default search action
Stefano Berlato
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b1]Stefano Berlato:
A Security Service for Performance-Aware End-to-End Protection of Sensitive Data in Cloud Native Applications. University of Genoa, Italy, 2024 - [j5]Davide Pizzolotto, Stefano Berlato, Mariano Ceccato:
Mitigating Debugger-based Attacks to Java Applications with Self-debugging. ACM Trans. Softw. Eng. Methodol. 33(4): 107:1-107:38 (2024) - [c7]Stefano Berlato, Matteo Rizzi, Matteo Franzil, Silvio Cretti, Pietro De Matteis, Roberto Carbone:
Work-in-Progress: A Sidecar Proxy for Usable and Performance-Adaptable End-to-End Protection of Communications in Cloud Native Applications. EuroS&P Workshops 2024: 706-711 - [c6]Stefano Berlato, Silvio Cretti, Domenico Siracusa, Silvio Ranise:
Multi-Objective Microservice Orchestration: Balancing Security and Performance in CCAM. ICIN 2024: 88-90 - 2022
- [j4]Stefano Berlato, Roberto Carbone, Adam J. Lee, Silvio Ranise:
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud. ACM Trans. Priv. Secur. 25(1): 2:1-2:37 (2022) - [j3]Stefano Berlato, Marco Centenaro, Silvio Ranise:
Smart Card-Based Identity Management Protocols for V2V and V2I Communications in CCAM: A Systematic Literature Review. IEEE Trans. Intell. Transp. Syst. 23(8): 10086-10103 (2022) - [c5]Stefano Berlato, Umberto Morelli, Roberto Carbone, Silvio Ranise:
End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies. DBSec 2022: 236-255 - 2021
- [j2]Marco Centenaro, Stefano Berlato, Roberto Carbone, Gianfranco Burzio, Giuseppe Faranda Cordella, Roberto Riggio, Silvio Ranise:
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay Between Functional and Security Requirements. IEEE Veh. Technol. Mag. 16(4): 78-88 (2021) - [c4]Stefano Berlato, Roberto Carbone, Silvio Ranise:
Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment. SECRYPT 2021: 370-381 - [c3]Andreas Heider-Aviet, Danny Roswin Ollik, Stefano Berlato, Silvio Ranise, Roberto Carbone, Van Thanh Le, Nabil El Ioini, Claus Pahl, Hamid R. Barzegar:
Blockchain Based RAN Data Sharing. SMDS 2021: 152-161 - 2020
- [j1]Stefano Berlato, Mariano Ceccato:
A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps. J. Inf. Secur. Appl. 52: 102463 (2020) - [c2]Marco Centenaro, Stefano Berlato, Roberto Carbone, Gianfranco Burzio, Giuseppe Faranda Cordella, Silvio Ranise, Roberto Riggio:
Security Considerations on 5G-Enabled Back-Situation Awareness for CCAM. 5G World Forum 2020: 245-250 - [c1]Stefano Berlato, Roberto Carbone, Adam J. Lee, Silvio Ranise:
Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization. AsiaCCS 2020: 208-221
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint