Ranise, Silvio
 Distribuzione geografica
Continente #
NA - Nord America 5.180
EU - Europa 3.490
AS - Asia 1.166
AF - Africa 44
Continente sconosciuto - Info sul continente non disponibili 32
SA - Sud America 31
OC - Oceania 27
Totale 9.970
Nazione #
US - Stati Uniti d'America 5.063
IT - Italia 937
DE - Germania 680
UA - Ucraina 461
SE - Svezia 364
HK - Hong Kong 288
FI - Finlandia 262
CN - Cina 257
IE - Irlanda 184
IN - India 159
VN - Vietnam 159
GB - Regno Unito 152
FR - Francia 120
SG - Singapore 107
CA - Canada 105
RU - Federazione Russa 100
BE - Belgio 68
NL - Olanda 47
IR - Iran 43
EU - Europa 32
JP - Giappone 32
BR - Brasile 30
KR - Corea 27
AU - Australia 20
NG - Nigeria 19
ID - Indonesia 16
MY - Malesia 15
AT - Austria 12
ES - Italia 12
IL - Israele 11
BY - Bielorussia 9
SI - Slovenia 9
BA - Bosnia-Erzegovina 8
GR - Grecia 8
PK - Pakistan 8
TR - Turchia 8
DK - Danimarca 7
EG - Egitto 7
MX - Messico 7
NO - Norvegia 7
NZ - Nuova Zelanda 7
PH - Filippine 7
RO - Romania 7
CZ - Repubblica Ceca 6
LU - Lussemburgo 6
SA - Arabia Saudita 6
HU - Ungheria 5
JO - Giordania 5
TH - Thailandia 5
TW - Taiwan 5
CH - Svizzera 4
EE - Estonia 3
HN - Honduras 3
MA - Marocco 3
AE - Emirati Arabi Uniti 2
AZ - Azerbaigian 2
DZ - Algeria 2
HR - Croazia 2
IQ - Iraq 2
KE - Kenya 2
LB - Libano 2
LV - Lettonia 2
PL - Polonia 2
RS - Serbia 2
TN - Tunisia 2
ZW - Zimbabwe 2
AL - Albania 1
BW - Botswana 1
CO - Colombia 1
CR - Costa Rica 1
CU - Cuba 1
LT - Lituania 1
MD - Moldavia 1
ML - Mali 1
SC - Seychelles 1
SD - Sudan 1
SK - Slovacchia (Repubblica Slovacca) 1
SO - Somalia 1
TZ - Tanzania 1
ZA - Sudafrica 1
Totale 9.970
Città #
Chandler 1.310
Jacksonville 945
Trento 409
Hong Kong 265
Boardman 240
Wilmington 228
Ashburn 205
Dublin 180
Kronberg 172
Helsinki 154
Dong Ket 151
Ann Arbor 116
Dearborn 114
Beijing 103
Brooklyn 84
Ottawa 83
New York 69
Woodbridge 68
Singapore 67
Redwood City 59
Los Angeles 57
Brussels 55
Phoenix 50
Pune 50
Shanghai 49
Campogalliano 47
Milan 36
Seattle 35
Cheyenne 32
Verona 31
Fremont 29
Houston 26
Hanover 25
Miami 25
Ardabil 23
Rome 21
Neumarkt 20
Secaucus 20
Monmouth Junction 18
Mountain View 18
Tokyo 17
Norwalk 15
Cambridge 14
Guangzhou 14
Portland 14
Falkenstein 13
Kiel 13
Redondo Beach 13
Sydney 13
São Luís 13
Lagos 12
Merano 12
Nanjing 11
Bologna 10
Falls Church 10
Cento 9
Cologne 9
Genoa 9
London 9
Padova 9
Shenzhen 9
Amsterdam 8
Berlin 8
Gainesville 8
Saint Petersburg 8
Alkmaar 7
Inglewood 7
Kuala Lumpur 7
Mexico City 7
Munich 7
Toronto 7
Barcelona 6
Dallas 6
Dongguan 6
Gunzenhausen 6
Hamburg 6
Jakarta 6
Liverpool 6
Rondissone 6
San Mateo 6
Wuhan 6
Zhengzhou 6
Chengdu 5
Des Moines 5
Dresden 5
Eindhoven 5
Esch-sur-Alzette 5
Fairfield 5
Fortaleza 5
Hangzhou 5
Hanoi 5
Karlsruhe 5
Leawood 5
Madrid 5
Mumbai 5
Nuremberg 5
Paris 5
Preganziol 5
Sarajevo 5
Seoul 5
Totale 6.167
Nome #
A Wizard-based Approach for Secure Code Generation of Single Sign-On and Access Delegation Solutions for Mobile Native Apps 335
Multi-Stakeholder Cybersecurity Risk Assessment for Data Protection 250
The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis 187
Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations 132
A First Appraisal of Cryptographic Mechanisms for the SelectiveDisclosure of Verifiable Credentials 131
MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers 130
PADS: Practical Attestation for Highly Dynamic Swarm Topologies 120
Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations 109
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements 103
Validating Requirements of Access Control for Cloud-Edge IoT Solutions 101
Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience 101
A Tool-assisted Methodology for the Data Protection Impact Assessment 98
Design and Security Assessment of Usable Multi-factor Authentication and Single Sign-On Solutions for Mobile Applications 93
A delegated authorization solution for smart-city mobile applications 91
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution 86
Learning from Others’ Mistakes: An Analysis of Cyber-security Incidents 84
Model checking: teoria ed applicazioni 81
A Lazy Approach to Access Control as a Service (ACaaS) for IoT 81
An Open and Flexible CyberSecurity Training Laboratory in IT/OT Infrastructures 81
Combination of convex theories: Modularity, deduction completeness, and explanation 80
A Methodology to build run-time Monitors for Security-Aware Workflows 80
WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications 78
Assisted Authoring, Analysis and Enforcement of Access Control Policies in the Cloud 78
New results on rewrite-based satisfiability procedures 77
RDL---Rewrite and Decision procedure Laboratory 74
Automated Assistance to the Security Assessment of API for Financial Services 74
The Phase Transition of the Linear Inequalities Problem 72
A Superposition Based Methodology to Design Satisfiability Decision Procedures 70
High Performance Deduction for verification: a case study in the theory of arrays 70
Automatically finding execution scenarios to deploy security-sensitive workflows 70
Deciding Extensions of the Theory of Arrays by Integrating Decision Procedures and Instantiation Strategies 69
Best current practices for OAuth/OIDC Native Apps: A study of their adoption in popular providers and top-ranked Android clients 69
Automated and Secure Integration of the OpenID Connect iGov Profile in Mobile Native Applications 69
Attribute Based Access Control for APIs in Spring Security 68
Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications 68
Coommunication Protocols for Mathematical Services based on KQML and OMRS 67
Efficient theory combination via boolean search 67
SAFARI: SMT-Based Abstraction for Arrays with Interpolants 67
A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies 67
A Combination of Rewriting and Constraint Solving for the Quantifier-free Interpolation of Arrays with Integer Difference Constraints 66
Backward Reachability of Array-based Systems by SMT solving: Termination and Invariant Synthesis 66
Attestation-enabled secure and scalable routing protocol for IoT networks 66
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay Between Functional and Security Requirements 66
A Declarative Two-level Framework to Specify and Verify Workflow and Authorization Policies in Service Oriented Architectures 65
Automated Analysis of Semantic-Aware Access Control Policies: a Logic-based Approach 64
Automated Legal Compliance Checking by Security Policy Analysis 64
A Theory of Singly-Linked Lists and its Extensible Decision Procedure 63
ASASP: Automated Symbolic Analysis of Security Policies 63
Efficient Satisfiability Modulo Theories via Delayed Theory Combination 63
On Run-Time Enforcement of Authorization Constraints in Security-Sensitive Workflows 63
SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things 63
TLSAssistant Goes FINSEC - A Security Platform Integration Extending Threat Intelligence Language 63
A Practical Extension Mechanism for Decision Procedures: the Case Study of Universal Presburger Arithmetic 62
Automated and Efficient Analysis of Role-Based Access Control with Attributes 62
Automated Analysis of Scenario-based Specifications of Distributed Access Control Policies with Non-Mechanizable Activities 62
An extension of lazy abstraction with interpolation for programs with arrays 61
Brief Announcement: Automated Support for the Design and Validation of Fault Tolerant Parameterized Systems - A Case Study 60
Efficient Satisfiability Modulo Theories via Delayed Theory Combination 60
The Control Component of Open Mechanized Reasoning Systems: Annotation and Tactics 59
Data and Applications Security and Privacy {XXX} 59
Nelson-Oppen, Shostak and the Extended Canonizer: A Family Picture with a Newborn 58
Modular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem 58
Scalable Automated Analysis of Access Control and Privacy Policies 58
Automated Termination in Model Checking Modulo Theories 57
Efficient Theory Combination via Boolean Search 57
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module 57
Parameterized model checking for security policy analysis 57
Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes 57
Rewrite and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation 56
Workflow and Access Control Reloaded: a Declarative Specification Framework for the Automated Analysis of Web Services 56
ALPS: An Action Language for Policy Specification and Automated Safety Analysis 56
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures 55
The {SMT-LIB} Initiative and the Rise of {SMT} - {(HVC} 2010 Award Talk) 55
Modularity for Security-Sensitive Workflows 55
Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes 55
A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies 55
Automating Compliance for Improving TLS Security Postures: An Assessment of Public Administration Endpoints 54
Abstraction-Driven Verification of Array Programs 54
Automated Analysis of Infinite State Workflows with Access Control Policies 54
Quantifier-free interpolation in combinations of equality interpolating theories 54
ASASPXL: New Clother for Analysing ARBAC Policies 54
A Framework for Security and Risk Analysis of Enrollment Procedures: Application to Fully-remote Solutions based on eDocuments 54
On a rewriting approach to satisfiability procedures: extension, combination of theories and an experimental appraisal 53
Content- based information protection and release in NATO operations 53
Efficient Symbolic Automated Analysis of Administrative Attribute-based RBAC-Policies 52
On the Verification of Security-Aware E-services 52
Combining Proof-Producing Decision Procedures 52
MCMT: A Model Checker Modulo Theories 51
Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving 51
Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies 51
A Modular and Extensible Framework for Securing TLS 50
Automated Validation of Security-sensitive Web Services specified in BPEL and RBAC 50
Uniform Derivation of Decision Procedures by Superposition 50
On the Automated Analysis of Safety in Usage Control: A New Decidability Result 50
Boosting Model Checking to Analyse Large ARBAC Policies 50
Symbolic Backward Reachability with Effectively Propositional Logic-Applications to Security Policy Analysis 50
Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment 50
SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes 49
Automatic Decidability and Combinability 49
Selective Release of Smart Metering Data in Multi-domain Smart Grids 49
Totale 7.286
Categoria #
all - tutte 61.802
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 61.802


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20201.227 0 0 6 34 179 82 239 44 192 115 216 120
2020/20211.749 207 10 187 94 179 110 255 12 120 269 72 234
2021/20221.227 120 69 29 136 52 31 57 206 119 34 131 243
2022/20232.879 117 243 55 482 112 423 42 395 617 212 108 73
2023/20241.920 147 123 158 83 146 209 114 262 81 343 42 212
2024/2025191 78 112 1 0 0 0 0 0 0 0 0 0
Totale 10.457