Search for courses or information

The SSE group research papers are linked in the following list, or they can be searched and downloaded from the UEL repository.

2014

A Ordonez, V Alcázar, JC Corrales, P Falcarin, Automated context aware composition of Advanced Telecom Services for environmental early warnings. In Expert Systems with Applications, v. 41 (13), 5907-5916, Elsevier, 2014.

M Ceccato, A Capiluppi, P Falcarin, C Boldyreff: A large study on the effect of code obfuscation on the quality of java code. In Empirical Software Engineering, pp 1-39, Springer, 2014.

M Ceccato, M DiPenta, P Falcarin, F Ricca, M Torchiano, P Tonella: A Family of Experiments to Assess the Effectiveness and Efficiency of Source Code Obfuscation Techniques. In Empirical Software Engineering, Springer, February 2014.

Okoye, Kingsley and Tawil, Abdel-Rahman and Naeem, Usman and Bashroush, Rabih and Lamine, Elyes (2014) ‘A Semantic Rule-based Approach Supported by Process Mining for Personalised Adaptive Learning’, Procedia Computer Science, 37, pp. 203-210. (10.1016/j.procs.2014.08.031).

2013

L Ardito, M Torchiano, M Marengo, P Falcarin: gLCB: an Energy Efficient Context Broker, in Sustainable Computing, Informatics and Systems, Elsevier, v 3(1), 2013.

JF Mejia Bernal, L Ardito, P Falcarin, O Rodriguez Rocha, M Morisio, F Giovannelli, F Pistore: "Emergency Situations Supported by Context-Aware and Application Streaming", International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Inderscience, v 13(2), 2013.

P. Falcarin, M. Valla, J. Yu, C.A. Licciardi, C. Frà, L. Lamorte: "Context Data Management: an Architectural Framework for Context-Aware Services", Service Oriented Computing and Applications, Springer, ISSN 1863-2386, v 7(2), pp 151-168, June 2013.

Yarandi, Maryam and Jahankhani, Hossein and Tawil, Abdel-Rahman (2013) ‘A personalized adaptive e-learning approach based on semantic web technology’, Webology, 10(2), Art.110.

Baravalle, Andres and Boldyreff, Cornelia and Capiluppi, Andrea and Marques, Renata (2013) ‘On the Sustainability of Web Systems Evolution’, Web Systems Evolution 2013. Eindhoven, 27th September 2013.

Emiola, Akintunde and Falcarin, Paolo and Tocher, Joanne and George, John (2013) ‘A model for the proteolytic regulation of LpxC in the lipopolysaccharide pathway of Escherichia coli’, Computational Biology and Chemistry (10.1016/j.compbiolchem.2013.06.001).


2012

Bing Zeng, Christophe Tartary, Peng Xu, Jiandu Jing and Xueming Tang. A Practical Framework for $t$-out-of-$n$ Oblivious Transfer with Security against Covert Adversaries. IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp 465 - 479, April 2012, IEEE Signal Processing Society.

Ron Steinfeld, San Ling, Josef Pieprzyk, Christophe Tartary and Huaxiong Wang. NTRUCCA: How to Efficiently Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model. Proceedings of the 15th IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2012). Lecture Notes in Computer Science, vol. 7293, pp 353 - 371, Springer - Verlag.

Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Xiaoming Sun, Christophe Tartary, Huaxiong Wang and Andrew Chi-Chih Yao. Graph Coloring Applied to Secure Computation in Non-Abelian Groups. Journal of Cryptology, vol. 25, no. 4, pp 557 - 600, October 2012, Springer.

A Capiluppi, P Falcarin, C Boldyreff, Code Defactoring: Evaluating the Effectiveness of Java Obfuscations, IEEE 19th Working Conference on Reverse Engineering (WCRE), Kingston, Canada, Oct 2012.

Islam, Shareeful (2012) ‘Enhancing Security Requirements Engineering by Organisational Learning’, Requirements Engineering Journal, 17(1), pp. 35-36.

Naeem, Usman and Tawil, Abdel-Rahman and Bashroush, Rabih and Al-Nemrat, Ameer (2012) ‘Achieving Model Completeness for Hierarchally Structured Activities of Daily Life’, Proceedings of the 2nd International Conference on Pervasive and Embedded Computing and Communication Systems PECCS 2012. Rome, Italy, February 2012.

Pavlidis, Michalis and Islam, Shareeful and Mouratidis, Haralambos (2012) ‘A CASE tool to support automated modelling and analysis of security requirements’, in IS Olympics: Information Systems in a Diverse World. Springer, pp. 95-109. (Lecture Notes in Business Information Processing, 107).

2011

Christophe Tartary, Huaxiong Wang and San Ling. Authentication of Digital Streams. IEEE Transactions on Information Theory, vol. 57, no. 9, pp 6285 - 6303, September 2011, IEEE Information Theory Society.

Tiancheng Lou, Xiaoming Sun and Christophe Tartary. Bounds and Trade-offs for Double-Base Number Systems. Information Processing Letters, vol. 111, no. 10, pp 488 - 493, April 2011, Elsevier.

Yun Zhang, Christophe Tartary and Huaxiong Wang. An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem. Proceedings of the 16th Australasian Conference on Information Security and Privacy (ACISP 2011). Lecture Notes in Computer Science, vol. 6812, pp 259 - 275, Springer - Verlag.

Yarandi, Maryam and Tawil, Abdel-Rahman and Jahankhani, Hossein (2011) ‘Adaptive e-learning system using ontology’, 22nd International Workshop on Database and Expert Systems Applications (DEXA). Toulouse, France, 29 Aug - 2 Sep 2011.

Falcarin, Paolo, Collberg Christian, Atallah Mikhail, Jakubowski Mariusz (2011) ‘Software protection’, IEEE Software, 28(2), pp. 24-27.

Falcarin, Paolo and Di Carlo, Stefano and Cabutto, Alessandro and Garazzino, Nicola and Barberis, Davide (2011) ‘Exploiting Code Mobility for Dynamic Binary Obfuscation’, IEEE World Congress on Internet Security (WorldCIS-2011), London, 21-23 February 2011. London: IEEE pp. 114 – 120.

Islam, Shareeful (2011) ‘Supporting Requirements Engineers in Recognising Security Issues’, in Lecture Notes in Computer Science. Requirements Engineering: Foundation for Software Quality 17th International Working Conference, REFSQ 2011. Essen, Germany, 28-30 March 2011. Springer, pp. 4-18.

Islam, Shareeful (2011) ‘Towards a Framework for Offshore Outsource Software Development Risk Management Model’, Journal of Software, 6(1), pp. 38-47.

Islam, Shareeful and Falcarin, Paolo (2011) ‘Measuring Security Requirements for Software Security’, IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS). London, 1-2 Sep 2011.

2010

M. Morisio, P. Falcarin, A. Vetrò: Software Engineering Exercises, CLUT ed., 2010, ISBN: 9788879922876.

Capiluppi, Andrea and Baravalle, Andres (2010) ‘Matching Demand and Offer in On-line Provision: a Longitudinal Study of Monster.com’, WSE 2010 Proceedings the 12th IEEE International Symposium on Web Systems Evolution (WSE 2010) September 17-18. 2010; Timisoara. Romania..

Islam, Shareeful (2010) ‘Integrating Risk Management Activities into Requirements Engineering’, Fourth International Conference on Research Challenges in Information Science (RCIS), pp. 299-310.

Capiluppi, Andrea and Baravalle, Andres and Heap, Nick W. (2010) ‘Engaging without Over-powering: a Case Study of a FLOSS project’, 6th International IFIP WG 2. 13 Conference on Open Source Systems, OSS 2010, Notre Dame, IN, USA, May 30 – June 2, 2010 pp. 21-41.

Mejia Bernal, Jose F. and Ardito, Luca and Morisio, Maurizio and Falcarin, Paolo (2010) ‘Towards an Efficient Context-Aware System: Problems and Suggestions to Reduce Energy Consumption in Mobile Devices’, Ninth International Conference on Mobile Business. (ICMB 2010). Athens, pp. 13-15.

Yu, Jian and Sheng, Quan Z. and Falcarin, Paolo (2010) ‘A visual semantic service browser supporting user-centric service composition’, In IEEE 24th International Conference on Advanced Information Networking and Applications (AINA 2010), Sch. of Comput. Sci..

Bernal, Jose F. Mejia and Falcarin, Paolo and Morisio, Maurizio (2010) ‘Dynamic Context-Aware Business Process: A Rule-Based Approach Supported by Pattern Identification’, Proceedings of the 2010 ACM Symposium on Applied Computing SAC'10. Sierre, Switzerland, 22-26 March 2010.

Baravalle, Andres and Capiluppi, Andrea (2010) ‘IT jobs in UK: current trends’, Proceedings of the 3rd IEEE International Conference on Computer Science and Information Technology (IEEE ICCSIT) 2010, Chengdu, China, July 2010.

Islam, Shareeful and Mouratidis, Haralambos (2010) ‘A Framework to Support Alignment of Secure Software Engineering with Legal Regulations’, Software and Systems Modeling, 10(3), pp. 369-394.

Islam, Shareeful and Mouratidis, Haralambos and Wager, Stefan (2010) ‘Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations’, in Wieringa, Roel and Persson, Anne (eds.) Requirements Engineering: Foundation for Software Quality. 16th International Working Conference, REFSQ 2010. Essen, Germany, 30 June – 2July 2010. Springer, pp. 255-261. (Lecture Notes in Computer Science, 6182). (10.1007/978-3-642-14192-8_23).

2009

Christophe Tartary. Ensuring Authentication of Digital Information using Cryptographic Accumulators. Proceedings of the 8th International Conference on Cryptology and Network Security (CANS 2009). Lecture Notes in Computer Science, vol. 5888, pp 315 - 333, Springer - Verlag.

Mejia Bernal, Jose F. and Falcarin, Paolo and Morisio, Maurizio (2009) ‘A Web-Based application to verify Open Mobile Alliance device management specifications’, IEEE International Conference on Advances in System Testing and Validation Lifecycle (VALID 2009). 20-25 September 2009. Porto, pp. 13-18.

Jian, Yu and Falcarin, Paolo and Rego, S. and Ordas, I. and Martins, E. and Quan, Sun and Trapero, R. and Sheng, Quan Z. (2009) ‘XDM-Compatible Service Repository for User-Centric Service Creation and Discovery’, IEEE International Conference on Web Services. (ICWS 2009). Los Angeles, pp. 6-10.

Yu, Jian and Falcarin, Paolo and del Álamo, José María and Sienel, Juergen and Sheng, Quan Z. and Mejia, Jose F. (2009) ‘A User-centric Mobile Service Creation Approach Converging Telco and IT Services’, Eighth International Conference on Mobile Business, (ICMB 2009), Sch. of Comput. Sci., pp. 27-28.

Ceccato, Mariano and Di Penta, Massimiliano and Nagra, Jasvir and Falcarin, Paolo and Ricca, Filippo and Torchiano, Marco and Tonell, Paolo (2009) ‘The Effectiveness of Source Code Obfuscation: an Experimental Assessment’, 17th IEEE International Conference on Program Comprehension (ICPC-09). Vancouver (Canada) May 17-19. 2009, 178 - 187.

Yu, Jian and Sheng, Quan Z. and Falcarin, Paolo and Morisio, Maurizio (2009) ‘Weaving Business Processes and Rules: A Petri Net Approach’, in Information Systems: Modeling, Development, and Integration. Third International United Information Systems Conference, UNISCON 2009. Sydney, Australia, 21-24 Apr 2009. Springer, pp. 121-126. (Lecture Notes in Business Information Processing, 20). (10.1007/978-3-642-01112-2_13).

Baladrón, Carlos and Aguiar, Javier and Carro, Belén and Goix, Laurent Walter and Martin, Alberto León and Falcarin, Paolo and Sienel, Jürgen (2009) ‘User-Centric Future Internet and Telecommunication Services’, in Georgios T, (ed.) Towards the Future Internet - A European Research Perspective. IOS Press, pp. 217-226.

Falcarin, Paolo (2009) ‘Service Composition Quality Evaluation in SPICE Platform’, in Zhang, Liang-Ji and Paul, Raymond and Dong, Jing (eds.) High Assurance Services Computing. Springer US, pp. 89-102. (10.1007/978-0-387-87658-0_5).

Islam, Shareeful (2009) ‘Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec’, Requirements Engineering Journal, 15(1), pp. 63-93.

Islam, Shareeful (2009) ‘Goal and Risk Factors in Offshore Outsourced Software Development From Vendor's Viewpoint’, 4th IEEE International Conference on Global Software Engineering. Limerick, Ireland, 13-16 Jul 2009.

Islam, Shareeful (2009) ‘Offshore-Outsourced Software Development Risk Management Model’, 12th International Conference on Computers and Information Technology ICCIT'09. pp. 514-519.

Islam, Shareeful (2009) ‘Software Development Risk Management Model – A Goal Driven Approach’, ESEC/FSE'09 Joint 12th European Software Engineering Conference (ESEC) and 17th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-17). Amsterdam, The Netherlands, 24-28 Aug 2009. ACM.

Sheng, Quan Z. and Yu, Jian and del Álamo, José María and Falcarin, Paolo (2009) ‘Personalized Service Creation and Provision for the Mobile Web’, in Irwin, King and Baeza-Yates, Ricardo (eds.) Weaving Services and People on the World Wide Web. Springer, pp. 99-121. (10.1007/978-3-642-00570-1_6).

2008

Tiancheng Lou and Christophe Tartary. Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes. Proceedings of the 7th International Conference on Cryptology and Network Security (CANS 2008). Lecture Notes in Computer Science, vol. 5339, pp 196 - 213, Springer - Verlag.

Youming Qiao and Christophe Tartary. Counting Method for Multi-Party Computation over Non-Abelian Groups. Proceedings of the 7th International Conference on Cryptology and Network Security (CANS 2008). Lecture Notes in Computer Science, vol. 5339, pp 162 - 177, Springer - Verlag.

Xiaoming Sun, Andrew Chi-Chih Yao and Christophe Tartary. Graph Design for Secure Multiparty Computation over Non-Abelian Groups. Proceedings of the 14th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2008). Lecture Notes in Computer Science, vol. 5350, pp 37 - 53, Springer - Verlag.

Ceccato, Mariano and Di Penta, Massimiliano and Nagra, Jasvir and Falcarin, Paolo and Ricca, Filippo (2008) ‘Towards Experimental Evaluation of Code Obfuscation Techniques’, Proceedings of the 4th ACM workshop on Quality of Protection, Oct. 2008 Alexandria, Virginia, USA pp. 39-46.

Baravalle, Andres (2008) ‘E-learning and Fast-Changing Subjects’, Proceedings of 4th International Conference for Internet Technology and Secured Transactions (ICITST). June 23–28. 2008.

Belaunde, Mariano and Falcarin, Paolo (2008) ‘Realizing an MDA and SOA Marriage for the Development of Mobile Services’, Schieferdecker, I. and Hartman, A. (Eds.) Model Driven Architecture - Foundations and Applications ECMDA-FA 2008.

Yelmo, Juan Carlos and del Álamo, José María and Trapero, Rubén and Falcarin, Paolo and Yu, Jian and Carro, Belén and Baladrón, Carlos (2008) ‘A User-Centric Service Creation Approach for Next Generation Networks’, IEEE, ITU-T/IEEE Innovations in NGN: Future Network and Services, K-INGN 2008. First ITU-T Kaleidoscope Academic Conference, Geneva (Switzerland) May 2008. pp. 211-218.

Scandariato, Riccardo and Ofek, Yoram and Falcarin, Paolo and Baldi, Mario (2008) ‘Application-oriented trust in distributed computing’, IEEE, International Conference on Availability, Reliability and Security (ARES 2008), Barcelona (Spain) March 2008. pp. 434-439..

Falcarin, Paolo and Venezia, Claudio (2008) ‘Communication Web Services and JAIN-SLEE Integration Challenges’, International Journal of Web Services Research, 5(4), pp. 59-78.

Islam, Shareeful (2008) ‘Human Factors in Software Security Risk Management’, in Proceedings of the first international workshop on Leadership and management in software architecture. 1st International Workshop on Leadership and Management in Software Architecture (LMSA08). Leipzig, Germany, 10-18 May 2008. ACM, pp. 13-16. (10.1145/1373307.1373312).

Shiaa, Mazen and Falcarin, Paolo and Pastor, Alain and Lecue, Freddy and Silva, Eduardo and Pires, Luis Ferreira (2008) ‘Towards the Automation of the Service Composition Process: Case Study and Prototype Implementations’, Cunningham, P and Cunningham, M. (Eds) ICT-MobileSummit 2008 Conference Proceedings. Stockholm, pp. 10-12.

Wang, Jianwu and Yu, Jian and Falcarin, Paolo and Han, Yanbo and Morisio, Maurizio (2008) ‘An Approach to Domain-Specific Reuse in Service-Oriented Environments’, Mei, H. (Ed. ) High Confidence Software Reuse in Large Systems ICSR 2008.

Jian Yu, Yanbo Han; Jun Han; Yan Jin; P Falcarin, M Morisio: “Synthesizing Service Composition Models on the Basis of Temporal Business Rules”, Journal of Computer Science and Technology, Springer, pp. 885-894, 2008, v. 23(6). ISSN: 1000-9000

2007

Christophe Tartary, Huaxiong Wang and Josef Pieprzyk. An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. Proceedings of the 1st International Conference on Provable Security (ProvSec 2007). Lecture Notes in Computer Science, vol. 4784, pp 17 - 34. Springer - Verlag.

Christophe Tartary and Huaxiong Wang. Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. Proceedings of the 12th Australasian Conference on Information Security and Privacy (ACISP 2007). Lecture Notes in Computer Science, vol. 4586, pp 293 - 307. Springer - Verlag.

Baravalle, Andres and Chambers, Sarah (2007) ‘Open Source Migrations: Experiences from the European public administrations’, Shoniregun, C. A. and Logvynovskiy.

Goix, Laurent Walter and Valla, Massimo and Cerami, Laura and Falcarin, Paolo (2007) ‘Situation Inference for Mobile Users: a Rule Based Approach’, International Conference on Mobile Data Management, Mannheim, Germany May 01. IEEE pp. 299-303.

Baravalle, Andres and Chambers, Sarah (2007) ‘Market Relations, Non-Market Relations and Free Software’, PsychNology Journal, 5(3), pp. 299-309.

2006

Falcarin, Paolo and Torchiano, Marco (2006) ‘Automated Reasoning on Aspects Interactions’, IEEE/ACM Proceedings of International Conference on Automated Software Engineering (ASE 2006). Tokyo. Japan.

Venezia, Claudio and Falcarin, Paolo (2006) ‘Communication Web Services Composition and Integration’, IEEE Proceedings of International Conference on Web Services (ICWS-06). September 2006. IEEE Press pp. 523 - 530.

Falcarin, Paolo and Scandariato, Riccardo and Baldi, Mario (2006) ‘Remote Trust with Aspect-Oriented Programming’, In IEEE 20th International Conference on Advanced Information Networking and Applications (AINA 2006), Vienna, Austria, April 2006, pp. 451-456..

Almeida, Joao Paulo and Baravaglio, Alberto and Belaunde, Mariano and Falcarin, Paolo and Kovacs, Erno (2006) ‘Service Creation in the SPICE Service Platform’, Proceedings of the 17th Wireless World Research Forum Meeting (WWRF17). Heidelberg: Wireless World Research Forum, pp. 1-7.

Christophe Tartary and Huaxiong Wang. Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme. Proceedings of the 2nd SKLOIS Conference on Information Security and Cryptology (INSCRYPT 2006). Lecture Notes in Computer Science, vol. 4318, pp 103 - 117. Springer - Verlag.