Luca Verderame's Selected Publications

[10] A. Armando, G. Costa, A. Merlo, and L. Verderame. Formal modeling and automatic enforcement of bring your own device policies. International Journal of Information Security, pages 1--18, Aug. 2014. [ DOI | .pdf ]
[9] A. Armando, G. Costa, A. Merlo, and L. Verderame. Enabling byod through secure meta-market. In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec '14, pages 219--230, New York, NY, USA, July 2014. ACM. [ DOI | .pdf ]
[8] A. Armando, G. Costa, L. Verderame, and A. Merlo. Securing the “bring your own device” paradigm. IEEE Computer, 47(6):48--56, 2014. [ DOI | .pdf ]
[7] A. Armando, A. Merlo, and L. Verderame. Security considerations related to the use of mobile devices in the operation of critical infrastructures. International Journal of Critical Infrastructure Protection, 7(4):247 -- 256, 2014. [ DOI | http ]
[6] A. Armando, A. Merlo, M. Migliardi, and L. Verderame. Breaking and fixing the android launching flow. Computers & Security, 39, Part A(0):104 -- 115, 2013. [ DOI | .pdf ]
[5] A. Armando, A. Castiglione, G. Costa, U. Fiore, A. Merlo, L. Verderame, and I. You. Trustworthy opportunistic access to the internet of services. In ICT-EurAsia'13: Proceedings of the 2013 international conference on Information and Communication Technology, pages 469--478, Berlin, Heidelberg, 2013. Springer-Verlag. [ DOI | .pdf ]
[4] A. Armando, A. Merlo, and L. Verderame. An empirical evaluation of the android security framework. In L. Janczewski, H. Wolfe, and S. Shenoi, editors, Security and Privacy Protection in Information Processing Systems, Proceedings of the 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013., volume 405 of IFIP Advances in Information and Communication Technology, pages 176--189. Springer Berlin Heidelberg, 2013. [ DOI | .pdf ]
[3] G. Costa, A. Merlo, and L. Verderame. Market-based security for mobile devices. Ercim News, 93:32--33, 2013. [ .pdf ]
[2] A. Armando, A. Merlo, M. Migliardi, and L. Verderame. Would you mind forking this process? a denial of service attack on android (and some countermeasures). In D. Gritzalis, S. Furnell, and M. Theoharidou, editors, Information Security and Privacy Research, volume 376 of IFIP Advances in Information and Communication Technology, pages 13--24. Springer Berlin Heidelberg, 2012. [ DOI | .pdf ]
[1] A. Armando, G. Costa, A. Merlo, and L. Verderame. Securing the “bring your own device” policy. Journal of Internet Services and Information Security (JISIS), 2(3/4):3--17, 2012. Short version of this paper has been presented at the 4th International Workshop on Managing Insider Security Threats (MIST 2012), November 8-9, 2012 Nishijin Plaza, Kyushu University, Fukuoka, Japan. [ .pdf ]

This file was generated by bibtex2html 1.98.