62 results on '"Chiara Braghin"'
Search Results
2. Kant: A Domain-Specific Language for Modeling Security Protocols.
3. Modeling and verification of smart contracts with Abstract State Machines.
4. A Modeling and Verification Framework for Ethereum Smart Contracts.
5. Engineering of Trust Analysis-Driven Digital Twins for a Medical Device.
6. Towards Trust-preserving Continuous Co-evolution of Digital Twins.
7. Towards ASM-Based Automated Formal Verification of Security Protocols.
8. Formal Proof of a Vulnerability in Z-Wave IoT Protocol.
9. The THREAT-ARREST Cyber Range Platform.
10. Dynamic and Scalable Enforcement of Access Control Policies for Big Data.
11. Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges.
12. Towards Blockchain-Based E-Voting Systems.
13. A Model Driven Approach for Cyber Security Scenarios Deployment.
14. Are mHealth Apps Secure? A Case Study.
15. Is Pokémon GO Watching You? A Survey on the Privacy-Awareness of Location-Based Apps' Users.
16. A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study
17. Using Semantic Lifting for improving Process Mining: a Data Loss Prevention System case study.
18. Knowledge and Business Intelligence Technologies in Cross-Enterprise Environments for Italian Advanced Mechanical Industry.
19. An Exact Approach for solving the Balanced Minimum Evolution Problem.
20. Automated Verification of Security Policies in Mobile Code.
21. A Distributed Calculus for Ro^le-Based Access Control.
22. Complexity of Nesting Analysis in Mobile Ambients.
23. BANANA - A Tool for Boundary Ambients Nesting ANAlysis.
24. Boundary Inference for Enforcing Security Policies in Mobile Ambients.
25. Control Flow Analysis of Mobile Ambients with Security Boundaries.
26. Flow-sensitive Leakage Analysis in Mobile Ambients.
27. Checking Integrity via CoPS and Banana: the E-Commerce Case Study .
28. Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients.
29. Information Leakage Detection in Boundary Ambients.
30. Towards ASM-Based Automated Formal Verification of Security Protocols
31. Towards the Monitoring and Evaluation of Trainees’ Activities in Cyber Ranges
32. A Model Driven Approach for Cyber Security Scenarios Deployment
33. Designing Smart-Contract Based Auctions
34. Towards Blockchain-Based E-Voting Systems
35. Are mHealth Apps Secure? A Case Study
36. Is Pokémon GO Watching You? A Survey on the Privacy-Awareness of Location-Based Apps’ Users
37. Online Privacy
38. Contributors
39. A model checking-based approach for security policy verification of mobile systems
40. Information flow security in Boundary Ambients
41. Role-based access control for a distributed calculus
42. Flow-sensitive Leakage Analysis in Mobile Ambients
43. Checking Integrity via CoPS and Banana: the E-Commerce Case Study
44. Information Leakage Detection in Boundary Ambients1 1Partially supported by MIUR Projects 'Interpretazione Astratta, Type Systems e Analisi Control-Flow' and 'Modelli formali per la sicurezza', and the EU Contract IST-2001-32617 'Models and Types for Security in Mobile Distributed Systems'
45. Privacy on the Internet
46. Contributors
47. The Binary Perfect Phylogeny with Persistent characters
48. A proposal for a new scoring system to evaluate pelvic masses: Pelvic Masses Score (PMS)
49. Short-term outcomes with the Ajust™ system: a new single incision sling for the treatment of stress urinary incontinence
50. NET Privacy
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.