Paolo Maggi

According to our database1, Paolo Maggi authored at least 14 papers between 2001 and 2014.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
HPC Cloud Pills: On-Demand Deployment and Execution of HPC Application in Cloud Environments.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2010
Conjugating science gateways and grid portals into e-collaboration environments: the Liferay and GENIUS/EnginFrame use case.
Proceedings of the 2010 TeraGrid Conference, 2010

2009
Detecting Chains of Vulnerabilities in Industrial Networks.
IEEE Trans. Ind. Informatics, 2009

2008
Vulnerability Modelling for the Analysis of Network Attacks.
Proceedings of the Third International Conference on Dependability of Computer Systems, 2008

2007
A Grid-Powered Framework to Support Courses on Distributed Programming.
IEEE Trans. Educ., 2007

Improving the security of industrial networks by means of formal verification.
Comput. Stand. Interfaces, 2007

2004
Implementing innovative services supporting user and terminal mobility: the SCARAB architecture.
J. Syst. Softw., 2004

2003
A configurable mobile agent data protection protocol.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

2002
Experiments on Formal Verification of Mobile Agent Data Integrity Properties.
Proceedings of the WOA 2002: Dagli Oggetti agli Agenti. 3rd AI*IA/TABOO Joint Workshop "From Objects to Agents": From Information to Knowledge, 2002

Using SPIN to Verify Security Properties of Cryptographic Protocols.
Proceedings of the Model Checking of Software, 2002

2001
Using Process Algebras to Formally Specify Mobile Agent Data Integrity Properties: A Case Study.
Proceedings of the WOA 2001: Dagli Oggetti agli Agenti. 2nd AI*IA/TABOO Joint Workshop "From Objects to Agents": Evolutive Trends of Software Systems, 2001

Using Data Flow Analysis to Infer Type Information in Java Bytecode.
Proceedings of the 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 2001

Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study.
Proceedings of the Mobile Agents, 5th International Conference, 2001

SCARAB: Innovative Services Supporting User and Terminal Mobility.
Proceedings of the 21st International Conference on Distributed Computing Systems Workshops (ICDCS 2001 Workshops), 2001


  Loading...