18-22 Sep 2011, Troyes, France. pp. 2653-2661. Taylor & Francis. ISBN 978-0-415-68379-1
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. and Hartel, P.H. (2011) Model-based Qualitative Risk Assessment for Availability of IT Infrastructures. Software and Systems Modeling, 10 (4). pp. 553-580. ISSN 1619-1366 *** ISI Impact 1,25 ***

2010

Bauer, L. and Etalle, S. and den Hartog, J.I. and Viganò, L. (2010) Preface of Special Issue on “Computer Security: Foundations and Automated Reasoning”. Journal of Automated Reasoning, 46 (3-4). pp. 223-224. ISSN 0168-7433 *** ISI Impact 0,57 ***
Böhm, K. and Etalle, S. and den Hartog, J.I. and Hütter, C. and Trabelsi, S. and Trivellato, D. and Zannone, N. (2010) A flexible architecture for privacy-aware trust management. Journal of Theoretical and Applied Electronic Commerce Research, 5 (2). pp. 77-96. ISSN 0718-1876
Morali, A. and Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2010) CRAC: Confidentiality Risk Assessment and IT-Architecture Comparison. In: Proceedings of the 6th International Conference on Network and Service Management (CNSM 2010), 25-29 Oct 2010, Niagara Falls, Canada. pp. 322-325. IEEE Computer Society. ISBN 978-1-4244-8910-7
Pontes Soares Rocha, B. and Bandhakavi, S. and den Hartog, J.I. and Winsborough, W.H. and Etalle, S. (2010) Towards static flow-based declassification for legacy and untrusted programs. In: IEEE Symposium on Security and Privacy, May 16-19, 2010, Oakland, California. pp. 93-108. IEEE Computer Society. ISBN 978-0-7695-4035-1
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2010) A2THOS: Availability Analysis and Optimisation in SLAs Technical Report TR-CTIT-10-20, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zannone, N. and Petkovic, M. and Etalle, S. (2010) Towards Data Protection Compliance. In: Proceedings of the 5th International Conference on Security and Cryptography (SECRYPT 2010), 26-28 July 2010, Athens, Greece. pp. 213-216. SciTePress. ISBN 978-989-8425-18-8

2009

Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. Technical Report TR-CTIT-09-10, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. and Hartel, P.H. (2009) Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems. In: Recent Advances in Intrusion Detection (RAID). pp. 1-20. Lecture Notes in Computer Science 5758. Springer Verlag. ISBN 978-3-642-04341-3
Czenko, M.R. and Etalle, S. (2009) LP with Flexible Grouping and Aggregates Using Modes. In: 19th International Symposium, LOPSTR, Revised Selected Papers, 9-11 Sep 2009, Coimbra, Portugal. pp. 67-81. LNCS 6037. Springer. ISBN 978-3-642-12591-1
Etalle, S. and Winsborough, W.H. (2009) Maintaining control while delegating trust: Integrity constraints in trust management. ACM Transactions on Information and System Security, 13 (1). 5:1-5:27. ISSN 1094-9224 *** ISI Impact 0,69 ***
Morali, A. and Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. (2009) CRAC: Confidentiality Risk Analysis and IT-Architecture Comparison of Business Networks (extended version). Technical Report TR-CTIT-09-30, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Zambon, Emmanuele and Houmb, S.H. and Sallhammar, K. and Etalle, S. (2009) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. In: 31st International Conference on Software Engineering - Companion Volume, 16-24 May 2009, Vancouver, Canada. pp. 130-140. IEEE Computer Society. ISBN 978-1-4244-3494-7
Spiessens, F. and den Hartog, J.I. and Etalle, S. (2009) Know what you trust. In: Formal Aspects in Security and Trust, 5th International Workshop, Malaga, Spain. pp. 129-142. Lecture Notes in Computer Science 5491. Springer Verlag. ISBN 978-3-642-01464-2
Trivellato, D. and Spiessens, A.O.D. and Zannone, N. and Etalle, S. (2009) Reputation-based ontology alignment for autonomy and interoperability in distributed access control. In: Proceedings 12th IEEE International conference on Computational Science and Engineering, 29-31 Aug. 2009, Vancouver BC, Canada. pp. 252-258. IEEE. ISBN 978-0-7695-3823-5
Trivellato, D. and Spiessens, A.O.D. and Zonnone, N. and Etalle, S. (2009) POLIPO: Policies & ontologies for interoperability, portability, and autonomy. In: IEEE International Symposium on Policies for Distributed Systems and Networks, 20-22 July 2009, London, UK. pp. 110-113. IEEE. ISBN 978-0-7695-3742-9
Zambon, Emmanuele and Etalle, S. and Wieringa, R.J. and Hartel, P.H. (2009) Architecture-based Qualitative Risk Analysis for Availability of IT Infrastructures. Technical Report TR-CTIT-09-35, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2008

Bolzoni, D. and Crispo, B. and Etalle, S. (2008) ATLANTIDES: Automatic Configuration for Alert Verification in Network Intrusion Detection Systems. Technical Report TR-CTIT-08-17, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. (2008) Approaches in Anomaly-based Network Intrusion Detection Systems. In: Intrusion Detection Systems. Advances in Information Security 38. Springer Verlag, London, pp. 1-16. ISBN 978-0-387-77265-3
Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. Technical Report TR-CTIT-08-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Etalle, S. (2008) Boosting Web Intrusion Detection Systems by Inferring Positive Signatures. In: Confederated International Conferences On the Move to Meaningful Internet Systems (OTM), November 9-14, 2008, Monterrey, Mexico. pp. 938-955. Lecture Notes in Computer Science 5332. Springer Verlag. ISSN 0302-9743 ISBN 978-3-540-88872-7
Czenko, M.R. and Doumen, J.M. and Etalle, S. (2008) Trust Management in P2P systems using Standard TuLiP. Technical Report TR-CTIT-08-09, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Doumen, J.M. and Etalle, S. (2008) Trust Management in P2P Systems Using Standard TuLiP. In: Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway. pp. 1-16. IFIP International Federation for Information Processing 263/2008. Springer. ISSN 1571-5736 ISBN 978-0-387-09427-4
Czenko, M.R. and Etalle, S. (2008) LP with Flexible Grouping and Aggregates Using Modes. Technical Report TR-CTIT-08-41, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Crampton, J. and Etalle, S. (2008) RBAC administration in distributed systems. In: Proceedings of the 13th ACM symposium on Access control models and technologies, 11-13 June 2008, Estes Park, Colorado, USA. pp. 93-102. ACM. ISBN 978-1-60558-129-3
Etalle, S. (2008) Nice to know. Technical University of Eindhoven, Eindhoven. ISBN 978-90-386-1427-4
Morali, A. and Zambon, Emmanuele and Etalle, S. and Overbeek, P. (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. Technical Report TR-CTIT-08-05, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Morali, A. and Zambon, Emmanuele and Etalle, S. and Overbeek, P. (2008) IT Confidentiality Risk Assessment for an Architecture-Based Approach. In: Third IEEE International Workshop on Business-Driven IT Management, 07 Apr 2008, Salvador, Brazil. pp. 31-40. IEEE Computer Society. ISBN 978-1-4244-2191-6
Morali, A. and Zambon, Emmanuele and Houmb, S.H. and Sallhammar, K. and Etalle, S. (2008) Extended eTVRA vs. Security Checklist: Experiences in a Value-Web. Technical Report TR-CTIT-08-62, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2007

Bolzoni, D. and Crispo, B. and Etalle, S. (2007) ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems. In: Proceedings of the 21st Large Installation System Administration Conference (LISA '07), 11-16 November 2007, Dallas, Texas. pp. 141-152. Usenix Association. ISBN 978-1-931971-55-3
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. and Lenzini, G. (2007) Audit-based compliance control. International Journal of Information Security, 6 (2-3). pp. 133-151. ISSN 1615-5262 *** ISI Impact 0,48 ***
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2007) Timed Analysis of Security Protocols. Journal of Computer Security, 15 (6). pp. 619-645. ISSN 0926-227X
Czenko, M.R. and Etalle, S. (2007) Core TuLiP. Technical Report TR-CTIT-07-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Etalle, S. (2007) Core TuLiP - Logic Programming for Trust Management. In: Proceedings of the 23rd International Conference on Logic Programming, ICLP 2007, 8-13 Sep 2007, Porto, Portugal. pp. 380-394. Lecture Notes in Computer Science 4670. Springer Verlag. ISBN 978-3-540-74608-9
Czenko, M.R. and Etalle, S. and Li, Dongyi and Winsborough, W.H. (2007) An Introduction to the Role Based Trust Management Framework RT. Technical Report TR-CTIT-07-34, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Etalle, S. and Li, Dongyi and Winsborough, W.H. (2007) An Introduction to the Role Based Trust Management Framework RT. In: Foundations of Security Analysis and Design IV -- FOSAD 2006/2007 Tutorial Lectures. Lecture Notes in Computer Science 4677. Springer Verlag, Berlin, pp. 246-281. ISBN 978-3-540-74809-0
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2007) Extended Privilege Inheritance in RBAC. In: Proceedings of the 2nd ACM symposium on Information, computer and communications security, ASIACCS 2007, March 20-22, Singapore. pp. 383-385. Conference on Computer and Communications Security. ACM Press. ISBN 1-59593-574-6
Dekker, M.A.C. and Crampton, J. and Etalle, S. (2007) RBAC Administration in Distributed Systems. Technical Report TR-CTIT-07-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2007) Refinement for Administrative Policies. Technical Report TR-CTIT-07-47, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2007) Refinement for Administrative Policies. In: Proceedings of the fourth VLDB Workshop, SDM 2007, 23, 24 Sept 2007, Vienna, Austria. pp. 33-46. Lecture Notes in Computer Science 4721. Springer. ISBN 978-3-540-75247-9
Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2007) Privacy Policies. In: Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications XVIII. Springer Verlag, Berlin, pp. 383-397. ISBN 978-3-540-69860-9
Dekker, M.A.C. and den Hartog, J.I. and Etalle, S. (2007) Audit-based Compliance Control (AC2) for EHR Systems. Technical Report TR-CTIT-07-46, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. and den Hartog, J.I. and Marsh, S. (2007) Trust and Punishment. (Invited) In: Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics, Rome, Italy. 5:1-5:6. nstitute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST). ISBN 978-963-9799-09-7
Etalle, S. and Massacci, F. and Yautsiukhin, A. (2007) The Meaning of Logs. In: Fourth Int. Conf. on Trust, Privacy and Security in Digital Business, TRUSTBUS 2007, 4-6 September 2007, Germany. pp. 145-154. Lecture Notes in Computer Science 4657. Springer Verlag. ISBN 978-3-540-74408-5
Etalle, S. and Massacci, F. and Yautsiukhin, A. (2007) The Meaning of Logs. Technical Report TR-CTIT-07-24, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. and Samarati, P. (2007) Preface of special issue of the proceedings of theSecond International Workshop on Security and Trust Management (STM 2006). In: Proceedings of the Second International Workshop on Security and Trust Management, 20 Sep 2006, Hamburg, Germany. pp. 1-2. Electronic Notes in Theoretical Computer Science 179. Elsevier. ISSN 1571-0661
Etalle, S. and Winsborough, W.H. (2007) A Posteriori Compliance Control. In: 12th ACM Symposium on Access Control Models and Technologies (SACMAT), 20-22 June 2007, Nice, France. pp. 11-20. ACM Press. ISBN 978-1-59593-745-2
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) A model supporting Business Continuity auditing & planning in Information Systems. In: Second International Conference on Internet Monitoring and Protection (ICIMP), 1-5 Jul 2007, San Jose, CA, USA. pp. 33-33. IEEE Computer Society. ISBN 0-7695-2911-9
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) Model-Based Mitigation of Availability Risks. Technical Report TR-CTIT-07-04, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) A model supporting Business Continuity auditing & planning in Information Systems. Technical Report TR-CTIT-07-17, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zambon, Emmanuele and Bolzoni, D. and Etalle, S. and Salvato, M. (2007) Model-Based Mitigation of Availability Risks. In: Second IEEE/IFIP International Workshop on Business-Driven IT Management, 21 May 2007, Munich, Germany. pp. 75-83. IEEE Computer Society. ISBN 1-4244-1295-1

2006

Bolzoni, D. and Etalle, S. (2006) APHRODITE: an Anomaly-based Architecture for False Positive Reduction. Technical Report TR-CTIT-06-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bolzoni, D. and Zambon, Emmanuele and Etalle, S. and Hartel, P.H. (2006) Poseidon: a 2-tier Anomaly-based Network Intrusion Detection System. In: 4th IEEE Int. Information Assurance Workshop (IWIA2006), 13-14 Apr 2006, London, UK. pp. 144-156. IEEE Computer Society. ISBN 0 7695 2564 4
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. and Lenzini, G. (2006) The Audit Logic: Policy Compliance in Distributed Systems. Technical Report TR-CTIT-06-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Corin, R.J. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Law, Yee Wei and Tokmakoff, A. (2006) LicenseScript: A Logical Language for Digital Rights Management. Annals of telecommunications special issue on Network and Information systems security, 61 (3-4). pp. 284-331. ISSN 0003-4347 *** ISI Impact 0,57 ***
Corin, R.J. and Saptawijaya, A. and Etalle, S. (2006) A Logic for Constraint-based Security Protocol Analysis. In: IEEE Symposium on Security and Privacy, 21-25 May 2006, Oakland, US. pp. 155-168. IEEE Computer Society. ISBN 0-7695-2574-1
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. Technical Report TR-CTIT-06-62, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Cederquist, J.G. and Crampton, J. and Etalle, S. (2006) Extended Privilege Inheritance in RBAC. Technical Report TR-CTIT-07-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. Technical Report TR-CTIT-06-49, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Etalle, S. (2006) Audit-Based Access Control for Electronic Health Records. In: Proceedings of the Second International Workshop on Views on Designing Complex Architectures (VODCA), 16-17 Sept 2006, Bertinoro, Italy. pp. 221-236. Elsevier Electronic Notes in Theoretical Computer Science 168. Elsevier. ISSN 1571-0661
Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2006) Privacy in an Ambient World. Technical Report TR-CTIT-06-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dekker, M.A.C. and Veugen, P.J.M. and Etalle, S. (2006) Audit-based Access Control in de Zorg. Informatiebeveiliging, 8. pp. 19-23. ISSN 1569-1063
Delzanno, G. and Etalle, S. and Gabbrielli, M. (2006) Introduction to the Special Issue on Specification Analysis and Verification of Reactive Systems. Theory and Practice of Logic Programming, 6 (3). pp. 225-226. ISSN 1471-0684 *** ISI Impact 0,29 ***

2005

Bolzoni, D. and Zambon, Emmanuele and Etalle, S. and Hartel, P.H. (2005) Poseidon: A 2-tier Anomaly-based Intrusion Detection System. Technical Report TR-CTIT-05-53, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2005) An Audit Logic for Accountability. Technical Report TR-CTIT-05-11, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Cederquist, J.G. and Corin, R.J. and Dekker, M.A.C. and Etalle, S. and den Hartog, J.I. (2005) An Audit Logic for Accountability. In: 6th International Workshop on Policies for Distributed Systems & Networks (POLICY 2005), 6-8 Jun 2005, Stockholm, Sweden. pp. 34-43. IEEE Computer Society. ISBN 0-7695-2265-3
Cheng, Jieyin and Chong, Chuen Ngen and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Nikolaus, S. (2005) STREAMTO: Streaming Content using a Tamper-Resistant Token (Workshop paper). In: 20th IFIP TC11 Int. Conf. on Security and Privacy in the Age of Ubiquitous Computing (SEC), Makuhari-Messe, Chiba, Japan. pp. 601-612. Springer-Verlag. ISBN 0-387-25658-X
Chong, Chuen Ngen and Corin, R.J. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Law, Yee Wei and Tokmakoff, A. (2005) LicenseScript: A Logical Language for Digital Rights Management. Technical Report TR-CTIT-05-09, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Joosten, R. and Kleinhuis, G. (2005) Service Brokerage with Prolog (Poster paper). In: 7th Int. Conf. on Enterprise Information Systems (ICEIS), Miami, Florida, USA. pp. 409-412. INSTICC Press. ISBN 972-8865-19-8
Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2005) A Formal Security Analysis of an OSA/Parlay Authentication Interface. Technical Report TR-CTIT-05-62, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2005) A Formal Security Analysis of an OSA/Parlay Authentication Interface. In: 7th IFIP WG 6.1 Int. Conf. on Formal Methods for Open Object-Based Distributed Systems (FMOODS), Athens, Greece. pp. 131-146. Springer-Verlag. ISBN 3-540-26181-8
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2005) Timed Analysis of Security Protocols. Technical Report TR-CTIT-05-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Saptawijaya, A. and Etalle, S. (2005) PS-LTL for Constraint-Based Security Protocol Analysis. In: Logic Programming, 21st International Conference, ICLP 2005, October 2-5, 2005, Sitges, Spain. pp. 439-440. Electronic Notes in Theoretical Computer Science 3668. Springer Verlag. ISBN 3-540-29208-X
Czenko, M.R. and Doumen, J.M. and Etalle, S. (2005) Trust in Virtual Communities. ERCIM News -- Special: Security and Trust Management, 63. pp. 29-30. ISSN 0926-4981
Czenko, M.R. and Tran, H.M. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and den Hartog, J.I. (2005) Nonmonotonic Trust Management for P2P Applications. Technical Report TR-CTIT-05-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Czenko, M.R. and Tran, H.M. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and den Hartog, J.I. (2005) Nonmonotonic Trust Management for P2P Applications. In: 1st Int. Workshop on Security and Trust Management (STM), Milan, Italy. pp. 113-130. Electronic Notes in Theoretical Computer Science 157. Elsevier Science. ISSN 1571-0661
Etalle, S. and Winsborough, W.H. (2005) Integrity Constraints in Trust Management. Technical Report TR-CTIT-05-12, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Etalle, S. and Winsborough, W.H. (2005) Integrity Constraints in Trust Management (Extended Abstract). In: 10th ACM Symp. on Access Control Models and Technologies (SACMAT), June 01 - 03, 2005, Stockholm, Sweden. pp. 1-10. ACM Press. ISBN 1-59593-045-0
Law, Yee Wei and Hartel, P.H. and Etalle, S. and Havinga, P.J.M. and Di Pietro, R. and Mancini, L.V. (2005) Overview of Security Research in EYES. Technical Report TR-CTIT-05-06, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2004

Bossi, A. and Cocco, N. and Etalle, S. and Rossi, S. (2004) Declarative Semantics of Input Consuming Logic Programs. Technical Report TR-CTIT-04-08, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Bossi, A. and Cocco, N. and Etalle, S. and Rossi, S. (2004) Declarative Semantics of Input Consuming Logic Programs. In: Program Development in Computational Logic. Springer-Verlag, Berlin, pp. 90-114. ISBN 3-540-22152-2
Bossi, A. and Etalle, S. and Smaus, J.G. and Rossi, S. (2004) Termination of Simply Moded Logic Programs with Dynamic Scheduling. ACM Transactions on Computational Logic, 15 (3). pp. 470-507. ISSN 1529-3785 *** ISI Impact 0,79 ***
Cheng, Jieyin and Chong, Chuen Ngen and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Nikolaus, S. (2004) STREAMTO: Streaming Content using a Tamper-Resistant Token. Technical Report TR-CTIT-04-47, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Joosten, R. and Kleinhuis, G. (2004) Inter-library Service Brokerage in LicenseScript. Technical Report TR-CTIT-04-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Joosten, R. and Kleinhuis, G. (2004) Service Brokerage with Prolog. Technical Report TR-CTIT-04-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Ren, B. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Corin, R.J. (2004) License Protection with a Tamper-Resistant Token. Technical Report TR-CTIT-04-28, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Ren, B. and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Corin, R.J. (2004) License protection with a tamper-resistant token. In: 5th Workshop on Information Security Applications (WISA), Jeju Island, Korea. pp. 223-237. Springer-Verlag. ISBN 3-540-24015-2
Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2004) Security Analysis of Parlay/OSA Framework. Technical Report TR-CTIT-04-37, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Di Caprio, G. and Etalle, S. and Gnesi, S. and Lenzini, G. and Moiso, C. (2004) Security Analysis of Parlay/OSA Framework. In: 9th Int. Conf. on Intelligence in service delivery Networks ICIN, Bordeaux, France. pp. 54-59. IOS Press.
Corin, R.J. and Doumen, J.M. and Etalle, S. (2004) Analysing Password Protocol Security Against Off-line Dictionary Attacks. In: Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP 2004), 26 June 2004, Bologna, Italy. pp. 47-63. Electronic Notes in Theoretical Computer Science 121. Elsevier. ISSN 1571-0661
Corin, R.J. and Etalle, S. (2004) A simple procedure for finding guessing attacks (Extended Abstract). Technical Report TR-CTIT-04-23, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2004) Timed Model Checking of Security Protocols. Technical Report TR-CTIT-04-24, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2004) Timed Model Checking of Security Protocols. In: 2nd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE), Fairfax, Virginia. pp. 23-32. ACM Press. ISBN 1-58113-971-3
Corin, R.J. and Etalle, S. and den Hartog, J.I. and Lenzini, G. and Staicu, I.S. (2004) A Logic for Auditing Accountability in Decentralized Systems. Technical Report TR-CTIT-04-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Etalle, S. and den Hartog, J.I. and Lenzini, G. and Staicu, I.S. (2004) A Logic for Auditing Accountability in Decentralized Systems. In: 2nd Int. Workshop on Formal Aspect of Security and Trust (FAST), Toulouse, France. pp. 187-201. Springer-Verlag. ISBN 0-387-24050-0
Hartel, P.H. and van Eck, P.A.T. and Etalle, S. and Wieringa, R.J. (2004) Modelling mobility aspects of security policies. Technical Report TR-CTIT-04-06, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Hartel, P.H. and van Eck, P.A.T. and Etalle, S. and Wieringa, R.J. (2004) Modelling mobility aspects of security policies. (Invited) In: Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS), March 10-14, 2004, Marseille, France. pp. 172-191. Lecture Notes in Computer Science 3362. Springer-Verlag. ISBN 3-540-24287-2
Law, Yee Wei and Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Corin, R.J. (2004) Licensing Structured Data with Ease. In: 2nd IFIP TC6 WG6.11 Int. Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, Ilmenau, Germany. Technical Univ. Ilmenau. ISBN not assigned

2003

Bossi, A. and Etalle, S. and Rossi, S. and Smaus, J.G. (2003) Termination of Simply Model Logic Programs with Dynamic Scheduling. Technical Report TR-CTIT-03-05, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinkman, R. and Feng, Ling and Etalle, S. and Hartel, P.H. and Jonker, W. (2003) Experimenting with linear search in encrypted data. Technical Report TR-CTIT-03-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Corin, R.J. and Etalle, S. and Hartel, P.H. and Jonker, W. and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language and its Semantics. Technical Report TR-CTIT-03-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Corin, R.J. and Etalle, S. and Hartel, P.H. and Jonker, W. and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language and its Semantics. In: 3rd Int. Conf. on Web Delivering of Music (WEDELMUSIC), Leeds, UK. pp. 122-129. IEEE Computer Society. ISBN 0-7695-1935-0
Chong, Chuen Ngen and Corin, R.J. and Etalle, S. and Hartel, P.H. and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language. Technical Report TR-CTIT-03-10, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Corin, R.J. and Etalle, S. and Hartel, P.H. and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language. In: IFIP TC6 WG6.11 Int. Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods, Ilmenau, Germany. pp. 104-115. Technical Univ. Ilmenau.
Chong, Chuen Ngen and Corin, R.J. and Law, Yee Wei and Etalle, S. (2003) License Interpreter, Manager and Interface for LicenseScript. Report Type UNSPECIFIED Number UNSPECIFIED,
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. (2003) Comparing Logic-based and XML-based Rights Expression Languages. Technical Report TR-CTIT-03-30, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. (2003) Comparing Logic-based and XML-based Rights Expression Languages. In: Confederated Int. Workshops: On The Move to Meaningful Internet Systems (OTM), Catania, Sicily, Italy. pp. 779-792. Springer-Verlag. ISBN 3-540-20494-6
Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Law, Yee Wei (2003) Approximating Fair Use in LicenseScript. In: 6th Int. Conf. of Asian Digital Libraries (ICADL), Kuala Lumpur, Malaysia. pp. 432-443. Springer-Verlag. ISBN 3-540-20608-6
Chong, Chuen Ngen and Law, Yee Wei and Etalle, S. and Hartel, P.H. (2003) Approximating Fair Use in LicenseScript. Technical Report TR-CTIT-03-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. (2003) How to pay in LicenseScript. Technical Report TR-CTIT-03-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Doumen, J.M. and Etalle, S. (2003) Analysing Password Protocol Security Against Off-line Dictionary Attacks. Technical Report TR-CTIT-03-52, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Durante, A. and Etalle, S. and Hartel, P.H. (2003) A Trace Logic for Local Security Properties. Technical Report TR-CTIT-03-21, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Durante, A. and Etalle, S. and Hartel, P.H. (2003) A Trace Logic for Local Security Properties. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003), December 14 2003, Mumbai, India. pp. 129-143. Electronic Notes in Theoretical Computer Science 118. Elsevier. ISSN 1571-0661
Corin, R.J. and Etalle, S. and Hartel, P.H. and Mader, A.H. (2003) On Modelling Real-time and Security properties of Distributed Systems (Extended Abstract). Technical Report TR-CTIT-03-46, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Malladi, S. and Alves-Foss, J. and Etalle, S. (2003) Guess what? Here is a new tool that finds some new guessing attacks. Technical Report TR-CTIT-03-02, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Malladi, S. and Alves-Foss, J. and Etalle, S. (2003) Guess what? Here is a new tool that finds some new guessing attacks (Extended Abstract). In: IFIP WG 1.7 and ACM SIGPLAN Workshop on Issues in the Theory of Security (WITS), Warsaw, Poland. pp. 62-71. Dipartamento di Scienze dell'Informazione Universita di Bologna.
Di Pietro, R. and Mancini, L.V. and Law, Yee Wei and Etalle, S. and Havinga, P.J.M. (2003) LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. Technical Report TR-CTIT-03-29, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Di Pietro, R. and Mancini, L.V. and Law, Yee Wei and Etalle, S. and Havinga, P.J.M. (2003) LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. In: 32nd Int. Conf. on Parallel Processing Workshops (ICPP), Kaohsiung, Taiwan. pp. 397-406. IEEE Computer Society. ISBN 0-7695-2018-9
Etalle, S. and Mukhopadhyay, S. and Roychoudhury, A. (2003) Preface. In: Proceedings of the International Workshop on Software Verification and Validation (SVV 2003), December 14 2003, Mumbai, India. 1. Electronic Notes in Theoretical Computer Science 118. Elsevier. ISSN 1571-0661
Havinga, P.J.M. and Etalle, S. and Karl, H. and Petrioli, C. and Zorzi, M. and Kip, H.J. and Lentsch, T. (2003) EYES -- Energy Efficient Sensor Networks. In: 4th IFIP TC6/WG6.8 Int. Conf on Personal Wireless Communications (PWC), Venice, Italy. pp. 198-201. Springer-Verlag. ISBN 3-540-20123-8
Law, Yee Wei and Chong, Chuen Ngen and Etalle, S. and Hartel, P.H. and Corin, R.J. (2003) Licensing Structured Data with Ease. Technical Report TR-CTIT-03-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Corin, R.J. and Etalle, S. and Hartel, P.H. (2003) A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. Technical Report TR-CTIT-03-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Corin, R.J. and Etalle, S. and Hartel, P.H. (2003) A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks. In: 4th IFIP TC6/WG6.8 Int. Conf on Personal Wireless Communications (PWC), Venice, Italy. pp. 27-39. Springer-Verlag. ISBN 3-540-20123-8
Law, Yee Wei and Etalle, S. and Hartel, P.H. (2003) Assessing Security in Energy-Efficient Sensor Networks. In: 18th IFIP TC11 Int. Conf. on Information Security and Privacy in the Age of Uncertainty (SEC), May 26-28, 2003, Athens, Greece. pp. 459-463. Kluwer Academic Publishers. ISBN 1-4020-7449-2

2002

Bossi, A. and Cocco, N. and Etalle, S. (2002) Transformation Systems and Nondeclarative Properties. In: Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part I. Springer-Verlag, Berlin, pp. 162-186. ISBN 3-540-43959-5
Bossi, A. and Cocco, N. and Etalle, S. and Rossi, S. (2002) On Modular Termination Proofs of General Logic Programs. Theory and Practice of Logic Programming, 2 (3). pp. 263-291. ISSN 1471-0684 *** ISI Impact 0,29 ***
Bossi, A. and Etalle, S. and Rossi, S. (2002) Properties of Input-Consuming Derivations. Theory and Practice of Logic Programming, 2 (2). pp. 125-154. ISSN 1471-0684 *** ISI Impact 0,29 ***
Chong, Chuen Ngen and Law, Yee Wei and Etalle, S. and Hartel, P.H. (2002) LicenseScript - A Language and Framework for Calculating Licenses on Information over Constrained Domains. Technical Report TR-CTIT-02-37, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Durante, A. and Etalle, S. and Hartel, P.H. (2002) Using Trace Formulae for Security Protocol Design. Technical Report TR-CTIT-02-36, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Etalle, S. (2002) An Improved Constraint-Based System for the Verification of Security Protocols. Technical Report TR-CTIT-02-27, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Corin, R.J. and Etalle, S. (2002) An Improved Constraint-based system for the verification of security protocols. In: 9th Int. Static Analysis Symp. (SAS), Madrid, Spain. pp. 239-265. Springer-Verlag. ISBN 3-540-44235-9
Law, Yee Wei and Dulman, S.O. and Etalle, S. and Havinga, P.J.M. (2002) Assessing Security-Critical Energy-Efficient Sensor Networks. Technical Report TR-CTIT-02-18, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Etalle, S. and Hartel, P.H. (2002) Key Management with Group-Wise Pre-Deployed Keying and Secret Sharing Pre-Deployed Keying. Technical Report TR-CTIT-02-25, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2001

Bossi, A. and Etalle, S. and Rossi, S. (2001) Semantics and Termination of Simply-Moded Logic Programs with Dynamic Scheduling. In: 10th European Symp. on programming (ESOP), Genova, Italy. pp. 402-416. Springer-Verlag. ISBN 3-540-41862-8
Delzanno, G. and Etalle, S. (2001) Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols. In: 11th Int. Logic Based Program Synthesis and Transformation (LOPSTR), Paphos, Greece. pp. 76-90. Springer-Verlag. ISSN 0302-9743 ISBN 3-540-43915-3
Etalle, S. and Gabbrielli, M. and Meo, M.C. (2001) Transformations of CCP programs. ACM Transactions on Programming Languages and Systems (TOPLAS), 23 (3). pp. 304-395. ISSN 0164-0925 *** ISI Impact 1,03 ***
Mansour, O. and Etalle, S. and Krol, T. (2001) Scheduling and Allocation of Non-Manifest Loops on Hardware Graph-Models. In: 2nd PROGRESS workshop on Embedded Systems, 18 Oct 2001, Veldhoven, The Netherlands. pp. 153-160. Technology Foundation STW. ISBN 90-73461-26-X

2000

Bertolino, M. and Etalle, S. and Palamidessi, C. (2000) The Replacement Operation for CCP Programs. In: 9th Int. Workshop on Logic Program Synthesis and Transformation (LOPSTR), Venezia, Italy. pp. 216-233. Springer-Verlag. ISBN 3-540-67628-7
Bossi, A. and Cocco, N. and Etalle, S. (2000) Transformation of Left Terminating Programs. In: 9th Int. Workshop on Logic Program Synthesis and Transformation (LOPSTR), Venezia, Italy. pp. 156-175. Springer-Verlag. ISBN 3-540-67628-7
Bossi, A. and Etalle, S. and Rossi, S. (2000) Semantics of Well-Moded Input-Consuming Programs. Computer Languages, 26 (1). pp. 1-25. ISSN 0096-0551
Bossi, A. and Etalle, S. and Rossi, S. (2000) Semantics of Input-Consuming Logic Programs. In: Computational Logic (CL), London, UK. pp. 194-208. Springer-Verlag.
Etalle, S. and Mountjoy, J. (2000) The lazy functional side of logic programming. In: Extended Abstracts 10th Int. Workshop on Logic-based Program Synthesis and Transformation (LOPSTR), Jul. 2000, Imperial College, London. Department of Computer Science. ISSN 1361-6161

1999

Bossi, A. and Etalle, S. and Rossi, S. (1999) Properties of Input-Consuming Derivations. In: ICLP'99 International Conference on Logic Programming: Workshop on Verification of Logic Programs, December 1, 1999, Las Cruces, New Mexico. pp. 1-23. Electronic Notes in Theoretical Computer Science 30. Elsevier. ISSN 1571-0661
Etalle, S. and Bossi, A. and Cocco, N. (1999) Termination of well-moded programs. Journal of Logic Programming (JLP), 38 (2). pp. 243-257. ISSN 0743-1066
Etalle, S. and Gabbrielli, M. (1999) Layered modes. Journal of Logic Programming (JLP), 39 (1-3). pp. 225-244. ISSN 0743-1066
Etalle, S. and Hartel, P.H. and Vree, W.G. (1999) Declarative Solutions to Partitioned-grid Problems. Software: Practice and Experience, 29 (13). pp. 1173-1200. ISSN 0038-0644 *** ISI Impact 1,01 ***
Etalle, S. and van Raamsdonk, F. (1999) Logic Programming with Requests. In: 16th Int. Conf. Logic Programming (ICLP), Las Cruces, New Mexico. pp. 558-572. MIT Press. ISBN 0-262-54104-1
Etalle, S. and Smaus, J.G. (1999) Preface. In: Workshop on Verification of Logic Programs, December 1, 1999, Las Cruces, New Mexico. 1. Electronic Notes in Theoretical Computer Science 30. Elsevier. ISSN 1571-0661

1998

Etalle, S. (1998) A Semantics for Modular General Logic Programs. Theoretical computer science, 206 (1-2). pp. 51-80.
Etalle, S. and Gabbrielli, M. (1998) Partial evaluation of concurrent constraint languages. ACM Computing Surveys, 30 (3). electronic supplement to the September 1998 issue. ISSN 0360-0300 *** ISI Impact 3,54 ***
Etalle, S. and Gabbrielli, M. and Meo, M.C. (1998) Unfold/Fold Transformations of CCP Programs. In: 9th Int. Conf. Concurrency Theory (CONCUR), Nice, France. pp. 348-365. Springer-Verlag. ISBN 3-540-64896-8
Etalle, S. and van Raamsdonk, F. (1998) Beyond Success and Failure. In: Joint Int. Conf. and Symp. on Logic Programming (JICSLP), Manchester, UK. pp. 190-205. MIT Press. ISBN 0-262-60031-5

1997

Etalle, S. and Gabbrielli, M. and Marchiori, E. (1997) A transformation system for CLP with dynamic scheduling and CCP. In: Partial evaluation and semantics-based program manipulation (PEPM), Amsterdam, The Netherlands. pp. 137-150. ACM Press. ISBN 0-89791-917-3

1996

Bossi, A. and Cocco, N. and Etalle, S. (1996) Simultaneous Replacement in Normal Programs. Journal of logic and Computation, 6 (1). pp. 79-120. ISSN 0955-792X *** ISI Impact 0,65 ***
Etalle, S. (1996) Unification-Free Prolog Programs Revisited. Journal of Programming Languages, 4. pp. 187-210.
Etalle, S. and Gabbrielli, M. (1996) Transformations of CLP Modules. Theoretical computer science, 166 (1). pp. 101-146. ISSN 0304-3975 *** ISI Impact 0,49 ***
Etalle, S. and Gabbrielli, M. (1996) On the Correctness of the Replacement Operation for CLP Modules. Journal of Functional and Logic Programming, 1996. ISSN 1080-5230
Etalle, S. and Teusink, F. (1996) A Compositional Semantics for Normal Open Programs. In: Joint Int. Conf. and Symp. on Logic Programming (JICSLP), Bonn, Germany. pp. 468-482. The MIT press. ISBN 0-262-63173-3

1995

Bossi, A. and Cocco, N. and Etalle, S. (1995) Transformation of Left Terminating Programs: The reordering problem. In: 5th Int. Logic Program Synthesis and Transformation (LOPSTR), Utrecht, The Netherlands. pp. 33-45. Springer-Verlag. ISBN 3-540-60939-3
Etalle, S. (1995) Transformation and analysis of (constraint) logic programs. PhD thesis, ILLC Dissertation series 1995-7, Univ. of Amsterdam.
Etalle, S. (1995) A Transformation System for Modular CLP Programs. In: 12th Int. Conf. on Logic Programming (ICLP), Tokyo, Japan. pp. 681-695. MIT Press. ISBN 0-262-69177-9
Etalle, S. and Gabbrielli, M. (1995) The replacement operation for CLP modules. In: Partial evaluation and semantics-based program manipulation (PEPM), La Jolla, California. pp. 168-177. ACM Press. ISBN 0-89791-720-0

1994

Bossi, A. and Etalle, S. (1994) Transforming acyclic programs. ACM Transactions on Programming Languages and Systems (TOPLAS), 16 (4). pp. 1081-1096. ISSN 0164-0925 *** ISI Impact 1,03 ***
Bossi, A. and Etalle, S. (1994) More on Unfold/Fold Transformations of Normal Programs: Preservation of Fitting's Semantics. In: 4th Int. Workshop on Meta Programming in Logic (META), Pisa, Italy. pp. 311-331. Springer-Verlag. ISBN 3-540-58792-6

1993

Apt, K.R. and Etalle, S. (1993) On the unification free Prolog programs. In: Mathematical Foundations of Computer Science (MFCS), Gdansk, Poland. pp. 1-19. Springer-Verlag.

1992

Bossi, A. and Cocco, N. and Etalle, S. (1992) On Safe Folding. In: 4th Programming Languages: Implementations, Logics and Programs (PLILP), Leuven, Belgique. pp. 172-186. Springer-Verlag. ISBN 3-540-55844-6
Bossi, A. and Cocco, N. and Etalle, S. (1992) Transforming Normal Programs by Replacement. In: 3rd Int. Workshop Meta Programming in Logic (META), Uppsala, Sweden. pp. 265-279. Springer-Verlag. ISBN 3-540-56282-6