Sfoglia per Autore
Securing Java with local policies
2008 Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R
Jalapa: Securing Java with Local Policies
2009 Bartoletti, M; Costa, G; Zunino, R
Jalapa: Securing Java with Local Policies
2009 Bartoletti, M.; Costa, G.; Zunino, R.
Detection of images with adult content for parental control on mobile devices
2009 Amato, G.; Bolettieri, P.; Costa, G.; la Torre, F.; Martinelli, F.
Securing Java with local policies
2009 Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R
Secure Service Composition with Symbolic Effects
2009 Costa, G; Degano, P; Martinelli, F
Secure Service Orchestration in Open Networks
2010 Costa, G; Degano, P; Martinelli, F
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
2010 Costa, G; Dragoni, N; Lazouski, A; Martinelli, F; Massacci, F; Matteucci, I
Runtime monitoring for next generation Java ME platform
2010 Costa, G; Martinelli, F; Mori, P; Schaefer, C; Walter, T
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
2010 Costa, G.; Dragoni, N.; Lazouski, A.; Martinelli, F.; Massacci, F.; Matteucci, I.
Modular Plans for Secure Service Composition
2010 Costa, G.; Degano, P.; Martinelli, F.
Elective temporal logic
2011 Costa, G.; Matteucci, I.
Trust-Driven Policy Enforcement through Gate Automata
2011 Costa, G.; Matteucci, I.
Securing the “bring your own device” policy
2012 Armando, A.; Costa, G.; Merlo, A.; Verderame, L.
Gate automata-driven run-time enforcement
2012 Costa, G.; Matteucci, I.
Modular plans for secure service composition
2012 Costa, G; Degano, P; Martinelli, F
Market-based security for mobile devices
2013 Costa, G.; Merlo, A.; Verderame, L.
Bring your own device, securely
2013 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
Lazy Security Controllers
2013 Caravagna, G.; Costa, G.; Pardini, G.
Formal Modeling and Reasoning about the Android Security Framework
2013 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio
| Titolo | Data di pubblicazione | Autore(i) | File |
|---|---|---|---|
| Securing Java with local policies | 1-gen-2008 | Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R | |
| Jalapa: Securing Java with Local Policies | 1-gen-2009 | Bartoletti, M; Costa, G; Zunino, R | |
| Jalapa: Securing Java with Local Policies | 1-gen-2009 | Bartoletti, M.; Costa, G.; Zunino, R. | |
| Detection of images with adult content for parental control on mobile devices | 1-gen-2009 | Amato, G.; Bolettieri, P.; Costa, G.; la Torre, F.; Martinelli, F. | |
| Securing Java with local policies | 1-gen-2009 | Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R | |
| Secure Service Composition with Symbolic Effects | 1-gen-2009 | Costa, G; Degano, P; Martinelli, F | |
| Secure Service Orchestration in Open Networks | 1-gen-2010 | Costa, G; Degano, P; Martinelli, F | |
| Extending Security-by-Contract with Quantitative Trust on Mobile Devices | 1-gen-2010 | Costa, G; Dragoni, N; Lazouski, A; Martinelli, F; Massacci, F; Matteucci, I | |
| Runtime monitoring for next generation Java ME platform | 1-gen-2010 | Costa, G; Martinelli, F; Mori, P; Schaefer, C; Walter, T | |
| Extending Security-by-Contract with Quantitative Trust on Mobile Devices | 1-gen-2010 | Costa, G.; Dragoni, N.; Lazouski, A.; Martinelli, F.; Massacci, F.; Matteucci, I. | |
| Modular Plans for Secure Service Composition | 1-gen-2010 | Costa, G.; Degano, P.; Martinelli, F. | |
| Elective temporal logic | 1-gen-2011 | Costa, G.; Matteucci, I. | |
| Trust-Driven Policy Enforcement through Gate Automata | 1-gen-2011 | Costa, G.; Matteucci, I. | |
| Securing the “bring your own device” policy | 1-gen-2012 | Armando, A.; Costa, G.; Merlo, A.; Verderame, L. | |
| Gate automata-driven run-time enforcement | 1-gen-2012 | Costa, G.; Matteucci, I. | |
| Modular plans for secure service composition | 1-gen-2012 | Costa, G; Degano, P; Martinelli, F | |
| Market-based security for mobile devices | 1-gen-2013 | Costa, G.; Merlo, A.; Verderame, L. | |
| Bring your own device, securely | 1-gen-2013 | Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio | |
| Lazy Security Controllers | 1-gen-2013 | Caravagna, G.; Costa, G.; Pardini, G. | |
| Formal Modeling and Reasoning about the Android Security Framework | 1-gen-2013 | Armando, Alessandro; Costa, Gabriele; Merlo, Alessio |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile