1. Deciding knowledge in security protocols under equational theories;Abadi;Theor. Comput. Sci.,2006
2. The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures;Armando,2012
3. Modeling and reasoning about business processes under authorization constraints: a planning-based approach;Armando,2013
4. Model checking authorization requirements in business processes;Armando;Comput. Secur.,2014
5. Web services verification and prudent implementation;Avanesov,2012