Valentina Casola

Orcid: 0000-0003-0964-7014

According to our database1, Valentina Casola authored at least 116 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure software development and testing: A model-based methodology.
Comput. Secur., February, 2024

DEFEDGE: Threat-Driven Security Testing and Proactive Defense Identification for Edge-Cloud Systems.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Understanding the challenges and novel architectural models of multi-cloud native applications - a systematic literature review.
J. Cloud Comput., 2023

Lightweight Secure Keys Management Based on Physical Unclonable Functions.
Proceedings of the 9th International Workshop on Advances in Sensors and Interfaces, 2023

Timing Behavior Characterization of Critical Real-Time Systems through Hybrid Timing Analysis.
Proceedings of the 7th International Conference on System Reliability and Safety, 2023

Ensuring End-to-End Security in Computing Continuum Exploiting Physical Unclonable Functions.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

Automatic Test Generation to Improve Scrum for Safety Agile Methodology.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Guest Editorial: Advanced Computing and Blockchain Applications for Critical Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

Scrum for safety: an agile methodology for safety-critical software systems.
Softw. Qual. J., 2022

Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls.
Comput. Electr. Eng., 2022

A Memory Protection Strategy for Resource Constrained Devices in Safety Critical Applications.
Proceedings of the 6th International Conference on System Reliability and Safety, 2022

2021
A Security and Privacy Validation Methodology for e-Health Systems.
ACM Trans. Multim. Comput. Commun. Appl., 2021

On the Adoption of Physically Unclonable Functions to Secure IIoT Devices.
IEEE Trans. Ind. Informatics, 2021

Combining contextualized word representation and sub-document level analysis through Bi-LSTM+CRF architecture for clinical de-identification.
Knowl. Based Syst., 2021

Security-Aware Deployment Optimization of Cloud-Edge Systems in Industrial IoT.
IEEE Internet Things J., 2021

A Novel COVID-19 Data Set and an Effective Deep Learning Approach for the De-Identification of Italian Medical Records.
IEEE Access, 2021

Scrum for Safety: Agile Development in Safety-Critical Software Systems.
Proceedings of the Quality of Information and Communications Technology, 2021

Toward Automated Threat Modeling of Edge Computing Systems.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach.
J. Syst. Softw., 2020

Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services.
IEEE Internet Things J., 2020

A methodology for automated penetration testing of cloud applications.
Int. J. Grid Util. Comput., 2020

Crosslingual named entity recognition for clinical de-identification applied to a COVID-19 Italian data set.
Appl. Soft Comput., 2020

A Cloud SecDevOps Methodology: From Design to Testing.
Proceedings of the Quality of Information and Communications Technology, 2020

Towards Tracking Data Flows in Cloud Architectures.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

2019
Toward the automation of threat modeling and risk assessment in IoT systems.
Internet Things, 2019

A security monitoring system for internet of things.
Internet Things, 2019

Model-based deployment of secure multi-cloud applications.
Int. J. Grid Util. Comput., 2019

The Applicability of a SIEM Solution: Requirements and Evaluation.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

A First Step Towards an ISO-Based Information Security Domain Ontology.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Enabling Technologies: Infrastructure for Collaborative Enterprises Editorial for WETICE 2019 Conference.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

2018
Security-by-design in multi-cloud applications: An optimization approach.
Inf. Sci., 2018

Per-service security SLAs for cloud security management: model and implementation.
Int. J. Grid Util. Comput., 2018

Editorial: Security and privacy protection vs sustainable development.
Comput. Secur., 2018

Towards Automated Penetration Testing for Cloud Applications.
Proceedings of the 27th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2018

A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

A Security SLA-Driven Moving Target Defense Framework to Secure Cloud Applications.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018

Automated Risk Analysis for IoT Systems.
Proceedings of the Advances on P2P, 2018

2017
Automatically Enforcing Security SLAs in the Cloud.
IEEE Trans. Serv. Comput., 2017

MUSA Deployer: Deployment of Multi-cloud Applications.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Towards Model-Based Security Assessment of Cloud Applications.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

An Automatic Tool for Benchmark Testing of Cloud Applications.
Proceedings of the CLOSER 2017, 2017

A Security Metric Catalogue for Cloud Applications.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

2016
Cloud Computing for Earth Surface Deformation Analysis via Spaceborne Radar Imaging: A Case Study.
IEEE Trans. Cloud Comput., 2016

SLA-based Secure Cloud Application Development.
Scalable Comput. Pract. Exp., 2016

Healthcare-Related Data in the Cloud: Challenges and Opportunities.
IEEE Cloud Comput., 2016

Per-Service Security SLa: A New Model for Security Management in Clouds.
Proceedings of the 25th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2016

Cloud Security: From Per-Provider to Per-Service Security SLAs.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications.
Proceedings of the 2nd International Conference on Cloud Forward: From Distributed to Complete Computing, 2016

Security SLA in Next Generation Data Centers, the SPECS Approach.
Proceedings of the Cloud Computing and Services Science - 6th International Conference, 2016

Providing Security SLA in Next Generation Data Centers with SPECS: The EMC Case Study.
Proceedings of the CLOSER 2016, 2016

Methodology to Obtain the Security Controls in Multi-cloud Applications.
Proceedings of the CLOSER 2016, 2016

A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services.
Proceedings of the 10th International Conference on Complex, 2016

2015
An On-Demand Web Tool for the Unsupervised Retrieval of Earth's Surface Deformation from SAR Data: The P-SBAS Service within the ESA G-POD Environment.
Remote. Sens., 2015

SLA-Based Secure Cloud Application Development: The SPECS Framework.
Proceedings of the 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2015

Unsupervised on-demand web service for DInSAR processing: The P-SBAS implementation within the ESA G-POD environment.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Towards Self-Protective Multi-Cloud Applications - MUSA - a Holistic Framework to Support the Security-Intelligent Lifecycle Management of Multi-Cloud Applications.
Proceedings of the CLOSER 2015, 2015

Security Monitoring in the Cloud: An SLA-Based Approach.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

DoS Protection in the Cloud through the SPECS Services.
Proceedings of the 10th International Conference on P2P, 2015

2014
Developing Secure Cloud Applications.
Scalable Comput. Pract. Exp., 2014

An SLA-based brokering platform to provide sensor networks as-a-service.
Int. J. Bus. Process. Integr. Manag., 2014

Manipulating the attacker's view of a system's attack surface.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Cloud Platform for Scientific Advances in Earth Surface Interferometric SAR Image Analysis.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

A Cloud Application for Security Service Level Agreement Evaluation.
Proceedings of the CLOSER 2014, 2014

Preliminary Design of a Platform-as-a-Service to Provide Security in Cloud.
Proceedings of the CLOSER 2014, 2014

On the Adoption of Security SLAs in the Cloud.
Proceedings of the Accountability and Security in the Cloud, 2014

2013
SeNsiM-SEC: secure sensor networks integration to monitor rail freight transport.
Int. J. Syst. Syst. Eng., 2013

A smart decision support systems based on a fast classifier and a semantic post reasoner.
Int. J. Syst. Syst. Eng., 2013

SIREN: a feasible moving target defence framework for securing resource-constrained embedded nodes.
Int. J. Crit. Comput. Based Syst., 2013

A semantic approach for fine-grain access control of e-health documents.
Log. J. IGPL, 2013

The CloudGrid approach: Security analysis and performance evaluation.
Future Gener. Comput. Syst., 2013

Developing Secure Cloud Applications: A Case Study.
Proceedings of the 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, 2013

A Probabilistic Framework for Distributed Localization of Attackers in MANETs.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

An integrated lifetime and network quality model of large WSNs.
Proceedings of the 2nd IEEE International Workshop on Measurements & Networking, 2013

A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices.
Proceedings of the Integration of Reusable Systems [extended versions of the best papers which were presented at IEEE International Conference on Information Reuse and Integration and IEEE International Workshop on Formal Methods Integration, 2013

A moving target defense approach for protecting resource-constrained distributed devices.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

An FPGA-Based Smart Classifier for Decision Support Systems.
Proceedings of the Intelligent Distributed Computing VII, 2013

Towards Automatic Generation of Hardware Classifiers.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013

Security as a Service Using an SLA-Based Approach via SPECS.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

An SLA-Based Approach to Manage Sensor Networks as-a-Service.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Performance Evaluation of Video Analytics for Surveillance On-Board Trains.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2013

A Compositional Modelling Approach for Large Sensor Networks Design.
Proceedings of the Eighth International Conference on P2P, 2013

On the Adoption of FPGA for Protecting Cyber Physical Infrastructures.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Performance Analysis of an OCSP-Based Authentication Protocol for VANETs.
Int. J. Adapt. Resilient Auton. Syst., 2012

Freight Train monitoring: A Case-Study for the pSHIELD Project.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
A semantic enriched data model for sensor network interoperability.
Simul. Model. Pract. Theory, 2011

Analysis and Comparison of Security Protocols in Wireless Sensor Networks.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

A Semantic-based Document Processing Framework: A Security Perspective.
Proceedings of the International Conference on Complex, 2011

An Innovative Framework for Securing Unstructured Documents.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

Access Control in Cloud-on-Grid Systems: The <i>PerfCloud</i> Case Study.
Proceedings of the Computers, Privacy and Data Protection: an Element of Choice, 2011

2010
An interoperability system for authentication and authorisation in VANETs.
Int. J. Auton. Adapt. Commun. Syst., 2010

Security and Performance Trade-off in PerfCloud.
Proceedings of the Euro-Par 2010 Parallel Processing Workshops, 2010

A Common Data Model for Sensor Network Integration.
Proceedings of the CISIS 2010, 2010

Identity federation in cloud computing.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

A semantic based methodology to classify and protect sensitive data in medical records.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
A Reference Architecture for Sensor Networks Integration and Management.
Proceedings of the GeoSensor Networks, Third International Conference, 2009

An AHP-Based Framework for Quality and Security Evaluation.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

PerfCloud: Performance-Oriented Integration of Cloud and GRID.
Proceedings of the Cloud Computing - First International Conference, 2009

2008
Self-optimization of secure web services.
Comput. Commun., 2008

The REM Framework for Security Evaluation.
Proceedings of the The Third International Conference on Availability, 2008

2007
A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures.
J. Comput. Secur., 2007

Optimizing secure Web Services with MAWeS: A case study.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

A policy-based evaluation framework for Quality and Security in Service Oriented Architectures.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal.
Proceedings of the Advances in Grid and Pervasive Computing, 2007

Building Autonomic and Secure Service Oriented Architectures with MAWeS.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Static evaluation of Certificate Policies for GRID PKIs interoperability.
Proceedings of the The Second International Conference on Availability, 2007

2006
A SLA evaluation methodology in Service Oriented Architectures.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Design and implementation of TruMan, a Trust Manager Component for Distributed Systems.
Proceedings of the Second International Workshop on Security, 2006

2005
A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques.
J. Univers. Comput. Sci., 2005

Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based Approach.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures.
Proceedings of the Public Key Infrastructure, 2005

2004
Design of Policy-Based Security Mechanisms in a Distributed Web Services Architecture.
Proceedings of the Applied Parallel Computing, 2004

Security Level Evaluation: Policy and Fuzzy Techniques.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A Policy-Based Design Methodology and Performance Evaluation Framework for a Secure VoIP Infrastructure.
Proceedings of the ICETE 2004, 2004

2003
Policy based interoperability in distributed security infrastructures.
Proceedings of the Enhanced Interoperable Systems. Proceedings of the 10th ISPE International Conference on Concurrent Engineering (ISPE CE 2003), 2003

2002
Policy formalization to combine separate systems into larger connected network of trust.
Proceedings of the Network Control and Engineering for QoS, 2002


  Loading...