Skip to content. | Skip to navigation

Personal tools

Navigation

You are here: Home / Documents / Scientific Papers

Scientific Papers

Papers published by the SECURED project
  • C.Dalton, A.Lioy, D.Lopez, F.Risso, and R.Sassu, "Exploiting the network for securing personal devices", CSPF-2014: 3rd Cyber Security and Privacy Forum, Athens (Greece), 21-22 May 2014. pp.16-27, DOI: 10.1007/978-3-319-12574-9_2
  • A.Lioy, A.Pastor, F.Risso, R.Sassu, and A.L.Shaw, "Offloading security applications into the network", eChallenges e-2014, Belfast (UK), 29-30 October 2014, 9 pages
  • C.Basile, C.Pitscheider, F.Risso, F.Valenza, and M.Vallini, "Towards the dynamic provision of virtualized security services", in the book "Cyber Security and Privacy" by F.Cleary and M.Felici (eds.), Springer, 2015, vol.CCIS-530, pp.65-76, DOI: 10.1007/978-3-319-25360-2_6
  • L.Jacquin, A.Lioy, D.R.Lopez, A.L.Shaw, and T.Su, "The trust problem in modern network infrastructures", in the book "Cyber Security and Privacy" by F.Cleary and M.Felici (eds.), Springer, 2015, vol.CCIS-530, pp.116-127, DOI: 10.1007/978-3-319-25360-2_10

  • C.Basile, A.Lioy, C.Pitscheider, and S.Zhao, "A formal model of policy reconciliation'', PDP-2015: 23rd Euromicro International Conference on Parallel, Distributed and Network-Based Processing, Turku (Finland), 4--6 March 2015, pp.587--594, DOI: 10.1109/PDP.2015.42
  • D.Montero, M.Yannuzzi, A.L.Shaw, L.Jacquin, A.Pastor, R.Serral-Gracià, A.Lioy, F.Risso, C.Basile, R.Sassu, M.Nemirovsky, F.Ciaccia, M.Georgiades, S.Charalambides, J.Kuusijärvi, F.Bosco,"Virtualized security at the network edge: a user-centric approach", IEEE Communications, Vol.53, Issue 4, April 2015, pp. 176-186, ISSN: 0163-6804, DOI: 10.1109/MCOM.2015.7081092
  • L.Jacquin, A.L.Shaw, and C.Dalton, "Towards trusted software-defined networks using a hardware-based integrity measurement architecture", NetSoft-2015: 1st IEEE Conference on Network Softwarization, London (UK), April 13-17, 2015, 6 pages, DOI:10.1109/NETSOFT.2015.7116186
  • C.Basile, A.Lioy, C.Pitscheider, F.Valenza, and M.Vallini, "A novel approach for integrating security policy enforcement with dynamic network virtualization", NetSoft-2015: 1st IEEE Conference on Network Softwarization, London (UK), April 13-17, 2015, 5 pages, DOI: 10.1109/NETSOFT.2015.7116152

  • R.Bonafiglia, F.Ciaccia, A.Lioy, M.Nemirovsky, F.Risso, and T.Su, "Offloading personal security applications to a secure and trusted network node", NetSoft-2015: 1st IEEE Conference on Network Softwarization, London (UK), April 13-17, 2015, 2 pages, DOI: 10.1109/NETSOFT.2015.711617

  • J.Hiltunen and J.Kuusijärvi, Trust metrics based on a trusted network element", RATSP-2015: IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications, Helsinki (Finland), 20-22 August 2015
  • F.Valenza, S.Spinoso, C.Basile, R.Sisto, and A.Lioy, "A formal model of network policy analysis", RTSI-2015: 1st International Forum on Research and Technologies for Society and Industry, Torino (Italy), 16-18 September 2015

  • C.Basile, D.Canavese, A.Lioy, C.Pitscheider, F.Valenza, "Inter-function anomaly analysis for correct SDN/NFV deployment", International Journal of Network Management, John Wiley & Sons, Vol.26, Issue 1, January-February 2016, pp. 25-43, DOI: 10.1002/nem.1917