Ranise, Silvio
 Distribuzione geografica
Continente #
NA - Nord America 4.838
AS - Asia 2.463
EU - Europa 1.481
SA - Sud America 584
AF - Africa 75
OC - Oceania 6
Continente sconosciuto - Info sul continente non disponibili 2
Totale 9.449
Nazione #
US - Stati Uniti d'America 4.714
SG - Singapore 1.261
BR - Brasile 490
CN - Cina 403
RU - Federazione Russa 371
IT - Italia 277
VN - Vietnam 199
KR - Corea 189
FR - Francia 177
LV - Lettonia 163
DE - Germania 137
GB - Regno Unito 131
IN - India 84
SE - Svezia 63
CA - Canada 62
HK - Hong Kong 61
IQ - Iraq 47
MX - Messico 43
BD - Bangladesh 39
AR - Argentina 32
TR - Turchia 27
UA - Ucraina 27
ES - Italia 26
FI - Finlandia 25
NL - Olanda 25
JP - Giappone 23
ZA - Sudafrica 22
EC - Ecuador 20
ID - Indonesia 20
PK - Pakistan 20
PL - Polonia 14
CO - Colombia 13
KE - Kenya 13
PH - Filippine 13
SA - Arabia Saudita 10
UZ - Uzbekistan 10
AZ - Azerbaigian 9
AT - Austria 8
DZ - Algeria 8
EG - Egitto 7
JO - Giordania 7
LT - Lituania 7
TN - Tunisia 7
MA - Marocco 6
NP - Nepal 6
PE - Perù 6
TW - Taiwan 6
AU - Australia 5
IE - Irlanda 5
UY - Uruguay 5
VE - Venezuela 5
AE - Emirati Arabi Uniti 4
BO - Bolivia 4
CL - Cile 4
DK - Danimarca 4
PY - Paraguay 4
BE - Belgio 3
BG - Bulgaria 3
ET - Etiopia 3
GT - Guatemala 3
KG - Kirghizistan 3
KZ - Kazakistan 3
TH - Thailandia 3
BA - Bosnia-Erzegovina 2
CR - Costa Rica 2
GR - Grecia 2
HU - Ungheria 2
IL - Israele 2
JM - Giamaica 2
LA - Repubblica Popolare Democratica del Laos 2
MN - Mongolia 2
MQ - Martinica 2
MY - Malesia 2
NI - Nicaragua 2
OM - Oman 2
PA - Panama 2
PT - Portogallo 2
RO - Romania 2
SN - Senegal 2
TT - Trinidad e Tobago 2
XK - ???statistics.table.value.countryCode.XK??? 2
BB - Barbados 1
BJ - Benin 1
BS - Bahamas 1
CG - Congo 1
CI - Costa d'Avorio 1
GE - Georgia 1
HN - Honduras 1
IS - Islanda 1
KH - Cambogia 1
LB - Libano 1
LU - Lussemburgo 1
MD - Moldavia 1
MK - Macedonia 1
NG - Nigeria 1
NO - Norvegia 1
NZ - Nuova Zelanda 1
PR - Porto Rico 1
PS - Palestinian Territory 1
QA - Qatar 1
Totale 9.444
Città #
Ashburn 807
Singapore 706
San Jose 429
Dallas 355
Princeton 309
Santa Clara 300
Columbus 299
Moscow 288
Seoul 189
Fairfield 188
New York 185
Riga 163
The Dalles 146
Lauterbourg 136
Chandler 119
Los Angeles 101
Washington 93
Chicago 79
Redondo Beach 69
Ho Chi Minh City 66
Houston 63
Hong Kong 57
Seattle 51
Munich 50
Beijing 49
Buffalo 49
Cambridge 48
Hanoi 46
Milan 46
Woodbridge 45
São Paulo 41
London 38
Trento 38
San Diego 30
Salt Lake City 29
Wilmington 25
Boydton 24
Montreal 23
Rome 23
Frankfurt am Main 22
Ann Arbor 21
Atlanta 20
Helsinki 20
Orem 19
Tokyo 19
Baghdad 18
Jacksonville 18
Toronto 17
Chennai 16
Council Bluffs 15
Phoenix 15
Rio de Janeiro 15
Dhaka 14
Johannesburg 14
Da Nang 13
Tampa 13
Brooklyn 12
Falkenstein 12
Kilburn 12
Stockholm 12
Belo Horizonte 11
Brasília 11
Verona 11
Andover 10
Mumbai 10
Warsaw 10
Amsterdam 9
Detroit 9
Elk Grove Village 9
Fayetteville 9
Guangzhou 9
Guarulhos 9
San Francisco 9
Tashkent 9
Baku 8
Boston 8
Changsha 8
Curitiba 8
Mexico City 8
Nairobi 8
Prescot 8
Quito 8
Campinas 7
Chiswick 7
Delhi 7
Denver 7
Fortaleza 7
Hefei 7
Istanbul 7
Miami 7
New Delhi 7
San Mateo 7
Wuhan 7
Amman 6
Biên Hòa 6
Erbil 6
Kansas City 6
Macerata 6
Massa 6
Pergine Valsugana 6
Totale 6.457
Nome #
Artificial Intelligence in Healthcare and the Protection of Health as a Fundamental Right 265
Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems 150
Efficient Satisfiability Modulo Theories via Delayed Theory Combination 129
Automated Legal Compliance Checking by Security Policy Analysis 125
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements 123
Can Data Subject Perception of Privacy Risks Be Useful in a Data Protection Impact Assessment? 123
Attestation-enabled secure and scalable routing protocol for IoT networks 102
A framework for security and risk analysis of enrollment procedures: Application to fully-remote solutions based on eDocuments 99
A declarative framework for specifying and enforcing purpose-aware policies 92
Merging Datasets of CyberSecurity Incidents for Fun and Insight 92
A declarative two-level framework to specify and verify workflow and authorization policies in service-oriented architectures 90
A prototype implementation of a distributed Satisfiability Modulo Theories solver in the ToolBus framework 88
Scalable and precise automated analysis of administrative temporal role-based access control 88
Aegis: Automatic enforcement of security policies in workflow-driven web applications 87
Abstraction-Driven Verification of Array Programs 86
Cryptographic enforcement of access control policies in the cloud: Implementation and experimental assessment 85
A Tool-assisted Methodology for the Data Protection Impact Assessment 80
Incremental analysis of evolving administrative role based access control policies 80
Integrating a Pentesting Tool for IdM Protocols in a Continuous Delivery Pipeline 79
Automated analysis of semantic-aware access control policies: A logic-based approach 79
An extension of lazy abstraction with interpolation for programs with arrays 77
Solving multi-objectiveworkflow satisfiability problems with optimization modulo theories techniques 77
On cryptographic mechanisms for the selective disclosure of verifiable credentials 76
Automated analysis of scenario-based specifications of distributed access control policies with non-mechanizable activities 76
A combination of rewriting and constraint solving for the quantifier-free interpolation of arrays with integer difference constraints 75
A theory of singly-linked lists and its extensible decision procedure 74
Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations 73
Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges 72
Blockchain tree as solution for distributed storage of personal id data and document access control 72
ALPS: An Action Language for Policy Specification and Automated Safety Analysis 71
A rewriting approach to satisfiability procedures 70
A SMT-based tool for the analysis and enforcement of NATO content-based protection and release policies 68
Brief Announcement: Automated Support for the Design and Validation of Fault Tolerant Parameterized Systems - A Case Study 67
ASASPXL: New clother for analysing ARBAC policies 67
A lazy approach to access control as a service (ACaaS) for IoT: An AWS case study 67
A Wizard-based Approach for Secure Code Generation of Single Sign-On and Access Delegation Solutions for Mobile Native Apps 67
Learning from others' mistakes: An analysis of cyber-security incidents 66
Symbolic backward reachability with effectively propositional logic: Applications to security policy analysis 66
SARA: Secure Asynchronous Remote Attestation for IoT Systems 66
Analysis of XACML policies with SMT 66
An Open and Flexible CyberSecurity Training Laboratory in IT/OT Infrastructures 65
A methodology to build run-time monitors for security-aware workflows 65
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system 65
DoS Attacks in Available MQTT Implementations: Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections 65
Best current practices for OAuth/OIDC Native Apps: A study of their adoption in popular providers and top-ranked Android clients 64
Modular synthesis of enforcement mechanisms for the workflow satisfiability problem: Scalability and reusability 64
Formal analysis of XACML policies using SMT 63
Compiling NATO Authorization Policies for Enforcement in the Cloud and SDNs 63
Nelson-Oppen, Shostak and the extended Canonizer: A family picture with a newborn 62
Boosting model checking to analyse large ARBAC policies 62
Assisted authoring, analysis and enforcement of access control policies in the cloud 61
Automated validation of security-sensitive web services specified in BPEL and RBAC 61
Automated analysis of infinite state workflows with access control policies 61
Combining data structures with nonstably infinite theories using many-sorted logic 60
Attribute based access control for APIs in Spring security 60
ASASP: Automated Symbolic Analysis of Security Policies 60
Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization 60
A SMT-based methodology for monitoring of security-aware workflows 60
Efficient symbolic automated analysis of administrative attribute-based RBAC-policies 59
Applying light-weight theorem proving to debugging and verifying pointer programs 59
MCMT: A model checker modulo theories 59
Combination methods for satisfiability and model-checking of infinite-state systems 58
Multi-Objective Microservice Orchestration: Balancing Security and Performance in CCAM 57
Scalable automated analysis of access control and privacy policies 57
Backward reachability of array-based systems by smt solving: Termination and invariant synthesis 57
Cerberus: Automated synthesis of enforcement mechanisms for security-sensitive business processes 57
On a rewriting approach to satisfiability procedures: Extension, combination of theories and an experimental appraisal 57
New results on rewrite-based satisfiability procedures 56
Quantifier-Free interpolation in combinations of equality interpolating theories 56
Design, formal specification and analysis of multi-factor authentication solutions with a single sign-on experience 56
Deploying access control enforcement for IoT in the cloud-edge continuum with the help of the CAP theorem 56
The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis 55
Smart Card-Based Identity Management Protocols for V2V and V2I Communications in CCAM: A Systematic Literature Review 55
Micro-Id-Gym: A Flexible Tool for Pentesting Identity Management Protocols in the Wild and in the Laboratory 55
Integrating static checking and interactive verification: Supporting multiple theories and provers in verification 55
Automatic combinability of rewriting-based satisfiability procedures 55
Remote Attestation as a Service for IoT 54
A practical extension mechanism for decision procedures: The case study of universal presburger arithmetic 54
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay between Functional and Security Requirements 54
Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies 54
Modeling authorization policies for Web services in presence of transitive dependencies 54
Automated analysis of parametric timing-based mutual exclusion algorithms 54
Secure Pull Printing with QR Codes and National eID Cards: A Software-oriented Design and an Open-source Implementation 54
Combination of convex theories: Modularity, deduction completeness, and explanation 53
On the automated analysis of safety in usage control: A new decidability result 53
Assisted content-based labelling and classification of documents 53
Blockchain Tree for eHealth 53
Automated and Secure Integration of the OpenID Connect iGov Profile in Mobile Native Applications 53
Noetherianity and combination problems 52
Automated Symbolic Analysis of ARBAC-Policies 52
On run-time enforcement of authorization constraints in security-sensitive Workflows 52
SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things 52
An Automated Multi-Layered Methodology to Assist the Secure and Risk-Aware Design of Multi-Factor Authentication Protocols 51
Uniform derivation of decision procedures by superposition 51
Workflow and access control reloaded: A declarative specification framework for the automated analysis of web services 51
PADS: Practical Attestation for Highly Dynamic Swarm Topologies 51
Automated analysis of RBAC policies with temporal constraints and static role hierarchies 51
MQTTSA: A tool for automatically assisting the secure deployments of MQTT brokers 51
Building extended canonizers by graph-based deduction 51
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud 50
Totale 6.953
Categoria #
all - tutte 68.974
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 373
Totale 69.347


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20219 0 0 0 0 0 0 0 0 0 5 2 2
2021/2022696 2 4 2 3 2 1 1 269 66 47 6 293
2022/2023453 190 27 22 8 26 43 5 29 38 17 33 15
2023/20241.158 15 37 119 38 169 449 60 28 4 79 37 123
2024/20252.212 8 34 48 448 203 360 25 95 403 311 129 148
2025/20264.893 350 262 780 811 388 515 880 144 432 331 0 0
Totale 9.636