Chiara Braghin

Orcid: 0000-0002-9756-4675

According to our database1, Chiara Braghin authored at least 33 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Kant: A Domain-Specific Language for Modeling Security Protocols.
Proceedings of the 12th International Conference on Model-Based Software and Systems Engineering, 2024

2023
A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study.
Comput. Secur., April, 2023

2022
Towards Trust-preserving Continuous Co-evolution of Digital Twins.
Proceedings of the IEEE 19th International Conference on Software Architecture Companion, 2022

Engineering of Trust Analysis-Driven Digital Twins for a Medical Device.
Proceedings of the Software Architecture. ECSA 2022 Tracks and Workshops, 2022

2021
Formal Proof of a Vulnerability in Z-Wave IoT Protocol.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Dynamic and Scalable Enforcement of Access Control Policies for Big Data.
Proceedings of the MEDES '21: Proceedings of the 13th International Conference on Management of Digital EcoSystems, Virtual Event, Tunisia, November 1, 2021


Towards ASM-Based Automated Formal Verification of Security Protocols.
Proceedings of the Rigorous State-Based Methods - 8th International Conference, 2021

2020
Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges.
Proceedings of the Model-driven Simulation and Training Environments for Cybersecurity, 2020

2019
A Model Driven Approach for Cyber Security Scenarios Deployment.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Towards Blockchain-Based E-Voting Systems.
Proceedings of the Business Information Systems Workshops, 2019

2018
Are mHealth Apps Secure? A Case Study.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Is Pokémon GO Watching You? A Survey on the Privacy-Awareness of Location-Based Apps' Users.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2013
Using Semantic Lifting for improving Process Mining: a Data Loss Prevention System case study.
Proceedings of the 3rd International Symposium on Data-driven Process Discovery and Analysis, 2013

Knowledge and Business Intelligence Technologies in Cross-Enterprise Environments for Italian Advanced Mechanical Industry.
Proceedings of the 3rd International Symposium on Data-driven Process Discovery and Analysis, 2013

2012
The binary perfect phylogeny with persistent characters.
Theor. Comput. Sci., 2012

2011
A model checking-based approach for security policy verification of mobile systems.
Formal Aspects Comput., 2011

2008
Information flow security in Boundary Ambients.
Inf. Comput., 2008

An Exact Approach for solving the Balanced Minimum Evolution Problem.
Proceedings of the Seventh Cologne Twente Workshop on Graphs and Combinatorial Optimization, 2008

2007
Automated Verification of Security Policies in Mobile Code.
Proceedings of the Integrated Formal Methods, 6th International Conference, 2007

2006
Role-based access control for a distributed calculus.
J. Comput. Secur., 2006

2005
Static analysis of security properties in mobile ambients.
PhD thesis, 2005

2004
Flow-sensitive Leakage Analysis in Mobile Ambients.
Proceedings of the 2nd International Workshop on Security Issues in Coordination Models, 2004

Nesting analysis of mobile ambients.
Comput. Lang. Syst. Struct., 2004

A Distributed Calculus for Ro^le-Based Access Control.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

2003
Checking Integrity via CoPS and Banana: the E-Commerce Case Study .
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003

Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients.
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003

Information Leakage Detection in Boundary Ambients.
Proceedings of the Computing: the Australasian Theory Symposiumm, 2003

Complexity of Nesting Analysis in Mobile Ambients.
Proceedings of the Verification, 2003

BANANA - A Tool for Boundary Ambients Nesting ANAlysis.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2003

2002
Security boundaries in mobile ambients.
Comput. Lang. Syst. Struct., 2002

Boundary Inference for Enforcing Security Policies in Mobile Ambients.
Proceedings of the Foundations of Information Technology in the Era of Networking and Mobile Computing, 2002

Control Flow Analysis of Mobile Ambients with Security Boundaries.
Proceedings of the Formal Methods for Open Object-Based Distributed Systems V, 2002


  Loading...