Ranise, Silvio
 Distribuzione geografica
Continente #
NA - Nord America 1.807
EU - Europa 266
AS - Asia 38
SA - Sud America 3
Totale 2.114
Nazione #
US - Stati Uniti d'America 1.798
GB - Regno Unito 83
IT - Italia 59
DE - Germania 49
SE - Svezia 48
SG - Singapore 22
UA - Ucraina 10
CA - Canada 8
CN - Cina 4
BR - Brasile 3
FI - Finlandia 3
FR - Francia 3
ID - Indonesia 3
IE - Irlanda 3
JP - Giappone 3
HU - Ungheria 2
NL - Olanda 2
TH - Thailandia 2
TW - Taiwan 2
BG - Bulgaria 1
IN - India 1
LU - Lussemburgo 1
MX - Messico 1
NO - Norvegia 1
PL - Polonia 1
TR - Turchia 1
Totale 2.114
Città #
Ashburn 521
Princeton 308
Fairfield 173
New York 146
Chandler 116
Washington 90
Houston 47
Seattle 46
Cambridge 45
Munich 39
Woodbridge 39
London 32
San Diego 29
Boydton 24
Wilmington 19
Ann Arbor 15
Trento 13
Kilburn 12
Singapore 11
Andover 10
Chiswick 7
Jacksonville 7
Prescot 7
Toronto 5
Como 4
Hounslow 4
New Bedfont 4
Padova 4
Rome 4
San Mateo 4
Florence 3
Helsinki 3
Islington 3
Milan 3
Natal 3
Tokyo 3
Bermondsey 2
Bochum 2
Buffalo 2
Campogalliano 2
Dortmund 2
Dublin 2
Fayetteville 2
Greenwich 2
Los Angeles 2
Manerba del Garda 2
Montreal 2
Phuket 2
Piove di Sacco 2
Taipei 2
Verona 2
Viterbo 2
Acton 1
Altamura 1
Amsterdam 1
Assago 1
Bamberg 1
Beijing 1
Berlin 1
Budapest 1
Cadoneghe 1
Caltrano 1
Dearborn 1
Eiselfing 1
Galway 1
Gelsenkirchen 1
Germantown 1
Hamar 1
Heidelberg 1
Izmir 1
Jinan 1
Karlstad 1
Latina 1
Laurel 1
Macherio 1
Mexico City 1
Mountain View 1
Norwalk 1
Ottawa 1
Palazzolo sull'Oglio 1
Salerno 1
San Jose 1
San Paolo di Civitate 1
Sofia 1
Trieste 1
Totale 1.868
Nome #
Automated Legal Compliance Checking by Security Policy Analysis 81
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements 67
Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems 66
Can Data Subject Perception of Privacy Risks Be Useful in a Data Protection Impact Assessment? 44
Integrating a Pentesting Tool for IdM Protocols in a Continuous Delivery Pipeline 38
A framework for security and risk analysis of enrollment procedures: Application to fully-remote solutions based on eDocuments 30
Abstraction-Driven Verification of Array Programs 26
Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations 26
Assisted authoring, analysis and enforcement of access control policies in the cloud 24
ASASPXL: New clother for analysing ARBAC policies 24
Automated analysis of semantic-aware access control policies: A logic-based approach 23
Applying light-weight theorem proving to debugging and verifying pointer programs 23
ALPS: An Action Language for Policy Specification and Automated Safety Analysis 22
Automated analysis of scenario-based specifications of distributed access control policies with non-mechanizable activities 22
Aegis: Automatic enforcement of security policies in workflow-driven web applications 21
An Open and Flexible CyberSecurity Training Laboratory in IT/OT Infrastructures 21
Cryptographic enforcement of access control policies in the cloud: Implementation and experimental assessment 20
Attestation-enabled secure and scalable routing protocol for IoT networks 20
Brief Announcement: Automated Support for the Design and Validation of Fault Tolerant Parameterized Systems - A Case Study 20
Solving multi-objectiveworkflow satisfiability problems with optimization modulo theories techniques 20
Analysis of XACML policies with SMT 20
Best current practices for OAuth/OIDC Native Apps: A study of their adoption in popular providers and top-ranked Android clients 19
Attribute based access control for APIs in Spring security 19
ASASP: Automated Symbolic Analysis of Security Policies 19
Modular synthesis of enforcement mechanisms for the workflow satisfiability problem: Scalability and reusability 19
New results on rewrite-based satisfiability procedures 18
Automated analysis of RBAC policies with temporal constraints and static role hierarchies 18
Assisted content-based labelling and classification of documents 18
Blockchain tree as solution for distributed storage of personal id data and document access control 17
Micro-Id-Gym: A Flexible Tool for Pentesting Identity Management Protocols in the Wild and in the Laboratory 17
TLSAssistant Goes FINSEC A Security Platform Integration Extending Threat Intelligence Language 17
A SMT-based tool for the analysis and enforcement of NATO content-based protection and release policies 17
Automated analysis of infinite state workflows with access control policies 17
A declarative framework for specifying and enforcing purpose-aware policies 16
A rewriting approach to satisfiability procedures 16
Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies 16
Deciding extensions of the theory of arrays by integrating decision procedures and instantiation strategies 16
Combination methods for satisfiability and model-checking of infinite-state systems 16
Blockchain Tree for eHealth 16
Automated and Secure Integration of the OpenID Connect iGov Profile in Mobile Native Applications 16
PADS: Practical Attestation for Highly Dynamic Swarm Topologies 15
An extension of lazy abstraction with interpolation for programs with arrays 15
A Tool-assisted Methodology for the Data Protection Impact Assessment 15
Automated analysis of parametric timing-based mutual exclusion algorithms 15
Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges 14
Symbolic backward reachability with effectively propositional logic: Applications to security policy analysis 14
Cerberus: Automated synthesis of enforcement mechanisms for security-sensitive business processes 14
Quantifier-Free interpolation in combinations of equality interpolating theories 14
Combination of convex theories: Modularity, deduction completeness, and explanation 14
Scalable and precise automated analysis of administrative temporal role-based access control 14
Constraint solving in logic programming and in automated deduction: A comparison 14
A theory of singly-linked lists and its extensible decision procedure 14
A Wizard-based Approach for Secure Code Generation of Single Sign-On and Access Delegation Solutions for Mobile Native Apps 14
Rewrite and decision procedure laboratory: Combining rewriting, satisfiability checking, and lemma speculation 14
Secure Pull Printing with QR Codes and National eID Cards: A Software-oriented Design and an Open-source Implementation 14
SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things 14
SMT-based enforcement and analysis of NATO content-based protection and release policies 14
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system 14
Automated validation of security-sensitive web services specified in BPEL and RBAC 14
Towards SMT model checking of array-based systems 14
A prototype implementation of a distributed Satisfiability Modulo Theories solver in the ToolBus framework 13
A declarative two-level framework to specify and verify workflow and authorization policies in service-oriented architectures 13
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay between Functional and Security Requirements 13
Modeling authorization policies for Web services in presence of transitive dependencies 13
Design, formal specification and analysis of multi-factor authentication solutions with a single sign-on experience 13
Nelson-Oppen, Shostak and the extended Canonizer: A family picture with a newborn 13
Towards a reference architecture for access control in distributed web applications 13
A combination of rewriting and constraint solving for the quantifier-free interpolation of arrays with integer difference constraints 13
Building extended canonizers by graph-based deduction 13
Combining generic and domain specific reasoning by using contexts 13
The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis 12
Quantifier-free interpolation of a theory of arrays 12
Backward reachability of array-based systems by smt solving: Termination and invariant synthesis 12
Automatically finding execution scenarios to deploy security-sensitive workflows 12
Smart Card-Based Identity Management Protocols for V2V and V2I Communications in CCAM: A Systematic Literature Review 12
SARA: Secure Asynchronous Remote Attestation for IoT Systems 12
Assisting the deployment of security-sensitive workflows by finding execution scenarios 12
On the automated analysis of safety in usage control: A new decidability result 12
Automated Symbolic Analysis of ARBAC-Policies 12
A lazy approach to access control as a service (ACaaS) for IoT: An AWS case study 12
A methodology to build run-time monitors for security-aware workflows 12
Compiling NATO Authorization Policies for Enforcement in the Cloud and SDNs 12
Formal modelling of content-based protection and release for access control in NATO operations 12
Boosting model checking to analyse large ARBAC policies 12
Deploying access control enforcement for IoT in the cloud-edge continuum with the help of the CAP theorem 12
From integrated reasoning specialists to “plug-And-Play” reasoning components 12
Termination of constraint contextual rewriting 12
Light-weight theorem proving for debugging and verifying units of code 12
On a rewriting approach to satisfiability procedures: Extension, combination of theories and an experimental appraisal 12
DoS Attacks in Available MQTT Implementations: Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections 12
Automated termination in model-checking modulo theories 12
A SMT-based methodology for monitoring of security-aware workflows 12
Noetherianity and combination problems 11
Uniform derivation of decision procedures by superposition 11
The control layer in Open Mechanized Reasoning Systems: Annotations and tactics 11
Remote Attestation as a Service for IoT 11
Distributing the Workload in a Lazy Theorem-Prover 11
Parameterized model checking for security policy analysis 11
Security Considerations on 5G-Enabled Back-Situation Awareness for CCAM 11
Content-based information protection and release in NATO operations 11
Totale 1.751
Categoria #
all - tutte 38.593
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 211
Totale 38.804


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/201935 0 0 0 0 0 0 0 0 0 6 16 13
2019/202069 5 3 6 9 9 5 9 6 11 1 4 1
2020/202150 3 2 6 1 7 6 15 4 0 4 1 1
2021/2022685 2 0 2 3 2 1 0 266 65 47 6 291
2022/2023444 189 25 22 8 26 42 5 28 36 17 32 14
2023/2024981 15 36 119 38 168 446 60 28 4 67 0 0
Totale 2.280