You are here

Publications

  1. Armando A.; Merlo A.; Verderame L.,
    An Empirical Evaluation of the Android Security Framework,
    Proceedings of the 28th IFIP International Information Security and Privacy Conference (SEC 2013),
    2013
    , (28th IFIP International Information Security and Privacy Conference (SEC 2013),
    Auckland, New Zeland,
    July 8-10, 2013)
  2. Delzanno G.; Traverso R.,
    Decidability and Complexity Results for Verification of Asynchronous Broadcast Networks,
    7th International Conference on Language and Automata Theory and Applications (LATA),
    Springer,
    vol.7810,
    2013
    , pp. 238-
    249
    2013)
  3. Delzanno G.; Sangnier A.; Traverso R.,
    Parameterized Verification of Broadcast Networks of Register Automata,
    Reachability Problems,
    Springer,
    vol.8169,
    2013
    , pp. 109-
    121
    2013)
  4. Delzanno G.; Traverso R.,
    Specification and Validation of Link Reversal Routing via Graph Transformations,
    20th International SPIN Symposium on Model Checking of Software,
    Springer,
    vol.7976,
    2013
    , pp. 160-
    177
    2013)
  5. Armando A.; Castiglione A.; Costa G.; Fiore U.; Merlo A.; Verderame L.; You I.,
    in «LECTURE NOTES IN COMPUTER SCIENCE»
    ICT-EurAsia'13: Proceedings of the 2013 international conference on Information and Communication Technology,
    Springer Berlin Heidelberg,
    2013
    , pp. 469-
    478
    , (ICT-EurAsia'13,
    Yogyakarta, Indonesia,
    March 25-29, 2013)
  6. dos Santos D. R.; Westphall C. M.; Westphall C. B.,
    Risk-based Dynamic Access Control for a Highly Scalable Cloud Federation,
    SECURWARE 2013. The Seventh International Conference on Emerging Security Information, Systems.,
    2013
    , pp. 8-
    13
    , (SECURWARE 2013,
    Barcelona, Spain,
    August 25-31, 2013)
  7. de Souza R. F.; Westphall C. B.; dos Santos D. R.; Westphall C. M.,
    Challenges of Operationalizing PACS on Cloud Over Wireless Networks,
    ICWMC 2013. The Ninth International Conference on Wireless and Mobile Communications,
    2013
    , pp. 265-
    270
    , (ICWMC 2013,
    Nice, France,
    July 21 - 26, 2013)
  8. Brinhosa R. B.; Westphall C. M.; Westphall C. B.; dos Santos D. R.; Grezele F.,
    A Validation Model of Data Input for Web Services,
    ICN 2013. The Twelfth International Conference on Networks,
    2013
    , pp. 87-
    94
    , (ICN 2013,
    Seville, Spain,
    January 27 - February 1, 2013)
  9. C. Bertolissi; S. Ranise,
    A Methodology to build run-time Monitors for Security-Aware Workflows,
    Proceedings of the 8th International Conference for Internet Technology and Secured Transactions,
    2013
    , pp. 501-
    502
    , (The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013),
    09/12/2013-12/12/2013,
    Londra, UK)
  10. Armando A.; Costa G.; Merlo A.,
    in «LECTURE NOTES IN COMPUTER SCIENCE»
    Trustworthy Global Computing,
    2013
    , pp. 64-
    81
    , (7th International Symposium, TGC 2012,
    Newcastle upon Tyne, UK,
    September 7-8, 2012)

Pages