Ranise, Silvio
 Distribuzione geografica
Continente #
EU - Europa 12.532
NA - Nord America 10.185
AS - Asia 5.850
SA - Sud America 1.649
AF - Africa 200
OC - Oceania 55
Continente sconosciuto - Info sul continente non disponibili 35
AN - Antartide 1
Totale 30.507
Nazione #
US - Stati Uniti d'America 9.802
RU - Federazione Russa 6.895
SG - Singapore 2.180
IT - Italia 1.519
BR - Brasile 1.387
CN - Cina 1.059
DE - Germania 1.058
VN - Vietnam 901
HK - Hong Kong 691
UA - Ucraina 486
SE - Svezia 482
FR - Francia 388
FI - Finlandia 357
GB - Regno Unito 341
IN - India 280
NL - Olanda 268
CA - Canada 237
IE - Irlanda 200
MX - Messico 107
AR - Argentina 98
PL - Polonia 98
BE - Belgio 93
BD - Bangladesh 85
JP - Giappone 85
ES - Italia 80
IQ - Iraq 71
PK - Pakistan 60
ZA - Sudafrica 59
TR - Turchia 51
IR - Iran 49
AU - Australia 46
ID - Indonesia 44
AT - Austria 41
EC - Ecuador 37
SA - Arabia Saudita 34
EU - Europa 32
MY - Malesia 32
KR - Corea 29
MA - Marocco 27
CO - Colombia 26
LT - Lituania 26
CL - Cile 24
VE - Venezuela 24
NG - Nigeria 23
PH - Filippine 22
CH - Svizzera 21
IL - Israele 21
PE - Perù 21
UZ - Uzbekistan 21
KE - Kenya 20
GR - Grecia 19
PT - Portogallo 17
AE - Emirati Arabi Uniti 16
AZ - Azerbaigian 16
DZ - Algeria 16
EG - Egitto 16
NO - Norvegia 15
PY - Paraguay 15
TN - Tunisia 14
JO - Giordania 13
NP - Nepal 13
TH - Thailandia 13
TW - Taiwan 13
BY - Bielorussia 12
RO - Romania 12
BA - Bosnia-Erzegovina 11
SI - Slovenia 11
CZ - Repubblica Ceca 10
EE - Estonia 10
BO - Bolivia 9
DK - Danimarca 9
HN - Honduras 9
HU - Ungheria 8
LB - Libano 8
LU - Lussemburgo 8
NZ - Nuova Zelanda 8
UY - Uruguay 8
JM - Giamaica 7
KZ - Kazakistan 7
SN - Senegal 7
AL - Albania 6
BG - Bulgaria 6
BH - Bahrain 6
CR - Costa Rica 6
OM - Oman 6
DO - Repubblica Dominicana 5
LK - Sri Lanka 5
MD - Moldavia 5
PA - Panama 5
RS - Serbia 5
SK - Slovacchia (Repubblica Slovacca) 5
HR - Croazia 4
LV - Lettonia 4
PS - Palestinian Territory 4
BN - Brunei Darussalam 3
ET - Etiopia 3
KW - Kuwait 3
QA - Qatar 3
TT - Trinidad e Tobago 3
BB - Barbados 2
Totale 30.477
Città #
San Jose 1.327
Chandler 1.310
Singapore 1.068
Jacksonville 947
Ashburn 719
Hong Kong 646
Dallas 557
Trento 543
Moscow 409
The Dalles 363
Beijing 335
Boardman 270
Ho Chi Minh City 251
Los Angeles 239
Wilmington 228
Helsinki 208
Hefei 195
Hanoi 193
Dublin 189
New York 189
Lauterbourg 179
Kronberg 172
Dong Ket 151
Brooklyn 122
São Paulo 120
Ann Arbor 116
Dearborn 114
Santa Clara 99
Munich 96
Ottawa 88
Milan 86
Phoenix 80
Warsaw 80
Brussels 71
Woodbridge 68
Montreal 63
Redwood City 59
Shanghai 58
Verona 58
Tokyo 57
Houston 56
Atlanta 54
Denver 54
Orem 52
Pune 51
Assago 50
Seattle 50
Falkenstein 49
Frankfurt am Main 49
Campogalliano 47
Pergine Valsugana 45
London 44
Chicago 42
Poplar 42
Rio de Janeiro 42
Da Nang 41
Chennai 40
Mexico City 40
Rome 39
Secaucus 36
Council Bluffs 35
Johannesburg 34
Miami 34
Belo Horizonte 32
Cheyenne 32
Stockholm 32
Toronto 32
Amsterdam 30
Fremont 29
Tianjin 29
Turku 29
Haiphong 27
Hillsboro 27
Brasília 26
Nuremberg 26
Curitiba 25
Hanover 25
Baghdad 24
Columbus 24
Sydney 24
Ardabil 23
Manchester 23
Mumbai 23
Genoa 21
Guangzhou 21
Porto Alegre 21
Neumarkt 20
Boston 19
Istanbul 19
Nairobi 19
Salvador 19
San Francisco 19
Tashkent 19
Monmouth Junction 18
Mountain View 18
Shenzhen 18
Barcelona 17
Bologna 17
Charlotte 17
Ribeirão Preto 17
Totale 14.010
Nome #
A Wizard-based Approach for Secure Code Generation of Single Sign-On and Access Delegation Solutions for Mobile Native Apps 482
Multi-Stakeholder Cybersecurity Risk Assessment for Data Protection 437
A First Appraisal of Cryptographic Mechanisms for the SelectiveDisclosure of Verifiable Credentials 317
The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis 304
Intelligent Systems and Formal Methods in Software Engineering 303
MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers 272
Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations 248
A Risk-based Approach to Trustworthy AI Systems for Judicial Procedures 243
A First Appraisal of NIS2 and CRA Compliance Leveraging Open Source Tools 238
A Tool-assisted Methodology for the Data Protection Impact Assessment 237
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements 231
A delegated authorization solution for smart-city mobile applications 231
Automated Assistance to the Security Assessment of API for Financial Services 227
Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations 226
Protecting Digital Identity Wallet: A Threat Model in the Age of eIDAS 2.0 225
Automating Compliance for Improving TLS Security Postures: An Assessment of Public Administration Endpoints 223
PADS: Practical Attestation for Highly Dynamic Swarm Topologies 218
A Lazy Approach to Access Control as a Service (ACaaS) for IoT 211
A Superposition Based Methodology to Design Satisfiability Decision Procedures 209
Validating Requirements of Access Control for Cloud-Edge IoT Solutions 207
Attribute Based Access Control for APIs in Spring Security 206
A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies 205
Learning from Others’ Mistakes: An Analysis of Cyber-security Incidents 204
Automated and Secure Integration of the OpenID Connect iGov Profile in Mobile Native Applications 203
A Declarative Two-level Framework to Specify and Verify Workflow and Authorization Policies in Service Oriented Architectures 202
An Open and Flexible CyberSecurity Training Laboratory in IT/OT Infrastructures 199
A Methodology to build run-time Monitors for Security-Aware Workflows 196
A Practical Extension Mechanism for Decision Procedures: the Case Study of Universal Presburger Arithmetic 195
Secure Pull Printing with QR Codes and National eID Cards: A Software-oriented Design and an Open-source Implementation 191
Best current practices for OAuth/OIDC Native Apps: A study of their adoption in popular providers and top-ranked Android clients 190
A Framework for Security and Risk Analysis of Enrollment Procedures: Application to Fully-remote Solutions based on eDocuments 190
Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience 187
Design and Security Assessment of Usable Multi-factor Authentication and Single Sign-On Solutions for Mobile Applications 186
Efficient Theory Combination via Boolean Search 182
A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies 182
Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications 182
A Threat Model for the W3C Digital Credentials API: An Initial Analysis 181
A Theory of Singly-Linked Lists and its Extensible Decision Procedure 180
TLSAssistant Goes FINSEC - A Security Platform Integration Extending Threat Intelligence Language 180
A Combination of Rewriting and Constraint Solving for the Quantifier-free Interpolation of Arrays with Integer Difference Constraints 179
New results on rewrite-based satisfiability procedures 179
Automated and Efficient Analysis of Role-Based Access Control with Attributes 179
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution 175
Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem 174
Assisted Authoring, Analysis and Enforcement of Access Control Policies in the Cloud 172
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system 172
A Modular and Extensible Framework for Securing TLS 170
Efficient theory combination via boolean search 170
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay Between Functional and Security Requirements 169
ASASP: Automated Symbolic Analysis of Security Policies 168
Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments 168
SAFARI: SMT-Based Abstraction for Arrays with Interpolants 166
Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies 166
Efficient Satisfiability Modulo Theories via Delayed Theory Combination 165
Automated Analysis of Semantic-Aware Access Control Policies: a Logic-based Approach 163
The eIDAS Regulation: A Survey of Technological Trends for European Electronic Identity Schemes 161
Beyond Screens: Investigating Identity Proofing for the Metaverse Through Cross-Device Flows 161
RDL---Rewrite and Decision procedure Laboratory 160
Quantifier-free interpolation in combinations of equality interpolating theories 160
An Automated Multi-Layered Methodology to Assist the Secure and Risk-Aware Design of Multi-Factor Authentication Protocols 159
High Performance Deduction for verification: a case study in the theory of arrays 159
Parameterized model checking for security policy analysis 159
Abstraction-Driven Verification of Array Programs 157
On Run-Time Enforcement of Authorization Constraints in Security-Sensitive Workflows 157
Attestation-enabled secure and scalable routing protocol for IoT networks 157
Enroll, and Authentication Will Follow 157
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud 157
Combination of convex theories: Modularity, deduction completeness, and explanation 156
WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications 156
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module 156
Automatically finding execution scenarios to deploy security-sensitive workflows 156
The Phase Transition of the Linear Inequalities Problem 155
The {SMT-LIB} Initiative and the Rise of {SMT} - {(HVC} 2010 Award Talk) 155
Efficient Satisfiability Modulo Theories via Delayed Theory Combination 154
Backward Reachability of Array-based Systems by SMT solving: Termination and Invariant Synthesis 154
Assessing the Effectiveness of the Shared Responsibility Model for Cloud Databases: the Case of Google’s Firebase 154
Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes 153
Scalable Automated Analysis of Access Control and Privacy Policies 153
Automated Analysis of Infinite State Workflows with Access Control Policies 152
Modular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem 152
Assurance, Consent and Access Control for Privacy-Aware OIDC Deployments 151
DoS Attacks in Available MQTT Implementations: Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections 151
Improving Security and Performance of Cryptographic Access Control with Trusted Execution Environments 150
Lazy Abstraction with Interpolants for Arrays 150
ALPS: An Action Language for Policy Specification and Automated Safety Analysis 150
Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness 149
A secure and quality of service-aware solution for the end-to-end protection of IoT applications 147
Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes 147
Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment 147
Selective Release of Smart Metering Data in Multi-domain Smart Grids 146
Deciding Extensions of the Theory of Arrays by Integrating Decision Procedures and Instantiation Strategies 146
SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things 146
Formal Analysis of Mobile Multi-Factor Authentication with Single Sign-On Login 146
Demo: TLSAssistant v2: A Modular and Extensible Framework for Securing TLS 145
Cross-Domain Sharing of User Claims: A Design Proposal for OpenID Connect Attribute Authorities 144
Automated Legal Compliance Checking by Security Policy Analysis 143
Model checking: teoria ed applicazioni 143
Control is Nothing Without Trust a First Look into Digital Identity Wallet Trends 142
Uniform Derivation of Decision Procedures by Superposition 141
Blockchain Based RAN Data Sharing 140
Totale 18.499
Categoria #
all - tutte 122.181
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 122.181


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021306 0 0 0 0 0 0 0 0 0 0 72 234
2021/20221.227 120 69 29 136 52 31 57 206 119 34 131 243
2022/20232.879 117 243 55 482 112 423 42 395 617 212 108 73
2023/20241.920 147 123 158 83 146 209 114 262 81 343 42 212
2024/20255.864 78 112 404 199 113 207 380 431 1.851 729 903 457
2025/202614.957 631 954 1.124 1.319 761 611 2.030 5.606 986 733 202 0
Totale 31.087