Stefano Berlato

Orcid: 0000-0002-1700-672X

According to our database1, Stefano Berlato authored at least 13 papers between 2020 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Mitigating Debugger-based Attacks to Java Applications with Self-debugging.
ACM Trans. Softw. Eng. Methodol., May, 2024

A Security Service for Performance-Aware End-to-End Protection of Sensitive Data in Cloud Native Applications.
PhD thesis, 2024

Multi-Objective Microservice Orchestration: Balancing Security and Performance in CCAM.
Proceedings of the 27th Conference on Innovation in Clouds, Internet and Networks, 2024

Work-in-Progress: A Sidecar Proxy for Usable and Performance-Adaptable End-to-End Protection of Communications in Cloud Native Applications.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

2022
Smart Card-Based Identity Management Protocols for V2V and V2I Communications in CCAM: A Systematic Literature Review.
IEEE Trans. Intell. Transp. Syst., 2022

Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud.
ACM Trans. Priv. Secur., 2022

End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

2021
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay Between Functional and Security Requirements.
IEEE Veh. Technol. Mag., 2021

Blockchain Based RAN Data Sharing.
Proceedings of the IEEE International Conference on Smart Data Services, 2021

Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2020
A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps.
J. Inf. Secur. Appl., 2020

Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Security Considerations on 5G-Enabled Back-Situation Awareness for CCAM.
Proceedings of the 3rd IEEE 5G World Forum, 2020


  Loading...