Mirko Montanari

According to our database1, Mirko Montanari authored at least 18 papers between 2007 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Limiting information exposure in multi-domain monitoring systems
PhD thesis, 2013

Distributed security policy conformance.
Comput. Secur., 2013

Limiting Data Exposure in Monitoring Multi-domain Policy Conformance.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Assessing software integrity of virtual appliances through software whitelists.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Towards SDN enabled network control delegation in clouds.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

An empirical study on the software integrity of virtual appliances: are you really getting what you paid for?
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
A middleware for assured clouds.
J. Internet Serv. Appl., 2012

Multi-organization Policy-Based Monitoring.
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012

Evidence of log integrity in policy-based security monitoring.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

Confidentiality of event data in policy-based monitoring.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

2011
NetODESSA: Dynamic Policy Enforcement in Cloud Networks.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

Attack-resilient compliance monitoring for large distributed infrastructure systems.
Proceedings of the 5th International Conference on Network and System Security, 2011

2009
Budget constrained optimal security hardening of control networks for critical cyber-infrastructures.
Int. J. Crit. Infrastructure Prot., 2009

Multi-aspect security configuration assessment.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009

An Automatic User Study Demo in Indoor Environments and Its Privacy Implications.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Using Failure Models for Controlling Data Availability in Wireless Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

MICS: an efficient content space representation model for publish/subscribe systems.
Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, 2009

2007
Architecture for an Automatic Customized Warning System.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007


  Loading...