Sfoglia per Autore
A TECHNIQUE FOR SUBCLASSING AND ITS IMPLEMENTATION EXPLOITING POLYMORPHIC PROCEDURES
1988 Mancini, Luigi Vincenzo
The duality of fault-tolerant system structures
1993 Shrivastava, Santosh K; Mancini, Luigi Vincenzo; Randell, Brian
Collecting garbage in multilevel secure object stores
1994 Bertino, Elisa; Mancini, Luigi Vincenzo; Jajodia, Sushil
Increasing processor utilization in hard-real-time systems with checkpoints
1995 Bertossi, A; Bonometto, M; Mancini, Luigi Vincenzo
Two implementation relations and the correctness of communicating replicated processes
1997 Koutny, M.; Mancini, Luigi Vincenzo; Pappalardo, G.
Advanced transaction processing in multilevel secure file store
1998 Bertino, E; Jajodia, S; Mancini, Luigi Vincenzo; Ray, I.
Fault-tolerant rate-monotonic first-fit scheduling in hard-real-time systems
1999 A. A., Bertossi; Mancini, Luigi Vincenzo; F., Rossini
ASEP: A secure and flexible commit protocol for MLS distributed database systems
2000 I., Ray; Mancini, Luigi Vincenzo; S., Jajodia; E., Bertino
Flexible transaction dependencies in database systems
2000 Mancini, Luigi Vincenzo; Ray, I.; Jajodia, S.; Bertino, E.
A formal Model for Role-Based Access Control using Graph Transformations
2000 M., Koch; Mancini, Luigi Vincenzo; PARISI PRESICCE, Francesco
Operating system enhancements to prevent the misuse of system calls
2000 Bernaschi, M; Gabrielli, Emanuele; Mancini, Luigi Vincenzo
On the Specification and Evolution of Access Control Policies
2001 Koch, M.; Mancini, Luigi Vincenzo; PARISI PRESICCE, Francesco
A Graph based formalism for RBAC
2002 M., Koch; Mancini, Luigi Vincenzo; PARISI PRESICCE, Francesco
REMUS: a security-enhanced operating system
2002 Massimo, Bernaschi; Emanuele, Gabrielli; Mancini, Luigi Vincenzo
Secure selective exclusion in ad hoc wireless network
2002 DI PIETRO, R.; Jajodia, S.; Mancini, Luigi Vincenzo
Graph transformations for the specification of access control policies
2002 Manuel, Koch; Mancini, Luigi Vincenzo; PARISI PRESICCE, Francesco
Conflict Detection and Resolution in Access Control Policy Specifications
2002 Koch, M.; Mancini, Luigi Vincenzo; PARISI PRESICCE, Francesco
Efficient and Secure Keys Management for Wireless Mobile Communications
2002 Di Pietro, Roberto; Mancini, Luigi Vincenzo; Jajodia, Sushil
Decidability of Safety in Graph-based Models for Access Control
2002 M., Koch; Mancini, Luigi Vincenzo; PARISI PRESICCE, Francesco
A time driven methodology for key dimensioning in multicast communications
2003 Di Pietro, Roberto; Mancini, Luigi Vincenzo; Mei, Alessandro
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
A TECHNIQUE FOR SUBCLASSING AND ITS IMPLEMENTATION EXPLOITING POLYMORPHIC PROCEDURES | 1988 | Mancini, Luigi Vincenzo | |
The duality of fault-tolerant system structures | 1993 | Shrivastava, Santosh K; Mancini, Luigi Vincenzo; Randell, Brian | |
Collecting garbage in multilevel secure object stores | 1994 | Bertino, Elisa; Mancini, Luigi Vincenzo; Jajodia, Sushil | |
Increasing processor utilization in hard-real-time systems with checkpoints | 1995 | Bertossi, A; Bonometto, M; Mancini, Luigi Vincenzo | |
Two implementation relations and the correctness of communicating replicated processes | 1997 | Koutny, M.; Mancini, Luigi Vincenzo; Pappalardo, G. | |
Advanced transaction processing in multilevel secure file store | 1998 | Bertino, E; Jajodia, S; Mancini, Luigi Vincenzo; Ray, I. | |
Fault-tolerant rate-monotonic first-fit scheduling in hard-real-time systems | 1999 | A. A., Bertossi; Mancini, Luigi Vincenzo; F., Rossini | |
ASEP: A secure and flexible commit protocol for MLS distributed database systems | 2000 | I., Ray; Mancini, Luigi Vincenzo; S., Jajodia; E., Bertino | |
Flexible transaction dependencies in database systems | 2000 | Mancini, Luigi Vincenzo; Ray, I.; Jajodia, S.; Bertino, E. | |
A formal Model for Role-Based Access Control using Graph Transformations | 2000 | M., Koch; Mancini, Luigi Vincenzo; PARISI PRESICCE, Francesco | |
Operating system enhancements to prevent the misuse of system calls | 2000 | Bernaschi, M; Gabrielli, Emanuele; Mancini, Luigi Vincenzo | |
On the Specification and Evolution of Access Control Policies | 2001 | Koch, M.; Mancini, Luigi Vincenzo; PARISI PRESICCE, Francesco | |
A Graph based formalism for RBAC | 2002 | M., Koch; Mancini, Luigi Vincenzo; PARISI PRESICCE, Francesco | |
REMUS: a security-enhanced operating system | 2002 | Massimo, Bernaschi; Emanuele, Gabrielli; Mancini, Luigi Vincenzo | |
Secure selective exclusion in ad hoc wireless network | 2002 | DI PIETRO, R.; Jajodia, S.; Mancini, Luigi Vincenzo | |
Graph transformations for the specification of access control policies | 2002 | Manuel, Koch; Mancini, Luigi Vincenzo; PARISI PRESICCE, Francesco | |
Conflict Detection and Resolution in Access Control Policy Specifications | 2002 | Koch, M.; Mancini, Luigi Vincenzo; PARISI PRESICCE, Francesco | |
Efficient and Secure Keys Management for Wireless Mobile Communications | 2002 | Di Pietro, Roberto; Mancini, Luigi Vincenzo; Jajodia, Sushil | |
Decidability of Safety in Graph-based Models for Access Control | 2002 | M., Koch; Mancini, Luigi Vincenzo; PARISI PRESICCE, Francesco | |
A time driven methodology for key dimensioning in multicast communications | 2003 | Di Pietro, Roberto; Mancini, Luigi Vincenzo; Mei, Alessandro |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile