Ranise, Silvio
 Distribuzione geografica
Continente #
NA - Nord America 5.374
EU - Europa 3.598
AS - Asia 1.526
AF - Africa 45
SA - Sud America 40
OC - Oceania 35
Continente sconosciuto - Info sul continente non disponibili 32
Totale 10.650
Nazione #
US - Stati Uniti d'America 5.244
IT - Italia 963
DE - Germania 698
UA - Ucraina 461
HK - Hong Kong 399
SE - Svezia 364
CN - Cina 306
SG - Singapore 283
FI - Finlandia 269
IE - Irlanda 184
GB - Regno Unito 169
IN - India 160
VN - Vietnam 160
FR - Francia 121
CA - Canada 116
RU - Federazione Russa 101
BE - Belgio 74
NL - Olanda 49
IR - Iran 46
BR - Brasile 35
JP - Giappone 33
EU - Europa 32
KR - Corea 28
AU - Australia 27
NG - Nigeria 19
ID - Indonesia 16
AT - Austria 15
MY - Malesia 15
ES - Italia 13
IL - Israele 13
GR - Grecia 12
NO - Norvegia 10
TR - Turchia 10
BY - Bielorussia 9
DK - Danimarca 9
SI - Slovenia 9
BA - Bosnia-Erzegovina 8
LU - Lussemburgo 8
NZ - Nuova Zelanda 8
PK - Pakistan 8
RO - Romania 8
BD - Bangladesh 7
EG - Egitto 7
MX - Messico 7
PH - Filippine 7
CZ - Repubblica Ceca 6
LT - Lituania 6
SA - Arabia Saudita 6
AZ - Azerbaigian 5
CH - Svizzera 5
HU - Ungheria 5
JO - Giordania 5
TH - Thailandia 5
TW - Taiwan 5
HR - Croazia 4
MA - Marocco 4
EE - Estonia 3
HN - Honduras 3
LV - Lettonia 3
PL - Polonia 3
SK - Slovacchia (Repubblica Slovacca) 3
AE - Emirati Arabi Uniti 2
BO - Bolivia 2
DZ - Algeria 2
IQ - Iraq 2
KE - Kenya 2
LB - Libano 2
MD - Moldavia 2
RS - Serbia 2
TN - Tunisia 2
ZW - Zimbabwe 2
AL - Albania 1
BW - Botswana 1
CO - Colombia 1
CR - Costa Rica 1
CU - Cuba 1
DO - Repubblica Dominicana 1
KG - Kirghizistan 1
KZ - Kazakistan 1
LK - Sri Lanka 1
ML - Mali 1
PA - Panama 1
PE - Perù 1
PT - Portogallo 1
PY - Paraguay 1
SC - Seychelles 1
SD - Sudan 1
SO - Somalia 1
TZ - Tanzania 1
ZA - Sudafrica 1
Totale 10.650
Città #
Chandler 1.310
Jacksonville 945
Trento 424
Hong Kong 376
Boardman 254
Wilmington 228
Ashburn 217
Singapore 214
Dublin 180
Kronberg 172
Helsinki 160
Dong Ket 151
Ann Arbor 116
Dearborn 114
Beijing 103
Ottawa 85
Brooklyn 84
New York 74
Los Angeles 71
Woodbridge 68
Brussels 61
Redwood City 59
Shanghai 52
Phoenix 50
Pune 50
Campogalliano 47
Milan 36
Seattle 35
Verona 34
Cheyenne 32
Fremont 29
Houston 26
Hanover 25
Miami 25
Ardabil 23
Rome 21
Secaucus 21
Neumarkt 20
Santa Clara 19
Monmouth Junction 18
Mountain View 18
Tokyo 18
Munich 17
Sydney 17
Guangzhou 15
Norwalk 15
Cambridge 14
London 14
Portland 14
Falkenstein 13
Kiel 13
Redondo Beach 13
São Luís 13
Toronto 13
Lagos 12
Merano 12
Nanjing 11
Bologna 10
Falls Church 10
Cento 9
Cologne 9
Genoa 9
Padova 9
Shenzhen 9
Amsterdam 8
Berlin 8
Gainesville 8
Saint Petersburg 8
Alkmaar 7
Inglewood 7
Kuala Lumpur 7
Mexico City 7
Vienna 7
Athens 6
Barcelona 6
Dallas 6
Dongguan 6
Gunzenhausen 6
Hamburg 6
Hangzhou 6
Jakarta 6
Liverpool 6
Madrid 6
Nuremberg 6
Rondissone 6
San Mateo 6
Washington 6
Wuhan 6
Zhengzhou 6
Baku 5
Brisbane 5
Chengdu 5
Des Moines 5
Dresden 5
Eindhoven 5
Esch-sur-Alzette 5
Fairfield 5
Fortaleza 5
Frankfurt am Main 5
Hanoi 5
Totale 6.554
Nome #
A Wizard-based Approach for Secure Code Generation of Single Sign-On and Access Delegation Solutions for Mobile Native Apps 341
Multi-Stakeholder Cybersecurity Risk Assessment for Data Protection 264
The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis 190
MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers 145
A First Appraisal of Cryptographic Mechanisms for the SelectiveDisclosure of Verifiable Credentials 139
Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations 133
PADS: Practical Attestation for Highly Dynamic Swarm Topologies 121
Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations 113
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements 108
Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience 105
Validating Requirements of Access Control for Cloud-Edge IoT Solutions 104
A Tool-assisted Methodology for the Data Protection Impact Assessment 102
A delegated authorization solution for smart-city mobile applications 97
Design and Security Assessment of Usable Multi-factor Authentication and Single Sign-On Solutions for Mobile Applications 95
Learning from Others’ Mistakes: An Analysis of Cyber-security Incidents 89
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution 87
A Lazy Approach to Access Control as a Service (ACaaS) for IoT 84
An Open and Flexible CyberSecurity Training Laboratory in IT/OT Infrastructures 84
A Methodology to build run-time Monitors for Security-Aware Workflows 83
New results on rewrite-based satisfiability procedures 82
Assisted Authoring, Analysis and Enforcement of Access Control Policies in the Cloud 82
Model checking: teoria ed applicazioni 82
Combination of convex theories: Modularity, deduction completeness, and explanation 81
WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications 80
Automated Assistance to the Security Assessment of API for Financial Services 80
A Superposition Based Methodology to Design Satisfiability Decision Procedures 78
RDL---Rewrite and Decision procedure Laboratory 76
Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications 76
The Phase Transition of the Linear Inequalities Problem 74
Attribute Based Access Control for APIs in Spring Security 74
Automated and Secure Integration of the OpenID Connect iGov Profile in Mobile Native Applications 74
Best current practices for OAuth/OIDC Native Apps: A study of their adoption in popular providers and top-ranked Android clients 73
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay Between Functional and Security Requirements 73
Automating Compliance for Improving TLS Security Postures: An Assessment of Public Administration Endpoints 72
High Performance Deduction for verification: a case study in the theory of arrays 72
Deciding Extensions of the Theory of Arrays by Integrating Decision Procedures and Instantiation Strategies 72
A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies 72
A Combination of Rewriting and Constraint Solving for the Quantifier-free Interpolation of Arrays with Integer Difference Constraints 71
SAFARI: SMT-Based Abstraction for Arrays with Interpolants 71
A Declarative Two-level Framework to Specify and Verify Workflow and Authorization Policies in Service Oriented Architectures 70
Automatically finding execution scenarios to deploy security-sensitive workflows 70
Coommunication Protocols for Mathematical Services based on KQML and OMRS 69
Automated Analysis of Semantic-Aware Access Control Policies: a Logic-based Approach 69
Efficient theory combination via boolean search 68
A Theory of Singly-Linked Lists and its Extensible Decision Procedure 67
Backward Reachability of Array-based Systems by SMT solving: Termination and Invariant Synthesis 67
ASASP: Automated Symbolic Analysis of Security Policies 67
Attestation-enabled secure and scalable routing protocol for IoT networks 67
A Practical Extension Mechanism for Decision Procedures: the Case Study of Universal Presburger Arithmetic 66
Automated and Efficient Analysis of Role-Based Access Control with Attributes 66
Efficient Satisfiability Modulo Theories via Delayed Theory Combination 66
SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things 66
TLSAssistant Goes FINSEC - A Security Platform Integration Extending Threat Intelligence Language 65
Automated Legal Compliance Checking by Security Policy Analysis 64
Efficient Satisfiability Modulo Theories via Delayed Theory Combination 63
On Run-Time Enforcement of Authorization Constraints in Security-Sensitive Workflows 63
Automated Analysis of Scenario-based Specifications of Distributed Access Control Policies with Non-Mechanizable Activities 62
An extension of lazy abstraction with interpolation for programs with arrays 62
Brief Announcement: Automated Support for the Design and Validation of Fault Tolerant Parameterized Systems - A Case Study 61
Efficient Theory Combination via Boolean Search 61
Modular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem 61
The Control Component of Open Mechanized Reasoning Systems: Annotation and Tactics 60
ALPS: An Action Language for Policy Specification and Automated Safety Analysis 60
Scalable Automated Analysis of Access Control and Privacy Policies 60
Nelson-Oppen, Shostak and the Extended Canonizer: A Family Picture with a Newborn 59
Automated Termination in Model Checking Modulo Theories 59
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module 59
Data and Applications Security and Privacy {XXX} 59
Parameterized model checking for security policy analysis 59
A Framework for Security and Risk Analysis of Enrollment Procedures: Application to Fully-remote Solutions based on eDocuments 59
Rewrite and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation 58
Workflow and Access Control Reloaded: a Declarative Specification Framework for the Automated Analysis of Web Services 58
A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies 58
Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes 58
Abstraction-Driven Verification of Array Programs 57
The {SMT-LIB} Initiative and the Rise of {SMT} - {(HVC} 2010 Award Talk) 57
Automated Analysis of Infinite State Workflows with Access Control Policies 56
Content- based information protection and release in NATO operations 56
Modularity for Security-Sensitive Workflows 56
SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes 55
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures 55
On the Verification of Security-Aware E-services 55
Quantifier-free interpolation in combinations of equality interpolating theories 55
Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes 55
ASASPXL: New Clother for Analysing ARBAC Policies 55
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system 55
A Modular and Extensible Framework for Securing TLS 54
On a rewriting approach to satisfiability procedures: extension, combination of theories and an experimental appraisal 54
Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem 54
Decision Procedures for Extensions of the Theory of Arrays 53
Efficient Symbolic Automated Analysis of Administrative Attribute-based RBAC-Policies 53
Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving 53
Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment 53
MCMT: A Model Checker Modulo Theories 52
Uniform Derivation of Decision Procedures by Superposition 52
On the Automated Analysis of Safety in Usage Control: A New Decidability Result 52
Boosting Model Checking to Analyse Large ARBAC Policies 52
Selective Release of Smart Metering Data in Multi-domain Smart Grids 52
Combining Proof-Producing Decision Procedures 52
Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques 52
Totale 7.610
Categoria #
all - tutte 67.976
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 67.976


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20201.187 0 0 0 0 179 82 239 44 192 115 216 120
2020/20211.749 207 10 187 94 179 110 255 12 120 269 72 234
2021/20221.227 120 69 29 136 52 31 57 206 119 34 131 243
2022/20232.879 117 243 55 482 112 423 42 395 617 212 108 73
2023/20241.920 147 123 158 83 146 209 114 262 81 343 42 212
2024/2025878 78 112 404 199 85 0 0 0 0 0 0 0
Totale 11.144