RAK, Massimiliano
 Distribuzione geografica
Continente #
NA - Nord America 960
EU - Europa 394
AS - Asia 392
SA - Sud America 7
Continente sconosciuto - Info sul continente non disponibili 2
AF - Africa 1
OC - Oceania 1
Totale 1.757
Nazione #
US - Stati Uniti d'America 937
SG - Singapore 283
IT - Italia 187
CN - Cina 80
IE - Irlanda 57
FI - Finlandia 42
DE - Germania 30
CA - Canada 22
GB - Regno Unito 20
UA - Ucraina 17
SE - Svezia 10
FR - Francia 6
HK - Hong Kong 6
RO - Romania 5
BR - Brasile 4
JP - Giappone 4
PT - Portogallo 4
IN - India 3
NO - Norvegia 3
EC - Ecuador 2
ES - Italia 2
EU - Europa 2
KG - Kirghizistan 2
NL - Olanda 2
PL - Polonia 2
TJ - Tagikistan 2
VN - Vietnam 2
AT - Austria 1
AU - Australia 1
AZ - Azerbaigian 1
BE - Belgio 1
BN - Brunei Darussalam 1
CH - Svizzera 1
CO - Colombia 1
CR - Costa Rica 1
EE - Estonia 1
ID - Indonesia 1
IL - Israele 1
IM - Isola di Man 1
JO - Giordania 1
LK - Sri Lanka 1
LV - Lettonia 1
MA - Marocco 1
MY - Malesia 1
PK - Pakistan 1
RU - Federazione Russa 1
SA - Arabia Saudita 1
TW - Taiwan 1
Totale 1.757
Città #
Singapore 221
Santa Clara 170
Millbury 81
Chandler 75
Princeton 50
Jacksonville 49
Des Moines 42
Boston 39
Nanjing 29
Ashburn 26
Napoli 26
Wilmington 25
Lawrence 23
Naples 23
Ottawa 21
Beijing 14
Nanchang 10
Redwood City 8
Rome 7
Dublin 6
Hebei 6
Hong Kong 6
Los Angeles 6
Orange 6
Quattro Castella 6
Norwalk 5
Pozzuoli 5
Salerno 5
Tianjin 5
Boardman 4
Changsha 4
Jiaxing 4
Linköping 4
San Donato Milanese 4
Torre Del Greco 4
Crispano 3
Fremont 3
Lisbon 3
Modena 3
Palermo 3
Strasbourg 3
Watford 3
Aversa 2
Bishkek 2
Calvizzano 2
Desio 2
Dushanbe 2
Fairfield 2
Guayaquil 2
Ho Chi Minh City 2
Kunming 2
Lioni 2
London 2
Madrid 2
Marigliano 2
Melito Di Napoli 2
Menlo Park 2
Mountain View 2
Munich 2
New Delhi 2
Oita 2
Oslo 2
Palmeira dos Índios 2
Parete 2
Poggiomarino 2
Shenyang 2
Taubaté 2
Zhengzhou 2
Adelaide 1
Alvignano 1
Amman 1
Amsterdam 1
Baku 1
Bandar Seri Begawan 1
Bari 1
Baronissi 1
Billericay 1
Bogotá 1
Bologna 1
Borgo San Lorenzo 1
Cambridge 1
Casoria 1
Catanzaro 1
Colombo 1
Constanta 1
Council Bluffs 1
Douglas 1
Falls Church 1
Fuzhou 1
Giugliano In Campania 1
Giugliano in Campania 1
Greenwich 1
Hoeilaart 1
Houston 1
Huddinge 1
Ipoh 1
Kagoya 1
Kronberg 1
Lancaster 1
Lanzhou 1
Totale 1.124
Nome #
A methodology for automated penetration testing of cloud applications 53
An Architectural Model for Trusted Domains in Web Services 49
A cloud secdevops methodology: From design to testing 49
An automatic tool for benchmark testing of cloud applications 42
Access control in Cloud on grid systems: the perfcloud case study 36
Automated risk analysis for IOT systems 36
Developing secure cloud applications 35
A cloud application for security service level agreement evaluation 34
Automatically Enforcing Security SLAs in the Cloud 34
Building Autonomic and Secure Service Oriented Architectures with MAWeS 33
Security Design and Evaluation in a VoIP Secure Infrastructure: A Policy Based Methodology 32
DoS Protection in the Cloud through the SPECS Services 32
Identity Federation and Access Control in the Cloud: The PerfCloud case study 30
Cloud security: From per-provider to per-service security SLAs 30
Model-based deployment of secure multi-cloud applications 30
A security metric catalogue for cloud applications 29
Design and implementation of TruMan, a Trust Manager Component for Distributed Systems 28
The fourth international symposium on information assurance and security 28
The CloudGrid approach: Security and Performance Analysis and Evaluation 27
Security Design and Evaluation in a VoIP Secure Infrastructure: A Policy Based Approach 26
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach 26
Interoperable Grid PKIs among Untrusted Domains: Architectural Proposal 25
Developing secure cloud applications: A case study 25
Towards self-protective multi-cloud applications: MUSA-A holistic framework to support the security-intelligent lifecycle management of multi-cloud applications 25
Optimizing Secure Web Services with MAWeS: a Case Study 24
An innovative Policy-based Cross Certification methodology for Public Key Infrastructures 24
MUSA deployer: Deployment of multi-cloud applications 24
A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services 24
Monitoring Data Security in the Cloud: A Security SLA-Based Approach 24
A framework for cloud-aware development of bag-of-tasks scientific applications 24
Security and Privacy Service Level Agreement composition for Internet of Things systems on top of standard controls 24
On the adoption of security SLAs in the cloud 23
Preliminary design of a platform-as-a-service to provide security in cloud 22
Per-service security sla: A new model for security management in clouds 22
Security Level Evaluation: Policy and Fuzzy Technique 21
Static evaluation of Certificate Policies for GRID PKIs interoperability 21
A Reference Model For Security Level Evaluation: Policy and Fuzzy Technique 21
SLA-based secure cloud application development 21
Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications 21
Identity Federation in PerfCloud: an Architecture for Cloud and GRID Integration 20
Providing security SLA in next generation Data Centers with SPECS: The EMC case study 20
Methodology to obtain the security controls in multi-cloud applications 20
PerfCloud: Performance-oriented Integration of Cloud and GRID 19
Access control in federated clouds: The cloudgrid case study 19
A Policy-based Design Methodology and Performance Evaluation framework for a secure VoIP Infrastructure 18
An Interoperability System for Authentication and Authorization in VANETs 18
Performance Analysis of an OCSP-Based Authentication Protocol for VANETs 18
Access control in federated clouds: The cloudgrid case study 17
Toward the automation of threat modeling and risk assessment in IoT systems 17
Preface 17
Self-optimization of secure web services 16
SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework 16
Security SLA in next generation data centers, the SPECS approach 16
Security monitoring in the cloud: An SLA-based approach 16
Interoperable grid PKIs among untrusted domains: An architectural proposal 16
A SLA evaluation methodology in Service Oriented Architectures 15
Security as a service using an SLA-based approach via SPECS 15
SLA-Based Secure Cloud Application Development: The SPECS Framework 15
DEFEDGE: Threat-Driven Security Testing and Proactive Defense Identification for Edge-Cloud Systems 15
Identity Federation in Cloud Computing 14
Security and performance trade-off in PerfCloud 14
Towards automated penetration testing for cloud applications 14
Per-service security SLAs for cloud security management: Model and implementation 14
Security design and evaluation in a VoIP secure infrastracture: A policy based approach 14
An SLA-based brokering platform to provide sensor networks as-a-service 13
An SLA-based approach to manage sensor networks as-a-service 13
A proposal of a cloud-oriented security and performance simulator provided as-a-service 13
SecLA-Based Negotiation and Brokering of Cloud Resources 13
Security level evaluation: Policy and fuzzy techniques 13
A security SLA-driven moving target defense framework to secure cloud applications 12
Security-by-design in multi-cloud applications: An optimization approach 12
REST-based SLA management for cloud applications 12
Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008: Chiars' welocome massage 12
Adding Dynamic Coscheduling support to PVM 7
SLAs for cloud applications: Agreement protocol and REST-based implementation 7
Automated Threat Modeling Approaches: Comparison of Open Source Tools 6
Security in IoT pairing & authentication protocols, a threat model and a case study analysis 6
Performance prediction through simulation of a hybrid MPI/OpenMP application 5
SLA-based negotiation and brokering of cloud resources 5
Autonomic Composite-service Architecture with MAWeS 5
A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles 5
Negotiation Policies for Provisioning of Cloud Resources 4
Mobile Agents Self-optimization with MAWeS 4
Towards a proof-based SLA management framework the SPECS approach 4
Threat Modeling of Edge-Based IoT Applications 4
A Cloud Agency for SLA Negotiation and Management 4
Performance Prediction for HPC on Clouds 4
Systematic analysis of automated threat modelling techniques: Comparison of open-source tools 4
MetaSEnD: A Security Enabled Development Life Cycle Meta-Model 4
Negotiating and brokering Cloud resources based on Security Level Agreements 4
Cloud Agency: A Mobile Agent Based Cloud System 4
An Ontology for the Cloud in mOSAIC 4
Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach 4
Architecturing a Sky Computing Platform 4
Security SLAs for cloud services: Hadoop case study 4
User Centric Service Level Management in mOSAIC Applications 4
ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems 4
Economic Denial of Sustainability Mitigation in Cloud Computing 4
A cloud-edge smart infrastructures for road safety 4
Automated threat modelling and risk analysis in e-Government using BPMN 4
Totale 1.782
Categoria #
all - tutte 10.951
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 10.951


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202079 0 0 0 0 10 11 5 0 1 13 21 18
2020/2021147 13 19 5 9 16 23 14 16 12 17 1 2
2021/2022359 2 4 0 8 4 4 9 11 56 13 69 179
2022/2023244 74 2 2 4 37 33 1 23 52 1 10 5
2023/2024184 12 27 21 25 6 4 2 6 3 1 52 25
2024/2025673 90 158 5 125 295 0 0 0 0 0 0 0
Totale 1.993