selected publications
-
academic article
- Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics. IEEE Access. 9:46462-46475. 2021
- Substring search over encrypted data. Journal of Computer Security. 26:1-30. 2017
- Achieving dynamicity in security policies enforcement using aspects. International Journal of Information Security. 17:83-103. 2017
- PAIRSE. ACM SIGMOD Record. 42:42-47. 2013
- KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. Journal of Network and Computer Applications. 39:152-166. 2013
- An ontology-based approach to react to network attacks. International Journal of Information and Computer Security. 3:280-280. 2009
- Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annals of Telecommunications. 61:197-217. 2006
-
blog posting
- Misconfiguration Management of Network Security Components. arXiv (Cornell University). 2019
-
book
- Foundations and Practice of Security 2023
- Computer Security 2020
- Foundations and Practice of Security 2019
- Interoperability, Safety and Security in IoT 2018
- Risks and Security of Internet and Systems 2018
- FPS 2014 : 7th International Symposium on Foundations and Practice of Security : revised selected papers 2015
-
chapter
- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model. Lecture notes in computer science. 209-226. 2014
- Using Requirements Engineering in an Automatic Security Policy Derivation Process. Lecture notes in computer science. 155-172. 2012
- MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies. Lecture notes in computer science. 203-215. 2011
- A Service Dependency Model for Cost-Sensitive Intrusion Response. Lecture notes in computer science. 626-642. 2010
- Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking. Lecture notes in computer science. 153-162. 2010
- Privacy Administration in Distributed Service Infrastructure. Security and Privacy in Communication Networks. 53-70. 2010
- Evaluating the Trustworthiness of Contributors in a Collaborative Environment. Springer eBooks. 451-460. 2009
-
conference paper
- Enabling Trust Assessment In Clouds-of-Clouds. Proceedings of the 17th International Conference on Availability, Reliability and Security. 1-9. 2017
- Fine-grained privacy control for the RFID middleware of EPCglobal networks. . 60-67. 2013
- Privacy Enforcement of Composed Services in Cellular Networks. . 1-8. 2011
- Formalization and Management of Group Obligations. IEEE International Symposium on Policies for Distributed Systems and Networks. 158-165. 2009