Gabriele Costa

According to our database1, Gabriele Costa authored at least 37 papers between 2009 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Automatic security verification of mobile app configurations.
Future Generation Comp. Syst., 2018

From Natural Projection to Partial Model Checking and Back.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2018

Scenario Design and Validation for Next Generation Cyber Ranges.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

2017
Strong Authentication for e-Banking: A Survey on European Regulations and Implementations.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

PolEnA: Enforcing Fine-grained Permission Policies in Android.
Proceedings of the Computer Safety, Reliability, and Security, 2017

2016
Android vs. SEAndroid: An empirical assessment.
Pervasive and Mobile Computing, 2016

FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Formal modeling and automatic enforcement of Bring Your Own Device policies.
Int. J. Inf. Sec., 2015

SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2015

Android Permissions Unleashed.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

Securing Android with Local Policies.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
Mobile App Security Analysis with the MAVeriC Static Analysis Module.
JoWUA, 2014

Securing the "Bring Your Own Device" Paradigm.
IEEE Computer, 2014

Enabling BYOD through secure meta-market.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

2013
Market-Based Security for Mobile Devices.
ERCIM News, 2013

Bring your own device, securely.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Trustworthy Opportunistic Access to the Internet of Services.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Multi-dimensional Secure Service Orchestration.
Proceedings of the Business Process Management Workshops, 2013

2012
Securing the "Bring Your Own Device" Policy.
J. Internet Serv. Inf. Secur., 2012

Metric-Aware Secure Service Orchestration
Proceedings of the Proceedings Fifth Interaction and Concurrency Experience, 2012

Gate automata-driven run-time enforcement.
Computers & Mathematics with Applications, 2012

Formal Modeling and Reasoning about the Android Security Framework.
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012

Lazy Security Controllers.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Lazy Monitoring for Distributed Computing Environments.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
Secure service orchestration in open networks.
Journal of Systems Architecture - Embedded Systems Design, 2011

Security and Trust.
Proceedings of the Formal Methods for Eternal Networked Software Systems, 2011

Elective temporal logic.
Proceedings of the 7th International Conference on the Quality of Software Architectures, 2011

Trust-Driven Policy Enforcement through Gate Automata.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

2010
Security-by-Contract-with-Trust for Mobile Devices.
JoWUA, 2010

Parental Control for Mobile Devices.
ERCIM News, 2010

Runtime monitoring for next generation Java ME platform.
Computers & Security, 2010

Modular Plans for Secure Service Composition.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

Extending Security-by-Contract with Quantitative Trust on Mobile Devices.
Proceedings of the CISIS 2010, 2010

2009
Securing Java with Local Policies.
Journal of Object Technology, 2009

Jalapa: Securing Java with Local Policies: Tool Demonstration.
Electr. Notes Theor. Comput. Sci., 2009

Detection of images with adult content for parental control on mobile devices?
Proceedings of the 6th International Conference on Mobile Technology, 2009


  Loading...