Ranise, Silvio
 Distribuzione geografica
Continente #
NA - Nord America 2.248
AS - Asia 436
EU - Europa 322
AF - Africa 6
SA - Sud America 5
OC - Oceania 1
Totale 3.018
Nazione #
US - Stati Uniti d'America 2.235
SG - Singapore 394
GB - Regno Unito 86
IT - Italia 73
DE - Germania 68
SE - Svezia 48
CN - Cina 30
CA - Canada 11
FR - Francia 10
UA - Ucraina 10
FI - Finlandia 6
KE - Kenya 6
NL - Olanda 6
BR - Brasile 4
RU - Federazione Russa 4
ID - Indonesia 3
IE - Irlanda 3
JP - Giappone 3
HU - Ungheria 2
TH - Thailandia 2
TW - Taiwan 2
AU - Australia 1
BE - Belgio 1
BG - Bulgaria 1
EC - Ecuador 1
IN - India 1
JM - Giamaica 1
LT - Lituania 1
LU - Lussemburgo 1
MX - Messico 1
NO - Norvegia 1
PL - Polonia 1
TR - Turchia 1
Totale 3.018
Città #
Ashburn 531
Singapore 321
Princeton 308
Columbus 298
Fairfield 173
New York 146
Chandler 116
Washington 90
Houston 47
Seattle 46
Cambridge 45
Munich 40
Woodbridge 39
London 34
San Diego 29
Boydton 24
Wilmington 19
Dallas 16
Trento 16
Ann Arbor 15
Santa Clara 14
Los Angeles 13
Kilburn 12
Andover 10
Toronto 8
Chiswick 7
Jacksonville 7
Prescot 7
Rome 7
Helsinki 6
Prineville 5
Springfield 5
Como 4
Dortmund 4
Fayetteville 4
Frankfurt am Main 4
Hounslow 4
Moscow 4
New Bedfont 4
Padova 4
San Mateo 4
Darmstadt 3
Florence 3
Islington 3
Milan 3
Naaldwijk 3
Natal 3
Tokyo 3
Bermondsey 2
Bochum 2
Buffalo 2
Campogalliano 2
Chengdu 2
Dublin 2
Fort Worth 2
Greenwich 2
Guangzhou 2
Jinan 2
Kaiserslautern 2
Lafayette 2
Manerba del Garda 2
Montreal 2
Nairobi 2
Nantes 2
Nice 2
Paris 2
Phuket 2
Piove di Sacco 2
Rosà 2
Schwetzingen 2
Taipei 2
Verona 2
Viterbo 2
Zhengzhou 2
Acton 1
Altamura 1
Amsterdam 1
Assago 1
Bamberg 1
Beijing 1
Berlin 1
Boardman 1
Brussels 1
Budapest 1
Cadoneghe 1
Caltrano 1
Dearborn 1
Dongguan 1
Eiselfing 1
Falkenstein 1
Galway 1
Gelsenkirchen 1
Genoa 1
Germantown 1
Hamar 1
Heidelberg 1
Izmir 1
Karlstad 1
Langfang 1
Latina 1
Totale 2.589
Nome #
Automated Legal Compliance Checking by Security Policy Analysis 91
Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems 74
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements 73
Can Data Subject Perception of Privacy Risks Be Useful in a Data Protection Impact Assessment? 68
Integrating a Pentesting Tool for IdM Protocols in a Continuous Delivery Pipeline 45
A framework for security and risk analysis of enrollment procedures: Application to fully-remote solutions based on eDocuments 41
Blockchain tree as solution for distributed storage of personal id data and document access control 40
Abstraction-Driven Verification of Array Programs 34
ASASPXL: New clother for analysing ARBAC policies 31
Analysis of XACML policies with SMT 30
Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations 30
Assisted authoring, analysis and enforcement of access control policies in the cloud 29
Micro-Id-Gym: A Flexible Tool for Pentesting Identity Management Protocols in the Wild and in the Laboratory 29
ALPS: An Action Language for Policy Specification and Automated Safety Analysis 29
Applying light-weight theorem proving to debugging and verifying pointer programs 29
Aegis: Automatic enforcement of security policies in workflow-driven web applications 28
An Open and Flexible CyberSecurity Training Laboratory in IT/OT Infrastructures 28
Automated analysis of semantic-aware access control policies: A logic-based approach 28
Best current practices for OAuth/OIDC Native Apps: A study of their adoption in popular providers and top-ranked Android clients 27
Solving multi-objectiveworkflow satisfiability problems with optimization modulo theories techniques 27
Automated analysis of scenario-based specifications of distributed access control policies with non-mechanizable activities 27
Attestation-enabled secure and scalable routing protocol for IoT networks 26
Automated analysis of infinite state workflows with access control policies 26
Cryptographic enforcement of access control policies in the cloud: Implementation and experimental assessment 25
Brief Announcement: Automated Support for the Design and Validation of Fault Tolerant Parameterized Systems - A Case Study 25
Combination of convex theories: Modularity, deduction completeness, and explanation 24
Deciding extensions of the theory of arrays by integrating decision procedures and instantiation strategies 24
A Wizard-based Approach for Secure Code Generation of Single Sign-On and Access Delegation Solutions for Mobile Native Apps 24
Attribute based access control for APIs in Spring security 24
ASASP: Automated Symbolic Analysis of Security Policies 24
Automated validation of security-sensitive web services specified in BPEL and RBAC 24
Noetherianity and combination problems 23
A declarative framework for specifying and enforcing purpose-aware policies 23
New results on rewrite-based satisfiability procedures 23
Quantifier-Free interpolation in combinations of equality interpolating theories 23
Automated analysis of RBAC policies with temporal constraints and static role hierarchies 23
Combination methods for satisfiability and model-checking of infinite-state systems 23
A Tool-assisted Methodology for the Data Protection Impact Assessment 23
Assisted content-based labelling and classification of documents 23
A combination of rewriting and constraint solving for the quantifier-free interpolation of arrays with integer difference constraints 23
Modular synthesis of enforcement mechanisms for the workflow satisfiability problem: Scalability and reusability 23
MCMT: A model checker modulo theories 23
Merging Datasets of CyberSecurity Incidents for Fun and Insight 22
A rewriting approach to satisfiability procedures 22
An extension of lazy abstraction with interpolation for programs with arrays 22
A theory of singly-linked lists and its extensible decision procedure 22
A SMT-based tool for the analysis and enforcement of NATO content-based protection and release policies 22
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud 21
A declarative two-level framework to specify and verify workflow and authorization policies in service-oriented architectures 21
Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies 21
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system 21
Blockchain Tree for eHealth 21
TLSAssistant Goes FINSEC A Security Platform Integration Extending Threat Intelligence Language 21
Automated and Secure Integration of the OpenID Connect iGov Profile in Mobile Native Applications 21
Scalable automated analysis of access control and privacy policies 20
Cerberus: Automated synthesis of enforcement mechanisms for security-sensitive business processes 20
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay between Functional and Security Requirements 20
PADS: Practical Attestation for Highly Dynamic Swarm Topologies 20
Design, formal specification and analysis of multi-factor authentication solutions with a single sign-on experience 20
A lazy approach to access control as a service (ACaaS) for IoT: An AWS case study 20
A methodology to build run-time monitors for security-aware workflows 20
Compiling NATO Authorization Policies for Enforcement in the Cloud and SDNs 20
Automated analysis of parametric timing-based mutual exclusion algorithms 20
Rewrite and decision procedure laboratory: Combining rewriting, satisfiability checking, and lemma speculation 20
Secure Pull Printing with QR Codes and National eID Cards: A Software-oriented Design and an Open-source Implementation 20
SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things 20
Collective Remote Attestation at the Internet of Things Scale: State-of-the-Art and Future Challenges 19
Symbolic backward reachability with effectively propositional logic: Applications to security policy analysis 19
SARA: Secure Asynchronous Remote Attestation for IoT Systems 19
Modeling authorization policies for Web services in presence of transitive dependencies 19
Scalable and precise automated analysis of administrative temporal role-based access control 19
Constraint solving in logic programming and in automated deduction: A comparison 19
Termination of constraint contextual rewriting 19
Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization 19
Building extended canonizers by graph-based deduction 19
Towards SMT model checking of array-based systems 19
Quantifier-free interpolation of a theory of arrays 18
Backward reachability of array-based systems by smt solving: Termination and invariant synthesis 18
Automated Symbolic Analysis of ARBAC-Policies 18
Nelson-Oppen, Shostak and the extended Canonizer: A family picture with a newborn 18
SMT-based enforcement and analysis of NATO content-based protection and release policies 18
Deploying access control enforcement for IoT in the cloud-edge continuum with the help of the CAP theorem 18
Towards a reference architecture for access control in distributed web applications 18
DoS Attacks in Available MQTT Implementations: Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections 18
Combining generic and domain specific reasoning by using contexts 18
A SMT-based methodology for monitoring of security-aware workflows 18
Incremental analysis of evolving administrative role based access control policies 18
Uniform derivation of decision procedures by superposition 17
The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis 17
A practical extension mechanism for decision procedures: The case study of universal presburger arithmetic 17
A prototype implementation of a distributed Satisfiability Modulo Theories solver in the ToolBus framework 17
Automatically finding execution scenarios to deploy security-sensitive workflows 17
Smart Card-Based Identity Management Protocols for V2V and V2I Communications in CCAM: A Systematic Literature Review 17
On the automated analysis of safety in usage control: A new decidability result 17
Integrating static checking and interactive verification: Supporting multiple theories and provers in verification 17
Formal modelling of content-based protection and release for access control in NATO operations 17
Boosting model checking to analyse large ARBAC policies 17
From integrated reasoning specialists to “plug-And-Play” reasoning components 17
Light-weight theorem proving for debugging and verifying units of code 17
Automated termination in model-checking modulo theories 17
Totale 2.443
Categoria #
all - tutte 47.871
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 269
Totale 48.140


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202046 0 0 0 0 9 5 9 6 11 1 4 1
2020/202150 3 2 6 1 7 6 15 4 0 4 1 1
2021/2022685 2 0 2 3 2 1 0 266 65 47 6 291
2022/2023444 189 25 22 8 26 42 5 28 36 17 32 14
2023/20241.152 15 36 119 38 168 446 60 28 4 79 37 122
2024/2025737 8 34 47 446 202 0 0 0 0 0 0 0
Totale 3.188