prof.dr. S. (Sandro) Etalle - Publications

Etalle, prof.dr. S.
Address :
Technische Universiteit Eindhoven
P.O. Box 513
5600 MB EINDHOVEN
Chair :
Embedded System Security
Department :
Department of Mathematics and Computer Science
Section :
Security and Embedded Networked Systems W&I
Positioncategory :
Professor (HGL)
Position :
Full Professor
Room :
MF 6.062
Tel :
+31 40-247 5016
Tel (internal) :
5016
Email :
s.etalle@tue.nl

Share / Bookmark

Publications

Article

Scientific peer reviewed
2017
2014
2013
2012
2011
2010
2009
2007
2006
2004
2002
2001
2000
1999
1998
1996
1994
Professional
2014
2006
2005

Chapter

Scientific peer reviewed
2013
2004
2002
Scientific not peer reviewed
2008
2007
  • Dekker, M.A.C., Etalle, S. & Hartog, den, J.I. (2007). Privacy policies. In M. Petkovic & W. Jonker (Eds.), Security, Privacy, and Trust in Modern Data Management (pp. 383-397). (Data-Centric Systems and Applications). Berlin: Springer.

Conference contribution

Scientific peer reviewed
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
  • Corin, R.J., Di Caprio, G., Etalle, S., Gnesi, S., Lenzini, G. & Moiso, C. (2004). Security analysis of Parlay/OSA framework. Proceedings 9th International Conference on Intelligence in Service Delivery Networks (ICIN'04, Bordeaux, France, October 18-21, 2004) (pp. 54-59). IOS Press.

  • Corin, R.J., Etalle, S., Hartel, P.H. & Mader, A.H. (2004). Timed model checking of security protocols. In D.A. Basin, M. Waidner, M. Backes & V. Atluri (Eds.), Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering (FMSE 2004, Washingtion DC, USA, October 29, 2004) (pp. 23-32). ACM Press. In Scopus Cited 20 times.

  • Law, Y.W., Chong, C.N., Etalle, S., Hartel, P.H. & Corin, R.J. (2004). Licensing structured data with ease. Proceedings 2nd IFIP TC6 WG6.11 International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods (Ilmenau, Germany, May 27-29, 2004) (pp. 113-124). Technische Universität Ilmenau.

2003
2002
2001
2000
1999
  • Bertolino, M., Etalle, S. & Palamidessi, C. (1999). The replacement operation for CCP programs. In M. Vilares Ferro & M.C. Meo (Eds.), 1999 Joint Conference on Declarative Programming (Proceedings AGP'99, L'Aquila, Italy, September 6-9, 1999) (pp. 441-454).

  • Bossi, A., Etalle, S. & Rossi, S. (1999). Properties of input-consuming derivations. Workshop on Verification of Logic Programs (in connection with ICLP'99, International Conference on Logic Programming, Las Cruces NM, USA, December 1, 1999) (pp. 102-124). (Electronic Notes in Theoretical Computer Science, No. 30). Amsterdam: Elsevier. In Scopus Cited 4 times.

  • Etalle, S. & Raamsdonk, van, F. (1999). Logic programming with requests. In D. Schreye, de (Ed.), Logic Programming (Proceedings of the 1999 International Conference, Las Cruces NM, USA, November 29-December 4, 1999) (pp. 558-572). MIT Press.

1998
  • Etalle, S. & Raamsdonk, van, F. (1998). Beyond success and failure. In J. Jaffar (Ed.), Proceedings of the 1998 Joint International Conference and Symposium on Logic Programming (Manchester, UK, June 15-19, 1998) (pp. 190-205). MIT Press.

  • Etalle, S., Gabbrielli, M. & Meo, M.C. (1998). Unfold/fold transformations of CCP programs. In R. Simone, de & D. Sangiorgi (Eds.), CONCUR '98: Concurrency Theory (Proceedings 9th International Conference, Nice, France, September 8-11, 1998) (pp. 348-363). (Lecture Notes in Computer Science, No. 1466). Springer. In Scopus Cited 4 times.

1997
1996
1995
1994
1993
  • Apt, K.R. & Etalle, S. (1993). On the unification free Prolog programs. In A.M. Borzyszkowski & S. Sokolowski (Eds.), Mathematical Foundations of Computer Science 1993 (Proceedings 18th International Symposium, MFCS'93, Gdansk, Poland, August 30-September 3, 1993) (pp. 1-19). (Lecture Notes in Computer Science, No. 711). Springer.

1992
  • Bossi, A., Cocco, N. & Etalle, S. (1992). On safe folding. In M. Bruynooghe & M. Wirsing (Eds.), Programming Language Implementation and Logic Programming (Proceedings 4th International Symposium, PLILP'92, Leuven, Belgium, August 26-28, 1992) (pp. 172-186). (Lecture Notes in Computer Science, No. 631). Springer.

  • Bossi, A., Cocco, N. & Etalle, S. (1992). Transforming normal programs by replacement. In A. Pettorossi (Ed.), Meta-Programming in Logic (Proceedings 3rd International Workshop, META-92, Uppsala, Sweden, June 10-12, 1992) (pp. 265-279). (Lecture Notes in Computer Science, No. 649). Springer.

Professional
2007
  • Etalle, S. & Samarati, P. (2007). Preface. Proceedings of the 2nd International Workshop on Security and Trust Management (STM 2006), 20-21 September 2006, Hamburg, Germany (pp. 1-2). (Electronic Notes in Theoretical Computer Science, No. 179). In Scopus Cited 0 times.

2005
  • Etalle, S., Mukhopadhyay, S. & Roychoudhury, A. (2005). Preface. In S. Etalle, A. Roychoudhury & S. Mukhopadhyay (Eds.), Proceedings of the International Workshop on Software Verification and Validation (SVV 2003, Mumbai, India, December 14, 2003) (pp. 1). (Electronic Notes in Theoretical Computer Science, No. 118). In Scopus Cited 0 times.

Scientific not peer reviewed
2007
2001

Poster

Other research output

Patent

Other research output
2010

Book editing

Professional
2006
2005
1999
Scientific not peer reviewed
2012
2011
2007

Report

Scientific
2010
2009
2007
2006
2005
2004
2003
2002
1995
1994
1993

Inaugural speech

Other research output
2008

Phd Thesis 1 (Research TU/e / Graduation TU/e)

Scientific
2015
  • Costante, E. (2015). Privacy throughout the data cycle. Eindhoven: Technische Universiteit Eindhoven. ((Co-)promot.: Milan Petkovic, Sandro Etalle & Jerry den Hartog).

2014
2012

Phd Thesis 4 Research NOT TU/e / Graduation NOT TU/e)

Scientific
1995