Publications
In all my papers authors are listed in alphabetical order. A few exceptions are market with *.
- 2015
- Fabio Martinelli, Francesco Santini, Artsiom Yautsiukhin. Network Security Supported by Arguments. In Proceedings of the 13th Annual Conference on Privacy, Security and Trust. 2015. [url] , [pdf] , [bib]
- Francesco Santini, Artsiom Yautsiukhin. Quantitative Analysis of Network Security with Abstract Argumentation?. In Proceedings of the 4th International Workshop on Qantitative Aspects of Security Assurance. 2015. [url] , [pdf] , [bib]
- * Michal Choras, Rafal Kozik, Maria Pilar Torres Bruna, Artsiom Yautsiukhin, Andrew Churchill, Iwona Maciejewska, Irene Eguinoa, Adel Jomni. Comprehensive Approach to Increase Cyber Security and Resilience. In Proceedings of the The First International Workshop on Future Scenarios for Cyber Crime and Cyber Terrorism. 2015. [url] , [pdf] , [bib]
- Kristian Beckers and Leanid Krautsevich, Artsiom Yautsiukhin. Using Attack Graphs to Analyze Social Engineering Threats. In International Journal of Secure Software Engineering, IGI Global, 2015. [url] , [pdf] , [bib]
- 2014
- Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin. Evaluation of Risk for Complex Systems Using Attack Surface. In Proceedings of The 2nd International Workshop on Risk Assessment and Risk-driven Testing. 2014. [url] , [pdf] , [bib]
- Kristian Beckers, Leanid Krautsevich, and Artsiom Yautsiukhin. Analysis of Social Engineering Threats with Attack Graphs. In Proceedings of The 3rd International Workshop on Quantitative Aspects in Security Assurance. 2014. [url] , [pdf] , [bib]
- Kristian Beckers, Maritta Heisel, Leanid Krautsevich, Fabio Martinelli, Rene Meis, and Artsiom Yautsiukhin. Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis. In Proceedings of The second Open EIT ICT Labs Workshop on Smart Grid Security. 2014. [url] , [pdf] , [bib]
- Gabriele Costa, Roberto Mandati, Fabio Martinelli, Ilaria Matteucci, Artsiom Yautsiukhin. Mitigating Security Risks in Web Service Invocations: Contract-Based Approaches. In Handbook of Research on Architectural Trends in Service-Driven Computing, editors: Raja Ramanathan, Kirtana Raja, IGI Global, 2013. [url] , [pdf] , [bib]
- 2013
- Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin. Formal Analysis of Security Metrics with Defensive Actions. In Proceedings of The 10th IEEE International Conference on Autonomic and Trusted Computing, IEEE, 2013. [url] , [pdf] , [bib]
- Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin. Towards Attribute-based Access Control Policy Engineering Using Risk. In Proceedings of The 1st International
Workshop on Risk Assessment and Risk-driven Testing (RISK), Springer, 2013. [url] , [pdf] , [bib]
- Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin. Towards Policy Engineering for Attribute-based Access Control. In Proceedings of 5th International Conference on Trusted Systems, Springer, 2013. [url] , [pdf] , [bib]
- Gabriele Costa, Fabio Martinelli, and Artsiom Yautsiukhin. Multidimensional Secure Service Orchestration. In Proceeding of the 2nd Workshop on Security in Business Process, Springer, 2013. [url] , [pdf] , [bib]
- Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin. Cost-Effective Enforcement of Access and Usage Control Policies under Uncertainties . IEEE Systems Journal. Special issue on Security and Privacy of Complex Systems., 7(2), pp. 223 - 235, June, 2013. [url] , [pdf] , [bib]
- Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Artsiom Yautsiukhin. Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies. In Proceedings of the International Conference on Computer Communications and Networks, IEEE, 2013. [url] , [pdf] , [bib]
- 2012
- Gabriele Costa, Fabio Martinelli, and Artsiom Yautsiukhin. Metric-Aware Secure Service Orchestration. In Proceedings of the
5th Interaction and Concurrency Experience. , EPTCS, 104, pp. 32–46, 2012. [url] , [pdf] , [bib]
- Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin. Towards Modelling Adaptive Attacker's
Behaviour. In Proceedings of 5th International Symposium on Foundations & Practice of Security, Springer, 2012. [url] , [pdf] , [bib]
- Leanid Krautsevich, Aliaksandr Lazouski, Paolo Mori, Artsiom Yautsiukhin Quantitative Methods for Usage Control. Presented at the International Workshop on Quantitative Aspects in Security Assurance, IEEE, 2012
- 2011
- Leanid Krautsevich, Aliaksandr Lazouski, and Fabio Martinelli and Artsiom Yautsiukhin
Cost-effective Enforcement of UCON Policies.
In Proceedings of the 6th International Conference on Risks and Security of Internet and Systems. Springer-Verlag, 2011. [url] , [pdf] , [bib]
- Leanid Krautsevich, and Fabio Martinelli and Artsiom Yautsiukhin
A General Method for Assessment of Security in Complex Services.
In Proceedings of 4th European Conference ServiceWave. , Springer-Verlag, 2011. [url] , [pdf] , [bib]
- Leanid Krautsevich, and Fabio Martinelli and Artsiom Yautsiukhin
Formal Analysis of Security Metrics and Risk.
In Proceedings of the IFIP Workshop on Information Security Theory and
Practice, Springer-Verlag, 2011. [url] , [pdf] , [bib]
- Leanid Krautsevich, Fabio Martinelli, Charles Morisset, and Artsiom Yautsiukhin
Risk-based Auto-Delegation for Probabilistic Availability.
In Proceeding of the 4th SETOP International Workshop on Autonomous and Spontaneous Security., INRIA, 2011. [url], [pdf], [bib]
- 2010
- Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom
Yautsiukhin. Risk-based usage control for service oriented architecture.
In Proceedings of the 18th Euromicro Conference on Parallel, Distributed
and Network-Based Processing, IEEE Computer Society Press, 2010. [url] , [pdf] , [bib]
- Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom
Yautsiukhin. Risk-aware usage decision making in highly dynamic systems.
In Proceedings of the The Fifth International Conference on Inter-
net Monitoring and Protection, Barcelona, Spain, May 2010. [url] , [pdf] , [bib]
- Leanid Krautsevich, Fabio Martinelli, and Artsiom Yautsiukhin. Formal
approach to security metrics. What does more secure mean for you? In
Proceedings of the 1st International Workshop on Measurability of Security
in Software Architectures. ACM Press, 2010. [url] , [pdf] , [bib]
- Leanid Krautsevich, Fabio Martinelli, and Artsiom Yautsiukhin. Influence
of attribute freshness on decision making in usage control. In Proceedings
of the 6th International Workshop on Security and Trust Management. Springer, 2010. [url]
, [pdf] , [bib]
- Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, and Artsiom Yautsiukhin Usage Control, Risk and Trust.
In Proceedings of the 7th international conference on Trust, privacy and security in digital business. Springer, 2010. [url] , [pdf] , [bib]
- 2009
- Fabio Massacci, Gene Tsudik and Artsiom Yautsiukhin. Logging Key Assurance Indicators in Business Processes.. In Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security. , 2009 [url], [pdf] , [bib]
-
- 2008
- Ruth Breu, Frank InnerhoferOberperfler, and Artsiom Yautsiukhin. Quantitative
assessment of enterprise security system. In Proceedings of the
1st International Workshop on Privacy and Assurance (WPA-2008). IEEE Computer
Society Press, 2008. [url], [pdf] , [bib]
-
Frank Innerhofer-Oberperfler, Fabio Massacci, and Artsiom Yautsiukhin.
Pareto- optimal architecture according to assurance indicators. In
Proceedings of the The 13th Nordic Workshop on Secure IT Systems.
2008 [pdf] , [bib]
- * Artsiom Yautsiukhin, Thomas Heyman, Riccardo Scandariato, Fabio Massacci,
and Wouter Joosen. Towards a quantitative assessment of security in
software architectures. In Proceedings of the 13th Nordic Workshop
on Secure IT Systems., 2008 [pdf] , [bib]
- Yudistira Asnar, Massimo Felici, Fabio Massacci, Alessandra Tedeschi and
Artsiom Yautsiukhin. Quantitative assessment for organisational security
and dependability. In Proceedings of the 2009 Second International Confer-
ence on Dependability, pages 40-45, Washington, DC, USA, 2009. IEEE
Computer Society.[url] [pdf] , [bib]
- 2007
- Artsiom Yautsiukhin. Quality of Protection determination for Web Services.
In Proceedings of the Workshop on Web services interactions, quality and
SLAs, 2007 [pdf] , [bib]
- Sandro Etale, Fabio Massacci, and Artsiom Yautsiukhin. The meaning of logs.
In Proceedings of the 4th International Conference on Trust, Privacy &
Security in Digital Business. LCNS series, 4657, pp. 145-154, 2007. [bib].
Technical report TR-CTIT-07-24 (with proofs) [url], [pdf]
-
Ganna Frankova and Artsiom Yautsiukhin. Service and protection level agreements
for business processes. In Proceedings of the 2nd Young Researchers
Workshop on Service Oriented Computing, Springer, 2007. [pdf], [bib]
-
Fabio Massacci and Artsiom Yautsiukhin. Modelling of quality of protection
in outsourced business processes. In Proceedings of the The Third
International Symposium on Information Assurance and Security. IEEE Press,
2007. [url], [pdf] , [bib]
-
Fabio Massacci and Artsiom Yautsiukhin. An Algorithm for the Appraisal of
Assurance Indicators for Complex Business Processes. In Proceedings
of the The Third Workshop on Quality of Protection.2007. [url],[pdf], [bib]
- 2006
- 1. Y. Karabulut, F. Kerschbaum, P. Robinson, F. Massacci, and A. Yautsiukhin.
Security and trust in it business outsourcing: a manifesto. In Proceedings of the 2nd
International Workshop on Security and Trust Management, volume 179, pages
47–58, 2006 [url], [pdf] , [bib]