User Tools

Site Tools


talks

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

talks [2013/03/25 11:27]
olga.gadyatskaya@unitn.it [2011] added pdf
talks [2021/01/29 10:58]
Line 1: Line 1:
-===== Talks of the Security Group in Trento ====== 
- 
-This page list in chronological order the main public talks of the [[start|Security Group]] in Trento. You can also find them in the individual [[research_activities|research topics]]. ​ 
-==== 2013 ==== 
- 
-  * Luca Allodi (Rome Tor Vergata). 
-  * Vadim Kotov (ESSOS). 
-==== 2012 ==== 
- 
-  * Fabio Massacci. //My software has a vulnerability,​ should I worry?// Siemens Research Center, Munich. 18th December 2012. {{mass-2012-siemens-4pages.pdf|slides}}. See also [[security_economics|Security Economics]] and [[vulnerability_discovery_models|Vulnerability Discover Models]] 
-  * Federica Paci. //How do you know that a security requirements method actually work?// ITT Trust and Security Seminar (TSS), University of Illinois, Urbana-Champaign,​ IL, USA, September 26 2012. Work funded by the project [[NESSOS]]. 
-  * Olga Gadyatskaya //The Embeddable Security-by-Contract Verifier for Java Card//. BYTECODE-2012 Workshop, March 2012. {{:​research_activities:​gady-mass-lost-bytecode-2012.pdf|Slides}}. See also [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] Work funded by projects [[SECURECHANGE]] and [[NESSOS]] 
-  * Olga Gadyatskaya,​ Fabio Massacci // Load-Time Security Certification for Real Smart-Cards.//​ FMCO-HATS Summer School Tutorial. September 2012. {{:​research_activities:​gady-mass-2012-fmco-hats-bertinoro.pdf|Slides}} See also [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]] Work funded by projects [[SECURECHANGE]] and [[NESSOS]] 
-==== 2011 ==== 
- 
-  * Fabio Massacci. //Managing Security in Services - a Goal & Process Approach//. Tutorial at the IEEE International Conference on Intelligence and Security Informatics. 2011 {{research_activities:​security_requirements_engineering:​tutorial-isi-2011.pdf|Tutorial Material}} (Appeared in Lecture Notes of FOSAD' 2011. LNCS Springer Verlag.). --> [[security_requirements_engineering|Security Requirements Engineering]]. Work funded by the project [[ANIKETOS]] and [[SECURECHANGE]]. 
-  * Fabio Massacci. //​Load‐Time Security Certification for Real Smart‐Cards//​. Hasso-Plattner Institute Berlin. February 2011. {{:​research_activities:​gady-mass-2011-tub.pdf|Slides}} See [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]]. Work funded by the project [[SECURECHANGE]] and [[NESSOS]]. 
-  * Olga Gadyaskaya, Fabio Massacci. //​Load‐Time Security Certification for Real Smart‐Cards//​. Nokia Research Center, January 2011. {{research_activities:​security-by-contract_for_mobile_and_smart_card:​gady-mass-2011-hpi-nokia-4pages.pdf|Slides}} See [[security-by-contract_for_mobile_and_smart_card|Security-by-Contract for Mobiles and Smart Cards]]. Work funded by the project [[SECURECHANGE]]. ​ 
- 
- 
  
talks.txt · Last modified: 2021/01/29 10:58 (external edit)