Anna Vaccarelli

According to our database1, Anna Vaccarelli authored at least 22 papers between 1992 and 2008.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2008
Mobile Implementation and Formal Verification of an e-Voting System.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

2007
Fine Grained Access Control with Trust and Reputation Management for Globus.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Extending the Globus Architecture with Role-Based Trust Management.
Proceedings of the Computer Aided Systems Theory, 2007

2006
Formal analysis of some secure procedures for certificate delivery.
Softw. Test., Verif. Reliab., 2006

An asymmetric fingerprint matching algorithm for Java Card TM.
Pattern Anal. Appl., 2006

A Fine-Grained and X.509-Based Access Control System for Globus.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006

Fine-grained and History-based Access Control with Trust Management for Autonomic Grid Services.
Proceedings of the 2006 International Conference on Autonomic and Autonomous Systems (ICAS 2006), 2006

Policy Driven Virtual Machine Monitor for Protected Grids.
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006

2005
SEAS, a secure e-voting protocol: Design and implementation.
Comput. Secur., 2005

A Flexible Framework for Access Control Based on Ability Authentication.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005

Towards Continuous Usage Control on Grid Computational Services.
Proceedings of the Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, 2005

An Asymmetric Fingerprint Matching Algorithm for Java Card™.
Proceedings of the Audio- and Video-Based Biometric Person Authentication, 2005

MOC via TOC Using a Mobile Agent Framework.
Proceedings of the Audio- and Video-Based Biometric Person Authentication, 2005

2004
Improving Grid Services Security with Fine Grain Policies.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

Local Management of Credits and Debits in Mobile Ad Hoc Networks.
Proceedings of the Communications and Multimedia Security, 2004

2003
SEAS: A Secure E-Voting Applet System.
Proceedings of the Software Security, 2003

Compositional Verification of Secure Streamed Data: A Case Study with EMSS.
Proceedings of the Theoretical Computer Science, 8th Italian Conference, 2003

Formal Anaylsis of Some Timed Security Properties in Wireless Protocols.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2003

Compositional Verification of Integrity for Digital Stream Signature Protocols.
Proceedings of the 3rd International Conference on Application of Concurrency to System Design (ACSD 2003), 2003

2002
Automated Analysis of Some Security Mechanisms of SCEP.
Proceedings of the Information Security, 5th International Conference, 2002

1994
An algebraic method for detection and recognition of polyhedral objects from a single image.
Pattern Recognit., 1994

1992
An algebraic method for detecting three-dimensional objects in a picture.
Proceedings of the 11th IAPR International Conference on Pattern Recognition, 1992


  Loading...