This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Abstract. Data centric languages, such as recursive rule based languages, have been proposed to program distributed applications over networks. They simplify greatly the code, whic...
This paper presents a Knowledge Base System (KBS) as a key component of a federated simulation framework which allows the investigation of (inter)dependencies among Critical Infra...
Elisa Castorini, Paolo Palazzari, Alberto Tofani, ...
Although many temporal extensions of the relational data model have been proposed, there is no comparable amount of work in the context of object-oriented data models. Moreover, ex...
Elisa Bertino, Elena Ferrari, Giovanna Guerrini, I...
—Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of...