Pubblicazioni dell'autore: Andrea Atzeni [Rubrica]

Livello precedente
Esporta come [feed] Atom [feed] DataCiteXML [feed] RSS 1.0 [feed] RSS 2.0
Numero di pubblicazioni : 29.

In corso di stampa

Articolo in atti di convegno Smiraglia, Paolo; De Benedictis, Marco; Atzeni, Andrea; Lioy, Antonio; Pucciarelli, Massimiliano
The FICEP Infrastructure - How we deployed the Italian eIDAS Node in the cloud. In: e-Democracy 2017: Privacy-Preserving, Secure, Intelligent e-Government Services, Athens (Greece), December 14-15, 2017. (In stampa)

Capitolo di libro Atzeni, A.; Faily S.; Galloni R.
Usable security: HCI-Sec issues and motivation. In: Encyclopedia of Information Science and Technology, Fourth Edition. IGI GLOBAL. (In stampa)

2017

Articolo in atti di convegno Atzeni, Andrea; Marcelli, Andrea; Muroni, Francesco; Squillero, Giovanni (2017)
HAIT: Heap Analyzer with Input Tracing. In: SECRYPT 2017, Madrid, Spain, 24-26 Luglio 2017. pp. 327-334 [Disponibilità ristretta]
[img]

Articolo in atti di convegno Berbecaru, Diana; Atzeni, Andrea; De Benedictis, Marco; Smiraglia, Paolo (2017)
Towards Stronger Data Security in an eID Management Infrastructure. In: PDP-2017: 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing, St. Petersburg (Russia), 06-08 March 2017. pp. 391-395
Web of Science: 0 - Scopus: 0

2015

Articolo di rivista Atzeni, Andrea; Su, Tao; Baltatu, Madalina; D'Alessandro, Rosalia; Pessiva, Giovanni (2015)
Android Apps Risk Evaluation: a methodology. In: ICST TRANSACTIONS ON UBIQUITOUS ENVIRONMENTS, vol. 1 n. 4, pp. 1-18. - ISSN 2032-9377

Capitolo di libro Atzeni A.; Lioy A. (2015)
Authentication. In: Encyclopedia of Information Science and Technology / M. Khosrow-Pour. IGI Global, pp. 4239-4247. ISBN 9781466658882 [Disponibilità ristretta]
[img]

Capitolo di libro Atzeni A.; Smiraglia P.; Siringo A. (2015)
Hard clues in soft environments: The Cloud's influence on digital forensics. In: Handbook of Research on Security Considerations in Cloud Computing / Kashif Munir, Mubarak S. Al-Mutairi, Lawan A. Mohammed. IGI Global, pp. 258-284. ISBN 9781466683877
Scopus: 0

2014

Articolo in atti di convegno Shamal Faily, John Lyle, Ivan Fléchais, Andrea Atzeni, Cesare Cameroni, Hans Myrhaug, Ayse Göker, Robert Kleinfeld (2014)
Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework. In: HCI'14: 28th Int. BCS Human Computer Interaction Conference 2014, Southport (UK), 9-12 September 2014. pp. 189-194
Scopus: 0
[img]
Preview

Capitolo di libro Atzeni A.; Lyle J.; Faily S. (2014)
Developing secure‚ unified multi−device and multi−domain platforms: a case study from the webinos project. In: Architectures and Protocols for Secure Information Technology / A. Ruiz-Martinez, R. Marin-Lopez, F. Pereniguez-Garcia. IGI Global, pp. 310-333. ISBN 1466645148
Scopus: 0

Articolo in atti di convegno A. Atzeni;T. Su;M. Baltatu;R. D'Alessandro;G. Pessiva (2014)
How Dangerous is Your Android App? An Evaluation Methodology. In: 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, London, United Kingdom, 02/12/2014-05/12/2014. pp. 130-139 [Disponibilità ristretta]
Scopus: 5
[img]

Articolo in atti di convegno Atzeni A.; Su T.; Montanaro T. (2014)
Lightweight Formal Verification in Real World, A Case Study. In: WISSE 2014: 4th International Workshop on Information Systems Security Engineering, Thessaloniki (Greece), 17 June 2014. pp. 335-342 [Disponibilità ristretta]
Web of Science: 1 - Scopus: 1
[img]

2013

Articolo in atti di convegno Su T.; Lyle J.;Atzeni A.;Faily S.; Virji H.; Ntanos C.; Botsikas C. (2013)
Continuous integration for web-based software infrastructures: lessons learned on the webinos project. In: HVC-2013: Ninth Haifa Verification Conference, Haifa (Israel), 5-7/11/2013. pp. 145-150
Scopus: 2

Articolo in atti di convegno Lyle J.; Paverd A.; King-Lacroix J. ; Atzeni A.; Virji H.; Flechais I.; Faily S. (2013)
Personal PKI for the smart device era. In: 9th European Workshop EuroPKI 2012, Pisa (Italy), September 13-14, 2012. pp. 69-84
Scopus: 2

Articolo in atti di convegno Faily S., Lyle J., Flechais I., Atzeni A., Cameroni C., Myrhaug H., Goker A., Kleinfeld R. (2013)
Policies in Context: Factors Influencing the Elicitation and Categorisation of Context−Sensitive Security Policies. In: HUPS-2013: workshop on Home Usable Privacy and Security, Newcastle (UK), 24-26/7/2013.

2012

Articolo in atti di convegno Faily S.; Lyle J.; Namiluko C.; Atzeni A.; Cameroni C. (2012)
Model-driven architectural risk analysis using architectural and contextualised attack patterns. In: MDSec 2012: Workshop on Model-Driven Security, at the 15th ACM/IEEE International Conference on Model Driven Engineering Languages and System, Innsbruck (Austria), October 1-5, 2012.
Scopus: 3

Articolo in atti di convegno Faily S., Lyle J., Paul A., Atzeni A., Blomme D., Desruelle H., And Bangalore K. (2012)
Requirements Sensemaking using Concept Maps. In: HCSE-2012: 4th International Conference on Human-Centred Software Engineering, Toulouse (France), October 29-31, 2012. pp. 217-232
Scopus: 4

2011

Articolo in atti di convegno Atzeni A., Faily S., Lyle J., Cameroni C., Flechais I. (2011)
Here's Johnny: a methodology for developing attacker personas. In: ARES-2011: 6th Int. Conf. on Availability, Reliability and Security, Vienna (Austria), 22-26 August 2011. pp. 722-727
Scopus: 12

2009

Capitolo di libro Atzeni A. (2009)
Problemi di sicurezza delle comunicazioni a distanza. In: Nuove tecnologie e processo penale. Giappichelli Editore, TURIN, pp. 102-108. ISBN 9788834877982

Articolo in atti di convegno Abou El Kalam A; Atzeni A; Cappadonia A.; Cesena E; Fischer-Hubner S; Lindskog S; Martucci L.A; Pastrone C (2009)
Toward a formal framework to evaluate wireless sensor network security. In: NON SPECIFICATO, Barcelona, March 30-April 1.

2008

Articolo in atti di convegno Aime M.D.; A. Atzeni (2008)
Generation of Diagnostic Plans for Large ICT Systems. In: Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE'08), Cap Esterel, France, August 25-31, 2008. pp. 344-349
Scopus: 0

Articolo in atti di convegno Aime M.D; Atzeni A; Pomi P.C. (2008)
Learning to enhance dependability of information systems. In: SASO 2008, IEEE International Conference on Self-Adaptive and Self-Organizing Systems, Venezia, October 20-24, 2008. pp. 483-484
Web of Science: 0 - Scopus: 0

Articolo in atti di convegno Aime M.D; Atzeni A; Pomi P.C. (2008)
The Risks With Security Metrics. In: QoP 2008, ACM Workshop on Quality of Protection, Alexandria, VA, USA, 27 Oct 2008. pp. 65-70
Scopus: 5

2007

Articolo in atti di convegno Aime M. D; Atzeni A.; Pomi P. C (2007)
AMBRA - Automated Model-Based Risk Analysis. In: QoP-2007, ACM workshop on Quality of Protection, Alexandria, VA, USA, October 29, 2007. pp. 43-48
Web of Science: 1 - Scopus: 9

Articolo in atti di convegno Atzeni A.; Lioy A. (2007)
An estimation of attack surface to evaluate network (in)security. In: ICEIS 2007 - 9th International Conference on Enterprise Information Systems, Funchal (Portugal), 12-16 June 2007. pp. 493-498
Web of Science: 0 - Scopus: 0

2006

Articolo in atti di convegno Aime M.D; Atzeni A. (2006)
Opaque channel: contrasting information leakage in wireless scenarios. In: AICA-2006, Cesena (Italy), September 21-22, 2006. pp. 481-490

Curatela Atzeni A.; Lioy A (2006)
Public Key Infrastructure - theory and practice. [Curatela]

2005

Articolo in atti di convegno Atzeni A.; Lioy A. (2005)
Why to adopt a security metric? A little survey. In: QoP-2005: Quality of Protection workshop, Milano (Italy), September 15, 2005. pp. 1-12

Articolo in atti di convegno Atzeni A.; Lioy A; Tamburino L. (2005)
A generic overall framework for network security evaluation. In: AICA-2005, Udine (Italy), October 5-7, 2005. pp. 605-615

Articolo in atti di convegno Aime M.D.; A. Atzeni; A. Lioy (2005)
The wireless opaque channel to contrast information leakage. In: WoWMoM-2005, IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, Taormina, Italy, June 13-16, 2005. pp. 570-575
Web of Science: 0 - Scopus: 0

Questa lista è stata generata il Fri Sep 22 09:03:04 2017 CEST.