Marco Domenico Aime

According to our database1, Marco Domenico Aime authored at least 14 papers between 2005 and 2011.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Automatic (Re)Configuration of IT Systems for Dependability.
IEEE Trans. Serv. Comput., 2011

Exploiting Proxy-Based Federated Identity Management in Wireless Roaming Access.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

2010
Ontology and algorithms for the dependable configuration of information systems.
Int. J. Crit. Comput. Based Syst., 2010

2008
Policy-Driven System Configuration for Dependability.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Generation of Diagnostic Plans for Large ICT Systems.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Learning to Enhance Dependability of Information Systems.
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008

The risks with security metrics.
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008

2007
Dependability in Wireless Networks: Can We Rely on WiFi?
IEEE Secur. Priv., 2007

AMBRA: automated model-based risk analysis.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

2006
A Wireless Distributed Intrusion Detection System and a New Attack Model.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

2005
Incremental Trust: Building Trust from Past Experience.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

The Wireless Opaque Channel to Contrast Information Leakage.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

Motivations for a Theoretical Approach to WYSIWYS.
Proceedings of the Communications and Multimedia Security, 2005

Decentralised Access Control in 802.11 Networks.
Proceedings of the Communications and Multimedia Security, 2005


  Loading...