Alberto Trombetta
Alberto Trombetta
Associate Professor of Computer Science, University of Insubria
Email verificata su uninsubria.it - Home page
TitoloCitata daAnno
BPMN: An introduction to the standard
M Chinosi, A Trombetta
Computer Standards & Interfaces 34 (1), 124-134, 2012
5292012
Privacy-aware role-based access control
Q Ni, E Bertino, J Lobo, C Brodie, CM Karat, J Karat, A Trombeta
ACM Transactions on Information and System Security (TISSEC) 13 (3), 24, 2010
4012010
A multidimensional critical state analysis for detecting intrusions in SCADA systems
A Carcano, A Coletta, M Guglielmi, M Masera, IN Fovino, A Trombetta
IEEE Transactions on Industrial Informatics 7 (2), 179-186, 2011
2272011
A framework for modeling and evaluating automatic semantic reconciliation
A Gal, A Anaby-Tavor, A Trombetta, D Montesi
The VLDB Journal—The International Journal on Very Large Data Bases 14 (1 …, 2005
1532005
Modbus/DNP3 state-based intrusion detection system
IN Fovino, A Carcano, TDL Murel, A Trombetta, M Masera
2010 24th IEEE International Conference on Advanced Information Networking …, 2010
1392010
An experimental investigation of malware attacks on SCADA systems
IN Fovino, A Carcano, M Masera, A Trombetta
International Journal of Critical Infrastructure Protection 2 (4), 139-145, 2009
1032009
Design and implementation of a secure modbus protocol
IN Fovino, A Carcano, M Masera, A Trombetta
International conference on critical infrastructure protection, 83-96, 2009
752009
State-based network intrusion detection systems for SCADA protocols: a proof of concept
A Carcano, IN Fovino, M Masera, A Trombetta
International Workshop on Critical Information Infrastructures Security, 138-150, 2009
652009
Imprecision and user preferences in multimedia queries: A generic algebraic approach
P Ciaccia, D Montesi, W Penzo, A Trombetta
International Symposium on Foundations of Information and Knowledge Systems …, 2000
502000
Optimal comparison strategies in Ulam's searching game with two errors
D Mundici, A Trombetta
Theoretical Computer Science 182 (1-2), 217-232, 1997
411997
Privacy-preserving updates to anonymous and confidential databases
A Trombetta, W Jiang, E Bertino, L Bossi
IEEE Transactions on Dependable and Secure Computing 8 (4), 578-587, 2010
312010
Scada Malware, a proof of Concept
A Carcano, IN Fovino, M Masera, A Trombetta
International Workshop on Critical Information Infrastructures Security, 211-222, 2008
302008
Introducing privacy in a hospital information system.
S Braghin, A Coen-Porisini, P Colombo, S Sicari, A Trombetta
SESS 8, 17-18, 2008
192008
Group-based negotiations in p2p systems
AC Squicciarini, F Paci, E Bertino, A Trombetta, S Braghin
IEEE Transactions on Parallel and Distributed Systems 21 (10), 1473-1486, 2010
182010
Supporting robust and secure interactions in open domains through recovery of trust negotiations
AC Squicciarini, A Trombetta, E Bertino
27th International Conference on Distributed Computing Systems (ICDCS'07), 57-57, 2007
182007
A similarity based relational algebra for web and multimedia data
D Montesi, A Trombetta, PA Dearnley
Information processing & management 39 (2), 307-322, 2003
172003
Private updates to anonymous databases
A Trombetta, E Bertino
22nd International Conference on Data Engineering (ICDE'06), 116-116, 2006
152006
Identity-based long running negotiations
AC Squicciarini, A Trombetta, E Bertino, S Braghin
Proceedings of the 4th ACM workshop on Digital identity management, 97-106, 2008
142008
A conceptual model for privacy policies
A Coen-Porisini, P Colombo, S Sicari, A Trombetta
Proceedings of the 11th IASTED International Conference on Software …, 2007
142007
Modeling and validating BPMN diagrams
M Chinosi, A Trombetta
2009 IEEE Conference on Commerce and Enterprise Computing, 353-360, 2009
132009
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20