Sfoglia per Autore
Control flow analysis of mobile ambients with security boundaries
2002 C. Braghin, A. Cortesi, R. Focardi
Boundary inference for enforcing security policies in mobile ambients
2002 C. Braghin, A. Cortesi, R. Focardi, S. van Bakel
Security boundaries in mobile ambients
2002 C. Braghin, A. Cortesi, R. Focardi
BANANA : a tool for boundary ambients nesting analysis
2003 C. Braghin, A. Cortesi, S. Filippone, R. Focardi, F.L. Luccio, C. Piazza
Complexity of nesting analysis in mobile ambients
2003 C. Braghin, A. Cortesi, R. Focardi, F.L. Luccio, C. Piazza
Information leakage detection in boundary ambients
2003 C. Braghin, A. Cortesi, R. Focardi
A distributed calculus for role-based access control
2004 C. Braghin, D. Gorla, V. Sassone
Nesting analysis of mobile ambients
2004 C. Braghin, A. Cortesi, R. Focardi, F.L. Luccio, C. Piazza
Behind BANANA : design and implementation of a tool for nesting analysis of mobile ambients
2004 C. Braghin, A. Cortesi, R. Focardi, F.L. Luccio, C. Piazza
Checking integrity via CoPS and Banana : the E-commerce case study
2004 C. Braghin, C. Piazza
Analisi dei costi di proprietà di prodotti software nella transizione a sistemi open source
2005 B. Russo, C. Braghin, M. Ceschi, P. Gasperi, G. Succi
Defining the total cost of ownership for the transition to open source systems
2005 B. Russo, C. Braghin, P. Gasperi, A. Sillitti, G. Succi
Modeling and verification of mobile systems
2006 C. Braghin, N. Sharygina
Role-based access control for a distributed calculus
2006 C. Braghin, D. Gorla, V. Sassone
Automated verification of security policies in mobile code
2007 C. Braghin, N. Sharygina, K. Barone Adesi
An exact approach for solving the balanced minimum evolution problem
2008 R. Aringhieri, C. Braghin, D. Catanzaro
Information flow security in boundary ambients
2008 C. Braghin, A. Cortesi, R. Focardi
Net privacy
2009 M. Cremonini, C. Braghin, C.A. Ardagna
A model checking-based approach for security policy verification of mobile systems
2011 C. Braghin, N. Sharygina, K. Barone Adesi
The binary perfect phylogeny with persistent characters
2012 P. Bonizzoni, C. Braghin, R. Dondi, G. Trucco
Privacy on the Internet
2013 M. Cremonini, C. Braghin, C.A. Ardagna
Knowledge and business intelligence technologies in cross-enterprise environments for italian advanced mechanical industry
2013 F. Arigliano, A. Azzini, C. Braghin, A. Caforio, P. Ceravolo, E. Damiani, V. Savarino, C. Vicari, F. Zavatarelli
Using semantic lifting for improving process mining : a data loss prevention system case study
2013 A. Azzini, C. Braghin, E. Damiani, F. Zavatarelli
Online Privacy
2017 C. Braghin, M. Cremonini
Is Pokémon GO Watching You? A Survey on the Privacy-Awareness of Location-Based Apps’ Users
2017 C. Braghin, M.D. Vecchio
Are mHealth Apps Secure? : A Case Study
2018 C. Braghin, S. Cimato, A. Della Libera
Towards Blockchain-Based E-Voting Systems
2019 C. Braghin, S. Cimato, S.R. Cominesi, E. Damiani, L. Mauri
Designing smart-contract based auctions
2019 C. Braghin, S. Cimato, E. Damiani, M. Baronchelli
Towards the Monitoring and Evaluation of Trainees’ Activities in Cyber Ranges
2020 C. Braghin, S. Cimato, E. Damiani, F. Frati, E. Riccobene, S. Astaneh
A Model Driven Approach for Cyber Security Scenarios Deployment
2020 C. Braghin, S. Cimato, E. Damiani, F. Frati, L. Mauri, E. Riccobene
Dynamic and Scalable Enforcement of Access Control Policies for Big Data
2021 M. Anisetti, C.A. Ardagna, C. Braghin, E. Damiani, A. Polimeno, A. Balestrucci
Towards ASM-Based Automated Formal Verification of Security Protocols
2021 C. Braghin, M. Lilli, E. Riccobene
Formal proof of a vulnerability in Z-wave IoT protocol
2021 M. Lilli, C. Braghin, E. Riccobene
The THREAT-ARREST Cyber Range Platform
2021 G. Hatzivasilis, S. Ioannidis, M. Smyrlis, G. Spanoudakis, F. Frati, C. Braghin, E. Damiani, H. Koshutanski, G. Tsakirakis, T. Hildebrandt, L. Goeke, S. Pape, O. Blinder, M. Vinov, G. Leftheriotis, M. Kunc, F. Oikonomou, G. Magilo, V. Petrarolo, A. Chieti, R. Bordianu
Towards Trust-preserving Continuous Co-evolution of Digital Twins
2022 M. Bersani, C. Braghin, V. Cortellessa, A. Gargantini, V. Grassi, F. Lo Presti, R. Mirandola, A. Pierantonio, E. Riccobene, P. Scandurra
A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study
2023 C. Braghin, M. Lilli, E. Riccobene
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile