According to our database1, Gabriele Costa authored at least 37 papers between 2009 and 2018.
Legend:Book In proceedings Article PhD thesis Other
Automatic security verification of mobile app configurations.
Future Generation Comp. Syst., 2018
From Natural Projection to Partial Model Checking and Back.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2018
Scenario Design and Validation for Next Generation Cyber Ranges.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018
Strong Authentication for e-Banking: A Survey on European Regulations and Implementations.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
PolEnA: Enforcing Fine-grained Permission Policies in Android.
Proceedings of the Computer Safety, Reliability, and Security, 2017
Android vs. SEAndroid: An empirical assessment.
Pervasive and Mobile Computing, 2016
FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Formal modeling and automatic enforcement of Bring Your Own Device policies.
Int. J. Inf. Sec., 2015
SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2015
Android Permissions Unleashed.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
Securing Android with Local Policies.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015
Mobile App Security Analysis with the MAVeriC Static Analysis Module.
Securing the "Bring Your Own Device" Paradigm.
IEEE Computer, 2014
Enabling BYOD through secure meta-market.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Market-Based Security for Mobile Devices.
ERCIM News, 2013
Bring your own device, securely.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Trustworthy Opportunistic Access to the Internet of Services.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Multi-dimensional Secure Service Orchestration.
Proceedings of the Business Process Management Workshops, 2013
Securing the "Bring Your Own Device" Policy.
J. Internet Serv. Inf. Secur., 2012
Metric-Aware Secure Service Orchestration
Proceedings of the Proceedings Fifth Interaction and Concurrency Experience, 2012
Gate automata-driven run-time enforcement.
Computers & Mathematics with Applications, 2012
Formal Modeling and Reasoning about the Android Security Framework.
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012
Lazy Security Controllers.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012
Lazy Monitoring for Distributed Computing Environments.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Secure service orchestration in open networks.
Journal of Systems Architecture - Embedded Systems Design, 2011
Security and Trust.
Proceedings of the Formal Methods for Eternal Networked Software Systems, 2011
Elective temporal logic.
Proceedings of the 7th International Conference on the Quality of Software Architectures, 2011
Trust-Driven Policy Enforcement through Gate Automata.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Security-by-Contract-with-Trust for Mobile Devices.
Parental Control for Mobile Devices.
ERCIM News, 2010
Runtime monitoring for next generation Java ME platform.
Computers & Security, 2010
Modular Plans for Secure Service Composition.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010
Extending Security-by-Contract with Quantitative Trust on Mobile Devices.
Proceedings of the CISIS 2010, 2010
Securing Java with Local Policies.
Journal of Object Technology, 2009
Jalapa: Securing Java with Local Policies: Tool Demonstration.
Electr. Notes Theor. Comput. Sci., 2009
Detection of images with adult content for parental control on mobile devices?
Proceedings of the 6th International Conference on Mobile Technology, 2009