Sfoglia per Autore
Lazy Security Controllers
2013 Caravagna, G.; Costa, G.; Pardini, G.
Formal modeling and automatic enforcement of Bring Your Own Device policies
2014 Armando, A.; Costa, G.; Merlo, A.; Verderame, L.
Enabling BYOD through secure meta-market
2014 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca
Mobile App Security Analysis with the MAVeriC Static Analysis Module
2014 Armando, A.; Bocci, G.; Chiarelli, G.; Costa, G.; De Maglie, G.; Mammoliti, R.; Merlo, A.
Securing the ``Bring Your Own Device'' Paradigm
2014 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
Multi-dimensional Secure Service Orchestration
2014 Costa, G.; Martinelli, F.; Yautsiukhin, A.
Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, TACAS 2015 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, Proceedings
2015 Armando, Alessandro; Bocci, Gianluca; Chiarelli, Giantonio; Costa, Gabriele; De Maglie, Gabriele; Mammoliti, Rocco; Merlo, Alessio
Mobile app security assessment with the maveric dynamic analysis module
2015 Armando, Alessandro; Bocci, Gianluca; Costa, Gabriele; Mammoliti, Rocco; Merlo, Alessio; Ranise, Silvio; Traverso, Riccardo; Valenza, Andrea
Android Permissions Unleashed
2015 Armando, Alessandro; Carbone, Roberto; Costa, Gabriele; Merlo, Alessio
Securing android with local policies
2015 Costa, G.
Android vs. SEAndroid: An empirical assessment
2016 Merlo, Alessio; Costa, Gabriele; Verderame, Luca; Armando, Alessandro
FLEX: A flexible code authentication framework for delegating mobile app customization
2016 Costa, Gabriele; Gasti, Paolo; Merlo, Alessio; Yu, Shunt-Hsi
Developing a NATO BYOD security policy
2016 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Wrona, Konrad
Strong authentication for e-banking: A survey on european regulations and implementations
2017 Sinigaglia, F; Carbone, R; Costa, G
PolEnA: Enforcing fine-grained permission policies in android
2017 Costa, G; Sinigaglia, F; Carbone, R
Automatic security verification of mobile app configurations
2018 Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Armando, Alessandro
Scenario design and validation for next generation cyber ranges
2018 Russo, E.; Costa, G.; Armando, A.
From Natural Projection to Partial Model Checking and Back
2018 Costa, G; Basin, D; Bodei, C; Degano, P; Galletta, L
Software security: The language approach
2019 Costa, G.; Degano, P.; Galletta, L.
Private-Yet-Verifiable Contact Tracing
2020 Canidio, Andrea; Costa, Gabriele; Galletta, Letterio
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Lazy Security Controllers | 1-gen-2013 | Caravagna, G.; Costa, G.; Pardini, G. | |
Formal modeling and automatic enforcement of Bring Your Own Device policies | 1-gen-2014 | Armando, A.; Costa, G.; Merlo, A.; Verderame, L. | |
Enabling BYOD through secure meta-market | 1-gen-2014 | Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca | |
Mobile App Security Analysis with the MAVeriC Static Analysis Module | 1-gen-2014 | Armando, A.; Bocci, G.; Chiarelli, G.; Costa, G.; De Maglie, G.; Mammoliti, R.; Merlo, A. | |
Securing the ``Bring Your Own Device'' Paradigm | 1-gen-2014 | Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio | |
Multi-dimensional Secure Service Orchestration | 1-gen-2014 | Costa, G.; Martinelli, F.; Yautsiukhin, A. | |
Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, TACAS 2015 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, Proceedings | 1-gen-2015 | Armando, Alessandro; Bocci, Gianluca; Chiarelli, Giantonio; Costa, Gabriele; De Maglie, Gabriele; Mammoliti, Rocco; Merlo, Alessio | |
Mobile app security assessment with the maveric dynamic analysis module | 1-gen-2015 | Armando, Alessandro; Bocci, Gianluca; Costa, Gabriele; Mammoliti, Rocco; Merlo, Alessio; Ranise, Silvio; Traverso, Riccardo; Valenza, Andrea | |
Android Permissions Unleashed | 1-gen-2015 | Armando, Alessandro; Carbone, Roberto; Costa, Gabriele; Merlo, Alessio | |
Securing android with local policies | 1-gen-2015 | Costa, G. | |
Android vs. SEAndroid: An empirical assessment | 1-gen-2016 | Merlo, Alessio; Costa, Gabriele; Verderame, Luca; Armando, Alessandro | |
FLEX: A flexible code authentication framework for delegating mobile app customization | 1-gen-2016 | Costa, Gabriele; Gasti, Paolo; Merlo, Alessio; Yu, Shunt-Hsi | |
Developing a NATO BYOD security policy | 1-gen-2016 | Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Wrona, Konrad | |
Strong authentication for e-banking: A survey on european regulations and implementations | 1-gen-2017 | Sinigaglia, F; Carbone, R; Costa, G | |
PolEnA: Enforcing fine-grained permission policies in android | 1-gen-2017 | Costa, G; Sinigaglia, F; Carbone, R | |
Automatic security verification of mobile app configurations | 1-gen-2018 | Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Armando, Alessandro | |
Scenario design and validation for next generation cyber ranges | 1-gen-2018 | Russo, E.; Costa, G.; Armando, A. | |
From Natural Projection to Partial Model Checking and Back | 1-gen-2018 | Costa, G; Basin, D; Bodei, C; Degano, P; Galletta, L | |
Software security: The language approach | 1-gen-2019 | Costa, G.; Degano, P.; Galletta, L. | |
Private-Yet-Verifiable Contact Tracing | 1-gen-2020 | Canidio, Andrea; Costa, Gabriele; Galletta, Letterio |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile