Pubblicazioni dell'autore: Marco Domenico Aime [Rubrica]

Livello precedente
Esporta come [feed] Atom [feed] DataCiteXML [feed] RSS 1.0 [feed] RSS 2.0
Vai a: 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2002
Numero di pubblicazioni : 22.

2011

Articolo di rivista Aime M.; Lioy A.; Pomi P. (2011)
Automatic (re)configuration of IT systems for dependability. In: IEEE TRANSACTIONS ON SERVICES COMPUTING, vol. 4 n. 2, pp. 110-124. - ISSN 1939-1374
Web of Science: 1 - Scopus: 2

Articolo in atti di convegno Berbecaru D., Lioy A., Aime M.D. (2011)
Exploiting proxy-based federated identity management in wireless roaming access. In: 8th International Conference, TrustBus 2011, Toulouse (FR), August 29 - September 2, 2011. pp. 13-23 [Disponibilità ristretta]
Scopus: 1
[img]

Capitolo di libro Aime M.D.; Lioy A.; Pomi P.C.; Vallini M. (2011)
Security Plans for SaaS. In: New Frontiers in Information and Software as Services: Service and Application Design Challenges in the Cloud / Agrawal D., Candan K.S., Li W.-S. Springer, Berlin Heidelberg, pp. 81-111. ISBN 9783642192937
Web of Science: 1 - Scopus: 2

2010

Articolo in atti di convegno Aime M.D., Guasconi F. (2010)
Enhanced Vulnerability Ontology for Information Risk Assessment and Dependability Management. In: DEPEND 2010: 3rd Int. Conf. on Dependability, Venezia Mestre (Italy), July 18-25, 2010. pp. 92-97
Scopus: 4

Articolo di rivista Aime M.D.; Pomi P.C.; Vallini M. (2010)
Ontology and algorithms for the dependable configuration of information systems. In: INTERNATIONAL JOURNAL OF CRITICAL COMPUTER-BASED SYSTEMS, vol. 1 n. 4, pp. 301-335. - ISSN 1757-8779
Scopus: 0

Articolo in atti di convegno Aime M.D. (2010)
Trusted Distributed Log Services. In: Ew2010: 2010 European Wireless, Lucca (Italy), 12-15 April 2010. pp. 488-495
Scopus: 0

2009

Articolo di rivista Aime M.D.; Pomi P.C.; Vallini M. (2009)
Automated Dependability Planning in Virtualised Information System. In: INTERNATIONAL JOURNAL ON ADVANCES IN INTELLIGENT SYSTEMS, vol. 2 n. 4, pp. 457-476. - ISSN 1942-2679

Articolo in atti di convegno Aime M.D.; Pomi P.C.; Vallini M. (2009)
Planning Dependability of Virtualised Networks. In: DEPEND'09 - 2nd Int. Conf. on Dependability, Athens (Greece), 18-23 June 2009. pp. 46-51
Web of Science: 0 - Scopus: 1

2008

Articolo in atti di convegno Aime M.D.; A. Atzeni (2008)
Generation of Diagnostic Plans for Large ICT Systems. In: Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE'08), Cap Esterel, France, August 25-31, 2008. pp. 344-349
Scopus: 0

Articolo in atti di convegno Aime M.D; Atzeni A; Pomi P.C. (2008)
Learning to enhance dependability of information systems. In: SASO 2008, IEEE International Conference on Self-Adaptive and Self-Organizing Systems, Venezia, October 20-24, 2008. pp. 483-484
Web of Science: 0 - Scopus: 0

Articolo in atti di convegno Aime M.D.; Pomi P.C.; Vallini M. (2008)
Policy-Driven System Configuration for Dependability. In: SECUREWARE'08 - 2nd Int. Conf. on Emerging Security Information, Systems and Technologies, Cap Esterel (France), 25-31 August 2008. pp. 420-425
Scopus: 3

Articolo in atti di convegno Aime M.D; Atzeni A; Pomi P.C. (2008)
The Risks With Security Metrics. In: QoP 2008, ACM Workshop on Quality of Protection, Alexandria, VA, USA, 27 Oct 2008. pp. 65-70
Scopus: 5

2007

Articolo in atti di convegno Aime M. D; Atzeni A.; Pomi P. C (2007)
AMBRA - Automated Model-Based Risk Analysis. In: QoP-2007, ACM workshop on Quality of Protection, Alexandria, VA, USA, October 29, 2007. pp. 43-48
Web of Science: 1 - Scopus: 9

Articolo di rivista Aime M.D.; Calandriello G.; Lioy A. (2007)
Dependability in wireless networks: can we rely on WiFi? In: IEEE SECURITY & PRIVACY, vol. 5, pp. 23-29. - ISSN 1540-7993
Web of Science: 8 - Scopus: 17
[img] [img]
Preview

2006

Articolo in atti di convegno Aime M.D; Atzeni A. (2006)
Opaque channel: contrasting information leakage in wireless scenarios. In: AICA-2006, Cesena (Italy), September 21-22, 2006. pp. 481-490

Articolo in atti di convegno Aime M.D.; Calandriello G.; Lioy A. (2006)
A wireless distributed intrusion detection system and a new attack model. In: ISCC-2006: 11th IEEE Int. Symp. on Computers and Communications, Cagliari (Italy), June 26-29, 2006. pp. 35-40
Scopus: 9

2005

Articolo in atti di convegno Aime M.D; Lioy A.; Ramunno G (2005)
Decentralised access control in 802.11 networks. In: 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg (AT), September 19 – 21, 2005. pp. 180-190
Web of Science: 0 - Scopus: 0

Articolo in atti di convegno Aime M.D.; Lioy A. (2005)
Incremental trust: building trust from past experience. In: WoWMoM 2005: IEEE Int. Symp. on a World of Wireless Mobile and Multimedia Networks, Taormina (Italy), June 13-16, 2005. pp. 603-608
Web of Science: 3 - Scopus: 6

Articolo in atti di convegno Lioy A., Ramunno G., Aime M.D., Pala M. (2005)
Motivations for a theoretical approach to WYSIWYS. In: 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg (AT), September 19 – 21, 2005. pp. 289-290
Web of Science: 0 - Scopus: 0

Articolo in atti di convegno Aime M.D.; A. Atzeni; A. Lioy (2005)
The wireless opaque channel to contrast information leakage. In: WoWMoM-2005, IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, Taormina, Italy, June 13-16, 2005. pp. 570-575
Web of Science: 0 - Scopus: 0

2004

Capitolo di libro Aime M.D.; Lioy A.; Mazzocchi D. (2004)
Security of 802.11 wireless networks. In: Security and privacy in advanced networking technologies / JERMAN-BLAZIC B.; SCHNEIDER W.; KLOBUCAR T. IOS Press, AMSTERDAM, pp. 51-100. ISBN 9781586034306

2002

Articolo in atti di convegno Aime M.D.; A. Lioy; D. Mazzocchi (2002)
Wireless security: current status and future evolution. In: AICA 2002, Conversano (BA), Italy, September 25-27, 2002. pp. 1-14

Questa lista è stata generata il Sat Jul 22 21:08:10 2017 CEST.