You are here

Publications

  1. Armando A.; Castiglione A.; Costa G.; Fiore U.; Merlo A.; Verderame L.; You I.,
    in «LECTURE NOTES IN COMPUTER SCIENCE»
    ICT-EurAsia'13: Proceedings of the 2013 international conference on Information and Communication Technology,
    Springer Berlin Heidelberg,
    2013
    , pp. 469-
    478
    , (ICT-EurAsia'13,
    Yogyakarta, Indonesia,
    March 25-29, 2013)
  2. dos Santos D. R.; Westphall C. M.; Westphall C. B.,
    Risk-based Dynamic Access Control for a Highly Scalable Cloud Federation,
    SECURWARE 2013. The Seventh International Conference on Emerging Security Information, Systems.,
    2013
    , pp. 8-
    13
    , (SECURWARE 2013,
    Barcelona, Spain,
    August 25-31, 2013)
  3. de Souza R. F.; Westphall C. B.; dos Santos D. R.; Westphall C. M.,
    Challenges of Operationalizing PACS on Cloud Over Wireless Networks,
    ICWMC 2013. The Ninth International Conference on Wireless and Mobile Communications,
    2013
    , pp. 265-
    270
    , (ICWMC 2013,
    Nice, France,
    July 21 - 26, 2013)
  4. Brinhosa R. B.; Westphall C. M.; Westphall C. B.; dos Santos D. R.; Grezele F.,
    A Validation Model of Data Input for Web Services,
    ICN 2013. The Twelfth International Conference on Networks,
    2013
    , pp. 87-
    94
    , (ICN 2013,
    Seville, Spain,
    January 27 - February 1, 2013)
  5. C. Bertolissi; S. Ranise,
    A Methodology to build run-time Monitors for Security-Aware Workflows,
    Proceedings of the 8th International Conference for Internet Technology and Secured Transactions,
    2013
    , pp. 501-
    502
    , (The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013),
    09/12/2013-12/12/2013,
    Londra, UK)
  6. Armando A.; Costa G.; Merlo A.,
    in «LECTURE NOTES IN COMPUTER SCIENCE»
    Trustworthy Global Computing,
    2013
    , pp. 64-
    81
    , (7th International Symposium, TGC 2012,
    Newcastle upon Tyne, UK,
    September 7-8, 2012)
  7. S. Ranise,
    On the Verification of Security-Aware E-services,
    in «JOURNAL OF SYMBOLIC COMPUTATION»,
    vol. 47,
    n. 9,
    2012
    , pp. 1066 -
    1088
  8. R. Bruttomesso; S. Ghilardi; S. Ranise,
    Quantifier-Free Interpolation of a Theory of Arrays,
    in «LOGICAL METHODS IN COMPUTER SCIENCE»,
    vol. 8,
    n. 2,
    2012
  9. F. Alberti; S. Ghilardi; E. Pagani; S. Ranise; G. P. Rossi,
    Universal Guards, Relativization of Quantifiers, and Failure Models in Model Checking Modulo Theories,
    in «JOURNAL ON SATISFIABILITY, BOOLEAN MODELING AND COMPUTATION»,
    vol. 8,
    n. 1/2,
    2012
    , pp. 29 -
    61
  10. A. Armando; S. Ranise,
    Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving,
    in «JOURNAL OF COMPUTER SECURITY»,
    vol. 20,
    2012
    , pp. 309 -
    352

Pages