VALENZA, FULVIO
VALENZA, FULVIO
Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni - IEIIT
A comprehensive approach to the automatic refinement and verification of access control policies
2020 Manuel Cheminod; Luca Durante; Lucia Seno; Fulvio Valenza;Adriano Valenzano
A comprehensive approach to the automatic refinement and verification of access control policies
2019 Cheminod M.; Durante L.; Seno L.; Valenza F.; Valenzano A.
Toward attribute-based access control policy in industrial networked systems
2018 M. Cheminod; L. Durante; F. Valenza; A. Valenzano
A formal approach for network security policy validation
2017 Valenza F.; Su T.; Spinoso S.; Lioy A.; Sisto R.; Vallini M.
A Model for the Analysis of Security Policies in Service Function Chains
2017 L. Durante; L. Seno; F. Valenza; A. Valenzano
Assessing network authorization policies via reachability analysis
2017 Basile, Cataldo; Canavese, Daniele; Pitscheider, Christian; Lioy, Antonio; Valenza, Fulvio; Valenza, Fulvio
Automated Fixing of Access Policy Implementation in Industrial Networked Systems
2017 M. Cheminod; L. Durante; L. Seno; F. Valenza; A. Valenzano
Classification and Analysis of Communication Protection Policy Anomalies
2017 Valenza F.; Basile C.; Canavese D.; Lioy A.
Leveraging SDN To Improve Security in Industrial Networks
2017 M. Cheminod; L. Durante; L. Seno; F. Valenza; A. Valenzano; C. Zunino
Inter-function anomaly analysis for correct SDN/NFV deployment
2016 Basile C.; Canavese D.; Lioy A.; Pitscheider C.; Valenza F.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
A comprehensive approach to the automatic refinement and verification of access control policies | 1-gen-2020 | Manuel Cheminod; Luca Durante; Lucia Seno; Fulvio Valenza;Adriano Valenzano | |
A comprehensive approach to the automatic refinement and verification of access control policies | 1-gen-2019 | Cheminod M.; Durante L.; Seno L.; Valenza F.; Valenzano A. | |
Toward attribute-based access control policy in industrial networked systems | 1-gen-2018 | M. Cheminod; L. Durante; F. Valenza; A. Valenzano | |
A formal approach for network security policy validation | 1-gen-2017 | Valenza F.; Su T.; Spinoso S.; Lioy A.; Sisto R.; Vallini M. | |
A Model for the Analysis of Security Policies in Service Function Chains | 1-gen-2017 | L. Durante; L. Seno; F. Valenza; A. Valenzano | |
Assessing network authorization policies via reachability analysis | 1-gen-2017 | Basile, Cataldo; Canavese, Daniele; Pitscheider, Christian; Lioy, Antonio; Valenza, Fulvio; Valenza, Fulvio | |
Automated Fixing of Access Policy Implementation in Industrial Networked Systems | 1-gen-2017 | M. Cheminod; L. Durante; L. Seno; F. Valenza; A. Valenzano | |
Classification and Analysis of Communication Protection Policy Anomalies | 1-gen-2017 | Valenza F.; Basile C.; Canavese D.; Lioy A. | |
Leveraging SDN To Improve Security in Industrial Networks | 1-gen-2017 | M. Cheminod; L. Durante; L. Seno; F. Valenza; A. Valenzano; C. Zunino | |
Inter-function anomaly analysis for correct SDN/NFV deployment | 1-gen-2016 | Basile C.; Canavese D.; Lioy A.; Pitscheider C.; Valenza F. |