Segui
Ilaria Matteucci
Ilaria Matteucci
IIT-CNR
Email verificata su iit.cnr.it - Home page
Titolo
Citata da
Citata da
Anno
Through modeling to synthesis of security automata
F Martinell, I Matteucci
Electronic Notes in Theoretical Computer Science 179, 31-46, 2007
892007
Risk analysis of Android applications: A user-centric solution
G Dini, F Martinelli, I Matteucci, M Petrocchi, A Saracino, D Sgandurra
Future Generation Computer Systems 80, 505-518, 2018
672018
CNL4DSA: a controlled natural language for data sharing agreements
I Matteucci, M Petrocchi, ML Sbodio
Proceedings of the 2010 ACM Symposium on Applied Computing, 616-620, 2010
522010
Toucan: A protocol to secure controller area network
G Bella, P Biondi, G Costantino, I Matteucci
Proceedings of the ACM Workshop on Automotive Cybersecurity, 3-8, 2019
492019
CANDY: A social engineering attack to leak information from infotainment system
G Costantino, A La Marra, F Martinelli, I Matteucci
2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 1-5, 2018
362018
Extending Security-by-Contract with quantitative trust on mobile devices
G Costa, N Dragoni, A Lazouski, F Martinelli, F Massacci, I Matteucci
2010 International Conference on Complex, Intelligent and Software Intensiveá…, 2010
362010
Prioritized execution of privacy policies
I Matteucci, P Mori, M Petrocchi
International Workshop on Data Privacy Management, 133-145, 2012
352012
A prototype for solving conflicts in XACML-based e-Health policies
A Lunardelli, I Matteucci, P Mori, M Petrocchi
Proceedings of the 26th IEEE International Symposium on Computer-Basedá…, 2013
302013
Automated synthesis of enforcing mechanisms for security properties in a timed setting
I Matteucci
Electronic Notes in Theoretical Computer Science 186, 101-120, 2007
292007
A novel security information and event management system for enhancing cyber security in a hydroelectric dam
C Di Sarno, A Garofalo, I Matteucci, M Vallini
International Journal of Critical Infrastructure Protection 13, 39-51, 2016
282016
A design phase for data sharing agreements
I Matteucci, M Petrocchi, ML Sbodio, L Wiegand
International Workshop on Data Privacy Management, 25-41, 2011
282011
A multi-criteria-based evaluation of android applications
G Dini, F Martinelli, I Matteucci, M Petrocchi, A Saracino, D Sgandurra
International Conference on Trusted Systems, 67-82, 2012
272012
An approach for the specification, verification and synthesis of secure systems
F Martinelli, I Matteucci
Electronic Notes in Theoretical Computer Science 168, 29-43, 2007
272007
A formal support for collaborative data sharing
F Martinelli, I Matteucci, M Petrocchi, L Wiegand
International Conference on Availability, Reliability, and Security, 547-561, 2012
232012
A framework for automatic generation of security controller
F Martinelli, I Matteucci
Software Testing, Verification and Reliability 22 (8), 563-582, 2012
222012
Controlling usage in business process workflows through fine-grained security policies
B Aziz, A Arenas, F Martinelli, I Matteucci, P Mori
Trust, Privacy and Security in Digital Business: 5th Internationalá…, 2008
222008
Controlling usage in business process workflows through fine-grained security policies
B Aziz, A Arenas, F Martinelli, I Matteucci, P Mori
Trust, Privacy and Security in Digital Business: 5th Internationalá…, 2008
222008
A tour of secure software engineering solutions for connected vehicles
A Bertolino, A Calabro’, F Di Giandomenico, G Lami, F Lonetti, E Marchetti, ...
Software Quality Journal 26, 1223-1256, 2018
202018
From qualitative to quantitative enforcement of security policy
F Martinelli, I Matteucci, C Morisset
Computer Network Security: 6th International Conference on Mathematicalá…, 2012
202012
My data, your data, our data: managing privacy preferences in multiple subjects personal data
S Gnesi, I Matteucci, C Moiso, P Mori, M Petrocchi, M Vescovi
Annual Privacy Forum, 154-171, 2014
192014
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20