Sfoglia per Autore
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations
2007-01-01 Squicciarini, A; Trombetta, Alberto; Bertino, E.
Privacy-aware role based access control
2007-01-01 Ni, Q; Trombetta, Alberto; Bertino, E; Lobo, J.
Private updates to anonymous databases
2008-01-01 Trombetta, Alberto; Jiang, Wei; Bertino, Elisa; Bossi, Lorenzo
private updates to anonymous databases
2008-01-01 Trombetta, Alberto; Elisa, Bertino
Integrating privacy policies into business processes
2008-01-01 Chinosi, Michele; Trombetta, Alberto
Advanced trust negotiations in critical infrastructures
2008-01-01 NAI FOVINO, Igor; Trombetta, Alberto; Braghin, Stefano
Information driven association rule hiding
2008-01-01 NAI FOVINO, Igor; Trombetta, Alberto
Introducing privacy in a hospital information system
2008-01-01 Braghin, Stefano; COEN PORISINI, Alberto; Colombo, Pietro; Sicari, SABRINA SOPHY; Trombetta, Alberto
Building a domain ontology from glossaries: a general methodology
2008-01-01 Bozzato, Loris; Ferrari, Mauro; Trombetta, Alberto
Identity-based long running negotiations
2008-01-01 Squicciarini, A.; Trombetta, Alberto; Bertino, E.; Braghin, Stefano
Scada malware, a proof of concept
2008-01-01 Carcano, Andrea; NAI FOVINO, Igor; Trombetta, Alberto
Effects of Malware Attacks on SCADA Systems
2009-01-01 NAI FOVINO, Igor; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto
Advanced trust negotiations in critical infrastructures
2009-01-01 Nai Fovino, I.; Braghin, S.; Trombetta, Alberto
An enhanced XSchema model for BPMN
2009-01-01 Chinosi, M.; Trombetta, Alberto
Integrating privacy policies into business processes
2009-01-01 Chinosi, Michele; Trombetta, Alberto
state-based network intrusion detection system for scada protocols, a proof of concept
2009-01-01 Carcano, A.; Nai Fovino, I.; Trombetta, Alberto; Masera, M.
An experimental investigation of malware attacks on SCADA systems
2009-01-01 Nai Fovino, I.; Trombetta, Alberto; Carcano, A.
a distributed critical state detection system for industrial protocols
2010-01-01 NAi Fovino, I.; Trombetta, Alberto; Carcano, A.; Masera, M.; Guglielmi, M.
Group-based negotiations in p2p systems
2010-01-01 Squicciarini, A.; Trombetta, Alberto; Braghin, S.; Bertino, E.; Paci, F.
adaptive and distributed access control in cognitive radio networks
2010-01-01 Braghin, S.; Trombetta, Alberto; Baldini, G.; Nai Fovino, I.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations | 1-gen-2007 | Squicciarini, A; Trombetta, Alberto; Bertino, E. | |
Privacy-aware role based access control | 1-gen-2007 | Ni, Q; Trombetta, Alberto; Bertino, E; Lobo, J. | |
Private updates to anonymous databases | 1-gen-2008 | Trombetta, Alberto; Jiang, Wei; Bertino, Elisa; Bossi, Lorenzo | |
private updates to anonymous databases | 1-gen-2008 | Trombetta, Alberto; Elisa, Bertino | |
Integrating privacy policies into business processes | 1-gen-2008 | Chinosi, Michele; Trombetta, Alberto | |
Advanced trust negotiations in critical infrastructures | 1-gen-2008 | NAI FOVINO, Igor; Trombetta, Alberto; Braghin, Stefano | |
Information driven association rule hiding | 1-gen-2008 | NAI FOVINO, Igor; Trombetta, Alberto | |
Introducing privacy in a hospital information system | 1-gen-2008 | Braghin, Stefano; COEN PORISINI, Alberto; Colombo, Pietro; Sicari, SABRINA SOPHY; Trombetta, Alberto | |
Building a domain ontology from glossaries: a general methodology | 1-gen-2008 | Bozzato, Loris; Ferrari, Mauro; Trombetta, Alberto | |
Identity-based long running negotiations | 1-gen-2008 | Squicciarini, A.; Trombetta, Alberto; Bertino, E.; Braghin, Stefano | |
Scada malware, a proof of concept | 1-gen-2008 | Carcano, Andrea; NAI FOVINO, Igor; Trombetta, Alberto | |
Effects of Malware Attacks on SCADA Systems | 1-gen-2009 | NAI FOVINO, Igor; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto | |
Advanced trust negotiations in critical infrastructures | 1-gen-2009 | Nai Fovino, I.; Braghin, S.; Trombetta, Alberto | |
An enhanced XSchema model for BPMN | 1-gen-2009 | Chinosi, M.; Trombetta, Alberto | |
Integrating privacy policies into business processes | 1-gen-2009 | Chinosi, Michele; Trombetta, Alberto | |
state-based network intrusion detection system for scada protocols, a proof of concept | 1-gen-2009 | Carcano, A.; Nai Fovino, I.; Trombetta, Alberto; Masera, M. | |
An experimental investigation of malware attacks on SCADA systems | 1-gen-2009 | Nai Fovino, I.; Trombetta, Alberto; Carcano, A. | |
a distributed critical state detection system for industrial protocols | 1-gen-2010 | NAi Fovino, I.; Trombetta, Alberto; Carcano, A.; Masera, M.; Guglielmi, M. | |
Group-based negotiations in p2p systems | 1-gen-2010 | Squicciarini, A.; Trombetta, Alberto; Braghin, S.; Bertino, E.; Paci, F. | |
adaptive and distributed access control in cognitive radio networks | 1-gen-2010 | Braghin, S.; Trombetta, Alberto; Baldini, G.; Nai Fovino, I. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile