Search the dblp DataBase
Luigi V. Mancini :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Luigi V. Mancini , Santosh K. Shrivastava Fault-Tolerant Reference Counting for Garbage Collection in Distributed Systems. [Citation Graph (2, 0)][DBLP ] Comput. J., 1991, v:34, n:6, pp:503-513 [Journal ] Indrajit Ray , Elisa Bertino , Sushil Jajodia , Luigi V. Mancini An Advanced Commit Protocol for MLS Distributed Database Systems. [Citation Graph (1, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1996, pp:119-128 [Conf ] Sushil Jajodia , Luigi V. Mancini , Indrajit Ray Secure Locking Protocols for Multilevel Database Management Systems. [Citation Graph (1, 0)][DBLP ] DBSec, 1996, pp:177-194 [Conf ] Elisa Bertino , Sushil Jajodia , Luigi V. Mancini , Indrajit Ray Advanced Transaction Processing in Multilevel Secure File Stores. [Citation Graph (1, 6)][DBLP ] IEEE Trans. Knowl. Data Eng., 1998, v:10, n:1, pp:120-135 [Journal ] Luigi V. Mancini , Maciej Koutny Formal specification of N-modular redundancy. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer Science, 1986, pp:199-204 [Conf ] Elisa Bertino , Giovanni Chiola , Luigi V. Mancini Deadlock Detection in the Face of Transaction and Data Dependencies in Advanced Transaction Models. [Citation Graph (0, 0)][DBLP ] ICATPN, 1998, pp:266-285 [Conf ] Massimo Bernaschi , Emanuele Gabrielli , Luigi V. Mancini Operating system enhancements to prevent the misuse of system calls. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:174-183 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Antonio Durante , Vishwas Patil Addressing the shortcomings of one-way chains. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:289-296 [Conf ] Vishwas Patil , Alessandro Mei , Luigi V. Mancini Addressing interoperability issues in access control models. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:389-391 [Conf ] Sushil Jajodia , Luigi V. Mancini , Sanjeev Setia A Fair Locking Protocol for Multilevel Secure Databases. [Citation Graph (0, 0)][DBLP ] CSFW, 1998, pp:168-178 [Conf ] Ehud Gudes , Luigi V. Mancini , Francesco Parisi-Presicce Information Flow Analysis for File Systems and Databases Using Labels. [Citation Graph (0, 0)][DBLP ] DBSec, 2004, pp:125-141 [Conf ] Santosh K. Shrivastava , Luigi V. Mancini , Brian Randell On the Duality of Fault Tolerant System Structures. [Citation Graph (0, 0)][DBLP ] Experiences with Distributed Systems, 1987, pp:19-37 [Conf ] Alan A. Bertossi , Luigi V. Mancini , Alessandra Menapace Scheduling Hard-Real-Time Tasks with Backup Phasing Delay. [Citation Graph (0, 0)][DBLP ] DS-RT, 2006, pp:107-118 [Conf ] Manuel Koch , Luigi V. Mancini , Francesco Parisi-Presicce A Formal Model for Role-Based Access Control Using Graph Transformation. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:122-139 [Conf ] Manuel Koch , Luigi V. Mancini , Francesco Parisi-Presicce Decidability of Safety in Graph-Based Models for Access Control. [Citation Graph (0, 0)][DBLP ] ESORICS, 2002, pp:229-243 [Conf ] Roberto Battistoni , Emanuele Gabrielli , Luigi V. Mancini A Host Intrusion Prevention System for Windows Operating Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:352-368 [Conf ] Alessandro Ciampichetti , Elisa Bertino , Luigi V. Mancini Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 1994, pp:359-373 [Conf ] Luigi V. Mancini , Indrajit Ray Secure Concurrency Control in MLS Databases with Two Versions of Data. [Citation Graph (0, 0)][DBLP ] ESORICS, 1996, pp:304-323 [Conf ] Maria Calagna , Luigi V. Mancini A Blind Method for Digital Watermarking Attacks. [Citation Graph (0, 0)][DBLP ] EuroIMSA, 2005, pp:265-270 [Conf ] Antonio Durante , Roberto Di Pietro , Luigi V. Mancini Formal Specification for Fast Automatic IDS Training. [Citation Graph (0, 0)][DBLP ] FASec, 2002, pp:191-204 [Conf ] Manuel Koch , Luigi V. Mancini , Francesco Parisi-Presicce Foundations for a Graph-Based Approach to the Specification of Access Control Policies. [Citation Graph (0, 0)][DBLP ] FoSSaCS, 2001, pp:287-302 [Conf ] Manuel Koch , Luigi V. Mancini , Francesco Parisi-Presicce Conflict Detection and Resolution in Access Control Policy Specifications. [Citation Graph (0, 0)][DBLP ] FoSSaCS, 2002, pp:223-237 [Conf ] Luigi V. Mancini , Giuseppe Pappalardo Towards a Theory of Replicated Processing. [Citation Graph (0, 0)][DBLP ] FTRTFT, 1988, pp:175-192 [Conf ] Giorgio Zanin , Alessandro Mei , Luigi V. Mancini A Secure and Efficient Large Scale Distributed System for Data Sharing. [Citation Graph (0, 0)][DBLP ] ICDCS, 2006, pp:27- [Conf ] Roberto Di Pietro , Luigi V. Mancini , Yee Wei Law , Sandro Etalle , Paul J. M. Havinga LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 2003, pp:397-0 [Conf ] Alan A. Bertossi , Andrea Fusiello , Luigi V. Mancini Fault-Tolerant Deadline-Monotonic Algorithm for Scheduling Hard-Real-Time Tasks. [Citation Graph (0, 0)][DBLP ] IPPS, 1997, pp:133-138 [Conf ] Giovanni Chiola , Gianni Conte , Luigi V. Mancini Workshop on Personal Computer Based Networks of Workstation. [Citation Graph (0, 0)][DBLP ] IPDPS Workshops, 2000, pp:1-3 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Alessandro Mei Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment. [Citation Graph (0, 0)][DBLP ] IPDPS, 2004, pp:- [Conf ] Maciej Koutny , Luigi V. Mancini , Giuseppe Pappalardo Modelling Replicated Processing. [Citation Graph (0, 0)][DBLP ] PARLE, 1993, pp:672-675 [Conf ] Giovanni Chiola , Giuseppe Ciaccio , Luigi V. Mancini , Pierluigi Rotondo GAMMA on DEC 2114x with Efficient Flow Control. [Citation Graph (0, 0)][DBLP ] PDPTA, 1999, pp:2337-2343 [Conf ] Mauro Conti , Roberto Di Pietro , Luigi V. Mancini Secure Cooperative Channel Establishment inWireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] PerCom Workshops, 2006, pp:327-331 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Sushil Jajodia Efficient and secure keys management for wireless mobile communications. [Citation Graph (0, 0)][DBLP ] POMC, 2002, pp:66-73 [Conf ] Nicoletta De Francesco , Gigliola Vaglini , Luigi V. Mancini , A. Pereira Paz Specification of Concurrency Control in Persistent Programming Languages. [Citation Graph (0, 0)][DBLP ] POS, 1992, pp:126-143 [Conf ] Luigi V. Mancini Garbage Collection and Reachability [Citation Graph (0, 0)][DBLP ] POS, 1992, pp:394-395 [Conf ] Maria Calagna , Huiping Guo , Luigi V. Mancini , Sushil Jajodia A robust watermarking system based on SVD compression. [Citation Graph (0, 0)][DBLP ] SAC, 2006, pp:1341-1347 [Conf ] Manuel Koch , Luigi V. Mancini , Francesco Parisi-Presicce On the specification and evolution of access control policies. [Citation Graph (0, 0)][DBLP ] SACMAT, 2001, pp:121-130 [Conf ] Giorgio Zanin , Luigi V. Mancini Towards a formal model for security policies specification and validation in the selinux system. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:136-145 [Conf ] Manuel Koch , Luigi V. Mancini , Francesco Parisi-Presicce Administrative scope in the graph-based framework. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:97-104 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Alessandro Mei Random key-assignment for secure Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] SASN, 2003, pp:62-71 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Alessandro Mei , Alessandro Panconesi , Jaikumar Radhakrishnan Connectivity properties of secure wireless sensor networks. [Citation Graph (0, 0)][DBLP ] SASN, 2004, pp:53-58 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Sushil Jajodia Secure Selective Exclusion in Ad Hoc Wireless Network. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:423-434 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Alessandro Mei A Time Driven Methodology for Key Dimensioning in Multicast Communications. [Citation Graph (0, 0)][DBLP ] SEC, 2003, pp:121-132 [Conf ] Maciej Koutny , Luigi V. Mancini , Giuseppe Pappalardo Formalising Replicated Distributed Processing. [Citation Graph (0, 0)][DBLP ] SRDS, 1991, pp:108-117 [Conf ] Luigi V. Mancini , Vittoria Rotella , Simonetta Venosa Copying Garbage Collection for Distributed Object Stores. [Citation Graph (0, 0)][DBLP ] SRDS, 1991, pp:218-227 [Conf ] Roberto Di Pietro , Antonio Durante , Luigi V. Mancini A Reliable Key Authentication Schema for Secure Multicast Communications. [Citation Graph (0, 0)][DBLP ] SRDS, 2003, pp:231-240 [Conf ] Mauro Conti , Roberto Di Pietro , Luigi V. Mancini ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2007, v:5, n:1, pp:49-62 [Journal ] Roberto Di Pietro , Luigi V. Mancini , Sushil Jajodia Providing secrecy in key management protocols for large wireless sensors networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2003, v:1, n:4, pp:455-468 [Journal ] Roberto Di Pietro , Luigi V. Mancini Security and privacy issues of handheld and wearable wireless devices. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2003, v:46, n:9, pp:74-79 [Journal ] Luigi V. Mancini , Giuseppe Pappalardo Proving Correctness Properties of a Replicated Synchronous Program. [Citation Graph (0, 0)][DBLP ] Comput. J., 1989, v:32, n:5, pp:437-444 [Journal ] Luigi V. Mancini , Giuseppe Pappalardo Hoare logic of distributed redundant systems. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 1988, v:3, n:4, pp:171-180 [Journal ] Luigi V. Mancini , Indrajit Ray , Sushil Jajodia , Elisa Bertino Flexible Transaction Dependencies in Database Systems. [Citation Graph (0, 0)][DBLP ] Distributed and Parallel Databases, 2000, v:8, n:4, pp:399-446 [Journal ] Manuel Koch , Luigi V. Mancini , Francesco Parisi-Presicce Graph Transformations for the Specification of Access Control Policies. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2001, v:51, n:, pp:- [Journal ] Roberto Di Pietro , Luigi V. Mancini , Giorgio Zanin Efficient and Adaptive Threshold Signatures for Ad hoc networks. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:171, n:1, pp:93-105 [Journal ] Giovanni Di Crescenzo , Luigi V. Mancini Preface. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:171, n:1, pp:1-2 [Journal ] Maciej Koutny , Luigi V. Mancini , Giuseppe Pappalardo Two Implementation Relations and the Correctness of Communicating Replicated Processes. [Citation Graph (0, 0)][DBLP ] Formal Asp. Comput., 1997, v:9, n:2, pp:119-148 [Journal ] Roberto Di Pietro , Luigi V. Mancini , Alessandro Mei Key management for high bandwidth secure multicast. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2004, v:12, n:5, pp:693-709 [Journal ] Giorgio Zanin , Roberto Di Pietro , Luigi V. Mancini Robust RSA distributed signatures for large-scale long-lived ad hoc networks. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2007, v:15, n:1, pp:171-196 [Journal ] Manuel Koch , Luigi V. Mancini , Francesco Parisi-Presicce Graph-based specification of access control policies. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 2005, v:71, n:1, pp:1-33 [Journal ] Maciej Koutny , Luigi V. Mancini Synchronizing events in replicated systems. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1989, v:9, n:3, pp:183-190 [Journal ] Alan A. Bertossi , Massimo Bonometto , Luigi V. Mancini Increasing Processor Utilization in Hard-Real-Time Systems with Checkpoints. [Citation Graph (0, 0)][DBLP ] Real-Time Systems, 1995, v:9, n:1, pp:5-29 [Journal ] Alan A. Bertossi , Luigi V. Mancini Scheduling Algorithms for Fault-Tolerance in Hard-Real-Time Systems. [Citation Graph (0, 0)][DBLP ] Real-Time Systems, 1994, v:7, n:3, pp:229-245 [Journal ] Luigi V. Mancini A Technique for Subclassing and its Implementation Exploiting Polymorphic Procedures. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1988, v:18, n:4, pp:287-300 [Journal ] Santosh K. Shrivastava , Luigi V. Mancini , Brian Randell The Duality of Fault-tolerant System Structures. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1993, v:23, n:7, pp:773-798 [Journal ] Massimo Bernaschi , Emanuele Gabrielli , Luigi V. Mancini Remus: a security-enhanced operating system. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:1, pp:36-61 [Journal ] Manuel Koch , Luigi V. Mancini , Francesco Parisi-Presicce A graph-based formalism for RBAC. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:3, pp:332-365 [Journal ] Indrajit Ray , Luigi V. Mancini , Sushil Jajodia , Elisa Bertino ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2000, v:12, n:6, pp:880-899 [Journal ] Alan A. Bertossi , Luigi V. Mancini , Federico Rossini Fault-Tolerant Rate-Monotonic First-Fit Scheduling in Hard-Real-Time Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1999, v:10, n:9, pp:934-945 [Journal ] Alessandro Mei , Luigi V. Mancini , Sushil Jajodia Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:9, pp:885-896 [Journal ] Luigi V. Mancini Modular Redundancy in a Message Passing System. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1986, v:12, n:1, pp:79-86 [Journal ] Roberto Di Pietro , Luigi V. Mancini , Alessandro Mei Towards threat-adaptive dynamic fragment replication in large scale distributed systems. [Citation Graph (0, 0)][DBLP ] IPDPS, 2007, pp:1- [Conf ] Roberto Di Pietro , Luigi V. Mancini , Alessandro Mei Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2006, v:12, n:6, pp:709-721 [Journal ] A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. [Citation Graph (, )][DBLP ] Catch Me (If You Can): Data Survival in Unattended Sensor Networks. [Citation Graph (, )][DBLP ] RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. [Citation Graph (, )][DBLP ] A Live Digital Forensic system for Windows networks. [Citation Graph (, )][DBLP ] The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. [Citation Graph (, )][DBLP ] Bio-Inspired Topology Maintenance Protocols for Secure Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. [Citation Graph (, )][DBLP ] Special Issue: Hot Topics in Peer-to-Peer Systems. [Citation Graph (, )][DBLP ] The Smallville Effect: Social Ties Make Mobile Networks More Secure Against the Node Capture Attack [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.460secs