default search action
Chiara Braghin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c28]Chiara Braghin, Mario Lilli, Elvinia Riccobene, Marian Baba:
Kant: A Domain-Specific Language for Modeling Security Protocols. MODELSWARD 2024: 62-73 - [c27]Chiara Braghin, Elvinia Riccobene, Simone Valentini:
Modeling and verification of smart contracts with Abstract State Machines. SAC 2024: 1425-1432 - [c26]Chiara Braghin, Elvinia Riccobene, Simone Valentini:
An ASM-Based Approach for Security Assessment of Ethereum Smart Contracts. SECRYPT 2024: 334-344 - [c25]Simone Valentini, Chiara Braghin, Elvinia Riccobene:
A Modeling and Verification Framework for Ethereum Smart Contracts. ABZ 2024: 201-207 - 2023
- [j7]Chiara Braghin, Mario Lilli, Elvinia Riccobene:
A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study. Comput. Secur. 127: 103037 (2023) - 2022
- [c24]Marcello M. Bersani, Chiara Braghin, Angelo Gargantini, Raffaela Mirandola, Elvinia Riccobene, Patrizia Scandurra:
Engineering of Trust Analysis-Driven Digital Twins for a Medical Device. ECSA (Tracks and Workshops) 2022: 467-482 - [c23]Marcello M. Bersani, Chiara Braghin, Vittorio Cortellessa, Angelo Gargantini, Vincenzo Grassi, F. Lo Presti, Raffaela Mirandola, Alfonso Pierantonio, Elvinia Riccobene, Patrizia Scandurra:
Towards Trust-preserving Continuous Co-evolution of Digital Twins. ICSA Companion 2022: 96-99 - 2021
- [c22]Chiara Braghin, Mario Lilli, Elvinia Riccobene:
Towards ASM-Based Automated Formal Verification of Security Protocols. ABZ 2021: 17-33 - [c21]George Hatzivasilis, Sotiris Ioannidis, Michail Smyrlis, George Spanoudakis, Fulvio Frati, Chiara Braghin, Ernesto Damiani, Hristo Koshutanski, George Tsakirakis, Torsten Hildebrandt, Ludger Goeke, Sebastian Pape, Oleg Blinder, Michael Vinov, George Leftheriotis, Martin Kunc, Fotis Oikonomou, Giovanni Magilo, Vito Petrarolo, Antonio Chieti, Robert Bordianu:
The THREAT-ARREST Cyber Range Platform. CSR 2021: 422-427 - [c20]Marco Anisetti, Claudio Agostino Ardagna, Chiara Braghin, Ernesto Damiani, Antongiacomo Polimeno, Alessandro Balestrucci:
Dynamic and Scalable Enforcement of Access Control Policies for Big Data. MEDES 2021: 71-78 - [c19]Mario Lilli, Chiara Braghin, Elvinia Riccobene:
Formal Proof of a Vulnerability in Z-Wave IoT Protocol. SECRYPT 2021: 198-209 - 2020
- [c18]Chiara Braghin, Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Elvinia Riccobene, Sadegh Astaneh:
Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges. MSTEC 2020: 79-91
2010 – 2019
- 2019
- [c17]Chiara Braghin, Stelvio Cimato, Simone Raimondi Cominesi, Ernesto Damiani, Lara Mauri:
Towards Blockchain-Based E-Voting Systems. BIS (Workshops) 2019: 274-286 - [c16]Chiara Braghin, Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Lara Mauri, Elvinia Riccobene:
A Model Driven Approach for Cyber Security Scenarios Deployment. IOSec/MSTEC/FINSEC@ESORICS 2019: 107-122 - 2018
- [c15]Chiara Braghin, Stelvio Cimato, Alessio Della Libera:
Are mHealth Apps Secure? A Case Study. COMPSAC (2) 2018: 335-340 - 2017
- [c14]Chiara Braghin, Marilisa Del Vecchio:
Is Pokémon GO Watching You? A Survey on the Privacy-Awareness of Location-Based Apps' Users. COMPSAC (2) 2017: 164-169 - 2013
- [c13]Antonia Azzini, Chiara Braghin, Ernesto Damiani, Francesco Zavatarelli:
Using Semantic Lifting for improving Process Mining: a Data Loss Prevention System case study. SIMPDA 2013: 62-73 - [c12]Francesco Arigliano, Antonia Azzini, Chiara Braghin, Antonio Caforio, Paolo Ceravolo, Ernesto Damiani, Vincenzo Savarino, Claudia Vicari, Francesco Zavatarelli:
Knowledge and Business Intelligence Technologies in Cross-Enterprise Environments for Italian Advanced Mechanical Industry. SIMPDA 2013: 104-110 - 2012
- [j6]Paola Bonizzoni, Chiara Braghin, Riccardo Dondi, Gabriella Trucco:
The binary perfect phylogeny with persistent characters. Theor. Comput. Sci. 454: 51-63 (2012) - 2011
- [j5]Chiara Braghin, Natasha Sharygina, Katerina Barone-Adesi:
A model checking-based approach for security policy verification of mobile systems. Formal Aspects Comput. 23(5): 627-648 (2011) - [i1]Chiara Braghin, Riccardo Dondi, Gabriella Trucco, Paola Bonizzoni:
The Binary Perfect Phylogeny with Persistent characters. CoRR abs/1110.6739 (2011)
2000 – 2009
- 2008
- [j4]Chiara Braghin, Agostino Cortesi, Riccardo Focardi:
Information flow security in Boundary Ambients. Inf. Comput. 206(2-4): 460-489 (2008) - [c11]Roberto Aringhieri, Chiara Braghin, Daniele Catanzaro:
An Exact Approach for solving the Balanced Minimum Evolution Problem. CTW 2008: 48-51 - 2007
- [c10]Chiara Braghin, Natasha Sharygina, Katerina Barone-Adesi:
Automated Verification of Security Policies in Mobile Code. IFM 2007: 37-53 - 2006
- [j3]Chiara Braghin, Daniele Gorla, Vladimiro Sassone:
Role-based access control for a distributed calculus. J. Comput. Secur. 14(2): 113-155 (2006) - 2005
- [b1]Chiara Braghin:
Static analysis of security properties in mobile ambients. Ca' Foscari University of Venice, Italy, 2005 - 2004
- [j2]Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza:
Nesting analysis of mobile ambients. Comput. Lang. Syst. Struct. 30(3-4): 207-230 (2004) - [c9]Chiara Braghin, Daniele Gorla, Vladimiro Sassone:
A Distributed Calculus for Ro^le-Based Access Control. CSFW 2004: 48-60 - [c8]Chiara Braghin, Agostino Cortesi:
Flow-sensitive Leakage Analysis in Mobile Ambients. SecCo 2004: 17-25 - 2003
- [c7]Chiara Braghin, Agostino Cortesi, Stefano Filippone, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza:
BANANA - A Tool for Boundary Ambients Nesting ANAlysis. TACAS 2003: 437-441 - [c6]Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza:
Complexity of Nesting Analysis in Mobile Ambients. VMCAI 2003: 86-101 - [c5]Chiara Braghin, Agostino Cortesi, Riccardo Focardi:
Information Leakage Detection in Boundary Ambients. CATS 2003: 123-143 - [c4]Chiara Braghin, Carla Piazza:
Checking Integrity via CoPS and Banana: the E-Commerce Case Study . MEFISTO 2003: 295-317 - [c3]Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza:
Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients. MEFISTO 2003: 319-337 - 2002
- [j1]Chiara Braghin, Agostino Cortesi, Riccardo Focardi:
Security boundaries in mobile ambients. Comput. Lang. Syst. Struct. 28(1): 101-127 (2002) - [c2]Chiara Braghin, Agostino Cortesi, Riccardo Focardi:
Control Flow Analysis of Mobile Ambients with Security Boundaries. FMOODS 2002: 197-212 - [c1]Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Steffen van Bakel:
Boundary Inference for Enforcing Security Policies in Mobile Ambients. IFIP TCS 2002: 383-395
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 21:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint