Nicola Dragoni

Nicola Dragoni

Lektor

DTU COMPUTE
Institut for Matematik og Computer Science

Danmarks Tekniske Universitet

Richard Petersens Plads

Bygning 322, rum 118

2800 Kgs. Lyngby

Hjemmeside

Få tilsendt vCard på e-mail.

Publikationer
Projekter
Kurser
Loading

Publikationer rss feed

2020
 

Community Targeted Phishing

Giaretta, Alberto ; Dragoni, Nicola
part of: Proceedings of 6th International Conference in Software Engineering for Defence Applications - SEDA 2018, pages: 86-93, 2020, Springer
Presented at:
6th International Conference in Software Engineering for Defence Applications, SEDA 2018

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2020     |    DOI: https://doi.org/10.1007/978-3-030-14687-0_8

 

Vulnerabilities and Security Breaches in Cryptocurrencies

Sigurdsson, Gudmundur ; Giaretta, Alberto ; Dragoni, Nicola
part of: Proceedings of 6th International Conference in Software Engineering for Defence Applications - SEDA 2018, pages: 288-299, 2020, Springer
Presented at:
6th International Conference in Software Engineering for Defence Applications, SEDA 2018

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2020     |    DOI: https://doi.org/10.1007/978-3-030-14687-0_26

 

When the Price Is Your Privacy

Favaretto, Margherita ; Tran Anh, Tu ; Kavaja, Juxhino ; De Donno, Michele ; Dragoni, Nicola
part of: Proceedings of 6th International Conference in Software Engineering for Defence Applications - SEDA 2018, pages: 55-75, 2020, Springer
Presented at:
6th International Conference in Software Engineering for Defence Applications, SEDA 2018

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2020     |    DOI: https://doi.org/10.1007/978-3-030-14687-0_6

2019
  PDF

Cyber-storms come from clouds

De Donno, Michele ; Giaretta, Alberto ; Dragoni, Nicola ; Bucchiarone, Antonio ; Mazzara, Manuel
in: Future Internet, vol: 11, issue: 6

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2019     |    DOI: https://doi.org/10.3390/fi11060127

 

BitFlow

Herskind, Lasse ; Giaretta, Alberto ; De Donno, Michele ; Dragoni, Nicola
in: Concurrency Computation

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2019     |    DOI: https://doi.org/10.1002/cpe.5333

 

ANTIBIOTIC 2.0: a fog-based anti-malware for internet of things

De Donno, Michele ; Felipe, Juan Manuel Donaire ; Dragoni, Nicola
part of: Proceedings of 2019 IEEE European Symposium on Security and Privacy Workshops, pages: 11-20, 2019, IEEE
Presented at:
4th IEEE European Symposium on Security and Privacy

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2019     |    DOI: https://doi.org/10.1109/EuroSPW.2019.00008

 

Combining antibiotic with fog computing: Antibiotic 2.0

De Donno, Michele ; Dragoni, Nicola
part of: Proceedings of 3rd IEEE International Conference on Fog and Edge Computing, 2019, IEEE
Presented at:
3rd IEEE International Conference on Fog and Edge Computing

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2019     |    DOI: https://doi.org/10.1109/CFEC.2019.8733144

 

Protecting the Internet of Things with Security-by-Contract and Fog Computing

Giaretta, Alberto ; Dragoni, Nicola ; Massacci, Fabio
part of: Proceedings of 2019 IEEE 5th World Forum on Internet of Things , pages: 1-6, 2019, IEEE
Presented at:
IEEE 5th World Forum on Internet of Things

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2019     |    DOI: https://doi.org/10.1109/WF-IoT.2019.8767243

 

Towards a Systematic Survey of Industrial IoT Security Requirements: Research Method and Quantitative Analysis

Tange, Koen Pieter ; De Donno, Michele ; Fafoutis, Xenofon ; Dragoni, Nicola
part of: Proceedings of the 2019 Workshop on Fog Computing and the Iot (iot-fog '19), pages: 56-63, 2019, Association for Computing Machinery
Presented at:
2019 Workshop on Fog Computing and the Internet of Things

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2019     |    DOI: https://doi.org/10.1145/3313150.3313228

2018
  PDF

Adding salt to pepper a structured security assessment over a humanoid robot

Giaretta, Alberto ; De Donno, Michele ; Dragoni, Nicola
part of: Proceedings of 13th International Conference on Availability, Reliability and Security,, 2018, Association for Computing Machinery
Presented at:
13th International Conference on Availability, Reliability and Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2018     |    DOI: https://doi.org/10.1145/3230833.3232807

  PDF

Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications

Argyriou, Marios ; Dragoni, Nicola ; Spognardi, Angelo
in: Security and Communication Networks, vol: 2018

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2018     |    DOI: https://doi.org/10.1155/2018/4672072

  PDF

AntibIoTic: Protecting IoT Devices Against DDoS Attacks

De Donno, Michele ; Dragoni, Nicola ; Giaretta, Alberto ; Mazzara, Manuel
part of: Proceedings of 5th International Conference in Software Engineering for Defence Applications, pages: 59-72, 2018, Springer
Presented at:
5th International Conference in Software Engineering for Defence Applications

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2018     |    DOI: https://doi.org/10.1007/978-3-319-70578-1_7

  PDF

DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

De Donno, Michele ; Dragoni, Nicola ; Giaretta, Alberto ; Spognardi, Angelo
in: Security and Communication Networks, vol: 2018, pages: 1-30

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2018     |    DOI: https://doi.org/10.1155/2018/7178164

  PDF

From Monolithic to Microservices An Experience Report from the Banking Domain

Bucchiarone, Antonio ; Dragoni, Nicola ; Dustdar, Schahram ; Larsen, Stephan T. ; Mazzara, Manuel
in: IEEE Software, vol: 35, issue: 3, pages: 50-55

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2018     |    DOI: https://doi.org/10.1109/MS.2018.2141026

  PDF

Joining Jolie to Docker Orchestration of Microservices on a Containers-as-a-Service Layer

Giaretta, Alberto ; Dragoni, Nicola ; Mazzara, Manuel
part of: Proceedings of 5th International Conference in Software Engineering for Defence Applications, pages: 167-175, 2018, Springer
Presented at:
5th International Conference in Software Engineering for Defence Applications

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2018     |    DOI: https://doi.org/10.1007/978-3-319-70578-1_16

 

Microservices: How to make your application scale

Dragoni, Nicola ; Lanese, Ivan ; Larsen, Stephan Thordal ; Mazzara, Manuel ; Mustafin, Ruslan ; Safina, Larisa
part of: Perspectives of System Informatics: 11th International Andrei P. Ershov Informatics Conference, PSI 2017, Revised Selected Papers, pages: 95-104, 2019, Springer
Presented at:
11th International Andrei Ershov Memorial Conference on Perspectives of System Informatics

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2018     |    DOI: https://doi.org/10.1007/978-3-319-74313-4_8

2017
 

Analysis of DDoS-capable IoT malwares

De Donno, Michele ; Dragoni, Nicola ; Giaretta, Alberto ; Spognardi, Angelo
part of: Proceedings of the Federated Conference on Computer Science and Information Systems, pages: 807-816, 2017, IEEE
Presented at:
Federated Conference on Computer Science and Information Systems

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2017     |    DOI: https://doi.org/10.15439/2017F288

 

A taxonomy of distributed denial of service attacks

De Donno, Michele ; Giaretta, Alberto ; Dragoni, Nicola ; Spognardi, Angelo
part of: Proceedings of 2017 International Conference onInformation Society (i-Society), pages: 100-7, 2018, IEEE
Presented at:
2017 International Conference on Information Society

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2017     |    DOI: https://doi.org/10.23919/i-Society.2017.8354681

  PDF

Microservices: Yesterday, Today, and Tomorrow

Dragoni, Nicola ; Giallorenzo, Saverio ; Lafuente, Alberto ; Mazzara, Manuel ; Montesi, Fabrizio ; Mustafin, Ruslan ; Safina, Larisa
in: Present and Ulterior Software Engineering, pages: 195-216

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2017     |    DOI: https://doi.org/10.1007/978-3-319-67425-4_12

  PDF

Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study

Handler, Daniel Tolboe ; Hauge, Lotte ; Spognardi, Angelo ; Dragoni, Nicola
part of: Proceedings of the 10th International Joint Conference on Biomedical Engineering Systems and Technologies, pages: 383-388, 2017, SCITEPRESS Digital Library
Presented at:
10th International Joint Conference on Biomedical Engineering Systems and Technologies

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2017     |    DOI: https://doi.org/10.5220/0006224603830388

 

Security flows in OAuth 2.0 framework: A case study

Argyriou, Marios ; Dragoni, Nicola ; Spognardi, Angelo
part of: Proceedings of International Conference on Computer Safety, Reliability, and Security., pages: 396-406, 2017, Springer
Presented at:
International Conference on Computer Safety, Reliability, and Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2017     |    DOI: https://doi.org/10.1007/978-3-319-66284-8_33

  PDF

The Internet of Hackable Things

Dragoni, Nicola ; Giaretta, Alberto ; Mazzara, Manuel
in: ArXiv, vol: 2017

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2017

2016
 

A Survey of Man in the Middle Attacks

Conti, Mauro ; Dragoni, Nicola ; Lesyk, Viktor
in: I E E E Communications Surveys and Tutorials, vol: 18, issue: 3, pages: 2027-2051

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2016     |    DOI: https://doi.org/10.1109/COMST.2016.2548426

  PDF

Evaluation of Professional Cloud Password Management Tools

Schougaard, Daniel ; Dragoni, Nicola ; Spognardi, Angelo
part of: Current Trends in Web Engineering , pages: 16-28, 2016, Springer
Presented at:
2nd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2016)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2016     |    DOI: https://doi.org/10.1007/978-3-319-46963-8_2

 

Mind the tracker you wear

Goyal, Rohit ; Dragoni, Nicola ; Spognardi, Angelo
part of: Proceedings of the 31st ACM Symposium on Applied Computing (SAC’16), pages: 131-136, 2016, ACM
Presented at:
31st Annual ACM Symposium on Applied Computing 2016

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2016     |    DOI: https://doi.org/10.1145/2851613.2851685

  PDF

SafeDroid: A Distributed Malware Detection Service for Android

Goyal, Rohit ; Spognardi, Angelo ; Dragoni, Nicola ; Argyriou, Marios
part of: Proceedings of the 9th IEEE International Conference on Service Oriented Computing and Applications (SOCA 2016), pages: 59-66, 2016, IEEE
Presented at:
9th IEEE International Conference on Service Oriented Computing and Applications (SOCA 2016)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2016     |    DOI: https://doi.org/10.1109/SOCA.2016.14

 

Security And Privacy Issues in Health Monitoring Systems: eCare@Home Case Study

Wearing, Thomas ; Dragoni, Nicola
part of: Proceedings of the 1st Workshop on Emerging eHealth through Internet of Things (EHIoT 2016), 2016
Presented at:
1st Workshop on Emerging eHealth through Internet of Things (EHIoT 2016)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2016

  PDF

Why Hackers Love eHealth Applications

Goyal, Rohit ; Dragoni, Nicola
part of: Proceedings of the 3rd EAI International Conference on IoT Technologies for HealthCare (HealthyIoT), 2016, LNICST, 2016, Springer
Presented at:
The 3rd EAI International Conference on IoT Technologies for HealthCare

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2016

2015
  PDF

Adaptive Multipath Key Reinforcement for Energy Harvesting Wireless Sensor Networks

Di Mauro, Alessio ; Dragoni, Nicola
in: Procedia Computer Science, vol: 63, pages: 48–55
Presented at:
6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks

Type: Conference article (Peer reviewed)

Status: Published     |    År: 2015     |    DOI: https://doi.org/10.1016/j.procs.2015.08.311

  PDF

Adaptive Security in ODMAC for Multihop Energy Harvesting Wireless Sensor Networks

Di Mauro, Alessio ; Fafoutis, Xenofon ; Dragoni, Nicola
in: International Journal of Distributed Sensor Networks, vol: 2015

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2015     |    DOI: https://doi.org/10.1155/2015/760302

  PDF

A Framework and Classification for Fault Detection Approaches in Wireless Sensor Networks with an Energy Efficiency Perspective

Zhang, Yue ; Dragoni, Nicola ; Wang, Jiangtao
in: International Journal of Distributed Sensor Networks, vol: 2015

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2015     |    DOI: https://doi.org/10.1155/2015/678029

 

Energy-Efficient Fault-Tolerant Dynamic Event Region Detection in Wireless Sensor Networks

Enemark, Hans-Jacob ; Zhang, Yue ; Dragoni, Nicola ; Orfanidis, Charalampos
part of: Proceedings of the 81st Vehicular Technology Conference (VTC Spring 2015) , pages: 1-5, 2015, IEEE
Presented at:
81st Vehicular Technology Conference (VTC Spring 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2015     |    DOI: https://doi.org/10.1109/VTCSpring.2015.7145814

 

Fault Detection in WSNs - An Energy Efficiency Perspective Towards Human-Centric WSNs

Orfanidis, Charalampos ; Zhang, Yue ; Dragoni, Nicola
part of: Proceedings of the 9th KES International Conference on Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2015), pages: 285-300, 2015, Springer
Presented at:
9th International KES International Conference on Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2015)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2015     |    DOI: https://doi.org/10.1007/978-3-319-19728-9_24

 

Receiver-initiated medium access control protocols for wireless sensor networks

Fafoutis, Xenofon ; Di Mauro, Alessio ; Vithanage, Madava D. ; Dragoni, Nicola
in: Computer Networks, vol: 76, pages: 55-74

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2015     |    DOI: https://doi.org/10.1016/j.comnet.2014.11.002

2014
  PDF

Altruistic Backoff: Collision Avoidance for Receiver-Initiated MAC Protocols for Wireless Sensor Networks

Fafoutis, Xenofon ; Orfanidis, Charalampos ; Dragoni, Nicola
in: International Journal of Distributed Sensor Networks, vol: 2014

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2014     |    DOI: https://doi.org/10.1155/2014/576401

2013
 

Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs

Di Mauro, Alessio ; Fafoutis, Xenofon ; Mödersheim, Sebastian Alexander ; Dragoni, Nicola
part of: Secure IT Systems, pages: 1-16, 2013, Springer
Presented at:
18th Nordic Conference on Secure IT Systems (NordSec 2013)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2013     |    DOI: https://doi.org/10.1007/978-3-642-41488-6_1

 

Dynamic allocation and admission policies for QoS-aware provisioning systems

Mazzucco, M. ; Mazzara, M. ; Dragoni, Nicola
in: International Journal of Critical Computer-Based Systems, vol: 4, issue: 1, pages: 27-44

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2013     |    DOI: https://doi.org/10.1504/IJCCBS.2013.053741

 

Medium Access Control for Thermal Energy Harvesting in Advanced Metering Infrastructures

Vithanage, Madava D. ; Fafoutis, Xenofon ; Andersen, Claus Bo ; Dragoni, Nicola
part of: 2013 IEEE EUROCON, pages: 291-299, 2013, IEEE
Presented at:
IEEE Eurocon 2013

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2013     |    DOI: https://doi.org/10.1109/EUROCON.2013.6624999

 

MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities

Conti, M. ; Dragoni, Nicola ; Gottardo, S.
part of: Security and Trust Management, pages: 65-81, 2013, Springer
Presented at:
9th International Workshop on Security and Trust Management (STM 2013)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2013     |    DOI: https://doi.org/10.1007/978-3-642-41098-7_5

 

Social Networks and Collective Intelligence: A Return to the Agora

Mazzara, Manuel ; Biselli, Luca ; Greco, Pier Paolo ; Dragoni, Nicola ; Marraffa, Antonio ; Qamar, Nafees ; de Nicola, Simona
part of: Social Network Engineering for Secure Web Data and Services, pages: 88-113, 2013, IGI global

Type: Book chapter (Peer reviewed)

Status: Published     |    År: 2013     |    DOI: https://doi.org/10.4018/978-1-4666-3926-3.ch005

 

Sustainable medium access control: Implementation and evaluation of ODMAC

Fafoutis, Xenofon ; Di Mauro, Alessio ; Dragoni, Nicola
part of: IEEE International Conference on Communications 2013: IEEE ICC'13 - Workshop on Energy Efficiency in Wireless Networks & Wireless Networks for Energy Efficiency (E2Nets), pages: 407 - 412, 2013, IEEE
Presented at:
IEEE International Conference on Communications (ICC 2013)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2013     |    DOI: https://doi.org/10.1109/ICCW.2013.6649268

  PDF

Sustainable Performance in Energy Harvesting - Wireless Sensor Networks

Fafoutis, Xenofon ; Di Mauro, Alessio ; Dragoni, Nicola
part of: Proceedings of the fourth international conference on Future energy systems, pages: 267-268, 2013, Association for Computing Machinery
Presented at:
4th International Conference on Future Energy Systems (e-Energy 2013)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2013     |    DOI: https://doi.org/10.1145/2487166.2487200

2012
 

Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

Fafoutis, Xenofon ; Dragoni, Nicola
part of: 2012 Ninth International Conference on Networked Sensing Systems (INSS), 2012, IEEE
Presented at:
The Ninth International Conference on Networked Sensing Systems (INSS 2012)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2012     |    DOI: https://doi.org/10.1109/INSS.2012.6240557

 

Analytical Comparison of MAC Schemes for Energy Harvesting - Wireless Sensor Networks

Fafoutis, Xenofon ; Dragoni, Nicola
part of: 2012 Ninth International Conference on Networked Sensing Systems (INSS), 2012, IEEE
Presented at:
The Ninth International Conference on Networked Sensing Systems (INSS 2012)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2012     |    DOI: https://doi.org/10.1109/INSS.2012.6240580

 

Declarative Specification of Fault Tolerant Auction Protocols: The English Auction Case Study

Dragoni, Nicola ; Gaspari, Mauro
in: Computational Intelligence, vol: 28, issue: 4, pages: 617-641

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2012     |    DOI: https://doi.org/10.1111/j.1467-8640.2012.00448.x

  PDF

Energy-Harvesting Wireless Sensor Networks

Fafoutis, Xenofon ; Vuckovic, Dusan ; Di Mauro, Alessio ; Dragoni, Nicola ; Madsen, Jan
part of: 9th European Conference on Wireless Sensor Networks, EWSN 2012, pages: 84-85, 2012
Presented at:
9th European Conference on Wireless Sensor Networks (EWSN 2012)

Type: Conference abstract in proceedings (Peer reviewed)

Status: Published     |    År: 2012

 

Implementing Workflow Reconfiguration in WS-BPEL

Mazzara, Manuel ; Dragoni, Nicola ; Zhou, Mu
in: Journal of Internet Services and Information Security, vol: 2, issue: 1/2, pages: 73-92

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2012

 

Modelling and Analysis of Dynamic Reconfiguration in BP-Calculus

Abouzaid, Faisal ; Mullins, John ; Mazzara, Manuel ; Dragoni, Nicola
part of: Agent and Multi-Agent Systems. Technologies and Applications, pages: 534-543, 2012, Springer
Presented at:
6th International KES Conference on Agents and Multi-agent Systems – Technologies and Applications

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2012     |    DOI: https://doi.org/10.1007/978-3-642-30947-2_58

 

SC2: Secure Communication over Smart Cards

Dragoni, Nicola ; Lostal, Eduardo ; Papini, Davide ; Fabra, Javier
part of: Foundations and Practice of Security, pages: 32-48, 2012, Springer
Presented at:
4th Canada-France MITACS Workshop on Foundations & Practice of Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2012     |    DOI: https://doi.org/10.1007/978-3-642-27901-0_4

 

Security challenges for energy-harvesting wireless sensor networks

Di Mauro, Alessio ; Papini, Davide ; Dragoni, Nicola
part of: PECCS 2012 - Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems, pages: 422-425, 2012, SciTePress
Presented at:
2nd International Conference on Pervasive Embedded Computing and Communication Systems (PECCS 2012)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2012

 

Social Networks and Collective Intelligence - A Return to the Agora (with the Polidoxa Shift)

Biselli, L. ; Dragoni, Nicola ; Goldoni, E. ; Greco, P. P. ; Marraa, A. ; Mazzara, M. ; Papageorgiou, G.
part of: Proceedings of the First International Conference on Agreement Technologies, pages: 347-348 , 2012
Presented at:
1st International Conference on Agreement Technologies

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2012

 

Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks

Di Mauro, Alessio ; Papini, Davide ; Vigo, Roberto ; Dragoni, Nicola
part of: Networked Digital Technologies, pages: 289-301, 2012, Springer
Presented at:
4th International Conference on Networked Digital Technologies (NDT 2012)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2012     |    DOI: https://doi.org/10.1007/978-3-642-30567-2_24

 

Toward a Unified Framework for Web Service Trustworthiness

Miotto, N. ; Dragoni, Nicola
part of: Proceedings of IADIS e-Society, pages: 555-558, 2012, International Association for Development, IADIS
Presented at:
IADIS International Conference e-Society 2012

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2012

2011
 

A Load Time Policy Checker for Open Multi-Application Smart Cards

Dragoni, Nicola ; Lostal, Eduardo ; Gadyatskaya, Olga ; Massacci, Fabio ; Paci, Federica
part of: 2011 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), pages: 153-156, 2011, IEEE
Presented at:
IEEE International Symposium on Policies for Distributed Systems and Networks

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2011     |    DOI: https://doi.org/10.1109/POLICY.2011.40

  PDF

Analysis of Trust-Based Approaches for Web Service Selection

Dragoni, Nicola ; Miotto, Nicola
part of: Proceedings of the 5th Nordic Workshop on Dependability and Security (NODES’11), 2011
Presented at:
5th Nordic Workshop on Dependability and Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2011

  PDF

Dependable Workflow Reconfiguration in WS-BPEL

Mazzara, Manuel ; Dragoni, Nicola ; Zhou, Mu
part of: Proceedings of the 5th Nordic Workshop on Dependability and Security (NODES’11), 2011
Presented at:
5th Nordic Workshop on Dependability and Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2011

 

Design, Modelling and Analysis of a Workflow Reconfiguration

Mazzara, Manuel (Invited author) ; Abouzaid, Faisal (Invited author) ; Dragoni, Nicola ; Bhattacharyya, Anirban (Invited author)
part of: Proceedings of the International Workshop on Petri Nets and Software Engineering (PNSE’11), pages: 10-24, 2011
Presented at:
International Workshop on Petri Nets and Software Engineering 2011

Type: Article in proceedings (Peer reviewed)     |     Invited contribution

Status: Published     |    År: 2011

  PDF

Guest Editorial: Special Issue on Frontiers in Trust Management

Jensen, Christian D. ; Dragoni, Nicola ; Basu, Anirban ; Mancini, Clara
in: Journal of Internet Services and Information Security, vol: 1, issue: 4, pages: 1-4

Type: Editorial (Peer reviewed)

Status: Published     |    År: 2011

 

ODMAC

Dragoni, Nicola ; Fafoutis, Xenofon
part of: Proceedings of the Eighth ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN’11), pages: 49-56, 2011, ACM, Miami Beach
Presented at:
ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2011     |    DOI: https://doi.org/10.1145/2069063.2069072

 

SC2: a System to Secure Off-Card Contract-Policy Matching in Security-by-Contract for Open Multi-Application Smart Cards

Dragoni, Nicola ; Lostal, Eduardo ; Papini, Davide
part of: 2011 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), pages: 186-187, 2011, IEEE
Presented at:
IEEE International Symposium on Policies for Distributed Systems and Networks

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2011     |    DOI: https://doi.org/10.1109/POLICY.2011.22

 

Supporting Software Evolution for Open Smart Cards by Security-by-Contract

Dragoni, Nicola ; Gadyatskya, Olga ; Massacci, Fabio
part of: Dependability and Computer Engineering, pages: 285-305, 2011, IGI global

Type: Book chapter (Peer reviewed)

Status: Published     |    År: 2011

  PDF

Toward Design, Modelling and Analysis of Dynamic Workflow Reconfigurations - A Process Algebra Perspective

Mazzara, M. ; Abouzaid, F. ; Dragoni, Nicola ; Bhattacharyya, A.
part of: Proceedings of the 8th International Workshop on Web Services and Formal Methods (WS-FM’11), 2011
Presented at:
International Workshop on Web Services and Formal Methods

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2011

2010
 

A Survey on Trust-Based Web Service Provision Approaches

Dragoni, Nicola
part of: 3rd International Conference on Dependability (DEPEND 2010), pages: 83-91, 2010, IEEE Press, Venice
Presented at:
International Conference on Dependability (DEPEND 2010)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2010     |    DOI: https://doi.org/10.1109/DEPEND.2010.21

 

Design of QoS-aware Provisioning Systems

Mazzucco, Michele ; Mazzara, Manuel ; Dragoni, Nicola
part of: 4th Nordic Workshop on Dependability and Security (NODES 2010), 2010, Technical University of Denmark
Presented at:
4th Nordic Workshop on Dependability and Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2010

 

Extending Security-by-Contract with Quantitative Trust on Mobile Devices

Costa, Gabriele ; Lazouski, Aliaksandr ; Martinelli, Fabio ; Matteucci, Ilaria ; Issarny, Valerie ; Saadi, Rachid ; Dragoni, Nicola ; Massacci, Fabio
in: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol: 1, issue: 4, pages: 75-91

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2010

 

Extending Security-by-Contract with Quantitative Trust on Mobile Devices

Costa, Gabriele ; Dragoni, Nicola ; Lazouski, Aliaksandr ; Martinelli, Fabio ; Massacci, Fabio ; Matteucci, Ilaria
part of: 4th International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS 2010), 2010, IEEE Computer Society Press
Presented at:
4th International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS 2010)

Type: Article in proceedings (Peer reviewed)

Status: E-pub ahead of print     |    År: 2010

 

Securing Off-Card Contract-Policy Matching in Security-By-Contract for Multi-Application Smart Cards

Dragoni, Nicola ; Lostal, Eduardo ; Papini, Davide ; Fabra, Javier
part of: 4th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM 2010), 2010, XPS
Presented at:
4th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM 2010)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2010

 

Security-by-Contract for Applications Evolution in Multi-Application Smart Cards

Dragoni, Nicola
part of: 4th Nordic Workshop on Dependability and Security (NODES 2010), 2010, Technical University of Denmark, DTU Informatics, Building 321
Presented at:
4th Nordic Workshop on Dependability and Security

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2010

 

Supporting Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract

Dragoni, Nicola ; Gadyatskaya, Olga ; Massacci, Fabio
part of: Proceedings of the 4th Workshop in Information Security Theory and Practices, 2010
Presented at:
4th Workshop in Information Security Theory and Practices

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2010

2009
 

A Formal Semantics for the WS-BPEL Recovery Framework - The Pi-Calculus Way

Dragoni, Nicola ; Mazzara, Manuel
part of: 6th International Workshop on Web Services and Formal Methods (WS-FM'09), 2009, Springer
Presented at:
6th International Workshop on Web Services and Formal Methods (WS-FM'09)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2009

 

A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems

Dragoni, Nicola ; Massacci, Fabio ; Saidane, Ayda
in: Computer Networks, vol: 53, issue: 10, pages: 1628-1648

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2009     |    DOI: https://doi.org/10.1016/j.comnet.2008.07.016

 

Matching in security-by-contract for mobile code

Bielova, N. ; Dragoni, Nicola ; Massacci, F ; Naliuka, K. ; Siahaan, I.
in: Journal of Logic and Algebraic Programming, vol: 78, issue: 5, pages: 340-358

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2009     |    DOI: https://doi.org/10.1016/j.jlap.2009.02.013

 

Security-By-Contract (SxC) for Mobile Systems

Dragoni, Nicola ; Massacci, Fabio
in: Telektronikk Journal, vol: 1, pages: 107-116

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2009

 

Security-by-Contract (SxC) for Software and Services of Mobile Systems

Dragoni, Nicola ; Martinelli, Fabio ; Massacci, Fabio ; Mori, Paolo ; Shaefer, Christian ; Walter, Thomas ; Vetillard, Eric
part of: At Your Service - Service-Oriented Computing from an EU Perspective, 2009, MIT Press

Type: Book chapter (Peer reviewed)

Status: Published     |    År: 2009

 

Toward Trustworthy Web Services

Dragoni, Nicola
part of: WI/IAT Web Privacy and Trust Workshop (WPT'09), 2009, IEEE Computer Society Press
Presented at:
WI/IAT Web Privacy and Trust Workshop (WPT'09)

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2009

 

What the heck is this application doing? - A security-by-contract architecture for pervasive services

Dragoni, Nicola ; Massacci, Fabio ; Walter, Thomas ; Schaefer, Christian
in: Computers & Security, vol: 28, issue: 7, pages: 566-577

Type: Journal article (Peer reviewed)

Status: Published     |    År: 2009     |    DOI: https://doi.org/10.1016/j.cose.2009.06.005

 

Where are All the Agents? On the Gap Between Theory and Practice of Agent-Based Referral Networks

Dragoni, Nicola
part of: Principles of Practice in Multi-Agent Systems, 2009, Springer, Berlin
Presented at:
12th International Conference on Principles of Practice in Multi-Agent Systems

Type: Article in proceedings (Peer reviewed)

Status: Published     |    År: 2009