Ilaria Matteucci

According to our database1, Ilaria Matteucci authored at least 68 papers between 2006 and 2018.

Collaborative distances :

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Risk analysis of Android applications: A user-centric solution.
Future Generation Comp. Syst., 2018

CANDY: A Social Engineering Attack to Leak Information from Infotainment System.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

Improving Vehicle Safety Through a Fog Collaborative Infrastructure.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

CARS: Context Aware Reputation Systems to Evaluate Vehicles' Behaviour.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

2017
Concurrent History-based Usage Control Policies.
Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017

A Quantitative Partial Model-Checking Function and Its Optimisation.
Proceedings of the LPAR-21, 2017

Analysis of Data Sharing Agreements.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
A novel security information and event management system for enhancing cyber security in a hydroelectric dam.
IJCIP, 2016

Data Sharing Agreements: How to Glue Definition, Analysis and Mapping Together.
ERCIM News, 2016

Enforcement of U-XACML History-Based Usage Control Policy.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

A multi-criteria ranking of security countermeasures.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Automated adaptation via quantitative partial model checking.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Exploiting Vehicles' Reputation to Mitigate DoS Attack.
Proceedings of the International Workshop on domAin specific Model-based AppRoaches to vErificaTion and validaTiOn, 2016

A Formal and Run-Time Framework for the Adaptation of Local Behaviours to Match a Global Property.
Proceedings of the Formal Aspects of Component Software - 13th International Conference, 2016

Decomposing Global Quantitative Properties into Local Ones.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Introduction to ReSA4CI 2016.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

A Lifecycle for Data Sharing Agreements: How it Works Out.
Proceedings of the Privacy Technologies and Policy - 4th Annual Privacy Forum, 2016

2015
Towards safer information sharing in the cloud.
Int. J. Inf. Sec., 2015

Semiring-based Specification Approaches for Quantitative Security.
Proceedings of the Proceedings Thirteenth Workshop on Quantitative Aspects of Programming Languages and Systems, 2015

1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and Security (TELERISE 2015).
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

There are Two Sides to Every Question - Controller Versus Attacker.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
On the Synthesis of Secure Services Composition.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Preserving Data Privacy in e-Health.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Automated Synthesis and Ranking of Secure BPMN Orchestrators.
IJSSE, 2014

Closing the loop of SIEM analysis to Secure Critical Infrastructures.
CoRR, 2014

On Security Countermeasures Ranking through Threat Analysis.
Proceedings of the Computer Safety, Reliability, and Security, 2014

Introduction to the Safecomp 2014 Workshop: Reliability and Security Aspects for Critical Infrastructure Protection (ReSA4CI 2014).
Proceedings of the Computer Safety, Reliability, and Security, 2014

Improved Automatic Maturity Assessment of Wikipedia Medical Articles - (Short Paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014

Enforcing Mobile Application Security Through Probabilistic Contracts.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

Introducing Probabilities in Controller Strategies.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Maturity Assessment of Wikipedia Medical Articles.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

An Expertise-Driven Authoring Tool for E-Health Data Policies.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

Definition of Data Sharing Agreements - The Case of Spanish Data Protection Law.
Proceedings of the Accountability and Security in the Cloud, 2014

2013
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Remote Policy Enforcement for Trusted Application Execution in Mobile Environments.
Proceedings of the Trusted Systems - 5th International Conference, 2013

Quantitative Evaluation of Enforcement Strategies - Position Paper.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Partial Model Checking for the Verification and Synthesis of Secure Service Compositions.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

Introducing Probabilities in Contract-Based Approaches for Mobile Application Security.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

A prototype for solving conflicts in XACML-based e-Health policies.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

Automated Synthesis and Ranking of Secure BPMN Orchestrators.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
A framework for automatic generation of security controller.
Softw. Test., Verif. Reliab., 2012

Gate automata-driven run-time enforcement.
Computers & Mathematics with Applications, 2012

A tool for the synthesis of cryptographic orchestrators.
Proceedings of the Model-Driven Security Workshop, 2012

From Qualitative to Quantitative Enforcement of Security Policy.
Proceedings of the Computer Network Security, 2012

A Multi-criteria-Based Evaluation of Android Applications.
Proceedings of the Trusted Systems, 4th International Conference, 2012

Prioritized Execution of Privacy Policies.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

A Formal Support for Collaborative Data Sharing.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Controlled data sharing in E-health.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

Security and Trust.
Proceedings of the Formal Methods for Eternal Networked Software Systems, 2011

Elective temporal logic.
Proceedings of the 7th International Conference on the Quality of Software Architectures, 2011

Trust-Driven Policy Enforcement through Gate Automata.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Preserving security properties under refinement.
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011

A Design Phase for Data Sharing Agreements.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

2010
Security-by-Contract-with-Trust for Mobile Devices.
JoWUA, 2010

CNL4DSA: a controlled natural language for data sharing agreements.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Extending Security-by-Contract with Quantitative Trust on Mobile Devices.
Proceedings of the CISIS 2010, 2010

2009
Towards Information Flow Properties for Distributed Systems.
Electr. Notes Theor. Comput. Sci., 2009

Idea: Action Refinement for Security Properties Enforcement.
Proceedings of the Engineering Secure Software and Systems, 2009

2008
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies.
Proceedings of the Trust, 2008

A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application.
Proceedings of the Leveraging Applications of Formal Methods, 2008

A Uniform Approach to Security and Fault-Tolerance Specification and Analysis.
Proceedings of the Architecting Dependable Systems VI, 2008

Synthesis of Local Controller Programs for Enforcing Global Security Properties.
Proceedings of the The Third International Conference on Availability, 2008

2007
Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting.
Electr. Notes Theor. Comput. Sci., 2007

Through Modeling to Synthesis of Security Automata.
Electr. Notes Theor. Comput. Sci., 2007

An Approach for the Specification, Verification and Synthesis of Secure Systems.
Electr. Notes Theor. Comput. Sci., 2007

Synthesis of Web Services Orchestrators in a Timed Setting.
Proceedings of the Web Services and Formal Methods, 4th International Workshop, 2007

2006
A Tool for the Synthesis of Controller Programs.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006


  Loading...