You are here

Publications

  1. de Souza R. F.; Westphall C. B.; dos Santos D. R.; Westphall C. M.,
    Challenges of Operationalizing PACS on Cloud Over Wireless Networks,
    ICWMC 2013. The Ninth International Conference on Wireless and Mobile Communications,
    2013
    , pp. 265-
    270
    , (ICWMC 2013,
    Nice, France,
    July 21 - 26, 2013)
  2. Brinhosa R. B.; Westphall C. M.; Westphall C. B.; dos Santos D. R.; Grezele F.,
    A Validation Model of Data Input for Web Services,
    ICN 2013. The Twelfth International Conference on Networks,
    2013
    , pp. 87-
    94
    , (ICN 2013,
    Seville, Spain,
    January 27 - February 1, 2013)
  3. C. Bertolissi; S. Ranise,
    A Methodology to build run-time Monitors for Security-Aware Workflows,
    Proceedings of the 8th International Conference for Internet Technology and Secured Transactions,
    2013
    , pp. 501-
    502
    , (The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013),
    09/12/2013-12/12/2013,
    Londra, UK)
  4. Armando A.; Costa G.; Merlo A.,
    in «LECTURE NOTES IN COMPUTER SCIENCE»
    Trustworthy Global Computing,
    2013
    , pp. 64-
    81
    , (7th International Symposium, TGC 2012,
    Newcastle upon Tyne, UK,
    September 7-8, 2012)
  5. S. Ranise,
    On the Verification of Security-Aware E-services,
    in «JOURNAL OF SYMBOLIC COMPUTATION»,
    vol. 47,
    n. 9,
    2012
    , pp. 1066 -
    1088
  6. R. Bruttomesso; S. Ghilardi; S. Ranise,
    Quantifier-Free Interpolation of a Theory of Arrays,
    in «LOGICAL METHODS IN COMPUTER SCIENCE»,
    vol. 8,
    n. 2,
    2012
  7. F. Alberti; S. Ghilardi; E. Pagani; S. Ranise; G. P. Rossi,
    Universal Guards, Relativization of Quantifiers, and Failure Models in Model Checking Modulo Theories,
    in «JOURNAL ON SATISFIABILITY, BOOLEAN MODELING AND COMPUTATION»,
    vol. 8,
    n. 1/2,
    2012
    , pp. 29 -
    61
  8. A. Armando; S. Ranise,
    Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving,
    in «JOURNAL OF COMPUTER SECURITY»,
    vol. 20,
    2012
    , pp. 309 -
    352
  9. A. Armando; G. Costa; A. Merlo; L. Verderame,
    Securing the "Bring Your Own Device'' Policy,
    in «JOURNAL OF INTERNET SERVICES AND APPLICATIONS»,
    vol. 2,
    n. 3,
    2012
    , pp. 3 -
    16
  10. A. Armando; E. Giunchiglia; M. Maratea; S. E. Ponta,
    An Action-based Approach to the Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints,
    in «JOURNAL OF COMPUTER AND SYSTEM SCIENCES»,
    vol. 1,
    2012

Pages