The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Luigi V. Mancini: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Luigi V. Mancini, Santosh K. Shrivastava
    Fault-Tolerant Reference Counting for Garbage Collection in Distributed Systems. [Citation Graph (2, 0)][DBLP]
    Comput. J., 1991, v:34, n:6, pp:503-513 [Journal]
  2. Indrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini
    An Advanced Commit Protocol for MLS Distributed Database Systems. [Citation Graph (1, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:119-128 [Conf]
  3. Sushil Jajodia, Luigi V. Mancini, Indrajit Ray
    Secure Locking Protocols for Multilevel Database Management Systems. [Citation Graph (1, 0)][DBLP]
    DBSec, 1996, pp:177-194 [Conf]
  4. Elisa Bertino, Sushil Jajodia, Luigi V. Mancini, Indrajit Ray
    Advanced Transaction Processing in Multilevel Secure File Stores. [Citation Graph (1, 6)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1998, v:10, n:1, pp:120-135 [Journal]
  5. Luigi V. Mancini, Maciej Koutny
    Formal specification of N-modular redundancy. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1986, pp:199-204 [Conf]
  6. Elisa Bertino, Giovanni Chiola, Luigi V. Mancini
    Deadlock Detection in the Face of Transaction and Data Dependencies in Advanced Transaction Models. [Citation Graph (0, 0)][DBLP]
    ICATPN, 1998, pp:266-285 [Conf]
  7. Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini
    Operating system enhancements to prevent the misuse of system calls. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:174-183 [Conf]
  8. Roberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil
    Addressing the shortcomings of one-way chains. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:289-296 [Conf]
  9. Vishwas Patil, Alessandro Mei, Luigi V. Mancini
    Addressing interoperability issues in access control models. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:389-391 [Conf]
  10. Sushil Jajodia, Luigi V. Mancini, Sanjeev Setia
    A Fair Locking Protocol for Multilevel Secure Databases. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:168-178 [Conf]
  11. Ehud Gudes, Luigi V. Mancini, Francesco Parisi-Presicce
    Information Flow Analysis for File Systems and Databases Using Labels. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:125-141 [Conf]
  12. Santosh K. Shrivastava, Luigi V. Mancini, Brian Randell
    On the Duality of Fault Tolerant System Structures. [Citation Graph (0, 0)][DBLP]
    Experiences with Distributed Systems, 1987, pp:19-37 [Conf]
  13. Alan A. Bertossi, Luigi V. Mancini, Alessandra Menapace
    Scheduling Hard-Real-Time Tasks with Backup Phasing Delay. [Citation Graph (0, 0)][DBLP]
    DS-RT, 2006, pp:107-118 [Conf]
  14. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
    A Formal Model for Role-Based Access Control Using Graph Transformation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:122-139 [Conf]
  15. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
    Decidability of Safety in Graph-Based Models for Access Control. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:229-243 [Conf]
  16. Roberto Battistoni, Emanuele Gabrielli, Luigi V. Mancini
    A Host Intrusion Prevention System for Windows Operating Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:352-368 [Conf]
  17. Alessandro Ciampichetti, Elisa Bertino, Luigi V. Mancini
    Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:359-373 [Conf]
  18. Luigi V. Mancini, Indrajit Ray
    Secure Concurrency Control in MLS Databases with Two Versions of Data. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:304-323 [Conf]
  19. Maria Calagna, Luigi V. Mancini
    A Blind Method for Digital Watermarking Attacks. [Citation Graph (0, 0)][DBLP]
    EuroIMSA, 2005, pp:265-270 [Conf]
  20. Antonio Durante, Roberto Di Pietro, Luigi V. Mancini
    Formal Specification for Fast Automatic IDS Training. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:191-204 [Conf]
  21. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
    Foundations for a Graph-Based Approach to the Specification of Access Control Policies. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 2001, pp:287-302 [Conf]
  22. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
    Conflict Detection and Resolution in Access Control Policy Specifications. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 2002, pp:223-237 [Conf]
  23. Luigi V. Mancini, Giuseppe Pappalardo
    Towards a Theory of Replicated Processing. [Citation Graph (0, 0)][DBLP]
    FTRTFT, 1988, pp:175-192 [Conf]
  24. Giorgio Zanin, Alessandro Mei, Luigi V. Mancini
    A Secure and Efficient Large Scale Distributed System for Data Sharing. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2006, pp:27- [Conf]
  25. Roberto Di Pietro, Luigi V. Mancini, Yee Wei Law, Sandro Etalle, Paul J. M. Havinga
    LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2003, pp:397-0 [Conf]
  26. Alan A. Bertossi, Andrea Fusiello, Luigi V. Mancini
    Fault-Tolerant Deadline-Monotonic Algorithm for Scheduling Hard-Real-Time Tasks. [Citation Graph (0, 0)][DBLP]
    IPPS, 1997, pp:133-138 [Conf]
  27. Giovanni Chiola, Gianni Conte, Luigi V. Mancini
    Workshop on Personal Computer Based Networks of Workstation. [Citation Graph (0, 0)][DBLP]
    IPDPS Workshops, 2000, pp:1-3 [Conf]
  28. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei
    Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2004, pp:- [Conf]
  29. Maciej Koutny, Luigi V. Mancini, Giuseppe Pappalardo
    Modelling Replicated Processing. [Citation Graph (0, 0)][DBLP]
    PARLE, 1993, pp:672-675 [Conf]
  30. Giovanni Chiola, Giuseppe Ciaccio, Luigi V. Mancini, Pierluigi Rotondo
    GAMMA on DEC 2114x with Efficient Flow Control. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1999, pp:2337-2343 [Conf]
  31. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini
    Secure Cooperative Channel Establishment inWireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2006, pp:327-331 [Conf]
  32. Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia
    Efficient and secure keys management for wireless mobile communications. [Citation Graph (0, 0)][DBLP]
    POMC, 2002, pp:66-73 [Conf]
  33. Nicoletta De Francesco, Gigliola Vaglini, Luigi V. Mancini, A. Pereira Paz
    Specification of Concurrency Control in Persistent Programming Languages. [Citation Graph (0, 0)][DBLP]
    POS, 1992, pp:126-143 [Conf]
  34. Luigi V. Mancini
    Garbage Collection and Reachability [Citation Graph (0, 0)][DBLP]
    POS, 1992, pp:394-395 [Conf]
  35. Maria Calagna, Huiping Guo, Luigi V. Mancini, Sushil Jajodia
    A robust watermarking system based on SVD compression. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:1341-1347 [Conf]
  36. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
    On the specification and evolution of access control policies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:121-130 [Conf]
  37. Giorgio Zanin, Luigi V. Mancini
    Towards a formal model for security policies specification and validation in the selinux system. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:136-145 [Conf]
  38. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
    Administrative scope in the graph-based framework. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:97-104 [Conf]
  39. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei
    Random key-assignment for secure Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:62-71 [Conf]
  40. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan
    Connectivity properties of secure wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:53-58 [Conf]
  41. Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia
    Secure Selective Exclusion in Ad Hoc Wireless Network. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:423-434 [Conf]
  42. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei
    A Time Driven Methodology for Key Dimensioning in Multicast Communications. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:121-132 [Conf]
  43. Maciej Koutny, Luigi V. Mancini, Giuseppe Pappalardo
    Formalising Replicated Distributed Processing. [Citation Graph (0, 0)][DBLP]
    SRDS, 1991, pp:108-117 [Conf]
  44. Luigi V. Mancini, Vittoria Rotella, Simonetta Venosa
    Copying Garbage Collection for Distributed Object Stores. [Citation Graph (0, 0)][DBLP]
    SRDS, 1991, pp:218-227 [Conf]
  45. Roberto Di Pietro, Antonio Durante, Luigi V. Mancini
    A Reliable Key Authentication Schema for Secure Multicast Communications. [Citation Graph (0, 0)][DBLP]
    SRDS, 2003, pp:231-240 [Conf]
  46. Mauro Conti, Roberto Di Pietro, Luigi V. Mancini
    ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:1, pp:49-62 [Journal]
  47. Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia
    Providing secrecy in key management protocols for large wireless sensors networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2003, v:1, n:4, pp:455-468 [Journal]
  48. Roberto Di Pietro, Luigi V. Mancini
    Security and privacy issues of handheld and wearable wireless devices. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:9, pp:74-79 [Journal]
  49. Luigi V. Mancini, Giuseppe Pappalardo
    Proving Correctness Properties of a Replicated Synchronous Program. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1989, v:32, n:5, pp:437-444 [Journal]
  50. Luigi V. Mancini, Giuseppe Pappalardo
    Hoare logic of distributed redundant systems. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 1988, v:3, n:4, pp:171-180 [Journal]
  51. Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino
    Flexible Transaction Dependencies in Database Systems. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2000, v:8, n:4, pp:399-446 [Journal]
  52. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
    Graph Transformations for the Specification of Access Control Policies. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:51, n:, pp:- [Journal]
  53. Roberto Di Pietro, Luigi V. Mancini, Giorgio Zanin
    Efficient and Adaptive Threshold Signatures for Ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:171, n:1, pp:93-105 [Journal]
  54. Giovanni Di Crescenzo, Luigi V. Mancini
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:171, n:1, pp:1-2 [Journal]
  55. Maciej Koutny, Luigi V. Mancini, Giuseppe Pappalardo
    Two Implementation Relations and the Correctness of Communicating Replicated Processes. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 1997, v:9, n:2, pp:119-148 [Journal]
  56. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei
    Key management for high bandwidth secure multicast. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:5, pp:693-709 [Journal]
  57. Giorgio Zanin, Roberto Di Pietro, Luigi V. Mancini
    Robust RSA distributed signatures for large-scale long-lived ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2007, v:15, n:1, pp:171-196 [Journal]
  58. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
    Graph-based specification of access control policies. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2005, v:71, n:1, pp:1-33 [Journal]
  59. Maciej Koutny, Luigi V. Mancini
    Synchronizing events in replicated systems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1989, v:9, n:3, pp:183-190 [Journal]
  60. Alan A. Bertossi, Massimo Bonometto, Luigi V. Mancini
    Increasing Processor Utilization in Hard-Real-Time Systems with Checkpoints. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 1995, v:9, n:1, pp:5-29 [Journal]
  61. Alan A. Bertossi, Luigi V. Mancini
    Scheduling Algorithms for Fault-Tolerance in Hard-Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 1994, v:7, n:3, pp:229-245 [Journal]
  62. Luigi V. Mancini
    A Technique for Subclassing and its Implementation Exploiting Polymorphic Procedures. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1988, v:18, n:4, pp:287-300 [Journal]
  63. Santosh K. Shrivastava, Luigi V. Mancini, Brian Randell
    The Duality of Fault-tolerant System Structures. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1993, v:23, n:7, pp:773-798 [Journal]
  64. Massimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini
    Remus: a security-enhanced operating system. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:1, pp:36-61 [Journal]
  65. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
    A graph-based formalism for RBAC. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:3, pp:332-365 [Journal]
  66. Indrajit Ray, Luigi V. Mancini, Sushil Jajodia, Elisa Bertino
    ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2000, v:12, n:6, pp:880-899 [Journal]
  67. Alan A. Bertossi, Luigi V. Mancini, Federico Rossini
    Fault-Tolerant Rate-Monotonic First-Fit Scheduling in Hard-Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1999, v:10, n:9, pp:934-945 [Journal]
  68. Alessandro Mei, Luigi V. Mancini, Sushil Jajodia
    Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:9, pp:885-896 [Journal]
  69. Luigi V. Mancini
    Modular Redundancy in a Message Passing System. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1986, v:12, n:1, pp:79-86 [Journal]
  70. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei
    Towards threat-adaptive dynamic fragment replication in large scale distributed systems. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2007, pp:1- [Conf]
  71. Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei
    Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2006, v:12, n:6, pp:709-721 [Journal]

  72. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. [Citation Graph (, )][DBLP]


  73. Catch Me (If You Can): Data Survival in Unattended Sensor Networks. [Citation Graph (, )][DBLP]


  74. RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. [Citation Graph (, )][DBLP]


  75. A Live Digital Forensic system for Windows networks. [Citation Graph (, )][DBLP]


  76. The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  77. Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. [Citation Graph (, )][DBLP]


  78. Bio-Inspired Topology Maintenance Protocols for Secure Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  79. Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. [Citation Graph (, )][DBLP]


  80. Special Issue: Hot Topics in Peer-to-Peer Systems. [Citation Graph (, )][DBLP]


  81. The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack [Citation Graph (, )][DBLP]


Search in 0.010secs, Finished in 0.012secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002