default search action
BibTeX records: Antonio Lioy
@article{DBLP:journals/fgcs/BenedictisJPAL24, author = {Marco de Benedictis and Ludovic Jacquin and Ignazio Pedone and Andrea S. Atzeni and Antonio Lioy}, title = {A novel architecture to virtualise a hardware-bound trusted platform module}, journal = {Future Gener. Comput. Syst.}, volume = {150}, pages = {21--36}, year = {2024}, url = {https://doi.org/10.1016/j.future.2023.08.012}, doi = {10.1016/J.FUTURE.2023.08.012}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/BenedictisJPAL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BerbecaruL24, author = {Diana Gratiela Berbecaru and Antonio Lioy}, title = {Threat-TLS: {A} Tool for Threat Identification in Weak, Malicious, or Suspicious {TLS} Connections}, booktitle = {Proceedings of the 19th International Conference on Availability, Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024 - 2 August 2024}, pages = {125:1--125:9}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3664476.3670945}, doi = {10.1145/3664476.3670945}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BerbecaruL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/FerroBSL24, author = {Lorenzo Ferro and Enrico Bravi and Silvia Sisinni and Antonio Lioy}, editor = {Maanak Gupta and Mahmoud Abdelsalam and Mir Mehedi A. Pritom and Feras M. Awaysheh}, title = {{SAFEHIVE:} Secure Attestation Framework for Embedded and Heterogeneous IoT Devices in Variable Environments}, booktitle = {Proceedings of the 2024 {ACM} Workshop on Secure and Trustworthy Cyber-Physical Systems, SaT-CPS 2024, Porto, Portugal, 21 June 2024}, pages = {41--50}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643650.3658609}, doi = {10.1145/3643650.3658609}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/FerroBSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CiravegnaBL24, author = {Flavio Ciravegna and Giacomo Bruno and Antonio Lioy}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {IKE-less IPsec: Enhancing Security for IoT Device Networks}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper35.pdf}, timestamp = {Fri, 26 Jul 2024 13:58:33 +0200}, biburl = {https://dblp.org/rec/conf/itasec/CiravegnaBL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/FerroL24, author = {Lorenzo Ferro and Antonio Lioy}, editor = {Gianni D'Angelo and Flaminia L. Luccio and Francesco Palmieri}, title = {Standard-Based Remote Attestation: The Veraison Project}, booktitle = {Proceedings of the 8th Italian Conference on Cyber Security {(ITASEC} 2024), Salerno, Italy, April 8-12, 2024}, series = {{CEUR} Workshop Proceedings}, volume = {3731}, publisher = {CEUR-WS.org}, year = {2024}, url = {https://ceur-ws.org/Vol-3731/paper28.pdf}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itasec/FerroL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/DOnghiaCBFPL24, author = {Grazia D'Onghia and Flavio Ciravegna and Giacomo Bruno and Mattin Antartiko Elorza Forcada and Antonio Pastor and Antonio Lioy}, title = {Securing 5G: Trusted Execution Environments for Centrally Controlled IPsec Integrity}, booktitle = {{IFIP} Networking Conference, {IFIP} Networking 2024, Thessaloniki, Greece, June 3-6, 2024}, pages = {595--597}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/IFIPNetworking62109.2024.10619852}, doi = {10.23919/IFIPNETWORKING62109.2024.10619852}, timestamp = {Wed, 04 Sep 2024 21:11:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/DOnghiaCBFPL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/BraviLB24, author = {Enrico Bravi and Antonio Lioy and Diana Gratiela Berbecaru}, title = {Integrity Management in Softwarized Networks}, booktitle = {{NOMS} 2024 {IEEE} Network Operations and Management Symposium, Seoul, Republic of Korea, May 6-10, 2024}, pages = {1--7}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/NOMS59830.2024.10574994}, doi = {10.1109/NOMS59830.2024.10574994}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/BraviLB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BerbecaruSLRMV23, author = {Diana Gratiela Berbecaru and Silvia Sisinni and Antonio Lioy and Benoit Rat and Davide Margaria and Andrea Vesco}, title = {Mitigating Software Integrity Attacks With Trusted Computing in a Time Distribution Network}, journal = {{IEEE} Access}, volume = {11}, pages = {50510--50527}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3276476}, doi = {10.1109/ACCESS.2023.3276476}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BerbecaruSLRMV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BerbecaruL23, author = {Diana Gratiela Berbecaru and Antonio Lioy}, title = {An Evaluation of {X.509} Certificate Revocation and Related Privacy Issues in the Web {PKI} Ecosystem}, journal = {{IEEE} Access}, volume = {11}, pages = {79156--79175}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3299357}, doi = {10.1109/ACCESS.2023.3299357}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BerbecaruL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/BraviBL23, author = {Enrico Bravi and Diana Gratiela Berbecaru and Antonio Lioy}, title = {A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical Infrastructures}, booktitle = {{IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2023, Naples, Italy, December 4-6, 2023}, pages = {91--98}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CloudCom59040.2023.00027}, doi = {10.1109/CLOUDCOM59040.2023.00027}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/BraviBL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/SettanniRBL23, author = {Francesco Settanni and Leonardo Regano and Cataldo Basile and Antonio Lioy}, editor = {Carlos J. Bernardos and Barbara Martini and Elisa Rojas and F{\'{a}}bio Luciano Verdii and Zuqing Zhu and Eiji Oki and Helge Parzyjegla}, title = {A Model for Automated Cybersecurity Threat Remediation and Sharing}, booktitle = {9th {IEEE} International Conference on Network Softwarization, NetSoft 2023, Madrid, Spain, June 19-23, 2023}, pages = {492--497}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/NetSoft57336.2023.10175486}, doi = {10.1109/NETSOFT57336.2023.10175486}, timestamp = {Thu, 20 Jul 2023 12:34:37 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/SettanniRBL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cybersec4europe/2022, editor = {Antonio F. Skarmeta and Daniele Canavese and Antonio Lioy and Sara Nieves Matheu}, title = {Digital Sovereignty in Cyber Security: New Challenges in Future Vision - First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17-21, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1807}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-36096-1}, doi = {10.1007/978-3-031-36096-1}, isbn = {978-3-031-36095-4}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec4europe/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/CanaveseRBCL22, author = {Daniele Canavese and Leonardo Regano and Cataldo Basile and Gabriele Ciravegna and Antonio Lioy}, title = {Encryption-agnostic classifiers of traffic originators and their application to anomaly detection}, journal = {Comput. Electr. Eng.}, volume = {97}, pages = {107621}, year = {2022}, url = {https://doi.org/10.1016/j.compeleceng.2021.107621}, doi = {10.1016/J.COMPELECENG.2021.107621}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/CanaveseRBCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/PedoneL22, author = {Ignazio Pedone and Antonio Lioy}, title = {Quantum Key Distribution in Kubernetes Clusters}, journal = {Future Internet}, volume = {14}, number = {6}, pages = {160}, year = {2022}, url = {https://doi.org/10.3390/fi14060160}, doi = {10.3390/FI14060160}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/PedoneL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/SisinniMPLV22, author = {Silvia Sisinni and Davide Margaria and Ignazio Pedone and Antonio Lioy and Andrea Vesco}, title = {Integrity Verification of Distributed Nodes in Critical Infrastructures}, journal = {Sensors}, volume = {22}, number = {18}, pages = {6950}, year = {2022}, url = {https://doi.org/10.3390/s22186950}, doi = {10.3390/S22186950}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/SisinniMPLV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cesar/CompastieSGFJMS22, author = {Maxime Compasti{\'{e}} and Silvia Sisinni and Supreshna Gurung and Carolina Fern{\'{a}}ndez and Ludovic Jacquin and Izidor Mlakar and Valentino Safran and Antonio Lioy and Ignazio Pedone}, editor = {Gurvan le Guernic}, title = {{PALANTIR:} Zero-Trust Architecture for Managed Security Service Provider}, booktitle = {Proceedings of the 29th Computer {\&} Electronics Security Application Rendezvous co-located with the 7th European Cyber Week {(ECW} 2022), Rennes, France, November 15-16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3329}, pages = {83--98}, publisher = {CEUR-WS.org}, year = {2022}, url = {http://ceur-ws.org/Vol-3329/paper-05.pdf}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cesar/CompastieSGFJMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersec4europe/CanaveseRL22, author = {Daniele Canavese and Leonardo Regano and Antonio Lioy}, editor = {Antonio F. Skarmeta and Daniele Canavese and Antonio Lioy and Sara Nieves Matheu}, title = {Computer-Aided Reverse Engineering of Protected Software}, booktitle = {Digital Sovereignty in Cyber Security: New Challenges in Future Vision - First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17-21, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1807}, pages = {3--15}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36096-1\_1}, doi = {10.1007/978-3-031-36096-1\_1}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersec4europe/CanaveseRL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/LioyPS22, author = {Antonio Lioy and Ignazio Pedone and Silvia Sisinni}, title = {{(POSTER)} Using MACsec to protect a Network Functions Virtualisation infrastructure}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2022, Rhodes, Greece, June 30 - July 3, 2022}, pages = {1--3}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISCC55528.2022.9912955}, doi = {10.1109/ISCC55528.2022.9912955}, timestamp = {Tue, 25 Oct 2022 21:20:50 +0200}, biburl = {https://dblp.org/rec/conf/iscc/LioyPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/meditcom/FernandezSKSCPM22, author = {Carolina Fern{\'{a}}ndez and Davide Sanvito and Orestis Kompougias and Valentino Safran and Maxime Compasti{\'{e}} and Ignazio Pedone and Antonio L{\'{o}}pez Mart{\'{\i}}nez and Manuel Gil P{\'{e}}rez and Akis Kourtis and George Xylouris and Izidor Mlakar and Stylianos Tsarsitalidis and Dimitrios Klonidis and Daniele Canavese and Vangelis Logothetis and Diego R. L{\'{o}}pez and Antonio Pastor and Antonio Lioy and Ludovic Jacquin and Supreshna Gurung and Roberto Bifulco and Athanasios Priovolos and Ilias Balampanis and Theodoros Rokkas and Nikolaos Papadakis and Dimitris Paraschos and Primoz Jeran and George Athanasiou and Dimitris Papadopoulos}, title = {{PALANTIR} demo: leveraging SecaaS model for managing threats in industrial environments}, booktitle = {{IEEE} International Mediterranean Conference on Communications and Networking, MeditCom 2022, Athens, Greece, September 5-8, 2022}, pages = {82--85}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/MeditCom55741.2022.9928648}, doi = {10.1109/MEDITCOM55741.2022.9928648}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/meditcom/FernandezSKSCPM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/BasileCRPL22, author = {Cataldo Basile and Daniele Canavese and Leonardo Regano and Ignazio Pedone and Antonio Lioy}, editor = {Alexander Clemm and Guido Maier and Carmen Mas Machuca and K. K. Ramakrishnan and Fulvio Risso and Prosper Chemouil and Noura Limam}, title = {A model of capabilities of Network Security Functions}, booktitle = {8th {IEEE} International Conference on Network Softwarization, NetSoft 2022, Milan, Italy, June 27 - July 1, 2022}, pages = {474--479}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/NetSoft54395.2022.9844057}, doi = {10.1109/NETSOFT54395.2022.9844057}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/BasileCRPL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/PedoneACL21, author = {Ignazio Pedone and Andrea S. Atzeni and Daniele Canavese and Antonio Lioy}, title = {Toward a Complete Software Stack to Integrate Quantum Key Distribution in a Cloud Environment}, journal = {{IEEE} Access}, volume = {9}, pages = {115270--115291}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3102313}, doi = {10.1109/ACCESS.2021.3102313}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/PedoneACL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BerbecaruLC21, author = {Diana Berbecaru and Antonio Lioy and Cesare Cameroni}, title = {On Enabling Additional Natural Person and Domain-Specific Attributes in the eIDAS Network}, journal = {{IEEE} Access}, volume = {9}, pages = {134096--134121}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3115853}, doi = {10.1109/ACCESS.2021.3115853}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BerbecaruLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/Masip-BruinMRJT21, author = {Xavi Masip{-}Bruin and Eva Mar{\'{\i}}n{-}Tordera and Jos{\'{e}} Ruiz and Admela Jukan and Panagiotis Trakadas and Ales Cernivec and Antonio Lioy and Diego R. L{\'{o}}pez and Henrique Santos and Antonis Gonos and Ana Silva and Jos{\'{e}} Soriano and Grigorios Kalogiannis}, title = {Cybersecurity in {ICT} Supply Chains: Key Challenges and a Relevant Architecture}, journal = {Sensors}, volume = {21}, number = {18}, pages = {6057}, year = {2021}, url = {https://doi.org/10.3390/s21186057}, doi = {10.3390/S21186057}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/Masip-BruinMRJT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/BerbecaruL21, author = {Diana Gratiela Berbecaru and Antonio Lioy}, editor = {David Camacho and Domenico Rosaci and Giuseppe M. L. Sarn{\'{e}} and Mario Versaci}, title = {Attack Strategies and Countermeasures in Transport-Based Time Synchronization Solutions}, booktitle = {Intelligent Distributed Computing XIV, 14th International Symposium on Intelligent Distributed Computing, {IDC} 2021, Virtual Event, 16-18 September 2021}, series = {Studies in Computational Intelligence}, volume = {1026}, pages = {203--213}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-96627-0\_19}, doi = {10.1007/978-3-030-96627-0\_19}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idc/BerbecaruL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/meditcom/MantasPFOCMPKXM21, author = {Evangelos Mantas and Dimitris Papadopoulos and Carolina Fern{\'{a}}ndez and Nil Ortiz and Maxime Compasti{\'{e}} and Antonio L{\'{o}}pez Mart{\'{\i}}nez and Manuel Gil P{\'{e}}rez and Akis Kourtis and George Xylouris and Izidor Mlakar and Stylianos Tsarsitalidis and Dimitrios Klonidis and Ignazio Pedone and Daniele Canavese and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Davide Sanvito and Vangelis Logothetis and Diego R. L{\'{o}}pez and Antonio Pastor and Antonio Lioy and Ludovic Jacquin and Roberto Bifulco and Angeliki Kapodistria and Athanasios Priovolos and Georgios Gardikis and Ioannis Neokosmidis and Theodoros Rokkas and Nikolaos Papadakis and Dimitris Paraschos and Primoz Jeran and Antonis Litke and George Athanasiou}, title = {Practical Autonomous Cyberhealth for resilient Micro, Small and Medium-sized Enterprises}, booktitle = {{IEEE} International Mediterranean Conference on Communications and Networking, MeditCom 2021, Athens, Greece, September 7-10, 2021}, pages = {500--505}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/MeditCom49071.2021.9647609}, doi = {10.1109/MEDITCOM49071.2021.9647609}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/meditcom/MantasPFOCMPKXM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BerbecaruLC20, author = {Diana Berbecaru and Antonio Lioy and Cesare Cameroni}, title = {Providing Login and Wi-Fi Access Services With the eIDAS Network: {A} Practical Approach}, journal = {{IEEE} Access}, volume = {8}, pages = {126186--126200}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3007998}, doi = {10.1109/ACCESS.2020.3007998}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BerbecaruLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/PastorMVCLRCL20, author = {Antonio Pastor and Alberto Mozo and Stanislav Vakaruk and Daniele Canavese and Diego R. L{\'{o}}pez and Leonardo Regano and Sandra G{\'{o}}mez Canaval and Antonio Lioy}, title = {Detection of Encrypted Cryptomining Malware Connections With Machine and Deep Learning}, journal = {{IEEE} Access}, volume = {8}, pages = {158036--158055}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3019658}, doi = {10.1109/ACCESS.2020.3019658}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/PastorMVCLRCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/BenedictisLS20, author = {Marco de Benedictis and Antonio Lioy and Paolo Smiraglia}, title = {Towards a secure and lightweight network function virtualisation environment}, journal = {Int. J. Grid Util. Comput.}, volume = {11}, number = {2}, pages = {243--252}, year = {2020}, url = {https://doi.org/10.1504/IJGUC.2020.105539}, doi = {10.1504/IJGUC.2020.105539}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/BenedictisLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BerbecaruLC20, author = {Diana Berbecaru and Antonio Lioy and Cesare Cameroni}, title = {Supporting Authorize-then-Authenticate for Wi-Fi access based on an electronic identity infrastructure}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {2}, pages = {34--54}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.06.30.034}, doi = {10.22667/JOWUA.2020.06.30.034}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BerbecaruLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/BenedictisL19, author = {Marco de Benedictis and Antonio Lioy}, title = {Integrity verification of Docker containers for a lightweight cloud environment}, journal = {Future Gener. Comput. Syst.}, volume = {97}, pages = {236--246}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.02.026}, doi = {10.1016/J.FUTURE.2019.02.026}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/BenedictisL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/BerbecaruLC19, author = {Diana Berbecaru and Antonio Lioy and Cesare Cameroni}, title = {Electronic Identification for Universities: Building Cross-Border Services Based on the eIDAS Infrastructure}, journal = {Inf.}, volume = {10}, number = {6}, pages = {210}, year = {2019}, url = {https://doi.org/10.3390/info10060210}, doi = {10.3390/INFO10060210}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/BerbecaruLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PedoneLV19, author = {Ignazio Pedone and Antonio Lioy and Fulvio Valenza}, title = {Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2425983:1--2425983:11}, year = {2019}, url = {https://doi.org/10.1155/2019/2425983}, doi = {10.1155/2019/2425983}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PedoneLV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/BerbecaruLC19, author = {Diana Berbecaru and Antonio Lioy and Cesare Cameroni}, title = {Providing digital identity and academic attributes through European eID infrastructures: Results achieved, limitations, and future steps}, journal = {Softw. Pract. Exp.}, volume = {49}, number = {11}, pages = {1643--1662}, year = {2019}, url = {https://doi.org/10.1002/spe.2738}, doi = {10.1002/SPE.2738}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/BerbecaruLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/BasileVLLP19, author = {Cataldo Basile and Fulvio Valenza and Antonio Lioy and Diego R. L{\'{o}}pez and Antonio Pastor Perales}, title = {Adding Support for Automatic Enforcement of Security Policies in {NFV} Networks}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {27}, number = {2}, pages = {707--720}, year = {2019}, url = {https://doi.org/10.1109/TNET.2019.2895278}, doi = {10.1109/TNET.2019.2895278}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/BasileVLLP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/BerbecaruLC19, author = {Diana Berbecaru and Antonio Lioy and Cesare Cameroni}, editor = {Igor V. Kotenko and Costin Badica and Vasily Desnitsky and Didier El Baz and Mirjana Ivanovic}, title = {Authorize-then-Authenticate: Supporting Authorization Decisions Prior to Authentication in an Electronic Identity Infrastructure}, booktitle = {Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, {IDC} 2019, St. Petersburg, Russia, 7-9 October, 2019}, series = {Studies in Computational Intelligence}, volume = {868}, pages = {313--322}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32258-8\_37}, doi = {10.1007/978-3-030-32258-8\_37}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idc/BerbecaruLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/BenedictisL19, author = {Marco de Benedictis and Antonio Lioy}, editor = {Christian Jacquenet and Filip De Turck and Prosper Chemouil and Flavio Esposito and Olivier Festor and Walter Cerroni and Stefano Secci}, title = {A proposal for trust monitoring in a Network Functions Virtualisation Infrastructure}, booktitle = {5th {IEEE} Conference on Network Softwarization, NetSoft 2019, Paris, France, June 24-28, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/NETSOFT.2019.8806655}, doi = {10.1109/NETSOFT.2019.8806655}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/netsoft/BenedictisL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-06641, author = {Diana Berbecaru and Antonio Lioy}, title = {Towards Simplifying {PKI} Implementation: Client-Server based Validation of Public Key Certificates}, journal = {CoRR}, volume = {abs/1910.06641}, year = {2019}, url = {http://arxiv.org/abs/1910.06641}, eprinttype = {arXiv}, eprint = {1910.06641}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-06641.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-07930, author = {Diana Berbecaru and Antonio Lioy}, title = {Preliminary steps in designing and implementing a privilege verifier for {PMI}}, journal = {CoRR}, volume = {abs/1910.07930}, year = {2019}, url = {http://arxiv.org/abs/1910.07930}, eprinttype = {arXiv}, eprint = {1910.07930}, timestamp = {Tue, 22 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-07930.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-07945, author = {Diana Berbecaru and Antonio Lioy and Marius Marian}, title = {A Framework for Secure Digital Administration}, journal = {CoRR}, volume = {abs/1910.07945}, year = {2019}, url = {http://arxiv.org/abs/1910.07945}, eprinttype = {arXiv}, eprint = {1910.07945}, timestamp = {Tue, 22 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-07945.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-09027, author = {Diana Berbecaru and Antonio Lioy and Marius Marian and Diana Marano}, title = {Secure Digital Administration in Medical Environment}, journal = {CoRR}, volume = {abs/1910.09027}, year = {2019}, url = {http://arxiv.org/abs/1910.09027}, eprinttype = {arXiv}, eprint = {1910.09027}, timestamp = {Tue, 22 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-09027.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ValenzaL18, author = {Fulvio Valenza and Antonio Lioy}, title = {User-oriented Network Security Policy Specification}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {2}, pages = {33--47}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.05.31.033}, doi = {10.22667/JISIS.2018.05.31.033}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ValenzaL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ViticchieBVL18, author = {Alessio Viticchi{\'{e}} and Cataldo Basile and Fulvio Valenza and Antonio Lioy}, title = {On the impossibility of effectively using likely-invariants for software attestation purposes}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {2}, pages = {1--25}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.06.30.001}, doi = {10.22667/JOWUA.2018.06.30.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ViticchieBVL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/BenedictisLS18, author = {Marco de Benedictis and Antonio Lioy and Paolo Smiraglia}, title = {Container-based design of a Virtual Network Security Function}, booktitle = {4th {IEEE} Conference on Network Softwarization and Workshops, NetSoft 2018, Montreal, QC, Canada, June 25-29, 2018}, pages = {55--63}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NETSOFT.2018.8459903}, doi = {10.1109/NETSOFT.2018.8459903}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/netsoft/BenedictisLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/BasileCPLV17, author = {Cataldo Basile and Daniele Canavese and Christian Pitscheider and Antonio Lioy and Fulvio Valenza}, title = {Assessing network authorization policies via reachability analysis}, journal = {Comput. Electr. Eng.}, volume = {64}, pages = {110--131}, year = {2017}, url = {https://doi.org/10.1016/j.compeleceng.2017.02.019}, doi = {10.1016/J.COMPELECENG.2017.02.019}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/BasileCPLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ValenzaSSLSV17, author = {Fulvio Valenza and Tao Su and Serena Spinoso and Antonio Lioy and Riccardo Sisto and Marco Vallini}, title = {A formal approach for network security policy validation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {1}, pages = {79--100}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.03.31.079}, doi = {10.22667/JOWUA.2017.03.31.079}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ValenzaSSLSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/ValenzaBCL17, author = {Fulvio Valenza and Cataldo Basile and Daniele Canavese and Antonio Lioy}, title = {Classification and Analysis of Communication Protection Policy Anomalies}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {25}, number = {5}, pages = {2601--2614}, year = {2017}, url = {https://doi.org/10.1109/TNET.2017.2708096}, doi = {10.1109/TNET.2017.2708096}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/ValenzaBCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/ViticchieBL17, author = {Alessio Viticchi{\'{e}} and Cataldo Basile and Antonio Lioy}, editor = {Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Jean{-}Louis Lanet and Axel Legay and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Remotely Assessing Integrity of Software Applications by Monitoring Invariants: Present Limitations and Future Directions}, booktitle = {Risks and Security of Internet and Systems - 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10694}, pages = {66--82}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-76687-4\_5}, doi = {10.1007/978-3-319-76687-4\_5}, timestamp = {Fri, 27 Dec 2019 21:24:12 +0100}, biburl = {https://dblp.org/rec/conf/crisis/ViticchieBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edemocracy/SmiragliaBALP17, author = {Paolo Smiraglia and Marco de Benedictis and Andrea S. Atzeni and Antonio Lioy and Massimiliano Pucciarelli}, editor = {Sokratis K. Katsikas and Vasilios Zorkadis}, title = {The {FICEP} Infrastructure - How We Deployed the Italian eIDAS Node in the Cloud}, booktitle = {E-Democracy - Privacy-Preserving, Secure, Intelligent E-Government Services - 7th International Conference, E-Democracy 2017, Athens, Greece, December 14-15, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {792}, pages = {196--210}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71117-1\_14}, doi = {10.1007/978-3-319-71117-1\_14}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edemocracy/SmiragliaBALP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/GardikisTTBCLGF17, author = {Georgios Gardikis and K. Tzoulas and K. Tripolitis and A. Bartzas and Socrates Costicoglou and Antonio Lioy and Bernat Gast{\'{o}}n and Carolina Fernandez and Cristian D{\'{a}}vila and Antonios Litke and Nikolaos Papadakis and Dimitris Papadopoulos and Antonio Pastor and Jer{\'{o}}nimo N{\'{u}}{\~{n}}ez and Ludovic Jacquin and Hamza Attak and N. Davri and George Xylouris and M. Kafetzakis and Dimitris Katsianis and Ioannis Neokosmidis and M. Terranova and C. Giustozzi and T. Batista and R. Preto and Eleni Trouva and Y. Angelopoulos and Akis Kourtis}, title = {{SHIELD:} {A} novel NFV-based cybersecurity framework}, booktitle = {2017 {IEEE} Conference on Network Softwarization, NetSoft 2017, Bologna, Italy, July 3-7, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/NETSOFT.2017.8004228}, doi = {10.1109/NETSOFT.2017.8004228}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/GardikisTTBCLGF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nfvsdn/LioyGGJBAX17, author = {Antonio Lioy and Georgios Gardikis and Bernat Gast{\'{o}}n and Ludovic Jacquin and Marco de Benedictis and Y. Angelopoulos and C. Xylouris}, title = {NFV-based network protection: The {SHIELD} approach}, booktitle = {2017 {IEEE} Conference on Network Function Virtualization and Software Defined Networks, {NFV-SDN} 2017, Berlin, Germany, November 6-8, 2017}, pages = {1--2}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/NFV-SDN.2017.8169869}, doi = {10.1109/NFV-SDN.2017.8169869}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nfvsdn/LioyGGJBAX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nfvsdn/BenedictisL17, author = {Marco de Benedictis and Antonio Lioy}, title = {On the establishment of trust in the cloud-based {ETSI} {NFV} framework}, booktitle = {2017 {IEEE} Conference on Network Function Virtualization and Software Defined Networks, {NFV-SDN} 2017, Berlin, Germany, November 6-8, 2017}, pages = {280--285}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/NFV-SDN.2017.8169864}, doi = {10.1109/NFV-SDN.2017.8169864}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nfvsdn/BenedictisL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/ReganoCBL17, author = {Leonardo Regano and Daniele Canavese and Cataldo Basile and Antonio Lioy}, title = {Towards Optimally Hiding Protected Assets in Software Applications}, booktitle = {2017 {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2017, Prague, Czech Republic, July 25-29, 2017}, pages = {374--385}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/QRS.2017.47}, doi = {10.1109/QRS.2017.47}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/qrs/ReganoCBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ccn/LioySSALP17, author = {Antonio Lioy and Tao Su and Adrian L. Shaw and Hamza Attak and Diego R. L{\'{o}}pez and Antonio Pastor}, editor = {Shao Ying Zhu and Sandra Scott{-}Hayward and Ludovic Jacquin and Richard Hill}, title = {Trust in {SDN/NFV} Environments}, booktitle = {Guide to Security in {SDN} and {NFV} - Challenges, Opportunities, and Applications}, series = {Computer Communications and Networks}, pages = {103--124}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64653-4\_4}, doi = {10.1007/978-3-319-64653-4\_4}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ccn/LioySSALP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ccn/AttakMDDFGGJLLPPNT17, author = {Hamza Attak and Marco Casassa Mont and Cristian D{\'{a}}vila and Eleni{-}Constantina Davri and Carolina Fernandez and Georgios Gardikis and Bernat Gast{\'{o}}n and Ludovic Jacquin and Antonio Lioy and Antonis Litke and Nikolaos K. Papadakis and Dimitris Papadopoulos and Jer{\'{o}}nimo N{\'{u}}{\~{n}}ez and Eleni Trouva}, editor = {Shao Ying Zhu and Sandra Scott{-}Hayward and Ludovic Jacquin and Richard Hill}, title = {{SHIELD:} Securing Against Intruders and Other Threats Through an NFV-Enabled Environment}, booktitle = {Guide to Security in {SDN} and {NFV} - Challenges, Opportunities, and Applications}, series = {Computer Communications and Networks}, pages = {197--225}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64653-4\_8}, doi = {10.1007/978-3-319-64653-4\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ccn/AttakMDDFGGJLLPPNT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-02175, author = {Fulvio Valenza and Cataldo Basile and Daniele Canavese and Antonio Lioy}, title = {Classification and Analysis of Communication Protection Policy Anomalies}, journal = {CoRR}, volume = {abs/1708.02175}, year = {2017}, url = {http://arxiv.org/abs/1708.02175}, eprinttype = {arXiv}, eprint = {1708.02175}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-02175.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BasileCLPV16, author = {Cataldo Basile and Daniele Canavese and Antonio Lioy and Christian Pitscheider and Fulvio Valenza}, title = {Inter-function anomaly analysis for correct {SDN/NFV} deployment}, journal = {Int. J. Netw. Manag.}, volume = {26}, number = {1}, pages = {25--43}, year = {2016}, url = {https://doi.org/10.1002/nem.1917}, doi = {10.1002/NEM.1917}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BasileCLPV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ValenzaVL16, author = {Fulvio Valenza and Marco Vallini and Antonio Lioy}, editor = {Ilsun You and Elisa Bertino}, title = {Online and Offline Security Policy Assessment}, booktitle = {Proceedings of the 8th {ACM} {CCS} International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {101--104}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2995970}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ValenzaVL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/BerbecaruL16, author = {Diana Berbecaru and Antonio Lioy}, title = {On the design, implementation and integration of an Attribute Provider in the Pan-European eID infrastructure}, booktitle = {{IEEE} Symposium on Computers and Communication, {ISCC} 2016, Messina, Italy, June 27-30, 2016}, pages = {1263--1269}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ISCC.2016.7543910}, doi = {10.1109/ISCC.2016.7543910}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/BerbecaruL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/BerbecaruL16, author = {Diana Berbecaru and Antonio Lioy}, title = {Efficient Attribute Management in a Federated Identity Management Infrastructure}, booktitle = {24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, {PDP} 2016, Heraklion, Crete, Greece, February 17-19, 2016}, pages = {590--595}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/PDP.2016.102}, doi = {10.1109/PDP.2016.102}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/BerbecaruL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ReganoCBVL16, author = {Leonardo Regano and Daniele Canavese and Cataldo Basile and Alessio Viticchi{\'{e}} and Antonio Lioy}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Towards Automatic Risk Analysis and Mitigation of Software Applications}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {120--135}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_8}, doi = {10.1007/978-3-319-45931-8\_8}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ReganoCBVL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/MonteroYSJPSLRB15, author = {Diego Montero and Marcelo Yannuzzi and Adrian L. Shaw and Ludovic Jacquin and Antonio Pastor and Ren{\'{e}} Serral{-}Graci{\`{a}} and Antonio Lioy and Fulvio Risso and Cataldo Basile and Roberto Sassu and Mario Nemirovsky and Francesco Ciaccia and Michael Georgiades and Savvas Charalambides and Jarkko Kuusij{\"{a}}rvi and Francesca Bosco}, title = {Virtualized security at the network edge: a user-centric approach}, journal = {{IEEE} Commun. Mag.}, volume = {53}, number = {4}, pages = {176--186}, year = {2015}, url = {https://doi.org/10.1109/MCOM.2015.7081092}, doi = {10.1109/MCOM.2015.7081092}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/MonteroYSJPSLRB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/BerbecaruL15, author = {Diana Berbecaru and Antonio Lioy}, title = {Exploiting the European Union trusted service status list for certificate validation in {STORK:} design, implementation, and lessons learnt}, journal = {Softw. Pract. Exp.}, volume = {45}, number = {11}, pages = {1457--1477}, year = {2015}, url = {https://doi.org/10.1002/spe.2292}, doi = {10.1002/SPE.2292}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/BerbecaruL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/BasileL15, author = {Cataldo Basile and Antonio Lioy}, title = {Analysis of Application-Layer Filtering Policies With Application to {HTTP}}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {23}, number = {1}, pages = {28--41}, year = {2015}, url = {https://doi.org/10.1109/TNET.2013.2293625}, doi = {10.1109/TNET.2013.2293625}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/BasileL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cspf/JacquinLLSS15, author = {Ludovic Jacquin and Antonio Lioy and Diego R. L{\'{o}}pez and Adrian L. Shaw and Tao Su}, editor = {Frances Cleary and Massimo Felici}, title = {The Trust Problem in Modern Network Infrastructures}, booktitle = {Cyber Security and Privacy - 4th Cyber Security and Privacy Innovation Forum, {CSP} Innovation Forum 2015, Brussels, Belgium, April 28-29, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {530}, pages = {116--127}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25360-2\_10}, doi = {10.1007/978-3-319-25360-2\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cspf/JacquinLLSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/BasileLPVV15, author = {Cataldo Basile and Antonio Lioy and Christian Pitscheider and Fulvio Valenza and Marco Vallini}, title = {A novel approach for integrating security policy enforcement with dynamic network virtualization}, booktitle = {Proceedings of the 1st {IEEE} Conference on Network Softwarization, NetSoft 2015, London, United Kingdom, April 13-17, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/NETSOFT.2015.7116152}, doi = {10.1109/NETSOFT.2015.7116152}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/netsoft/BasileLPVV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/BonafigliaCLNRS15, author = {Roberto Bonafiglia and Francesco Ciaccia and Antonio Lioy and Mario Nemirovsky and Fulvio Risso and Tao Su}, title = {Offloading personal security applications to a secure and trusted network node}, booktitle = {Proceedings of the 1st {IEEE} Conference on Network Softwarization, NetSoft 2015, London, United Kingdom, April 13-17, 2015}, pages = {1--2}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/NETSOFT.2015.7116171}, doi = {10.1109/NETSOFT.2015.7116171}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/netsoft/BonafigliaCLNRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/BasileLPZ15, author = {Cataldo Basile and Antonio Lioy and Christian Pitscheider and Shilong Zhao}, editor = {Masoud Daneshtalab and Marco Aldinucci and Ville Lepp{\"{a}}nen and Johan Lilius and Mats Brorsson}, title = {A Formal Model of Policy Reconciliation}, booktitle = {23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, {PDP} 2015, Turku, Finland, March 4-6, 2015}, pages = {587--594}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/PDP.2015.42}, doi = {10.1109/PDP.2015.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/BasileLPZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtsi/ValenzaSBSL15, author = {Fulvio Valenza and Serena Spinoso and Cataldo Basile and Riccardo Sisto and Antonio Lioy}, title = {A formal model of network policy analysis}, booktitle = {1st {IEEE} International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, {RTSI} 2015, Torino, Italy, September 16-18, 2015}, pages = {516--522}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/RTSI.2015.7325150}, doi = {10.1109/RTSI.2015.7325150}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rtsi/ValenzaSBSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/BasileCLV14, author = {Cataldo Basile and Daniele Canavese and Antonio Lioy and Fulvio Valenza}, editor = {Javier L{\'{o}}pez and Indrajit Ray and Bruno Crispo}, title = {Inter-technology Conflict Analysis for Communication Protection Policies}, booktitle = {Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8924}, pages = {148--163}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17127-2\_10}, doi = {10.1007/978-3-319-17127-2\_10}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/BasileCLV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cspf/DaltonLLRS14, author = {Chris Dalton and Antonio Lioy and Diego R. L{\'{o}}pez and Fulvio Risso and Roberto Sassu}, editor = {Frances Cleary and Massimo Felici}, title = {Exploiting the Network for Securing Personal Devices}, booktitle = {Cyber Security and Privacy - Third Cyber Security and Privacy {EU} Forum, {CSP} Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {470}, pages = {16--27}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12574-9\_2}, doi = {10.1007/978-3-319-12574-9\_2}, timestamp = {Mon, 29 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cspf/DaltonLLRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SassuRL14, author = {Roberto Sassu and Gianluca Ramunno and Antonio Lioy}, title = {Practical Assessment of Biba Integrity for TCG-Enabled Platforms}, booktitle = {13th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014}, pages = {495--504}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/TrustCom.2014.63}, doi = {10.1109/TRUSTCOM.2014.63}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/SassuRL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/BerbecaruCL13, author = {Diana Berbecaru and Matteo Maria Casalino and Antonio Lioy}, title = {FcgiOCSP: a scalable OCSP-based certificate validation system exploiting the FastCGI interface}, journal = {Softw. Pract. Exp.}, volume = {43}, number = {12}, pages = {1489--1518}, year = {2013}, url = {https://doi.org/10.1002/spe.2148}, doi = {10.1002/SPE.2148}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/BerbecaruCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/CutilloL13, author = {Leucio Antonio Cutillo and Antonio Lioy}, title = {Privacy-by-design cloud computing through decentralization and real life trust}, booktitle = {13th {IEEE} International Conference on Peer-to-Peer Computing, {IEEE} {P2P} 2013, Trento, Italy, September 9-11, 2013, Proceedings}, pages = {1--2}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/P2P.2013.6688726}, doi = {10.1109/P2P.2013.6688726}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/p2p/CutilloL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/BasileCLP13, author = {Cataldo Basile and Daniele Canavese and Antonio Lioy and Christian Pitscheider}, title = {Improved Reachability Analysis for Security Management}, booktitle = {21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, {PDP} 2013, Belfast, United Kingdom, February 27 - March 1, 2013}, pages = {534--541}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PDP.2013.86}, doi = {10.1109/PDP.2013.86}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/BasileCLP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/CutilloL13, author = {Leucio Antonio Cutillo and Antonio Lioy}, editor = {Steven Furnell and Costas Lambrinoudakis and Javier L{\'{o}}pez}, title = {Towards Privacy-by-Design Peer-to-Peer Cloud Computing}, booktitle = {Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8058}, pages = {85--96}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40343-9\_8}, doi = {10.1007/978-3-642-40343-9\_8}, timestamp = {Mon, 03 Jan 2022 22:15:14 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/CutilloL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/BasileCL12, author = {Cataldo Basile and Alberto Cappadonia and Antonio Lioy}, title = {Network-Level Access Control Policy Analysis and Transformation}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {20}, number = {4}, pages = {985--998}, year = {2012}, url = {https://doi.org/10.1109/TNET.2011.2178431}, doi = {10.1109/TNET.2011.2178431}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/BasileCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/BasileLP12, author = {Cataldo Basile and Antonio Lioy and Stefano Paraboschi}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {The PoSecCo Security Decision Support System}, booktitle = {{ISSE} 2012 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2012 Conference, Brussels, Belgium, October 23-24, 2012}, pages = {64--74}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-658-00333-3\_7}, doi = {10.1007/978-3-658-00333-3\_7}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isse/BasileLP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mobisec/2011, editor = {Ramjee Prasad and K{\'{a}}roly Farkas and Andreas U. Schmidt and Antonio Lioy and Giovanni Russello and Flaminia L. Luccio}, title = {Security and Privacy in Mobile Information and Communication Systems - Third International {ICST} Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {94}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30244-2}, doi = {10.1007/978-3-642-30244-2}, isbn = {978-3-642-30243-5}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/software/CabidduCSVRL11, author = {Giovanni Cabiddu and Emanuele Cesena and Roberto Sassu and Davide Vernizzi and Gianluca Ramunno and Antonio Lioy}, title = {The Trusted Platform Agent}, journal = {{IEEE} Softw.}, volume = {28}, number = {2}, pages = {35--41}, year = {2011}, url = {https://doi.org/10.1109/MS.2010.160}, doi = {10.1109/MS.2010.160}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/software/CabidduCSVRL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CalandrielloPHL11, author = {Giorgio Calandriello and Panos Papadimitratos and Jean{-}Pierre Hubaux and Antonio Lioy}, title = {On the Performance of Secure Vehicular Communication Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {8}, number = {6}, pages = {898--912}, year = {2011}, url = {https://doi.org/10.1109/TDSC.2010.58}, doi = {10.1109/TDSC.2010.58}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CalandrielloPHL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/AimeLP11, author = {Marco Domenico Aime and Antonio Lioy and Paolo Carlo Pomi}, title = {Automatic (Re)Configuration of {IT} Systems for Dependability}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {4}, number = {2}, pages = {110--124}, year = {2011}, url = {https://doi.org/10.1109/TSC.2010.31}, doi = {10.1109/TSC.2010.31}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/AimeLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CesenaRSVL11, author = {Emanuele Cesena and Gianluca Ramunno and Roberto Sassu and Davide Vernizzi and Antonio Lioy}, editor = {Yan Chen and Shouhuai Xu and Ahmad{-}Reza Sadeghi and Xinwen Zhang}, title = {On scalability of remote attestation}, booktitle = {Proceedings of the sixth {ACM} workshop on Scalable trusted computing, STC@CCS 2011, Chicago, Illinois, USA, October 17, 2011}, pages = {25--30}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046582.2046588}, doi = {10.1145/2046582.2046588}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CesenaRSVL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/BerbecaruLA11, author = {Diana Berbecaru and Antonio Lioy and Marco Domenico Aime}, editor = {Steven Furnell and Costas Lambrinoudakis and G{\"{u}}nther Pernul}, title = {Exploiting Proxy-Based Federated Identity Management in Wireless Roaming Access}, booktitle = {Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6863}, pages = {13--23}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22890-2\_2}, doi = {10.1007/978-3-642-22890-2\_2}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/BerbecaruLA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/BerbecaruAL10, author = {Diana Berbecaru and Luca Albertalli and Antonio Lioy}, title = {The ForwardDiffSig Scheme for Multicast Authentication}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {18}, number = {6}, pages = {1855--1868}, year = {2010}, url = {https://doi.org/10.1109/TNET.2010.2052927}, doi = {10.1109/TNET.2010.2052927}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/BerbecaruAL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/BasileLV10, author = {Cataldo Basile and Antonio Lioy and Marco Vallini}, editor = {Marco Danelutto and Julien Bourgeois and Tom Gross}, title = {Towards a Network-Independent Policy Specification}, booktitle = {Proceedings of the 18th Euromicro Conference on Parallel, Distributed and Network-based Processing, {PDP} 2010, Pisa, Italy, February 17-19, 2010}, pages = {649--653}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/PDP.2010.45}, doi = {10.1109/PDP.2010.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/BasileLV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/icsec/LioyR10, author = {Antonio Lioy and Gianluca Ramunno}, editor = {Peter P. Stavroulakis and Mark Stamp}, title = {Trusted Computing}, booktitle = {Handbook of Information and Communication Security}, pages = {697--717}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-04117-4\_32}, doi = {10.1007/978-3-642-04117-4\_32}, timestamp = {Mon, 13 Mar 2023 20:54:16 +0100}, biburl = {https://dblp.org/rec/reference/icsec/LioyR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mobisec/2010, editor = {Andreas U. Schmidt and Giovanni Russello and Antonio Lioy and Neeli R. Prasad and Shiguo Lian}, title = {Security and Privacy in Mobile Information and Communication Systems - Second International {ICST} Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {47}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17502-2}, doi = {10.1007/978-3-642-17502-2}, isbn = {978-3-642-17501-5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/BerbecaruDL09, author = {Diana Berbecaru and Amarkumar Desai and Antonio Lioy}, title = {A unified and flexible solution for integrating {CRL} and {OCSP} into {PKI} applications}, journal = {Softw. Pract. Exp.}, volume = {39}, number = {10}, pages = {891--921}, year = {2009}, url = {https://doi.org/10.1002/spe.918}, doi = {10.1002/SPE.918}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/BerbecaruDL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis-spain/BasileLSV09, author = {Cataldo Basile and Antonio Lioy and Salvatore Scozzi and Marco Vallini}, editor = {{\'{A}}lvaro Herrero and Paolo Gastaldo and Rodolfo Zunino and Emilio Corchado}, title = {Ontology-Based Policy Translation}, booktitle = {Computational Intelligence in Security for Information Systems - CISIS'09, 2nd International Workshop, Burgos, Spain, 23-26 September 2009 Proceedings}, series = {Advances in Intelligent and Soft Computing}, volume = {63}, pages = {117--126}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04091-7\_15}, doi = {10.1007/978-3-642-04091-7\_15}, timestamp = {Fri, 12 Aug 2022 13:44:54 +0200}, biburl = {https://dblp.org/rec/conf/cisis-spain/BasileLSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GiambrunoSML09, author = {Alessandro Giambruno and Muhammad Awais Shibli and Sead Muftic and Antonio Lioy}, title = {MagicNET: {XACML} authorization policies for mobile agents}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402600}, doi = {10.1109/ICITST.2009.5402600}, timestamp = {Mon, 09 Aug 2021 17:01:45 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GiambrunoSML09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ShibliMGL09, author = {Muhammad Awais Shibli and Sead Muftic and Alessandro Giambruno and Antonio Lioy}, editor = {Yang Xiang and Javier L{\'{o}}pez and Haining Wang and Wanlei Zhou}, title = {MagicNET: Security System for Development, Validation and Adoption of Mobile Agents}, booktitle = {Third International Conference on Network and System Security, {NSS} 2009, Gold Coast, Queensland, Australia, October 19-21, 2009}, pages = {389--396}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NSS.2009.33}, doi = {10.1109/NSS.2009.33}, timestamp = {Thu, 15 Aug 2024 07:54:34 +0200}, biburl = {https://dblp.org/rec/conf/nss/ShibliMGL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis-spain/LioyRV08, author = {Antonio Lioy and Gianluca Ramunno and Davide Vernizzi}, editor = {Emilio Corchado and Rodolfo Zunino and Paolo Gastaldo and {\'{A}}lvaro Herrero}, title = {Trusted-Computing Technologies for the Protection of Critical Information Systems}, booktitle = {Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems, CISIS'08, Genova, Italy, October 23-24, 2008}, series = {Advances in Soft Computing}, volume = {53}, pages = {77--83}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88181-0\_10}, doi = {10.1007/978-3-540-88181-0\_10}, timestamp = {Fri, 12 Aug 2022 13:44:54 +0200}, biburl = {https://dblp.org/rec/conf/cisis-spain/LioyRV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/BasileCL08, author = {Cataldo Basile and Alberto Cappadonia and Antonio Lioy}, title = {Geometric Interpretation of Policy Specification}, booktitle = {9th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2008), 2-4 June 2008, Palisades, New York, {USA}}, pages = {78--81}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/POLICY.2008.36}, doi = {10.1109/POLICY.2008.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/BasileCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2008, editor = {Steven Furnell and Sokratis K. Katsikas and Antonio Lioy}, title = {Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5185}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85735-8}, doi = {10.1007/978-3-540-85735-8}, isbn = {978-3-540-85734-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0808-2666, author = {Panos Papadimitratos and Giorgio Calandriello and Jean{-}Pierre Hubaux and Antonio Lioy}, title = {Impact of Vehicular Communications Security on Transportation Safety}, journal = {CoRR}, volume = {abs/0808.2666}, year = {2008}, url = {http://arxiv.org/abs/0808.2666}, eprinttype = {arXiv}, eprint = {0808.2666}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0808-2666.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AimeCL07, author = {Marco Domenico Aime and Giorgio Calandriello and Antonio Lioy}, title = {Dependability in Wireless Networks: Can We Rely on WiFi?}, journal = {{IEEE} Secur. Priv.}, volume = {5}, number = {1}, pages = {23--29}, year = {2007}, url = {https://doi.org/10.1109/MSP.2007.4}, doi = {10.1109/MSP.2007.4}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/AimeCL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/BerbecaruL07, author = {Diana Berbecaru and Antonio Lioy}, editor = {Javier L{\'{o}}pez and Pierangela Samarati and Josep L. Ferrer}, title = {On the Robustness of Applications Based on the {SSL} and {TLS} Security Protocols}, booktitle = {Public Key Infrastructure, 4th European {PKI} Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4582}, pages = {248--264}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73408-6\_18}, doi = {10.1007/978-3-540-73408-6\_18}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/europki/BerbecaruL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/AtzeniL07, author = {Andrea S. Atzeni and Antonio Lioy}, editor = {Jorge Cardoso and Jos{\'{e}} Cordeiro and Joaquim Filipe}, title = {An Estimation of Attack Surface to Evaluate Network (in)security}, booktitle = {{ICEIS} 2007 - Proceedings of the Ninth International Conference on Enterprise Information Systems, Volume EIS, Funchal, Madeira, Portugal, June 12-16, 2007}, pages = {493--497}, year = {2007}, timestamp = {Thu, 03 Feb 2022 09:27:49 +0100}, biburl = {https://dblp.org/rec/conf/iceis/AtzeniL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/CalandrielloPHL07, author = {Giorgio Calandriello and Panos Papadimitratos and Jean{-}Pierre Hubaux and Antonio Lioy}, editor = {Wieland Holfelder and Paolo Santi and Yih{-}Chun Hu and Jean{-}Pierre Hubaux}, title = {Efficient and robust pseudonymous authentication in {VANET}}, booktitle = {Proceedings of the Fourth International Workshop on Vehicular Ad Hoc Networks, {VANET} 2007, Montr{\'{e}}al, Qu{\'{e}}bec, Canada, September 10, 2007}, pages = {19--28}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1287748.1287752}, doi = {10.1145/1287748.1287752}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/CalandrielloPHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/BasileLPCG07, author = {Cataldo Basile and Antonio Lioy and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and F{\'{e}}lix J. Garc{\'{\i}}a Clemente and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, title = {{POSITIF:} {A} Policy-Based Security Management System}, booktitle = {8th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2007), 13-15 June 2007, Bologna, Italy}, pages = {280}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/POLICY.2007.37}, doi = {10.1109/POLICY.2007.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/BasileLPCG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LioyMMP06, author = {Antonio Lioy and Marius Marian and Natalia Moltchanova and Massimiliano Pala}, title = {{PKI} past, present and future}, journal = {Int. J. Inf. Sec.}, volume = {5}, number = {1}, pages = {18--29}, year = {2006}, url = {https://doi.org/10.1007/s10207-005-0077-9}, doi = {10.1007/S10207-005-0077-9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/LioyMMP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/PalaL06, author = {Massimiliano Pala and Antonio Lioy}, editor = {Andrea S. Atzeni and Antonio Lioy}, title = {Fighting E-Mail Abuses: The {EMPE} Approach}, booktitle = {Public Key Infrastructure, Third European {PKI} Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4043}, pages = {130--144}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11774716\_11}, doi = {10.1007/11774716\_11}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/europki/PalaL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/AimeCL06, author = {Marco Domenico Aime and Giorgio Calandriello and Antonio Lioy}, editor = {Paolo Bellavista and Chi{-}Ming Chen and Antonio Corradi and Mahmoud Daneshmand}, title = {A Wireless Distributed Intrusion Detection System and a New Attack Model}, booktitle = {Proceedings of the 11th {IEEE} Symposium on Computers and Communications {(ISCC} 2006), 26-29 June 2006, Cagliari, Sardinia, Italy}, pages = {35--40}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ISCC.2006.22}, doi = {10.1109/ISCC.2006.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/AimeCL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/Lioy06, author = {Antonio Lioy}, editor = {Sachar Paulus and Norbert Pohlmann and Helmut Reimer}, title = {Security Analysis and Configuration of Large Networks}, booktitle = {{ISSE} 2006 - Securing Electronic Busines Processes, Highlights of the Information Security Solutions Europe 2006 Conference, 10-12 October 2006, Rome, Italy}, pages = {259--265}, publisher = {Vieweg}, year = {2006}, url = {https://doi.org/10.1007/978-3-8348-9195-2\_28}, doi = {10.1007/978-3-8348-9195-2\_28}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isse/Lioy06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/AtzeniL06, author = {Andrea S. Atzeni and Antonio Lioy}, editor = {Dieter Gollmann and Fabio Massacci and Artsiom Yautsiukhin}, title = {Why to adopt a security metric? {A} brief survey}, booktitle = {Quality of Protection - Security Measurements and Metrics}, series = {Advances in Information Security}, volume = {23}, pages = {1--12}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36584-8\_1}, doi = {10.1007/978-0-387-36584-8\_1}, timestamp = {Sun, 02 Oct 2022 16:18:05 +0200}, biburl = {https://dblp.org/rec/series/ais/AtzeniL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/europki/2006, editor = {Andrea S. Atzeni and Antonio Lioy}, title = {Public Key Infrastructure, Third European {PKI} Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4043}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11774716}, doi = {10.1007/11774716}, isbn = {3-540-35151-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/AimeLR05, author = {Marco Domenico Aime and Antonio Lioy and Gianluca Ramunno}, editor = {Jana Dittmann and Stefan Katzenbeisser and Andreas Uhl}, title = {Decentralised Access Control in 802.11 Networks}, booktitle = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11} International Conference, {CMS} 2005, Salzburg, Austria, September 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3677}, pages = {180--190}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552055\_18}, doi = {10.1007/11552055\_18}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cms/AimeLR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/LioyRAP05, author = {Antonio Lioy and Gianluca Ramunno and Marco Domenico Aime and Massimiliano Pala}, editor = {Jana Dittmann and Stefan Katzenbeisser and Andreas Uhl}, title = {Motivations for a Theoretical Approach to {WYSIWYS}}, booktitle = {Communications and Multimedia Security, 9th {IFIP} {TC-6} {TC-11} International Conference, {CMS} 2005, Salzburg, Austria, September 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3677}, pages = {289--290}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552055\_38}, doi = {10.1007/11552055\_38}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cms/LioyRAP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/AimeAL05, author = {Marco Domenico Aime and Andrea S. Atzeni and Antonio Lioy}, title = {The Wireless Opaque Channel to Contrast Information Leakage}, booktitle = {2005 International Conference on a World of Wireless, Mobile and Multimedia Networks {(WOWMOM} 2005), 13-16 June 2005, Taormina, Italy, Proceedings}, pages = {570--575}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/WOWMOM.2005.104}, doi = {10.1109/WOWMOM.2005.104}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/AimeAL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/AimeL05, author = {Marco Domenico Aime and Antonio Lioy}, title = {Incremental Trust: Building Trust from Past Experience}, booktitle = {2005 International Conference on a World of Wireless, Mobile and Multimedia Networks {(WOWMOM} 2005), 13-16 June 2005, Taormina, Italy, Proceedings}, pages = {603--608}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/WOWMOM.2005.54}, doi = {10.1109/WOWMOM.2005.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/AimeL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/egcdmas/LioyR04, author = {Antonio Lioy and Gianluca Ramunno}, editor = {Mohammad S. Obaidat and Noureddine Boudriga}, title = {Multiple electronic signatures on multiple documents}, booktitle = {Electronic Government and Commerce: Design, Modeling, Analysis and Security - Proceedings of the 1st International Workshop on Electronic Government and Commerce: Design, Modeling, Analysis and Security, {EGCDMAS} 2004, In conjunction with {ICETE} 2004, Set{\'{u}}bal, Portugal, August 2004}, pages = {24--34}, publisher = {{INSTICC} Press}, year = {2004}, timestamp = {Wed, 15 Dec 2004 14:13:59 +0100}, biburl = {https://dblp.org/rec/conf/egcdmas/LioyR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/LioyMMP04, author = {Antonio Lioy and Marius Marian and Natalia Moltchanova and Massimiliano Pala}, editor = {Sokratis K. Katsikas and Stefanos Gritzalis and Javier L{\'{o}}pez}, title = {The EuroPKI Experience}, booktitle = {Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3093}, pages = {14--27}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25980-0\_2}, doi = {10.1007/978-3-540-25980-0\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/europki/LioyMMP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iadis/BerbecaruL04, author = {Diana Berbecaru and Antonio Lioy}, editor = {Pedro T. Isa{\'{\i}}as and Nitya Karmakar and Lu{\'{\i}}s E. T. Rodrigues and Patr{\'{\i}}cia Barbosa}, title = {Preliminary Steps in Designing and Implementing a Privilege Verifier for {PMI}}, booktitle = {Proceedings of the {IADIS} International Conference WWW/Internet 2004, Madrid, Spain, 2 Volumes}, pages = {317--324}, publisher = {{IADIS}}, year = {2004}, timestamp = {Wed, 01 Apr 2015 20:06:19 +0200}, biburl = {https://dblp.org/rec/conf/iadis/BerbecaruL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cms/2003, editor = {Antonio Lioy and Daniele Mazzocchi}, title = {Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th {IFIP} {TC-6} {TC-11} International Conference, {CMS} 2003, Torino, Italy, October 2-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2828}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b13863}, doi = {10.1007/B13863}, isbn = {3-540-20185-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iadis/BerbecaruLMM02, author = {Diana Berbecaru and Antonio Lioy and Marius Marian and Diana Marano}, title = {Secure Digital Administration in Medical Environment}, booktitle = {Proceedings of the {IADIS} International Conference WWW/Internet 2002, {ICWI} 2002, Lisbon, Portugal, November 13-15, 2002}, pages = {299--306}, publisher = {{IADIS}}, year = {2002}, timestamp = {Tue, 30 Dec 2003 11:36:37 +0100}, biburl = {https://dblp.org/rec/conf/iadis/BerbecaruLMM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/BerbecaruLM02, author = {Diana Berbecaru and Antonio Lioy and Marius Marian}, title = {Security aspects in standard certificate revocation mechanisms: a case study for {OCSP}}, booktitle = {Proceedings of the Seventh {IEEE} Symposium on Computers and Communications {(ISCC} 2002), 1-4 July 2002, Taormina, Italy}, pages = {484--489}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ISCC.2002.1021719}, doi = {10.1109/ISCC.2002.1021719}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/BerbecaruLM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/BeniniMLMOP01, author = {Luca Benini and Giovanni De Micheli and Antonio Lioy and Enrico Macii and Giuseppe Odasso and Massimo Poncino}, title = {Synthesis of power-managed sequential components based oncomputational kernel extraction}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {20}, number = {9}, pages = {1118--1131}, year = {2001}, url = {https://doi.org/10.1109/43.945307}, doi = {10.1109/43.945307}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/BeniniMLMOP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icon/BaltatuLLM01, author = {Madalina Baltatu and Antonio Lioy and Dario Lombardo and Daniele Mazzocchi}, title = {Towards a policy system for IPsec: issues and an experimental implementation}, booktitle = {Proceedings 9th {IEEE} International Conference on Networks, {ICON} 2001, Bangkok, Thailand, October 10-11, 2001}, pages = {146--151}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/ICON.2001.962332}, doi = {10.1109/ICON.2001.962332}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icon/BaltatuLLM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BerbecaruLM01, author = {Diana Berbecaru and Antonio Lioy and Marius Marian}, editor = {George I. Davida and Yair Frankel}, title = {On the Complexity of Public-Key Certificate Validation}, booktitle = {Information Security, 4th International Conference, {ISC} 2001, Malaga, Spain, October 1-3, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2200}, pages = {183--203}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45439-X\_13}, doi = {10.1007/3-540-45439-X\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/BerbecaruLM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BaltatuLMM00, author = {Madalina Baltatu and Antonio Lioy and Fabio Maino and Daniele Mazzocchi}, title = {Security issues in control, management and routing protocols}, journal = {Comput. Networks}, volume = {34}, number = {6}, pages = {881--894}, year = {2000}, url = {https://doi.org/10.1016/S1389-1286(00)00159-6}, doi = {10.1016/S1389-1286(00)00159-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BaltatuLMM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icon/BaltatuLM00, author = {Madalina Baltatu and Antonio Lioy and Daniele Mazzocchi}, title = {Security policy system: status and perspective}, booktitle = {Proceedings of the {IEEE} International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, {ICON} 2000, Singapore, September 5-8, 2000}, pages = {278--284}, publisher = {{IEEE}}, year = {2000}, url = {https://doi.org/10.1109/ICON.2000.875802}, doi = {10.1109/ICON.2000.875802}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icon/BaltatuLM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/CorradiMSBLM00, author = {Antonio Corradi and Rebecca Montanari and Cesare Stefanelli and Diana Berbecaru and Antonio Lioy and Fabio Maino}, editor = {Sihan Qing and Jan H. P. Eloff}, title = {A Flexible Management Framework for Certificate Status Validation}, booktitle = {Information Security for Global Information Infrastructures, {IFIP} {TC11} Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China}, series = {{IFIP} Conference Proceedings}, volume = {175}, pages = {481--490}, publisher = {Kluwer}, year = {2000}, timestamp = {Fri, 26 Jul 2002 13:04:43 +0200}, biburl = {https://dblp.org/rec/conf/sec/CorradiMSBLM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/BeniniMLMOP99, author = {Luca Benini and Giovanni De Micheli and Antonio Lioy and Enrico Macii and Giuseppe Odasso and Massimo Poncino}, title = {Automatic Synthesis of Large Telescopic Units Based on Near-Minimum Timed Supersetting}, journal = {{IEEE} Trans. Computers}, volume = {48}, number = {8}, pages = {769--779}, year = {1999}, url = {https://doi.org/10.1109/12.795120}, doi = {10.1109/12.795120}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/BeniniMLMOP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/CostinescuDLM99, author = {Bogdan Costinescu and Dan Dragomirescu and Antonio Lioy and Cristian Marinescu}, editor = {Hamid R. Arabnia}, title = {A Component-based Infrastructure for Building Cluster Management and Monitoring Tools}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} 1999, June 28 - July 1, 1999, Las Vegas, Nevada, {USA}}, pages = {2041--2047}, publisher = {{CSREA} Press}, year = {1999}, timestamp = {Tue, 30 Jul 2024 10:34:32 +0200}, biburl = {https://dblp.org/rec/conf/pdpta/CostinescuDLM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/BeniniMLMOP98, author = {Luca Benini and Giovanni De Micheli and Antonio Lioy and Enrico Macii and Giuseppe Odasso and Massimo Poncino}, editor = {Basant R. Chawla and Randal E. Bryant and Jan M. Rabaey}, title = {Computational Kernels and their Application to Sequential Power Optimization}, booktitle = {Proceedings of the 35th Conference on Design Automation, Moscone center, San Francico, California, USA, June 15-19, 1998}, pages = {764--769}, publisher = {{ACM} Press}, year = {1998}, url = {https://doi.org/10.1145/277044.277237}, doi = {10.1145/277044.277237}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dac/BeniniMLMOP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/BeniniMLMOP98, author = {Luca Benini and Giovanni De Micheli and Antonio Lioy and Enrico Macii and Giuseppe Odasso and Massimo Poncino}, title = {Timed Supersetting and the Synthesis of Telescopic Units}, booktitle = {8th Great Lakes Symposium on {VLSI} {(GLS-VLSI} '98), 19-21 February 1998, Lafayette, LA, {USA}}, pages = {331--337}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/GLSV.1998.665289}, doi = {10.1109/GLSV.1998.665289}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/glvlsi/BeniniMLMOP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/charme/CabodiCLPQ97, author = {Gianpiero Cabodi and Paolo Camurati and Antonio Lioy and Massimo Poncino and Stefano Quer}, editor = {Hon Fung Li and David K. Probst}, title = {A parallel approach to symbolic traversal based on set partitioning}, booktitle = {Advances in Hardware Design and Verification, {IFIP} {WG} 10.5 International Conference on Correct Hardware Design and Verification Methods, 16-18 October 1997, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, series = {{IFIP} Conference Proceedings}, volume = {105}, pages = {167--184}, publisher = {Chapman {\&} Hall}, year = {1997}, timestamp = {Thu, 18 Feb 2010 08:37:22 +0100}, biburl = {https://dblp.org/rec/conf/charme/CabodiCLPQ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/LioyMPR97, author = {Antonio Lioy and Enrico Macii and Massimo Poncino and Massimo Rossello}, title = {Accurate Entropy Calculation for Large Logic Circuits Based on Output Clustering}, booktitle = {7th Great Lakes Symposium on {VLSI} {(GLS-VLSI} '97), 13-15 March 1997, Urbana, IL, {USA}}, pages = {70}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/GLSV.1997.580413}, doi = {10.1109/GLSV.1997.580413}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/glvlsi/LioyMPR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LioyMM97, author = {Antonio Lioy and Fabio Maino and Marco Mezzalama}, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {Secure document management and distribution in an open network environment}, booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, pages = {109--117}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028467}, doi = {10.1007/BFB0028467}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/LioyMM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/GallianoLM97, author = {Daniel Alberto Galliano and Antonio Lioy and Fabio Maino}, editor = {Louise Yngstr{\"{o}}m and Jan Carlsen}, title = {Non-intrusive authentication}, booktitle = {Information Security in Research and Business, Proceedings of the {IFIP} {TC11} 13th International Conference on Information Security {(SEC} '97), 14-16 May 1997, Copenhagen, Denmark}, series = {{IFIP} Conference Proceedings}, volume = {92}, pages = {440--451}, publisher = {Chapman {\&} Hall}, year = {1997}, timestamp = {Thu, 03 Jan 2002 12:08:24 +0100}, biburl = {https://dblp.org/rec/conf/sec/GallianoLM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurodac/LavagnoLK94, author = {Luciano Lavagno and Antonio Lioy and Michael Kishinevsky}, editor = {Jean Mermet}, title = {Testing redundant asynchronous circuits by variable phase splitting}, booktitle = {Proceedings EURO-DAC'94, European Design Automation Conference, Grenoble, France, September 19-22, 1994}, pages = {328--333}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {http://dl.acm.org/citation.cfm?id=198278}, timestamp = {Wed, 29 Mar 2017 16:45:25 +0200}, biburl = {https://dblp.org/rec/conf/eurodac/LavagnoLK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/LioyP93, author = {Antonio Lioy and Massimo Poncino}, title = {A study of the resetability of synchronous sequential circuits}, journal = {Microprocess. Microprogramming}, volume = {38}, number = {1-5}, pages = {395--402}, year = {1993}, url = {https://doi.org/10.1016/0165-6074(93)90173-I}, doi = {10.1016/0165-6074(93)90173-I}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/LioyP93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Lioy93, author = {Antonio Lioy}, title = {On the Equivalence of Fanout-Point Faults}, journal = {{IEEE} Trans. Computers}, volume = {42}, number = {3}, pages = {268--271}, year = {1993}, url = {https://doi.org/10.1109/12.210169}, doi = {10.1109/12.210169}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/Lioy93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/LioyP93, author = {Antonio Lioy and Massimo Poncino}, title = {On the Resetability of Synchronous Sequential Circuits}, booktitle = {1993 {IEEE} International Symposium on Circuits and Systems, {ISCAS} 1993, Chicago, Illinois, USA, May 3-6, 1993}, pages = {1507--1510}, publisher = {{IEEE}}, year = {1993}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/LioyP93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dt/Lloy92, author = {Antonio Lioy}, title = {Advanced Fault Collapsing (Logic Circuits Testing)}, journal = {{IEEE} Des. Test Comput.}, volume = {9}, number = {1}, pages = {64--71}, year = {1992}, url = {https://doi.org/10.1109/54.124518}, doi = {10.1109/54.124518}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dt/Lloy92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/FarhatFL92, author = {Hassan A. Farhat and Steven G. From and Antonio Lioy}, title = {A quadratic programming approach to estimating the testability and coverage distributions of a {VLSI} circuit}, journal = {Microprocess. Microprogramming}, volume = {35}, number = {1-5}, pages = {479--483}, year = {1992}, url = {https://doi.org/10.1016/0165-6074(92)90357-D}, doi = {10.1016/0165-6074(92)90357-D}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/FarhatFL92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/LioyP91, author = {Antonio Lioy and Massimo Poncino}, title = {A hierarchical multi-level test generation system}, booktitle = {First Great Lakes Symposium on VLSI, 1991, Kalamazoo, MI, USA, March 1-2, 1991}, pages = {54--59}, publisher = {{IEEE}}, year = {1991}, url = {https://doi.org/10.1109/GLSV.1991.143942}, doi = {10.1109/GLSV.1991.143942}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/glvlsi/LioyP91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/LioyMMR91, author = {Antonio Lioy and Enrico Macii and Angelo Raffaele Meo and Matteo Sonza Reorda}, title = {An algebraic approach to test generation for sequential circuits}, booktitle = {First Great Lakes Symposium on VLSI, 1991, Kalamazoo, MI, USA, March 1-2, 1991}, pages = {115--120}, publisher = {{IEEE}}, year = {1991}, url = {https://doi.org/10.1109/GLSV.1991.143952}, doi = {10.1109/GLSV.1991.143952}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/LioyMMR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itc/Lioy91, author = {Antonio Lioy}, title = {Looking for Functional Fault Equivalence}, booktitle = {Proceedings {IEEE} International Test Conference 1991, Test: Faster, Better, Sooner, Nashville, TN, USA, October 26-30, 1991}, pages = {858--863}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/TEST.1991.519751}, doi = {10.1109/TEST.1991.519751}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/itc/Lioy91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spdp/CaliaL91, author = {E. Calia and Antonio Lioy}, title = {Test generation in a distributed environment}, booktitle = {Proceedings of the Third {IEEE} Symposium on Parallel and Distributed Processing, {SPDP} 1991, 2-5 December 1991, Dallas, Texas, {USA}}, pages = {700--707}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/SPDP.1991.218194}, doi = {10.1109/SPDP.1991.218194}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spdp/CaliaL91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/CamuratiLPR90, author = {Paolo Camurati and Antonio Lioy and Paolo Prinetto and Matteo Sonza Reorda}, title = {Assessing the diagnostic power of test pattern sets}, journal = {Microprocessing and Microprogramming}, volume = {30}, number = {1-5}, pages = {413--419}, year = {1990}, url = {https://doi.org/10.1016/0165-6074(90)90276-F}, doi = {10.1016/0165-6074(90)90276-F}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/CamuratiLPR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/LioyM90, author = {Antonio Lioy and Marco Mezzalama}, title = {Automatic compaction of microcode}, journal = {Microprocess. Microsystems}, volume = {14}, number = {1}, pages = {21--29}, year = {1990}, url = {https://doi.org/10.1016/0141-9331(90)90010-S}, doi = {10.1016/0141-9331(90)90010-S}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/LioyM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurodac/CamuratiLPR90, author = {Paolo Camurati and Antonio Lioy and Paolo Prinetto and Matteo Sonza Reorda}, editor = {Gordon Adshead and Jochen A. G. Jess}, title = {Diagnosis oriented test pattern generation}, booktitle = {European Design Automation Conference, {EURO-DAC} 1990, Glasgow, Scotland, UK, March 12-15, 1990}, pages = {470--474}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/EDAC.1990.136693}, doi = {10.1109/EDAC.1990.136693}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurodac/CamuratiLPR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/GaiL89, author = {S. Gai and Antonio Lioy}, title = {A multilevel hardware description language}, journal = {Microprocess. Microprogramming}, volume = {25}, number = {1-5}, pages = {183--187}, year = {1989}, url = {https://doi.org/10.1016/0165-6074(89)90193-2}, doi = {10.1016/0165-6074(89)90193-2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/GaiL89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/Lioy88, author = {Antonio Lioy}, title = {Adaptative backtrace and dynamic partitioning enhance {ATPG}}, booktitle = {Computer Design: {VLSI} in Computers and Processors, {ICCD} 1988., Proceedings of the 1988 {IEEE} International Conference on, Rye Brook, NY, USA, October 3-5, 1988}, pages = {62--65}, publisher = {{IEEE}}, year = {1988}, url = {https://doi.org/10.1109/ICCD.1988.25660}, doi = {10.1109/ICCD.1988.25660}, timestamp = {Mon, 18 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccd/Lioy88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iee-sej/LioyM84, author = {Antonio Lioy and Marco Mezzalama}, title = {A testability measure to improve algebraic test generation}, journal = {Softw. Microsystems}, volume = {3}, number = {2}, pages = {37--41}, year = {1984}, url = {https://doi.org/10.1049/sm.1984.0013}, doi = {10.1049/SM.1984.0013}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iee-sej/LioyM84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.