Ranise, Silvio
 Distribuzione geografica
Continente #
NA - Nord America 3.965
AS - Asia 1.818
EU - Europa 1.151
SA - Sud America 500
AF - Africa 43
OC - Oceania 4
Continente sconosciuto - Info sul continente non disponibili 2
Totale 7.483
Nazione #
US - Stati Uniti d'America 3.883
SG - Singapore 1.199
BR - Brasile 438
RU - Federazione Russa 370
CN - Cina 348
IT - Italia 199
LV - Lettonia 162
DE - Germania 116
GB - Regno Unito 113
VN - Vietnam 76
SE - Svezia 59
CA - Canada 52
HK - Hong Kong 33
BD - Bangladesh 24
FR - Francia 24
AR - Argentina 23
UA - Ucraina 23
MX - Messico 22
IN - India 20
TR - Turchia 19
ZA - Sudafrica 19
FI - Finlandia 17
IQ - Iraq 17
ES - Italia 15
NL - Olanda 15
EC - Ecuador 13
JP - Giappone 13
ID - Indonesia 10
KE - Kenya 9
PK - Pakistan 9
AT - Austria 8
CO - Colombia 7
PL - Polonia 7
SA - Arabia Saudita 7
UZ - Uzbekistan 7
AZ - Azerbaigian 5
IE - Irlanda 5
LT - Lituania 5
PH - Filippine 5
AE - Emirati Arabi Uniti 4
DZ - Algeria 4
PY - Paraguay 4
TW - Taiwan 4
UY - Uruguay 4
AU - Australia 3
CL - Cile 3
KG - Kirghizistan 3
KZ - Kazakistan 3
PE - Perù 3
TN - Tunisia 3
VE - Venezuela 3
BE - Belgio 2
BG - Bulgaria 2
BO - Bolivia 2
EG - Egitto 2
GR - Grecia 2
HU - Ungheria 2
LA - Repubblica Popolare Democratica del Laos 2
MA - Marocco 2
MY - Malesia 2
NI - Nicaragua 2
TH - Thailandia 2
TT - Trinidad e Tobago 2
XK - ???statistics.table.value.countryCode.XK??? 2
BB - Barbados 1
BS - Bahamas 1
CG - Congo 1
ET - Etiopia 1
GE - Georgia 1
IL - Israele 1
JM - Giamaica 1
JO - Giordania 1
LU - Lussemburgo 1
MD - Moldavia 1
MN - Mongolia 1
NG - Nigeria 1
NO - Norvegia 1
NP - Nepal 1
NZ - Nuova Zelanda 1
PA - Panama 1
PS - Palestinian Territory 1
PT - Portogallo 1
RO - Romania 1
SN - Senegal 1
Totale 7.483
Città #
Ashburn 694
Singapore 681
Dallas 351
Princeton 309
Columbus 299
Santa Clara 291
Moscow 288
Fairfield 188
Riga 162
New York 161
Chandler 119
Washington 93
Los Angeles 84
Chicago 78
Redondo Beach 69
Houston 60
Seattle 51
Munich 50
Buffalo 48
Cambridge 48
Woodbridge 45
Beijing 38
London 37
Trento 37
São Paulo 35
Hong Kong 31
The Dalles 31
Ho Chi Minh City 30
San Diego 30
Salt Lake City 28
Wilmington 25
Boydton 24
Ann Arbor 21
Montreal 21
Jacksonville 18
Rome 18
Hanoi 16
Atlanta 15
Frankfurt am Main 14
Rio de Janeiro 14
Toronto 14
Helsinki 13
Tampa 13
Falkenstein 12
Kilburn 12
Phoenix 12
Tokyo 12
Belo Horizonte 11
Johannesburg 11
Andover 10
Brooklyn 10
Stockholm 10
Verona 10
Brasília 9
Detroit 9
Dhaka 9
Fayetteville 9
Milan 9
Changsha 8
Curitiba 8
Elk Grove Village 8
Guangzhou 8
Guarulhos 8
Prescot 8
San Francisco 8
Baghdad 7
Boston 7
Chiswick 7
Hefei 7
Mexico City 7
San Mateo 7
Kansas City 6
Macerata 6
Massa 6
Miami 6
Porto Alegre 6
Shanghai 6
Shenyang 6
Shijiazhuang 6
Tashkent 6
Warsaw 6
Wuhan 6
Baku 5
Bauru 5
Campinas 5
Campo Grande 5
Dulles 5
Fortaleza 5
Genoa 5
Goiânia 5
Manaus 5
Mumbai 5
Nairobi 5
Naples 5
Newark 5
Oberriexingen 5
Prineville 5
Quito 5
Springfield 5
Sterling 5
Totale 5.101
Nome #
Artificial Intelligence in Healthcare and the Protection of Health as a Fundamental Right 208
Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems 136
Efficient Satisfiability Modulo Theories via Delayed Theory Combination 113
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements 110
Can Data Subject Perception of Privacy Risks Be Useful in a Data Protection Impact Assessment? 107
Automated Legal Compliance Checking by Security Policy Analysis 104
A framework for security and risk analysis of enrollment procedures: Application to fully-remote solutions based on eDocuments 80
A prototype implementation of a distributed Satisfiability Modulo Theories solver in the ToolBus framework 76
Scalable and precise automated analysis of administrative temporal role-based access control 76
A declarative two-level framework to specify and verify workflow and authorization policies in service-oriented architectures 73
Integrating a Pentesting Tool for IdM Protocols in a Continuous Delivery Pipeline 73
Cryptographic enforcement of access control policies in the cloud: Implementation and experimental assessment 72
Abstraction-Driven Verification of Array Programs 72
Aegis: Automatic enforcement of security policies in workflow-driven web applications 69
Attestation-enabled secure and scalable routing protocol for IoT networks 64
Blockchain tree as solution for distributed storage of personal id data and document access control 64
Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations 63
ALPS: An Action Language for Policy Specification and Automated Safety Analysis 62
A Tool-assisted Methodology for the Data Protection Impact Assessment 62
Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges 61
A rewriting approach to satisfiability procedures 61
An extension of lazy abstraction with interpolation for programs with arrays 61
A theory of singly-linked lists and its extensible decision procedure 61
A declarative framework for specifying and enforcing purpose-aware policies 60
Solving multi-objectiveworkflow satisfiability problems with optimization modulo theories techniques 60
A lazy approach to access control as a service (ACaaS) for IoT: An AWS case study 59
A combination of rewriting and constraint solving for the quantifier-free interpolation of arrays with integer difference constraints 59
On cryptographic mechanisms for the selective disclosure of verifiable credentials 58
A Wizard-based Approach for Secure Code Generation of Single Sign-On and Access Delegation Solutions for Mobile Native Apps 57
A methodology to build run-time monitors for security-aware workflows 57
Analysis of XACML policies with SMT 57
ASASPXL: New clother for analysing ARBAC policies 56
Automated analysis of semantic-aware access control policies: A logic-based approach 56
A SMT-based tool for the analysis and enforcement of NATO content-based protection and release policies 56
An Open and Flexible CyberSecurity Training Laboratory in IT/OT Infrastructures 55
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system 55
Merging Datasets of CyberSecurity Incidents for Fun and Insight 53
Brief Announcement: Automated Support for the Design and Validation of Fault Tolerant Parameterized Systems - A Case Study 53
SARA: Secure Asynchronous Remote Attestation for IoT Systems 53
Assisted authoring, analysis and enforcement of access control policies in the cloud 53
Boosting model checking to analyse large ARBAC policies 53
Modular synthesis of enforcement mechanisms for the workflow satisfiability problem: Scalability and reusability 53
DoS Attacks in Available MQTT Implementations: Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections 52
Automated analysis of infinite state workflows with access control policies 52
Learning from others' mistakes: An analysis of cyber-security incidents 51
Automated validation of security-sensitive web services specified in BPEL and RBAC 51
Attribute based access control for APIs in Spring security 50
Compiling NATO Authorization Policies for Enforcement in the Cloud and SDNs 50
Best current practices for OAuth/OIDC Native Apps: A study of their adoption in popular providers and top-ranked Android clients 49
Applying light-weight theorem proving to debugging and verifying pointer programs 49
MCMT: A model checker modulo theories 49
Automated analysis of scenario-based specifications of distributed access control policies with non-mechanizable activities 49
Micro-Id-Gym: A Flexible Tool for Pentesting Identity Management Protocols in the Wild and in the Laboratory 48
Nelson-Oppen, Shostak and the extended Canonizer: A family picture with a newborn 48
ASASP: Automated Symbolic Analysis of Security Policies 48
New results on rewrite-based satisfiability procedures 47
Assisted content-based labelling and classification of documents 47
A SMT-based methodology for monitoring of security-aware workflows 47
Quantifier-Free interpolation in combinations of equality interpolating theories 46
Integrating static checking and interactive verification: Supporting multiple theories and provers in verification 46
Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization 46
On a rewriting approach to satisfiability procedures: Extension, combination of theories and an experimental appraisal 46
Scalable automated analysis of access control and privacy policies 45
Symbolic backward reachability with effectively propositional logic: Applications to security policy analysis 45
A practical extension mechanism for decision procedures: The case study of universal presburger arithmetic 45
Formal analysis of XACML policies using SMT 45
Modeling authorization policies for Web services in presence of transitive dependencies 45
Combination methods for satisfiability and model-checking of infinite-state systems 45
Design, formal specification and analysis of multi-factor authentication solutions with a single sign-on experience 45
Blockchain Tree for eHealth 45
The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis 44
Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies 44
Combining data structures with nonstably infinite theories using many-sorted logic 44
Automated analysis of parametric timing-based mutual exclusion algorithms 44
Deploying access control enforcement for IoT in the cloud-edge continuum with the help of the CAP theorem 44
Incremental analysis of evolving administrative role based access control policies 44
Cerberus: Automated synthesis of enforcement mechanisms for security-sensitive business processes 43
Smart Card-Based Identity Management Protocols for V2V and V2I Communications in CCAM: A Systematic Literature Review 43
Automated analysis of RBAC policies with temporal constraints and static role hierarchies 43
On the automated analysis of safety in usage control: A new decidability result 43
Automated Symbolic Analysis of ARBAC-Policies 43
Secure Pull Printing with QR Codes and National eID Cards: A Software-oriented Design and an Open-source Implementation 43
TLSAssistant Goes FINSEC A Security Platform Integration Extending Threat Intelligence Language 43
Automated and Secure Integration of the OpenID Connect iGov Profile in Mobile Native Applications 43
Uniform derivation of decision procedures by superposition 42
Backward reachability of array-based systems by smt solving: Termination and invariant synthesis 42
PADS: Practical Attestation for Highly Dynamic Swarm Topologies 42
Efficient symbolic automated analysis of administrative attribute-based RBAC-policies 42
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud 41
Remote Attestation as a Service for IoT 41
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay between Functional and Security Requirements 41
From integrated reasoning specialists to “plug-And-Play” reasoning components 41
Light-weight theorem proving for debugging and verifying units of code 41
MQTTSA: A tool for automatically assisting the secure deployments of MQTT brokers 41
Building extended canonizers by graph-based deduction 41
Automated termination in model-checking modulo theories 41
SAFARI: SMT-based abstraction for arrays with interpolants 41
Combining generic and domain specific reasoning by using contexts 41
Noetherianity and combination problems 40
Combination of convex theories: Modularity, deduction completeness, and explanation 40
Totale 5.588
Categoria #
all - tutte 65.199
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 361
Totale 65.560


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/202137 0 0 0 0 0 6 16 5 1 5 2 2
2021/2022696 2 4 2 3 2 1 1 269 66 47 6 293
2022/2023453 190 27 22 8 26 43 5 29 38 17 33 15
2023/20241.158 15 37 119 38 169 449 60 28 4 79 37 123
2024/20252.212 8 34 48 448 203 360 25 95 403 311 129 148
2025/20262.924 350 262 780 811 388 333 0 0 0 0 0 0
Totale 7.667