IIT Home Page CNR Home Page

Lista Pubblicazioni

Rivista ISI, 2008

P. Greci, F. Martinelli, I. Matteucci
A Framework for Contract-Policy Matching based on Symbolic Simulations for securing Mobile Device Application
2008, LECTURE NOTES IN COMPUTER SCIENCE (00538S0)
F. Geraci, M. Pellegrini, E. Renda
AMIC@: All MIcroarray Clusterings @ once
2008, NUCLEIC ACIDS RESEARCH (72106J0)
R. Bruno, M. Conti, E. Gregori
An Accurate Closed-form Formula for the Throughput of Long-lived TCP Connections in IEEE 802.11 WLANs
2008, COMPUTER NETWORKS AND ISDN SYSTEMS (01477J0)
B. Aziz, A. Arenas, F. Martinelli, I. Matteucci P. Mori
Controlling Usage of Business Processes through Fine-Grained Security Policies
2008, LECTURE NOTES IN COMPUTER SCIENCE (00538S0)
E. Ancillotti, R. Bruno, M. Conti, A. Pinizzotto
Enhancing DHCP for Address Autoconfiguration in Multi-hop WLANs
2008, LECTURE NOTES IN COMPUTER SCIENCE (00538S0)
A. Castrucci, F. Martinelli, P. Mori, F. Roperti
Enhancing Java ME Security Support with Resource Usage Monitoring
2008, LECTURE NOTES IN COMPUTER SCIENCE (00538S0)
F. Martinelli, P. Mori
Enhancing Java Security with History Based Access Control
2008, LECTURE NOTES IN COMPUTER SCIENCE (00538S0)
Stefano Bistarelli, Francesco Santini
SCLP for Trust Propagation in Small-World Networks
2008, LECTURE NOTES IN ARTIFICIAL INTELLIGENCE (06400S0)
S.N. Foley, G. Bella, S. Bistarelli
Security Protocol Deployment Risk
2008, LECTURE NOTES IN COMPUTER SCIENCE (00538S0)
Stefano Bistarelli, Francesca Rossi
Semiring-Based Soft Constraints. Concurrency, Graphs and Models
2008, Lecture Notes in Computer Science