Ranise, Silvio
 Distribuzione geografica
Continente #
NA - Nord America 6.038
EU - Europa 5.802
AS - Asia 2.590
SA - Sud America 728
AF - Africa 81
OC - Oceania 45
Continente sconosciuto - Info sul continente non disponibili 35
Totale 15.319
Nazione #
US - Stati Uniti d'America 5.873
RU - Federazione Russa 1.659
IT - Italia 1.122
SG - Singapore 856
DE - Germania 798
BR - Brasile 663
HK - Hong Kong 541
CN - Cina 534
UA - Ucraina 469
SE - Svezia 367
FI - Finlandia 330
NL - Olanda 244
GB - Regno Unito 206
IE - Irlanda 191
IN - India 168
VN - Vietnam 160
CA - Canada 134
FR - Francia 130
BE - Belgio 86
IR - Iran 47
JP - Giappone 41
AU - Australia 37
EU - Europa 32
TR - Turchia 29
KR - Corea 28
ID - Indonesia 23
AT - Austria 21
BD - Bangladesh 21
ES - Italia 21
NG - Nigeria 20
AR - Argentina 18
MY - Malesia 17
MX - Messico 16
PK - Pakistan 16
PE - Perù 15
GR - Grecia 14
IL - Israele 14
ZA - Sudafrica 13
LT - Lituania 12
BY - Bielorussia 11
EG - Egitto 11
IQ - Iraq 11
CH - Svizzera 10
CZ - Repubblica Ceca 10
NO - Norvegia 10
TW - Taiwan 10
UZ - Uzbekistan 10
DK - Danimarca 9
PL - Polonia 9
PT - Portogallo 9
SI - Slovenia 9
AZ - Azerbaigian 8
BA - Bosnia-Erzegovina 8
EC - Ecuador 8
LU - Lussemburgo 8
MA - Marocco 8
NZ - Nuova Zelanda 8
RO - Romania 8
SA - Arabia Saudita 8
DZ - Algeria 7
HU - Ungheria 7
JO - Giordania 7
PH - Filippine 7
VE - Venezuela 7
HN - Honduras 6
CL - Cile 5
LK - Sri Lanka 5
TH - Thailandia 5
TN - Tunisia 5
CO - Colombia 4
HR - Croazia 4
KE - Kenya 4
LB - Libano 4
LV - Lettonia 4
OM - Oman 4
SK - Slovacchia (Repubblica Slovacca) 4
AE - Emirati Arabi Uniti 3
EE - Estonia 3
KZ - Kazakistan 3
NP - Nepal 3
PA - Panama 3
PY - Paraguay 3
SN - Senegal 3
UY - Uruguay 3
AL - Albania 2
BN - Brunei Darussalam 2
BO - Bolivia 2
CR - Costa Rica 2
DO - Repubblica Dominicana 2
GE - Georgia 2
KG - Kirghizistan 2
MD - Moldavia 2
RS - Serbia 2
RW - Ruanda 2
SS - ???statistics.table.value.countryCode.SS??? 2
ZW - Zimbabwe 2
BG - Bulgaria 1
BW - Botswana 1
CU - Cuba 1
IS - Islanda 1
Totale 15.310
Città #
Chandler 1.310
Jacksonville 945
Hong Kong 516
Trento 446
Singapore 424
Moscow 405
The Dalles 257
Boardman 255
Wilmington 228
Ashburn 227
Hefei 195
Helsinki 195
Dublin 182
Kronberg 172
Dong Ket 151
Ann Arbor 116
Dearborn 114
Beijing 107
Los Angeles 95
Brooklyn 93
Ottawa 86
New York 85
Brussels 70
Woodbridge 68
Redwood City 59
Phoenix 53
Shanghai 53
Pune 50
Campogalliano 47
Falkenstein 45
Milan 45
Munich 41
Verona 39
Seattle 37
Santa Clara 35
São Paulo 35
Cheyenne 32
Houston 30
Fremont 29
Miami 27
Assago 26
Hanover 25
Turku 25
Ardabil 23
London 23
Secaucus 23
Belo Horizonte 21
Rio de Janeiro 21
Rome 21
Tokyo 21
Neumarkt 20
Monmouth Junction 18
Mountain View 18
Sydney 17
Toronto 17
Guangzhou 16
Padova 16
Amsterdam 15
Frankfurt am Main 15
Norwalk 15
Portland 15
Cambridge 14
Bologna 13
Bolzano 13
Kiel 13
Lima 13
Nijmegen 13
Redondo Beach 13
São Luís 13
Berlin 12
Dallas 12
Genoa 12
Lagos 12
Merano 12
Montreal 12
Brisbane 11
Nanjing 11
Nuremberg 11
Falls Church 10
Paris 10
Brasília 9
Cento 9
Chicago 9
Cologne 9
Council Bluffs 9
Guarulhos 9
Istanbul 9
Mexico City 9
Salvador 9
Shenzhen 9
Tashkent 9
Venice 9
Atlanta 8
Curitiba 8
Dongguan 8
Gainesville 8
Ribeirão Preto 8
Saint Petersburg 8
San Francisco 8
Washington 8
Totale 8.212
Nome #
A Wizard-based Approach for Secure Code Generation of Single Sign-On and Access Delegation Solutions for Mobile Native Apps 370
Multi-Stakeholder Cybersecurity Risk Assessment for Data Protection 338
The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis 216
Intelligent Systems and Formal Methods in Software Engineering 189
MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers 186
A First Appraisal of Cryptographic Mechanisms for the SelectiveDisclosure of Verifiable Credentials 176
PADS: Practical Attestation for Highly Dynamic Swarm Topologies 155
Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations 153
Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations 146
Protecting Digital Identity Wallet: A Threat Model in the Age of eIDAS 2.0 141
A Tool-assisted Methodology for the Data Protection Impact Assessment 140
A delegated authorization solution for smart-city mobile applications 139
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements 134
Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience 131
Validating Requirements of Access Control for Cloud-Edge IoT Solutions 125
Design and Security Assessment of Usable Multi-factor Authentication and Single Sign-On Solutions for Mobile Applications 119
Learning from Others’ Mistakes: An Analysis of Cyber-security Incidents 114
An Open and Flexible CyberSecurity Training Laboratory in IT/OT Infrastructures 110
Automated Assistance to the Security Assessment of API for Financial Services 109
Automating Compliance for Improving TLS Security Postures: An Assessment of Public Administration Endpoints 108
Attestation-enabled secure and scalable routing protocol for IoT networks 108
A Risk-based Approach to Trustworthy AI Systems for Judicial Procedures 107
A Superposition Based Methodology to Design Satisfiability Decision Procedures 106
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution 106
A Lazy Approach to Access Control as a Service (ACaaS) for IoT 106
A Declarative Two-level Framework to Specify and Verify Workflow and Authorization Policies in Service Oriented Architectures 105
A Methodology to build run-time Monitors for Security-Aware Workflows 105
WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications 104
New results on rewrite-based satisfiability procedures 101
Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications 101
Assisted Authoring, Analysis and Enforcement of Access Control Policies in the Cloud 101
Attribute Based Access Control for APIs in Spring Security 100
A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies 100
Model checking: teoria ed applicazioni 100
Best current practices for OAuth/OIDC Native Apps: A study of their adoption in popular providers and top-ranked Android clients 99
Automated and Secure Integration of the OpenID Connect iGov Profile in Mobile Native Applications 99
RDL---Rewrite and Decision procedure Laboratory 98
The Phase Transition of the Linear Inequalities Problem 97
Combination of convex theories: Modularity, deduction completeness, and explanation 97
A Combination of Rewriting and Constraint Solving for the Quantifier-free Interpolation of Arrays with Integer Difference Constraints 96
SAFARI: SMT-Based Abstraction for Arrays with Interpolants 96
A Practical Extension Mechanism for Decision Procedures: the Case Study of Universal Presburger Arithmetic 95
A Theory of Singly-Linked Lists and its Extensible Decision Procedure 92
High Performance Deduction for verification: a case study in the theory of arrays 92
Automated and Efficient Analysis of Role-Based Access Control with Attributes 90
Efficient Theory Combination via Boolean Search 90
Automatically finding execution scenarios to deploy security-sensitive workflows 90
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay Between Functional and Security Requirements 90
Abstraction-Driven Verification of Array Programs 89
Backward Reachability of Array-based Systems by SMT solving: Termination and Invariant Synthesis 89
Automated Analysis of Semantic-Aware Access Control Policies: a Logic-based Approach 89
TLSAssistant Goes FINSEC - A Security Platform Integration Extending Threat Intelligence Language 89
Efficient Satisfiability Modulo Theories via Delayed Theory Combination 88
A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies 88
ASASP: Automated Symbolic Analysis of Security Policies 87
Secure Pull Printing with QR Codes and National eID Cards: A Software-oriented Design and an Open-source Implementation 87
A Framework for Security and Risk Analysis of Enrollment Procedures: Application to Fully-remote Solutions based on eDocuments 87
Efficient Satisfiability Modulo Theories via Delayed Theory Combination 86
Analysis of XACML Policies with SMT 86
On Run-Time Enforcement of Authorization Constraints in Security-Sensitive Workflows 86
SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things 86
Efficient theory combination via boolean search 85
ALPS: An Action Language for Policy Specification and Automated Safety Analysis 85
Coommunication Protocols for Mathematical Services based on KQML and OMRS 84
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system 84
Deciding Extensions of the Theory of Arrays by Integrating Decision Procedures and Instantiation Strategies 82
Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem 82
Quantifier-free interpolation in combinations of equality interpolating theories 81
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module 81
Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes 81
Automated Legal Compliance Checking by Security Policy Analysis 81
Brief Announcement: Automated Support for the Design and Validation of Fault Tolerant Parameterized Systems - A Case Study 80
The Control Component of Open Mechanized Reasoning Systems: Annotation and Tactics 80
The {SMT-LIB} Initiative and the Rise of {SMT} - {(HVC} 2010 Award Talk) 80
Modular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem 80
A Modular and Extensible Framework for Securing TLS 79
Parameterized model checking for security policy analysis 79
Enroll, and Authentication Will Follow 79
Rewrite and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation 78
Workflow and Access Control Reloaded: a Declarative Specification Framework for the Automated Analysis of Web Services 78
Modularity for Security-Sensitive Workflows 78
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud 78
Lazy Abstraction with Interpolants for Arrays 77
An extension of lazy abstraction with interpolation for programs with arrays 77
Data and Applications Security and Privacy {XXX} 77
The eIDAS Regulation: A Survey of Technological Trends for European Electronic Identity Schemes 76
SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes 75
Automated Analysis of Infinite State Workflows with Access Control Policies 75
Automated Termination in Model Checking Modulo Theories 75
Symbolic Backward Reachability with Effectively Propositional Logic-Applications to Security Policy Analysis 75
Automated Analysis of Scenario-based Specifications of Distributed Access Control Policies with Non-Mechanizable Activities 75
Termination of Constraint Contextual Rewriting 74
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures 73
Combining Data Structures with Nonstably Infinite Theories Using Many-Sorted Logic 73
Nelson-Oppen, Shostak and the Extended Canonizer: A Family Picture with a Newborn 73
On a rewriting approach to satisfiability procedures: extension, combination of theories and an experimental appraisal 73
Automated Analysis of Parametric Timing-Based Mutual Exclusion Algorithms 73
Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving 73
Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies 73
Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes 73
Totale 10.242
Categoria #
all - tutte 88.016
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 88.016


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020120 0 0 0 0 0 0 0 0 0 0 0 120
2020/20211.749 207 10 187 94 179 110 255 12 120 269 72 234
2021/20221.227 120 69 29 136 52 31 57 206 119 34 131 243
2022/20232.879 117 243 55 482 112 423 42 395 617 212 108 73
2023/20241.920 147 123 158 83 146 209 114 262 81 343 42 212
2024/20255.568 78 112 404 199 113 207 380 431 1.851 729 903 161
Totale 15.834