PACI, Federica Maria Francesca
PACI, Federica Maria Francesca
DIPARTIMENTO DI INFORMATICA
A Comprehensive Study on Third-Party User Tracking in Mobile Applications
2023-01-01 Paci, Federica; Pizzoli, Jacopo; Zannone, Nicola
A Distributed Access Control System for Cloud Federations
2017-01-01 Alansari, Shorouq; Paci, Federica; Sassone, Vladimiro
A Load Time Policy Checker for Open Multi-application Smart Cards
2011-01-01 Dragoni, Nicola; Lostal, Eduardo; Gadyatskaya, Olga; Massacci, Fabio; Paci, Federica
A privacy-preserving approach to policy-based content dissemination
2010-01-01 Shang, Ning; Nabeel, Mohamed; Paci, Federica; Bertino, Elisa
A real world study on employees' susceptibility to phishing attacks
2020-01-01 De Bona, Marco; Paci, Federica
Access Control and Authorization Constraints for WS-BPEL
2006-01-01 Bertino, Elisa; Crampton, Jason; Paci, Federica
Access control enforcement for conversation-based web services
2006-01-01 Mecella, Massimo; Ouzzani, Mourad; Paci, Federica; Bertino, Elisa
An Experimental Comparison of Two Risk-Based Security Methods
2013-01-01 Labunets, Katsiaryna; Massacci, Fabio; Paci, Federica; Tran, Le Minh Sang
Authorization and User Failure Resiliency for WS-BPEL Business Processes
2008-01-01 Paci, Federica; Ferrini, Rodolfo; Sun, Yuqing; Bertino, Elisa
Collective privacy management in social networks
2009-01-01 Squicciarini, Anna Cinzia; Shehab, Mohamed; Paci, Federica
Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods
2013-01-01 Beckers, Kristian; Faßbender, Stephan; Heisel, Maritta; Paci, Federica
Computer Aided Threat Identification
2011-01-01 Asnar, Yudis; Li, Tong; Massacci, Fabio; Paci, Federica
Detecting Insider Threats: A Trust-Aware Framework
2013-01-01 Paci, Federica; Fernandez-Gago, Carmen; Moyano, Francisco
EEVi - framework for evaluating the effectiveness of visualization in cyber-security
2017-01-01 Sethi, Aneesha; Paci, Federica; Wills, Gary
HoneyICS: A High-interaction Physics-aware Honeynet forIndustrial Control Systems
2023-01-01 Lucchese, Marco; Lupia, Francesco; Merro, Massimo; Paci, Federica; Zannone, Nicola; Furfaro, Angelo
IFTTT Privacy Checker
2020-01-01 Paci, Federica; Bianchin, Davide; Quintarelli, Elisa; Zannone, Nicola
Mitigating Privilege Misuse in Access Control through Anomaly Detection
2023-01-01 Hasel Mehri, Gelareh; Wester, Inez L.; Paci, Federica; Zannone, Nicola
Model comprehension for security risk assessment
2018-01-01 Labunets, Katsiaryna; Massacci, Fabio; Paci, Federica; Marczak, Sabrina; de Oliveira, Flávio Moreira
On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment
2017-01-01 Labunets, Katsiaryna; Massacci, Fabio; Paci, Federica
Preventing Information Inference in Access Control
2015-01-01 Paci, Federica; Zannone, Nicola
| Titolo | Data di pubblicazione | Autore(i) | File |
|---|---|---|---|
| A Comprehensive Study on Third-Party User Tracking in Mobile Applications | 1-gen-2023 | Paci, Federica; Pizzoli, Jacopo; Zannone, Nicola | |
| A Distributed Access Control System for Cloud Federations | 1-gen-2017 | Alansari, Shorouq; Paci, Federica; Sassone, Vladimiro | |
| A Load Time Policy Checker for Open Multi-application Smart Cards | 1-gen-2011 | Dragoni, Nicola; Lostal, Eduardo; Gadyatskaya, Olga; Massacci, Fabio; Paci, Federica | |
| A privacy-preserving approach to policy-based content dissemination | 1-gen-2010 | Shang, Ning; Nabeel, Mohamed; Paci, Federica; Bertino, Elisa | |
| A real world study on employees' susceptibility to phishing attacks | 1-gen-2020 | De Bona, Marco; Paci, Federica | |
| Access Control and Authorization Constraints for WS-BPEL | 1-gen-2006 | Bertino, Elisa; Crampton, Jason; Paci, Federica | |
| Access control enforcement for conversation-based web services | 1-gen-2006 | Mecella, Massimo; Ouzzani, Mourad; Paci, Federica; Bertino, Elisa | |
| An Experimental Comparison of Two Risk-Based Security Methods | 1-gen-2013 | Labunets, Katsiaryna; Massacci, Fabio; Paci, Federica; Tran, Le Minh Sang | |
| Authorization and User Failure Resiliency for WS-BPEL Business Processes | 1-gen-2008 | Paci, Federica; Ferrini, Rodolfo; Sun, Yuqing; Bertino, Elisa | |
| Collective privacy management in social networks | 1-gen-2009 | Squicciarini, Anna Cinzia; Shehab, Mohamed; Paci, Federica | |
| Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods | 1-gen-2013 | Beckers, Kristian; Faßbender, Stephan; Heisel, Maritta; Paci, Federica | |
| Computer Aided Threat Identification | 1-gen-2011 | Asnar, Yudis; Li, Tong; Massacci, Fabio; Paci, Federica | |
| Detecting Insider Threats: A Trust-Aware Framework | 1-gen-2013 | Paci, Federica; Fernandez-Gago, Carmen; Moyano, Francisco | |
| EEVi - framework for evaluating the effectiveness of visualization in cyber-security | 1-gen-2017 | Sethi, Aneesha; Paci, Federica; Wills, Gary | |
| HoneyICS: A High-interaction Physics-aware Honeynet forIndustrial Control Systems | 1-gen-2023 | Lucchese, Marco; Lupia, Francesco; Merro, Massimo; Paci, Federica; Zannone, Nicola; Furfaro, Angelo | |
| IFTTT Privacy Checker | 1-gen-2020 | Paci, Federica; Bianchin, Davide; Quintarelli, Elisa; Zannone, Nicola | |
| Mitigating Privilege Misuse in Access Control through Anomaly Detection | 1-gen-2023 | Hasel Mehri, Gelareh; Wester, Inez L.; Paci, Federica; Zannone, Nicola | |
| Model comprehension for security risk assessment | 1-gen-2018 | Labunets, Katsiaryna; Massacci, Fabio; Paci, Federica; Marczak, Sabrina; de Oliveira, Flávio Moreira | |
| On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment | 1-gen-2017 | Labunets, Katsiaryna; Massacci, Fabio; Paci, Federica | |
| Preventing Information Inference in Access Control | 1-gen-2015 | Paci, Federica; Zannone, Nicola |