Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Casalino, Matteo Maria"'
Many tools and libraries are readily available to build and operate distributed Web applications. While the setup of operational environments is comparatively easy, practice shows that their continuous secure operation is more difficult to achieve, m
Externí odkaz:
http://arxiv.org/abs/1206.6757
Publikováno v:
In Computer and Information Security Handbook Edition: Fourth Edition. 2025:917-936
Autor:
Aljohani, Meshari, Alshamrani, Saeed H., Amoroso, Edward G., Amro, Ahmed, Anderson, Richard, Balboni, Paolo, Barata, Martim Taborda, Bardin, Jeffrey S., Basile, Cataldo, Bella, Giampaolo, Braghin, Chiara, Capparelli, Francesco, Casalino, Matteo Maria, Chasdi, Richard J., Chen, Thomas M., Chowdhury, N. M. Istiak, Collins, Lauren, Cremonini, Marco, da Cruz, José de Arimatéia, Day, Christopher, Di Pietro, Roberto, Ellis, Scott R., El Maliki, Tewfiq, Evangelopoulos, Evan, Foresti, Sara, Francis, Kate, Fulp, Errin W., Genovese, Angelo, Gurtu, Anurag, Harmening, Jim, Hasan, Ragib, Hodwitz, Omi, Hoque, Mohammad Aminul, Hossain, Md Ismail, Huseynov, Emin, Katsikas, Sokratis K., Kavallieratos, Georgios, King, Steff, Lambrinoudakis, Costas, Lewis, Keith, Lim, Damien, Livraga, Giovanni, Lombardi, Flavio, McDonald, John, McGowan, John, Mims, Nailah A., Mukkamala, Ravi, Mutti, Simone, Nicoletti, Pete F., Noble, Kevin, Olariu, Stephan, Pandya, Pramod, Paraboschi, Stefano, Patil, Harsh Kupwade, Peacock, Thea, Perkins, Ken, Pitropakis, Nikolaos, Piuri, Vincenzo, Rounsavall, Robert, Ryan, Peter Y.A., Samarati, Pierangela, Schneider, Steve, Scotti, Fabio, Seigneur, Jean-Marc, Signorini, Matteo, Stallings, William, Vimercati, Sabrina De Capitani di, Wing, Dan, Wolf, Brian, Xia, Zhe, Zabicki, Roman
Publikováno v:
In Computer and Information Security Handbook Edition: Fourth Edition. 2025:xv-xvi
Publikováno v:
In Computer and Information Security Handbook Edition: Third Edition. 2017:781-800
Autor:
Casalino, Matteo Maria
La sécurité des services informatiques d'aujourd'hui dépend significativement de la bonne configuration des systèmes qui sont de plus en plus distribués. Au même temps, la gestion des configurations de sécurité est encore fortement basée sur
Externí odkaz:
http://www.theses.fr/2014LYO10124/document
Autor:
Casalino , Matteo Maria
Publikováno v:
Other [cs.OH]. Université Claude Bernard-Lyon I, 2014. English. ⟨NNT : 2014LYO10124⟩
Other [cs.OH]. Université Claude Bernard-Lyon I, 2014. English. 〈NNT : 2014LYO10124〉
Other [cs.OH]. Université Claude Bernard-Lyon I, 2014. English. 〈NNT : 2014LYO10124〉
The security of nowadays IT services significantly depends on the correct configuration of increasingly distributed information systems. At the same time, the management of security configurations is still heavily centered on human activities, which
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::98c5a0037a00e234aa02de109ccd8cf7
https://tel.archives-ouvertes.fr/tel-01058803/file/TH2014_Casalino_Matteo-Maria.pdf
https://tel.archives-ouvertes.fr/tel-01058803/file/TH2014_Casalino_Matteo-Maria.pdf
Autor:
Amoroso, Edward G., Bardin, Jeffrey S., Basile, Cataldo, Berthold, Stefan, Beuchelt, Gerald, Bhaskar, Rahul, Braghin, Chiara, Caballero, Albert, Casalino, Matteo Maria, Cayirci, Erdal, Chen, Thomas M., Cheng, Hongbing, Collins, Lauren, Cremonini, Marco, Curry, Samuel J.J., Dara, Rozita, Day, Christopher, di Vimercati, Sabrina De Capitani, El Maliki, Tewfiq, Ellis, Scott R., Erbschloe, Michael, Fischer-Hbner, Simone, Foresti, Sara, Fulp, Errin W., Genovese, Angelo, Granova, Anna, Gross, William F., Guan, Yong, Gurkok, Cem, Hao, Feng, Hamed, Tarfa, Harmening, James T., Hoffman, Rich, Huseynov, Emin, Jakobsson, Markus, Jhawar, Ravi, Kakareka, Almantas, Kapoor, Bhushan, Katsikas, Sokratis K., Khader, Dalia, Khan, John Benjamin, Korba, Larry, Kotapati, Kameswari, Kremer, Stefan C., LaPorta, Thomas F., Lencrenon, Jean, Lewis, Keith, Liu, Peng, Livraga, Giovanni, Mallery, John R., Mansoor, Bill, Martin, Luther, McDonald, John, McGowan, John, Mims, Nailah, Mutti, Simone, Nicoletti, Peter F., Noble, Kevin, Pandya, Pramod, Patil, Harsh Kupwade, Paraboschi, Stefano, Peacock, Thea, Perkins, Ken, Piuri, Vincenzo, Plate, Henrik, Pooley, James, Rong, Chunming, Rounsavall, Robert, Ryan, Peter Y.A., Samarati, Pierangela, Santambrogio, Marco, Santana, Mario, Schneider, Steve, Scotti, Fabio, Seigneur, Jean-Marc, Slaviero, Marco, Soper, Daniel S., Spies, Terence, Stallings, William, Tsow, Alex, Walker, Jesse, West, Michael A., Wing, Dan, Yee, George O.M., Yan, Liang, Zabicki, Roman, Zhao, Gansen, Zias, Zhe
Publikováno v:
In Computer and Information Security Handbook Edition: Third Edition. 2017:xxvii-xxx
Publikováno v:
On the Move to Meaningful Internet Systems: OTM 2014 Workshops; 2014, p210-216, 7p
Publikováno v:
Data Privacy Management & Autonomous Spontaneous Security (9783642358890); 2013, p217-226, 10p