
Dottorato in Ingegneria Informatica E Dei Sistemi , 28o ciclo (2013-2016)
Dottorato concluso nel 2017
Tesi:
Trust and Integrity in Distributed Systems
Tutori:
Antonio LioyPubblicazioni
Pubblicazioni durante il dottorato Vedi tutte le pubblicazioni su Porto@Iris
- Valenza, Fulvio; Su, Tao; Spinoso, Serena; Lioy, Antonio; Sisto, Riccardo; Vallini, Marco (2017)
A formal approach for network security policy validation. In: JOURNAL OF WIRELESS MOBILE NETWORKS, UBIQUITOUS COMPUTING AND DEPENDABLE APPLICATIONS, vol. 8, pp. 79-100. ISSN 2093-5374
Contributo su Rivista - Su, Tao (2017)
Trust and integrity in distributed systems. relatore: Lioy A., 28. XXVIII Ciclo, P.: 149
Doctoral Thesis - Lioy, Antonio; Su, Tao; Lopez, Diego R.; Pastor, Antonio; Shaw, Adrian L.; Attak, Hamza (2017)
Trust in SDN/NFV environments. In: Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications / Ying Zhu S., Hill R.; Scott-Hayward S.; Jacquin L., S.L., springer, pp. 103-124. ISBN: 978-3-319-64652-7
Contributo in Volume - Su, Tao; Lioy, Antonio; Barresi, Nicola (2016)
Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems. In: Cloud Computing Security - Foundations and Challenges / Vacca J.R., S.L., Taylor & Francis, pp. 345-358. ISBN: 978-1-4822-6094-6
Contributo in Volume - Filograna, Antonio; Smiraglia, Paolo; Gilsanz, Celia; Krco, Srdjan; Medela, Arturo; Su, ... (2016)
Cloudification of Public Services in Smart Cities: the CLIPS project. In: 21st IEEE Symposium on Computers and Communications (ISCC'16), Messina (IT), 2016, pp. 153-158. ISBN: 978-1-5090-0679-3
Contributo in Atti di Convegno (Proceeding) - Jacquin, Ludovic; Lioy, Antonio; Lopez, Diego R.; Shaw, Adrian L.; Su, Tao (2015)
The trust problem in modern network infrastructures. In: Cyber Security and Privacy / Cleary F., Felici M., S.L., Springer, pp. 116-127. ISBN: 978-3-319-25360-2
Contributo in Volume - Atzeni, Andrea; Su, Tao; Baltatu, Madalina; D'Alessandro, Rosalia; Pessiva, Giovanni (2015)
Android Apps Risk Evaluation: a methodology. In: ICST TRANSACTIONS ON UBIQUITOUS ENVIRONMENTS, vol. 1, pp. 1-18. ISSN 2032-9377
Contributo su Rivista - Bonafiglia, Roberto; Ciaccia, F.; Lioy, Antonio; Nemirovsky, M.; Risso, FULVIO GIOVANNI ... (2015)
Offloading personal security applications to a secure and trusted network node. In: Netsoft-2015: 1st IEEE Conference on Network Softwarization, London (UK), 13-17 April 2015, pp. 1-2. ISBN: 978-1-4799-7898-4
Contributo in Atti di Convegno (Proceeding) - Atzeni, Andrea; Su, Tao; Montanaro, Teodoro (2014)
Lightweight Formal Verification in Real World, A Case Study. In: WISSE 2014: 4th International Workshop on Information Systems Security Engineering, Thessaloniki (Greece), 17 June 2014, pp. 335-342. ISSN 1865-1348
Contributo in Atti di Convegno (Proceeding) - Atzeni, Andrea; Su, Tao; M., Baltatu; R., D'Alessandro; G., Pessiva (2014)
How Dangerous is Your Android App? An Evaluation Methodology. In: 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, London, United Kingdom, 02/12/2014-05/12/2014, pp. 130-139
Contributo in Atti di Convegno (Proceeding) - Su, Tao; Lyle, J.; Atzeni, Andrea; Faily, S.; Virji, H.; Ntanos, C.; Botsikas, C. (2013)
Continuous integration for web-based software infrastructures: lessons learned on the webinos project. In: HVC-2013: Ninth Haifa Verification Conference, Haifa (Israel), 5-7/11/2013, pp. 145-150. ISSN 0302-9743
Contributo in Atti di Convegno (Proceeding)