You are here

Publications

  1. Armando A.; Costa G.; Merlo A.; Verderame L.,
    in «INTERNATIONAL JOURNAL OF INFORMATION SECURITY»,
    2014
    , pp. 1 -
    18
  2. Armando A.; Benerecetti M.; Mantovani J.,
    in «AUTOMATED SOFTWARE ENGINEERING»,
    vol. 21,
    n. 2,
    2014
    , pp. 225 -
    258
  3. Alberti F.; Bruttomesso R.; Ghilardi S.; Ranise S.; Sharygina N.,
    in «FORMAL METHODS IN SYSTEM DESIGN»,
    vol. 45,
    n. 1,
    2014
    , pp. 63 -
    109
  4. Armando A.; Merlo A.; Verderame L.,
    in «INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION»,
    vol. 7,
    n. 4,
    2014
    , pp. 247 -
    256
  5. Armando A.; Carbone R.; Compagna L.,
    in «LECTURE NOTES IN COMPUTER SCIENCE»
    Tools and Algorithms for the Construction and Analysis of Systems- 20th International Conference, {TACAS} 2014,
    Springer Berlin Heidelberg,
    vol.8413,
    2014
    , pp. 31-
    45
    , (20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS),
    Grenoble, France,
    5-13 April 2014)
  6. Ranise S.; Truong A.,
    Incremental analysis of evolving administrative role based access control policies,
    Data and Applications Security and Privacy XXVIII,
    Springer,
    vol.8566,
    2014
    , pp. 260-
    275
    , (28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSeC14),
    Vienna, Austria,
    14-16 July 2014)
  7. Ranise S.; Truong A.; Armando A.,
    Proceedings of the 19th ACM symposium on Access control models and technologies,
    ACM Press,
    2014
    , pp. 103-
    114
    , (ACM Symposium on Access Control Models and Technologies (SACMAT14),
    London, Ontario, Canada,
    June 25-25 2014)
  8. Armando A.; Carbone R.; Chekole E. G.; Ranise S.,
    Attribute Based Access Control for APIs in Spring Security,
    SACMAT '14 Proceedings of the 19th ACM symposium on Access control models and technologies,
    New York, NY, USA,
    ACM New York, NY, USA ©2014,
    2014
    , pp. 85-
    88
    , (ACM Symposium on Access Control Models and Technologies (SACMAT14),
    London, Ontario, Canada,
    June 25-27, 2014)
  9. Armando A.; Oudkerk S.; Ranise S.; Wrona K.,
    Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations,
    in «LECTURE NOTES IN COMPUTER SCIENCE»
    Foundations and Practice of Security,
    Springer International Publishing,
    vol.8352,
    2014
    , pp. 227-
    244
    , (Foundations and Practice of Security - 6th International Symposium, FPS 2013,
    La Rochelle, France,
    October 21-22, 2013)
  10. Mojtaba Eskandari; Anderson Santana de Oliveira; Bruno Crispo,
    VLOC: An Approach To Verify The Physical Location Of A Virtual Machine In Cloud,
    IEEE CloudCom 2014,
    2014
    , (CloudCom 2014,
    Singapore,

Pages