Sfoglia per Autore
Securing Java with local policies
2008-01-01 Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R
Jalapa: Securing Java with Local Policies
2009-01-01 Bartoletti, M; Costa, G; Zunino, R
Securing Java with local policies
2009-01-01 Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R
Detection of images with adult content for parental control on mobile devices
2009-01-01 Amato, G.; Bolettieri, P.; Costa, G.; la Torre, F.; Martinelli, F.
Jalapa: Securing Java with Local Policies
2009-01-01 Bartoletti, M.; Costa, G.; Zunino, R.
Secure Service Composition with Symbolic Effects
2009-01-01 Costa, G; Degano, P; Martinelli, F
Secure Service Orchestration in Open Networks
2010-01-01 Costa, G; Degano, P; Martinelli, F
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
2010-01-01 Costa, G; Dragoni, N; Lazouski, A; Martinelli, F; Massacci, F; Matteucci, I
Runtime monitoring for next generation Java ME platform
2010-01-01 Costa, G; Martinelli, F; Mori, P; Schaefer, C; Walter, T
Modular Plans for Secure Service Composition
2010-01-01 Costa, G.; Degano, P.; Martinelli, F.
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
2010-01-01 Costa, G.; Dragoni, N.; Lazouski, A.; Martinelli, F.; Massacci, F.; Matteucci, I.
Trust-Driven Policy Enforcement through Gate Automata
2011-01-01 Costa, G.; Matteucci, I.
Elective temporal logic
2011-01-01 Costa, G.; Matteucci, I.
Modular plans for secure service composition
2012-01-01 Costa, G; Degano, P; Martinelli, F
Gate automata-driven run-time enforcement
2012-01-01 Costa, G.; Matteucci, I.
Securing the “bring your own device” policy
2012-01-01 Armando, A.; Costa, G.; Merlo, A.; Verderame, L.
Market-based security for mobile devices
2013-01-01 Costa, G.; Merlo, A.; Verderame, L.
Bring your own device, securely
2013-01-01 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
Trustworthy Opportunistic Access to the Internet of Services
2013-01-01 Armando, Alessandro; Castiglione, Aniello; Costa, Gabriele; Fiore, Ugo; Merlo, Alessio; Verderame, Luca; You, Ilsun
Lazy Security Controllers
2013-01-01 Caravagna, G.; Costa, G.; Pardini, G.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Securing Java with local policies | 1-gen-2008 | Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R | |
Jalapa: Securing Java with Local Policies | 1-gen-2009 | Bartoletti, M; Costa, G; Zunino, R | |
Securing Java with local policies | 1-gen-2009 | Bartoletti, M; Costa, G; Degano, P; Martinelli, F; Zunino, R | |
Detection of images with adult content for parental control on mobile devices | 1-gen-2009 | Amato, G.; Bolettieri, P.; Costa, G.; la Torre, F.; Martinelli, F. | |
Jalapa: Securing Java with Local Policies | 1-gen-2009 | Bartoletti, M.; Costa, G.; Zunino, R. | |
Secure Service Composition with Symbolic Effects | 1-gen-2009 | Costa, G; Degano, P; Martinelli, F | |
Secure Service Orchestration in Open Networks | 1-gen-2010 | Costa, G; Degano, P; Martinelli, F | |
Extending Security-by-Contract with Quantitative Trust on Mobile Devices | 1-gen-2010 | Costa, G; Dragoni, N; Lazouski, A; Martinelli, F; Massacci, F; Matteucci, I | |
Runtime monitoring for next generation Java ME platform | 1-gen-2010 | Costa, G; Martinelli, F; Mori, P; Schaefer, C; Walter, T | |
Modular Plans for Secure Service Composition | 1-gen-2010 | Costa, G.; Degano, P.; Martinelli, F. | |
Extending Security-by-Contract with Quantitative Trust on Mobile Devices | 1-gen-2010 | Costa, G.; Dragoni, N.; Lazouski, A.; Martinelli, F.; Massacci, F.; Matteucci, I. | |
Trust-Driven Policy Enforcement through Gate Automata | 1-gen-2011 | Costa, G.; Matteucci, I. | |
Elective temporal logic | 1-gen-2011 | Costa, G.; Matteucci, I. | |
Modular plans for secure service composition | 1-gen-2012 | Costa, G; Degano, P; Martinelli, F | |
Gate automata-driven run-time enforcement | 1-gen-2012 | Costa, G.; Matteucci, I. | |
Securing the “bring your own device” policy | 1-gen-2012 | Armando, A.; Costa, G.; Merlo, A.; Verderame, L. | |
Market-based security for mobile devices | 1-gen-2013 | Costa, G.; Merlo, A.; Verderame, L. | |
Bring your own device, securely | 1-gen-2013 | Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio | |
Trustworthy Opportunistic Access to the Internet of Services | 1-gen-2013 | Armando, Alessandro; Castiglione, Aniello; Costa, Gabriele; Fiore, Ugo; Merlo, Alessio; Verderame, Luca; You, Ilsun | |
Lazy Security Controllers | 1-gen-2013 | Caravagna, G.; Costa, G.; Pardini, G. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile