SU, TAO
A formal approach for network security policy validation
2017 Valenza, Fulvio; Su, Tao; Spinoso, Serena; Lioy, Antonio; Sisto, Riccardo; Vallini, Marco
Trust and integrity in distributed systems
2017 Su, Tao
Trust in SDN/NFV environments
2017 Lioy, Antonio; Su, Tao; Lopez, Diego R.; Pastor, Antonio; Shaw, Adrian L.; Attak, Hamza
Cloudification of Public Services in Smart Cities: the CLIPS project
2016 Filograna, Antonio; Smiraglia, Paolo; Gilsanz, Celia; Krco, Srdjan; Medela, Arturo; Su, Tao
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems
2016 Su, Tao; Lioy, Antonio; Barresi, Nicola
Android Apps Risk Evaluation: a methodology
2015 Atzeni, Andrea; Su, Tao; Baltatu, Madalina; D'Alessandro, Rosalia; Pessiva, Giovanni
Offloading personal security applications to a secure and trusted network node
2015 Bonafiglia, Roberto; Ciaccia, F.; Lioy, Antonio; Nemirovsky, M.; Risso, FULVIO GIOVANNI OTTAVIO; Su, Tao
The trust problem in modern network infrastructures
2015 Jacquin, Ludovic; Lioy, Antonio; Lopez, Diego R.; Shaw, Adrian L.; Su, Tao
How Dangerous is Your Android App? An Evaluation Methodology
2014 Atzeni, Andrea; Su, Tao; M., Baltatu; R., D'Alessandro; G., Pessiva
Lightweight Formal Verification in Real World, A Case Study
2014 Atzeni, Andrea; Su, Tao; Montanaro, Teodoro
Continuous integration for web-based software infrastructures: lessons learned on the webinos project
2013 Su, Tao; Lyle, J.; Atzeni, Andrea; Faily, S.; Virji, H.; Ntanos, C.; Botsikas, C.
Citazione | Data di pubblicazione | Autori | File |
---|---|---|---|
A formal approach for network security policy validation / Valenza, Fulvio; Su, Tao; Spinoso, Serena; Lioy, Antonio; Sisto, Riccardo; Vallini, Marco. - In: JOURNAL OF WIRELESS MOBILE NETWORKS, UBIQUITOUS COMPUTING AND DEPENDABLE APPLICATIONS. - ISSN 2093-5374. - STAMPA. - 8:1(2017), pp. 79-100. [10.22667/JOWUA.2017.03.31.079] | 1-gen-2017 | VALENZA, FULVIOSU, TAOSPINOSO, SERENALIOY, ANTONIOSISTO, RiccardoVALLINI, MARCO | 2017JOWUA.pdf |
Trust and integrity in distributed systems / Su, Tao. - (2017). [10.6092/polito/porto/2676918] | 1-gen-2017 | SU, TAO | SU_TAO_thesis.pdf |
Trust in SDN/NFV environments / Lioy, Antonio; Su, Tao; Lopez, Diego R.; Pastor, Antonio; Shaw, Adrian L.; Attak, Hamza - In: Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications / Ying Zhu S., Hill R.; Scott-Hayward S.; Jacquin L.. - STAMPA. - [s.l] : springer, 2017. - ISBN 978-3-319-64652-7. - pp. 103-124 [10.1007/978-3-319-64653-4_4] | 1-gen-2017 | LIOY, ANTONIOSU, TAO + | - |
Cloudification of Public Services in Smart Cities: the CLIPS project / Filograna, Antonio; Smiraglia, Paolo; Gilsanz, Celia; Krco, Srdjan; Medela, Arturo; Su, Tao. - ELETTRONICO. - (2016), pp. 153-158. (Intervento presentato al convegno 21st IEEE Symposium on Computers and Communications (ISCC'16) tenutosi a Messina (IT) nel 2016) [10.1109/ISCC.2016.7543731]. | 1-gen-2016 | SMIRAGLIA, PAOLOSU, TAO + | - |
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems / Su, Tao; Lioy, Antonio; Barresi, Nicola - In: Cloud Computing Security - Foundations and Challenges / Vacca J.R.. - STAMPA. - [s.l] : Taylor & Francis, 2016. - ISBN 978-1-4822-6094-6. - pp. 345-358 | 1-gen-2016 | SU, TAOLIOY, ANTONIOBARRESI, NICOLA | torsec_CRC_cloud_TC.pdf |
Android Apps Risk Evaluation: a methodology / Atzeni, Andrea; Su, Tao; Baltatu, Madalina; D'Alessandro, Rosalia; Pessiva, Giovanni. - In: ICST TRANSACTIONS ON UBIQUITOUS ENVIRONMENTS. - ISSN 2032-9377. - ELETTRONICO. - 1:4(2015), pp. 1-18. [10.4108/ue.1.4.e5] | 1-gen-2015 | ATZENI, ANDREASU, TAO + | ue.1.4.e5.pdf |
Offloading personal security applications to a secure and trusted network node / Bonafiglia, Roberto; Ciaccia, F.; Lioy, Antonio; Nemirovsky, M.; Risso, FULVIO GIOVANNI OTTAVIO; Su, Tao. - STAMPA. - (2015), pp. 1-2. (Intervento presentato al convegno Netsoft-2015: 1st IEEE Conference on Network Softwarization tenutosi a London (UK) nel 13-17 April 2015) [10.1109/NETSOFT.2015.7116171]. | 1-gen-2015 | BONAFIGLIA, ROBERTOLIOY, ANTONIORISSO, FULVIO GIOVANNI OTTAVIOSU, TAO + | 2015_netsoft_secured_final.pdf |
The trust problem in modern network infrastructures / Jacquin, Ludovic; Lioy, Antonio; Lopez, Diego R.; Shaw, Adrian L.; Su, Tao - In: Cyber Security and Privacy / Cleary F., Felici M.. - STAMPA. - [s.l] : Springer, 2015. - ISBN 978-3-319-25360-2. - pp. 116-127 [10.1007/978-3-319-25360-2_10] | 1-gen-2015 | LIOY, ANTONIOSU, TAO + | - |
How Dangerous is Your Android App? An Evaluation Methodology / Atzeni, Andrea; Su, Tao; M., Baltatu; R., D'Alessandro; G., Pessiva. - ELETTRONICO. - (2014), pp. 130-139. (Intervento presentato al convegno 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services tenutosi a London, United Kingdom nel 02/12/2014-05/12/2014) [10.4108/icst.mobiquitous.2014.257832]. | 1-gen-2014 | ATZENI, ANDREASU, TAO + | - |
Lightweight Formal Verification in Real World, A Case Study / Atzeni, Andrea; Su, Tao; Montanaro, Teodoro. - STAMPA. - (2014), pp. 335-342. (Intervento presentato al convegno WISSE 2014: 4th International Workshop on Information Systems Security Engineering tenutosi a Thessaloniki (Greece) nel 17 June 2014) [10.1007/978-3-319-07869-4_31]. | 1-gen-2014 | ATZENI, ANDREASU, TAOMONTANARO, TEODORO | - |
Continuous integration for web-based software infrastructures: lessons learned on the webinos project / Su, Tao; Lyle, J.; Atzeni, Andrea; Faily, S.; Virji, H.; Ntanos, C.; Botsikas, C.. - STAMPA. - LNCS-8244:(2013), pp. 145-150. (Intervento presentato al convegno HVC-2013: Ninth Haifa Verification Conference tenutosi a Haifa (Israel) nel 5-7/11/2013) [10.1007/978-3-319-03077-7_10]. | 1-gen-2013 | SU, TAOATZENI, ANDREA + | - |