User Tools

Site Tools


talks

This is an old revision of the document!


Talks of the Security Group in Trento

This page list in chronological order the main public talks of the Security Group in Trento. You can also find them in the individual research topics.

2013

  • Luca Allodi (Rome Tor Vergata).
  • Vadim Kotov (ESSOS).

2012

  • Fabio Massacci. My software has a vulnerability, should I worry? Siemens Research Center, Munich. 18th December 2012. slides. See also Security Economics and Vulnerability Discover Models
  • Federica Paci. How do you know that a security requirements method actually work? ITT Trust and Security Seminar (TSS), University of Illinois, Urbana-Champaign, IL, USA, September 26 2012.Slides.Work funded by the project NESSOS.
  • Olga Gadyatskaya The Embeddable Security-by-Contract Verifier for Java Card. BYTECODE-2012 Workshop, March 2012. Slides. See also Security-by-Contract for Mobiles and Smart Cards Work funded by projects SECURECHANGE and NESSOS
  • Olga Gadyatskaya, Fabio Massacci Load-Time Security Certification for Real Smart-Cards. FMCO-HATS Summer School Tutorial. September 2012. Slides See also Security-by-Contract for Mobiles and Smart Cards Work funded by projects SECURECHANGE and NESSOS
  • Muhammad Rizwan Asghar, ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems, The 13th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Chapel Hill, North Carolina, USA, July 2012.
  • Muhammad Rizwan Asghar, ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments, The 6th IEEE International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, August 2011.

2011

  • Muhammad Rizwan Asghar, ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments, The 6th IEEE International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, August 2011.
  • Muhammad Rizwan Asghar, Securing Data Provenance in the Cloud, IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland, June 2011.
  • Muhammad Rizwan Asghar, Flexible and Dynamic Consent-Capturing, IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland, June 2011.
  • Muhammad Rizwan Asghar, Enforcing Multi-user Access Policies to Encrypted Cloud Databases, The 12th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Pisa, Italy, June 2011.
  • Fabio Massacci. Managing Security in Services - a Goal & Process Approach. Tutorial at the IEEE International Conference on Intelligence and Security Informatics. 2011 Tutorial Material (Appeared in Lecture Notes of FOSAD' 2011. LNCS Springer Verlag.). –> Security Requirements Engineering. Work funded by the project ANIKETOS and SECURECHANGE.
  • Fabio Massacci. Load‐Time Security Certification for Real Smart‐Cards. Hasso-Plattner Institute Berlin. February 2011. Slides See Security-by-Contract for Mobiles and Smart Cards. Work funded by the project SECURECHANGE and NESSOS.
  • Olga Gadyaskaya, Fabio Massacci. Load‐Time Security Certification for Real Smart‐Cards. Nokia Research Center, January 2011. Slides See Security-by-Contract for Mobiles and Smart Cards. Work funded by the project SECURECHANGE.
talks.1364242576.txt.gz · Last modified: 2021/01/29 10:58 (external edit)