Ilaria Matteucci
Ilaria Matteucci
IIT-CNR
Verified email at iit.cnr.it - Homepage
TitleCited byYear
Through modeling to synthesis of security automata
F Martinell, I Matteucci
Electronic Notes in Theoretical Computer Science 179, 31-46, 2007
702007
CNL4DSA: a controlled natural language for data sharing agreements
I Matteucci, M Petrocchi, ML Sbodio
Proceedings of the 2010 ACM Symposium on Applied Computing, 616-620, 2010
422010
Extending security-by-contract with quantitative trust on mobile devices
G Costa, N Dragoni, A Lazouski, F Martinelli, F Massacci, I Matteucci
2010 International Conference on Complex, Intelligent and Software Intensive …, 2010
382010
Prioritized execution of privacy policies
I Matteucci, P Mori, M Petrocchi
Data Privacy Management and Autonomous Spontaneous Security, 133-145, 2012
312012
A prototype for solving conflicts in XACML-based e-Health policies
A Lunardelli, I Matteucci, P Mori, M Petrocchi
Proceedings of the 26th IEEE International Symposium on Computer-Based …, 2013
242013
Automated synthesis of enforcing mechanisms for security properties in a timed setting
I Matteucci
Electronic Notes in Theoretical Computer Science 186, 101-120, 2007
242007
Risk analysis of Android applications: A user-centric solution
G Dini, F Martinelli, I Matteucci, M Petrocchi, A Saracino, D Sgandurra
Future Generation Computer Systems 80, 505-518, 2018
232018
A multi-criteria-based evaluation of android applications
G Dini, F Martinelli, I Matteucci, M Petrocchi, A Saracino, D Sgandurra
International Conference on Trusted Systems, 67-82, 2012
232012
A design phase for data sharing agreements
I Matteucci, M Petrocchi, ML Sbodio, L Wiegand
Data Privacy Management and Autonomous Spontaneus Security, 25-41, 2011
212011
Controlling usage in business process workflows through fine-grained security policies
B Aziz, A Arenas, F Martinelli, I Matteucci, P Mori
International Conference on Trust, Privacy and Security in Digital Business …, 2008
202008
Controlling usage in business process workflows through fine-grained security policies
B Aziz, A Arenas, F Martinelli, I Matteucci, P Mori
International Conference on Trust, Privacy and Security in Digital Business …, 2008
202008
An approach for the specification, verification and synthesis of secure systems
F Martinelli, I Matteucci
Electronic Notes in Theoretical Computer Science 168, 29-43, 2007
202007
A framework for automatic generation of security controller
F Martinelli, I Matteucci
Software Testing, Verification and Reliability 22 (8), 563-582, 2012
182012
A formal support for collaborative data sharing
F Martinelli, I Matteucci, M Petrocchi, L Wiegand
International Conference on Availability, Reliability, and Security, 547-561, 2012
182012
A novel security information and event management system for enhancing cyber security in a hydroelectric dam
C Di Sarno, A Garofalo, I Matteucci, M Vallini
International Journal of Critical Infrastructure Protection 13, 39-51, 2016
172016
From qualitative to quantitative enforcement of security policy
F Martinelli, I Matteucci, C Morisset
International Conference on Mathematical Methods, Models, and Architectures …, 2012
172012
Controlled data sharing in E-health
I Matteucci, P Mori, M Petrocchi, L Wiegand
2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011
172011
Evaluating the trust of android applications through an adaptive and distributed multi-criteria approach
G Dini, F Martinelli, I Matteucci, M Petrocchi, A Saracino, D Sgandurra
2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013
152013
A framework for contract-policy matching based on symbolic simulations for securing mobile device application
P Greci, F Martinelli, I Matteucci
International Symposium On Leveraging Applications of Formal Methods …, 2008
152008
Partial model checking, process algebra operators and satisfiability procedures for (automatically) enforcing security properties
F Martinelli, I Matteucci
Foundations of Computer Security, 133-144, 2005
152005
The system can't perform the operation now. Try again later.
Articles 1–20