default search action
Valentina Casola
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Valentina Casola, Alessandra De Benedictis, Carlo Mazzocca, Vittorio Orbinato:
Secure software development and testing: A model-based methodology. Comput. Secur. 137: 103639 (2024) - [j39]Mario Barbareschi, Valentina Casola, Antonio Emmanuele, Daniele Lombardi:
A Lightweight PUF-Based Protocol for Dynamic and Secure Group Key Management in IoT. IEEE Internet Things J. 11(20): 32969-32984 (2024) - [j38]Valentina Casola, Alessandra De Benedictis, Carlo Mazzocca, Rebecca Montanari:
Designing Secure and Resilient Cyber-Physical Systems: A Model-Based Moving Target Defense Approach. IEEE Trans. Emerg. Top. Comput. 12(2): 631-642 (2024) - [c82]Valentina Casola, Salvatore Della Torca:
Transfer Adversarial Attacks through Approximate Computing. ARES 2024: 168:1-168:6 - [c81]Stylianos Karagiannis, Camilla Fusco, Leonidas Agathos, Wissam Mallouli, Valentina Casola, Christoforos Ntantogian, Emmanouil Magkos:
AI-Powered Penetration Testing using Shennina: From Simulation to Validation. ARES 2024: 169:1-169:7 - [c80]Daniele Lombardi, Mario Barbareschi, Salvatore Barone, Valentina Casola:
A comprehensive evaluation of interrupt measurement techniques for predictability in safety-critical systems. ARES 2024: 172:1-172:10 - [c79]Valentina Casola, Marta Catillo, Alessandra De Benedictis, Felice Moretta, Antonio Pecchia, Massimiliano Rak, Umberto Villano:
DEFEDGE: Threat-Driven Security Testing and Proactive Defense Identification for Edge-Cloud Systems. AINA (5) 2024: 79-88 - [c78]Mario Barbareschi, Valentina Casola, Antonio Emmanuele, Daniele Lombardi:
On the adoption of PUF for key agreement scheme in Internet of Things. CF (Companion) 2024 - [c77]Salvatore Barone, Valentina Casola, Salvatore Della Torca:
Ineffectiveness of Digital Transformations for Detecting Adversarial Attacks Against Quantized and Approximate CNNs. CSR 2024: 290-295 - [c76]Mario Barbareschi, Salvatore Barone, Valentina Casola, Salvatore Della Torca:
Error Resiliency and Adversarial Robustness in Convolutional Neural Networks: An Empirical Analysis. IFIPIoT (1) 2024: 149-160 - 2023
- [j37]Juncal Alonso, Leire Orue-Echevarria, Valentina Casola, Ana I. Torre-Bastida, Maider Huarte, Eneko Osaba, Jesus L. Lobo:
Understanding the challenges and novel architectural models of multi-cloud native applications - a systematic literature review. J. Cloud Comput. 12(1): 6 (2023) - [c75]Mario Barbareschi, Salvatore Barone, Valentina Casola, Salvatore Della Torca, Daniele Lombardi:
Automatic Test Generation to Improve Scrum for Safety Agile Methodology. ARES 2023: 137:1-137:6 - [c74]Mario Barbareschi, Valentina Casola, Daniele Lombardi:
Ensuring End-to-End Security in Computing Continuum Exploiting Physical Unclonable Functions. CloudCom 2023: 273-278 - [c73]Salvatore Barone, Valentina Casola, Salvatore Della Torca, Daniele Lombardi:
Timing Behavior Characterization of Critical Real-Time Systems through Hybrid Timing Analysis. ICSRS 2023: 306-311 - [c72]Mario Barbareschi, Valentina Casola, Daniele Lombardi:
Lightweight Secure Keys Management Based on Physical Unclonable Functions. IWASI 2023: 34-39 - 2022
- [j36]Erkuden Rios, Marivi Higuero, Xabier Larrucea, Massimiliano Rak, Valentina Casola, Eider Iturbe:
Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls. Comput. Electr. Eng. 98: 107690 (2022) - [j35]Mario Barbareschi, Salvatore Barone, Riccardo Carbone, Valentina Casola:
Scrum for safety: an agile methodology for safety-critical software systems. Softw. Qual. J. 30(4): 1067-1088 (2022) - [j34]Ahmed A. Abd El-Latif, Yassine Maleh, Marinella Petrocchi, Valentina Casola:
Guest Editorial: Advanced Computing and Blockchain Applications for Critical Industrial IoT. IEEE Trans. Ind. Informatics 18(11): 8282-8286 (2022) - [c71]Mario Barbareschi, Salvatore Barone, Valentina Casola, Pasquale Montone, Alberto Moriconi:
A Memory Protection Strategy for Resource Constrained Devices in Safety Critical Applications. ICSRS 2022: 533-538 - 2021
- [j33]Rosario Catelli, Francesco Gargiulo, Valentina Casola, Giuseppe De Pietro, Hamido Fujita, Massimo Esposito:
A Novel COVID-19 Data Set and an Effective Deep Learning Approach for the De-Identification of Italian Medical Records. IEEE Access 9: 19097-19110 (2021) - [j32]Valentina Casola, Alessandra De Benedictis, Sergio Di Martino, Nicola Mazzocca, Luigi Libero Lucio Starace:
Security-Aware Deployment Optimization of Cloud-Edge Systems in Industrial IoT. IEEE Internet Things J. 8(16): 12724-12733 (2021) - [j31]Rosario Catelli, Valentina Casola, Giuseppe De Pietro, Hamido Fujita, Massimo Esposito:
Combining contextualized word representation and sub-document level analysis through Bi-LSTM+CRF architecture for clinical de-identification. Knowl. Based Syst. 213: 106649 (2021) - [j30]Mario Barbareschi, Valentina Casola, Alessandra De Benedictis, Erasmo La Montagna, Nicola Mazzocca:
On the Adoption of Physically Unclonable Functions to Secure IIoT Devices. IEEE Trans. Ind. Informatics 17(11): 7781-7790 (2021) - [j29]Flora Amato, Valentina Casola, Giovanni Cozzolino, Alessandra De Benedictis, Nicola Mazzocca, Francesco Moscato:
A Security and Privacy Validation Methodology for e-Health Systems. ACM Trans. Multim. Comput. Commun. Appl. 17(2s): 67:1-67:22 (2021) - [c70]Valentina Casola, Alessandra De Benedictis, Carlo Mazzocca, Rebecca Montanari:
Toward Automated Threat Modeling of Edge Computing Systems. CSR 2021: 135-140 - [c69]Riccardo Carbone, Salvatore Barone, Mario Barbareschi, Valentina Casola:
Scrum for Safety: Agile Development in Safety-Critical Software Systems. QUATIC 2021: 127-140 - 2020
- [j28]Rosario Catelli, Francesco Gargiulo, Valentina Casola, Giuseppe De Pietro, Hamido Fujita, Massimo Esposito:
Crosslingual named entity recognition for clinical de-identification applied to a COVID-19 Italian data set. Appl. Soft Comput. 97(Part): 106779 (2020) - [j27]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
A methodology for automated penetration testing of cloud applications. Int. J. Grid Util. Comput. 11(2): 267-277 (2020) - [j26]Flora Amato, Valentina Casola, Giovanni Cozzolino, Alessandra De Benedictis, Francesco Moscato:
Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services. IEEE Internet Things J. 7(5): 4655-4665 (2020) - [j25]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach. J. Syst. Softw. 163: 110537 (2020) - [c68]Immanuel Kunz, Valentina Casola, Angelika Schneider, Christian Banse, Julian Schütte:
Towards Tracking Data Flows in Cloud Architectures. CLOUD 2020: 445-452 - [c67]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Giovanni Salzillo:
A Cloud SecDevOps Methodology: From Design to Testing. QUATIC 2020: 317-331 - [e2]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak:
Testing Software and Systems - 32nd IFIP WG 6.1 International Conference, ICTSS 2020, Naples, Italy, December 9-11, 2020, Proceedings. Lecture Notes in Computer Science 12543, Springer 2020, ISBN 978-3-030-64880-0 [contents] - [i1]Immanuel Kunz, Valentina Casola, Angelika Schneider, Christian Banse, Julian Schütte:
Towards Tracking Data Flows in Cloud Architectures. CoRR abs/2007.05212 (2020)
2010 – 2019
- 2019
- [j24]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano, Erkuden Rios, Angel Rego, Giancarlo Capone:
Model-based deployment of secure multi-cloud applications. Int. J. Grid Util. Comput. 10(6): 639-653 (2019) - [j23]Valentina Casola, Alessandra De Benedictis, Antonio Riccio, Diego Rivera, Wissam Mallouli, Edgardo Montes de Oca:
A security monitoring system for internet of things. Internet Things 7 (2019) - [j22]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
Toward the automation of threat modeling and risk assessment in IoT systems. Internet Things 7 (2019) - [c66]Valentina Casola, Alessandra De Benedictis, Umberto Villano:
Enabling Technologies: Infrastructure for Collaborative Enterprises Editorial for WETICE 2019 Conference. WETICE 2019: 14-15 - [c65]Hassan Mokalled, Rosario Catelli, Valentina Casola, Daniele Debertol, Ermete Meda, Rodolfo Zunino:
The Applicability of a SIEM Solution: Requirements and Evaluation. WETICE 2019: 132-137 - [c64]Valentina Casola, Rosario Catelli, Alessandra De Benedictis:
A First Step Towards an ISO-Based Information Security Domain Ontology. WETICE 2019: 334-339 - 2018
- [j21]Elisa Bertino, Valentina Casola, Aniello Castiglione, Willy Susilo:
Editorial: Security and privacy protection vs sustainable development. Comput. Secur. 76: 250-251 (2018) - [j20]Valentina Casola, Alessandra De Benedictis, Jolanda Modic, Massimiliano Rak, Umberto Villano:
Per-service security SLAs for cloud security management: model and implementation. Int. J. Grid Util. Comput. 9(2): 128-138 (2018) - [j19]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
Security-by-design in multi-cloud applications: An optimization approach. Inf. Sci. 454-455: 344-362 (2018) - [c63]Massimiliano Rak, Valentina Casola, Alessandra De Benedictis, Umberto Villano:
Automated Risk Analysis for IoT Systems. 3PGCIC 2018: 265-275 - [c62]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
A Security SLA-Driven Moving Target Defense Framework to Secure Cloud Applications. MTD@CCS 2018: 48-56 - [c61]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
A Proposal of a Cloud-Oriented Security and Performance Simulator Provided as-a-Service. CISIS 2018: 1002-1011 - [c60]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
Towards Automated Penetration Testing for Cloud Applications. WETICE 2018: 24-29 - 2017
- [j18]Valentina Casola, Alessandra De Benedictis, Madalina Erascu, Jolanda Modic, Massimiliano Rak:
Automatically Enforcing Security SLAs in the Cloud. IEEE Trans. Serv. Comput. 10(5): 741-755 (2017) - [c59]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
A Security Metric Catalogue for Cloud Applications. CISIS 2017: 854-863 - [c58]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
An Automatic Tool for Benchmark Testing of Cloud Applications. CLOSER 2017: 701-708 - [c57]Valentina Casola, Alessandra De Benedictis, Roberto Nardone:
Towards Model-Based Security Assessment of Cloud Applications. GPC 2017: 773-785 - [c56]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano, Erkuden Rios, Angel Rego, Giancarlo Capone:
MUSA Deployer: Deployment of Multi-cloud Applications. WETICE 2017: 107-112 - 2016
- [j17]Valentina Casola, Aniello Castiglione, Kim-Kwang Raymond Choo, Christian Esposito:
Healthcare-Related Data in the Cloud: Challenges and Opportunities. IEEE Cloud Comput. 3(6): 10-14 (2016) - [j16]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
SLA-based Secure Cloud Application Development. Scalable Comput. Pract. Exp. 17(4): 271-284 (2016) - [j15]Ivana Zinno, Lorenzo Mossucca, Stefano Elefante, Claudio De Luca, Valentina Casola, Olivier Terzo, Francesco Casu, Riccardo Lanari:
Cloud Computing for Earth Surface Deformation Analysis via Spaceborne Radar Imaging: A Case Study. IEEE Trans. Cloud Comput. 4(1): 104-118 (2016) - [c55]Valentina Casola, Alessandra De Benedictis, Madalina Erascu, Massimiliano Rak, Umberto Villano:
A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services. CISIS 2016: 549-554 - [c54]Valentina Casola, Massimiliano Rak, Silvio La Porta, Andrew Byrne:
Providing Security SLA in Next Generation Data Centers with SPECS: The EMC Case Study. CLOSER (2) 2016: 138-145 - [c53]Massimiliano Rak, Valentina Casola, Silvio La Porta, Andrew Byrne:
Security SLA in Next Generation Data Centers, the SPECS Approach. CLOSER (Selected Papers) 2016: 151-169 - [c52]Samuel Olaiya Afolaranmi, Luis E. Gonzalez Moctezuma, Massimiliano Rak, Valentina Casola, Erkuden Rios, Jose L. Martinez Lastra:
Methodology to Obtain the Security Controls in Multi-cloud Applications. CLOSER (1) 2016: 327-332 - [c51]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Erkuden Rios:
Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications. Cloud Forward 2016: 53-62 - [c50]Erkuden Rios, Wissam Mallouli, Massimiliano Rak, Valentina Casola, Antonio M. Ortiz:
SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework. ICDCS Workshops 2016: 55-60 - [c49]Alessandra De Benedictis, Valentina Casola, Massimiliano Rak, Umberto Villano:
Cloud Security: From Per-Provider to Per-Service Security SLAs. INCoS 2016: 469-474 - [c48]Valentina Casola, Alessandra De Benedictis, Jolanda Modic, Massimiliano Rak, Umberto Villano:
Per-Service Security SLa: A New Model for Security Management in Clouds. WETICE 2016: 83-88 - 2015
- [j14]Claudio De Luca, Roberto Cuccu, Stefano Elefante, Ivana Zinno, Michele Manunta, Valentina Casola, Giancarlo Rivolta, Riccardo Lanari, Francesco Casu:
An On-Demand Web Tool for the Unsupervised Retrieval of Earth's Surface Deformation from SAR Data: The P-SBAS Service within the ESA G-POD Environment. Remote. Sens. 7(11): 15630-15650 (2015) - [c47]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
DoS Protection in the Cloud through the SPECS Services. 3PGCIC 2015: 677-682 - [c46]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak:
Security Monitoring in the Cloud: An SLA-Based Approach. ARES 2015: 749-755 - [c45]Erkuden Rios, Eider Iturbe, Leire Orue-Echevarria, Massimiliano Rak, Valentina Casola:
Towards Self-Protective Multi-Cloud Applications - MUSA - a Holistic Framework to Support the Security-Intelligent Lifecycle Management of Multi-Cloud Applications. CLOSER 2015: 551-558 - [c44]Claudio De Luca, Roberto Cuccu, Stefano Elefante, Ivana Zinno, Michele Manunta, Giancarlo Rivolta, Valentina Casola, Riccardo Lanari, Francesco Casu:
Unsupervised on-demand web service for DInSAR processing: The P-SBAS implementation within the ESA G-POD environment. IGARSS 2015: 2692-2695 - [c43]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
SLA-Based Secure Cloud Application Development: The SPECS Framework. SYNASC 2015: 337-344 - 2014
- [j13]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Giuseppe Aversano, Umberto Villano:
An SLA-based brokering platform to provide sensor networks as-a-service. Int. J. Bus. Process. Integr. Manag. 7(2): 114-127 (2014) - [j12]Massimiliano Rak, Massimo Ficco, Ermanno Battista, Valentina Casola, Nicola Mazzocca:
Developing Secure Cloud Applications. Scalable Comput. Pract. Exp. 15(1) (2014) - [c42]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak:
On the Adoption of Security SLAs in the Cloud. A4Cloud 2014: 45-62 - [c41]Valentina Casola, Massimiliano Rak, Giuseppe Alfieri:
A Cloud Application for Security Service Level Agreement Evaluation. CLOSER 2014: 299-307 - [c40]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano:
Preliminary Design of a Platform-as-a-Service to Provide Security in Cloud. CLOSER 2014: 752-757 - [c39]Lorenzo Mossucca, Ivana Zinno, Stefano Elefante, Claudio De Luca, Valentina Casola, Olivier Terzo, Francesco Casu, Riccardo Lanari:
Cloud Platform for Scientific Advances in Earth Surface Interferometric SAR Image Analysis. CloudCom 2014: 835-840 - [c38]Massimiliano Albanese, Ermanno Battista, Sushil Jajodia, Valentina Casola:
Manipulating the attacker's view of a system's attack surface. CNS 2014: 472-480 - 2013
- [j11]Valentina Casola, Antonio Cuomo, Massimiliano Rak, Umberto Villano:
The CloudGrid approach: Security analysis and performance evaluation. Future Gener. Comput. Syst. 29(1): 387-401 (2013) - [j10]Flora Amato, Valentina Casola, Nicola Mazzocca, Sara Romano:
A semantic approach for fine-grain access control of e-health documents. Log. J. IGPL 21(4): 692-701 (2013) - [j9]Ermanno Battista, Valentina Casola, Antonino Mazzeo, Nicola Mazzocca:
SIREN: a feasible moving target defence framework for securing resource-constrained embedded nodes. Int. J. Crit. Comput. Based Syst. 4(4): 374-392 (2013) - [j8]Valentina Casola, Alessandra De Benedictis, Annarita Drago, Nicola Mazzocca:
SeNsiM-SEC: secure sensor networks integration to monitor rail freight transport. Int. J. Syst. Syst. Eng. 4(3/4): 291-316 (2013) - [j7]Flora Amato, Valentina Casola, Mariana Esposito, Antonino Mazzeo, Nicola Mazzocca:
A smart decision support systems based on a fast classifier and a semantic post reasoner. Int. J. Syst. Syst. Eng. 4(3/4): 317-336 (2013) - [c37]Ermanno Battista, Valentina Casola, Nicola Mazzocca, Roberto Nardone, Stefano Marrone:
A Compositional Modelling Approach for Large Sensor Networks Design. 3PGCIC 2013: 422-429 - [c36]Mario Barbareschi, Ermanno Battista, Valentina Casola, Antonino Mazzeo, Nicola Mazzocca:
On the Adoption of FPGA for Protecting Cyber Physical Infrastructures. 3PGCIC 2013: 430-435 - [c35]Valentina Casola, Mariana Esposito, Francesco Flammini, Nicola Mazzocca, Concetta Pragliola:
Performance Evaluation of Video Analytics for Surveillance On-Board Trains. ACIVS 2013: 414-425 - [c34]Massimiliano Rak, Neeraj Suri, Jesus Luna, Dana Petcu, Valentina Casola, Umberto Villano:
Security as a Service Using an SLA-Based Approach via SPECS. CloudCom (2) 2013: 1-6 - [c33]Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Giuseppe Aversano, Umberto Villano:
An SLA-Based Approach to Manage Sensor Networks as-a-Service. CloudCom (1) 2013: 191-197 - [c32]Flora Amato, Mario Barbareschi, Valentina Casola, Antonino Mazzeo, Sara Romano:
Towards Automatic Generation of Hardware Classifiers. ICA3PP (2) 2013: 125-132 - [c31]Flora Amato, Mario Barbareschi, Valentina Casola, Antonino Mazzeo:
An FPGA-Based Smart Classifier for Decision Support Systems. IDC 2013: 289-299 - [c30]Valentina Casola, Alessandra De Benedictis, Massimiliano Albanese:
A moving target defense approach for protecting resource-constrained distributed devices. IRI 2013: 22-29 - [c29]Valentina Casola, Alessandra De Benedictis, Massimiliano Albanese:
A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices. IRI (best papers) 2013: 299-324 - [c28]Ermanno Battista, Valentina Casola, Stefano Marrone, Nicola Mazzocca, Roberto Nardone, Valeria Vittorini:
An integrated lifetime and network quality model of large WSNs. M&N 2013: 132-137 - [c27]Alessandra De Benedictis, Behzad Koosha, Massimiliano Albanese, Valentina Casola:
A Probabilistic Framework for Distributed Localization of Attackers in MANETs. STM 2013: 49-64 - [c26]Ermanno Battista, Valentina Casola, Nicola Mazzocca, Massimo Ficco, Massimiliano Rak:
Developing Secure Cloud Applications: A Case Study. SYNASC 2013: 432-439 - 2012
- [j6]Jetzabel Serna-Olvera, Valentina Casola, Massimiliano Rak, Jesus Luna, Manel Medina, Nicola Mazzocca:
Performance Analysis of an OCSP-Based Authentication Protocol for VANETs. Int. J. Adapt. Resilient Auton. Syst. 3(1): 19-45 (2012) - [c25]Valentina Casola, Mariana Esposito, Nicola Mazzocca, Francesco Flammini:
Freight Train monitoring: A Case-Study for the pSHIELD Project. IMIS 2012: 597-602 - 2011
- [j5]Flora Amato, Valentina Casola, Andrea Gaglione, Antonino Mazzeo:
A semantic enriched data model for sensor network interoperability. Simul. Model. Pract. Theory 19(8): 1745-1757 (2011) - [c24]Flora Amato, Valentina Casola, Nicola Mazzocca, Sara Romano:
A Semantic-based Document Processing Framework: A Security Perspective. CISIS 2011: 197-202 - [c23]Flora Amato, Valentina Casola, Antonino Mazzeo, Sara Romano:
An Innovative Framework for Securing Unstructured Documents. CISIS 2011: 251-258 - [c22]Valentina Casola, Alessandra De Benedictis, Annarita Drago, Nicola Mazzocca:
Analysis and Comparison of Security Protocols in Wireless Sensor Networks. SRDS Workshops 2011: 52-56 - [p2]Valentina Casola, Raffaele Lettiero, Massimiliano Rak, Umberto Villano:
Access Control in Cloud-on-Grid Systems: The PerfCloud Case Study. Computers, Privacy and Data Protection 2011: 427-444 - 2010
- [j4]Valentina Casola, Jesus Luna, Antonino Mazzeo, Manel Medina, Massimiliano Rak, Jetzabel M. Serna:
An interoperability system for authentication and authorisation in VANETs. Int. J. Auton. Adapt. Commun. Syst. 3(2): 115-135 (2010) - [c21]Flora Amato, Valentina Casola, Antonino Mazzeo, Sara Romano:
A semantic based methodology to classify and protect sensitive data in medical records. IAS 2010: 240-246 - [c20]Valentina Casola, Massimiliano Rak, Umberto Villano:
Identity federation in cloud computing. IAS 2010: 253-259 - [c19]Flora Amato, Valentina Casola, Andrea Gaglione, Antonino Mazzeo:
A Common Data Model for Sensor Network Integration. CISIS 2010: 1081-1086 - [c18]Valentina Casola, Antonio Cuomo, Massimiliano Rak, Umberto Villano:
Security and Performance Trade-off in PerfCloud. Euro-Par Workshops 2010: 633-640
2000 – 2009
- 2009
- [c17]Valentina Casola, Massimiliano Rak, Umberto Villano:
PerfCloud: Performance-Oriented Integration of Cloud and GRID. CloudComp 2009: 93-102 - [c16]Valentina Casola, Anna Rita Fasolino, Nicola Mazzocca, Porfirio Tramontana:
An AHP-Based Framework for Quality and Security Evaluation. CSE (3) 2009: 405-411 - [c15]Valentina Casola, Andrea Gaglione, Antonino Mazzeo:
A Reference Architecture for Sensor Networks Integration and Management. GSN 2009: 158-168 - 2008
- [j3]Valentina Casola, Emilio Pasquale Mancini, Nicola Mazzocca, Massimiliano Rak, Umberto Villano:
Self-optimization of secure web services. Comput. Commun. 31(18): 4312-4323 (2008) - [c14]Flora Amato, Valentina Casola, Antonino Mazzeo, Valeria Vittorini:
The REM Framework for Security Evaluation. ARES 2008: 1097-1103 - [e1]Massimiliano Rak, Ajith Abraham, Valentina Casola:
Proccedings of the Fourth International Conference on Information Assurance and Security, IAS 2008, September 8-10, 2008, Napoli, Italy. IEEE Computer Society 2008, ISBN 978-0-7695-3324-7 [contents] - 2007
- [j2]Valentina Casola, Antonino Mazzeo, Nicola Mazzocca, Valeria Vittorini:
A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures. J. Comput. Secur. 15(2): 197-229 (2007) - [c13]Valentina Casola, Nicola Mazzocca, Jesus Luna, Oscar Manso, Manel Medina:
Static evaluation of Certificate Policies for GRID PKIs interoperability. ARES 2007: 391-399 - [c12]Valentina Casola, Emilio Pasquale Mancini, Nicola Mazzocca, Massimiliano Rak, Umberto Villano:
Building Autonomic and Secure Service Oriented Architectures with MAWeS. ATC 2007: 82-93 - [c11]Valentina Casola, Jesus Luna, Oscar Manso, Nicola Mazzocca, Manel Medina, Massimiliano Rak:
Interoperable Grid PKIs Among Untrusted Domains: An Architectural Proposal. GPC 2007: 39-51 - [c10]Valentina Casola, Anna Rita Fasolino, Nicola Mazzocca, Porfirio Tramontana:
A policy-based evaluation framework for Quality and Security in Service Oriented Architectures. ICWS 2007: 1181-1190 - [c9]Massimiliano Rak, Valentina Casola, Nicola Mazzocca, Emilio Pasquale Mancini, Umberto Villano:
Optimizing secure Web Services with MAWeS: A case study. SecureComm 2007: 144-153 - 2006
- [c8]Valentina Casola, Luigi Coppolino, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak:
Design and implementation of TruMan, a Trust Manager Component for Distributed Systems. SecPerU 2006: 34-40 - [p1]Valentina Casola, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak:
A SLA evaluation methodology in Service Oriented Architectures. Quality of Protection 2006: 119-130 - 2005
- [j1]Valentina Casola, Rosa Preziosi, Massimiliano Rak, Luigi Troiano:
A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques. J. Univers. Comput. Sci. 11(1): 150-174 (2005) - [c7]Valentina Casola, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak:
An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures. EuroPKI 2005: 100-117 - [c6]Valentina Casola, Massimiliano Rak, Antonino Mazzeo, Nicola Mazzocca:
Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based Approach. ITCC (1) 2005: 727-732 - 2004
- [c5]Valentina Casola, Raffaele Chianese, Nicola Mazzocca, Massimiliano Rak, Antonino Mazzeo:
A Policy-Based Design Methodology and Performance Evaluation Framework for a Secure VoIP Infrastructure. ICETE (2) 2004: 209-215 - [c4]Valentina Casola, Massimiliano Rak, Rosa Preziosi, Luigi Troiano:
Security Level Evaluation: Policy and Fuzzy Techniques. ITCC (2) 2004: 752- - [c3]Valentina Casola, Antonino Mazzeo, Nicola Mazzocca, Salvatore Venticinque:
Design of Policy-Based Security Mechanisms in a Distributed Web Services Architecture. PARA 2004: 454-463 - 2003
- [c2]Valentina Casola, Nicola Mazzocca, Antonino Mazzeo, Valeria Vittorini:
Policy based interoperability in distributed security infrastructures. CE 2003: 1027-1034 - 2002
- [c1]Valentina Casola, Antonino Mazzeo, Nicola Mazzocca, Valeria Vittorini:
Policy formalization to combine separate systems into larger connected network of trust. Net-Con 2002: 425-430
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint