Sfoglia per Autore
RETISS: A Real TIme Security System for Threat Detection Using Fuzzy Logic
1991 F. Carrettoni, S. Castano, G. Martella, P. Samarati
Sicurezza delle basi di dati
1992 S. Castano, G. Martella, P. Samarati
Modeling Users’ Behavior and Threats in Security Systems
1992 S. Castano, P. Samarati
An Object-Oriented Security Model for Office Environments
1992 S. Castano, P. Samarati
Classifying and reusing conceptual schemas
1992 S. Castano, V. De Antonellis, B. Zonta
Reuse of conceptual requirement specifications
1992 S. Castano, V. De Antonellis
Verifying System Security Using Petri Nets
1993 S. Castano, P. Samarati, C. Villa
A constructive approach to reuse of conceptual components
1993 S. Castano, V. De Antonellis
A New Approach to Security System Development
1994 S. Castano, G. Martella, P. Samarati
Standard-driven re-engineering of entity-relationship schemas
1994 S. Castano, V. Deantonellis
BUILDING REUSABLE COMPONENTS THROUGH PROJECT EVOLUTION ANALYSIS
1994 V. DEANTONELLIS, S. CASTANO, L. VANDONI
Reuse of object-oriented requirement specifications
1994 S. Castano, V. De Antonellis, P. San Pietro
Reference conceptual architectures for re-engineering information systems
1995 S. Castano, V. De Antonellis
Database security
1995 S. Castano, M. Fugini, G. Martella, P. Samarati
Analysis of an inventory of information systems in the public administration
1996 C. Batini, S. Castano, V. De Antonellis, M. Fugini, B. Pernici
Analysis, Comparison and Design of Role-Based Security Specifications
1996 S. Castano, G. Martella, P. Samarati
Automated derivation of global authorizations for database federations
1997 S. Castano, S. De Capitani di Vimercati, M. Fugini
A multi-perspective framework for the analysis of legacy information systems
1997 S. Castano, V. De Antonellis
Semantic dictionary design for database interoperability
1997 S. Castano, V. De Antonellis
Engineering a library of reusable conceptual components
1997 S. Castano, V. DeAntonellis
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile