dblp.uni-trier.dewww.uni-trier.de

Luigi V. Mancini

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
82EEMauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini: Privacy-preserving robust data aggregation in wireless sensor networks. Security and Communication Networks 2(2): 195-213 (2009)
2008
81EERoberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Catch Me (If You Can): Data Survival in Unattended Sensor Networks. PerCom 2008: 185-194
80EERoberto Battistoni, Alessandro Di Biagio, Roberto Di Pietro, Matteo Formica, Luigi V. Mancini: A Live Digital Forensic system for Windows networks. SEC 2008: 653-667
79EEMauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. WISEC 2008: 214-219
78EERoberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan: Redoubtable Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): (2008)
77EELuigi V. Mancini: Special Issue: Hot Topics in Peer-to-Peer Systems. Concurrency and Computation: Practice and Experience 20(6): 599 (2008)
2007
76EEVishwas Patil, Alessandro Mei, Luigi V. Mancini: Addressing interoperability issues in access control models. ASIACCS 2007: 389-391
75EEAndrea Gabrielli, Luigi V. Mancini: Bio-Inspired Topology Maintenance Protocols for Secure Wireless Sensor Networks. BIOWIRE 2007: 399-410
74EERoberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Towards threat-adaptive dynamic fragment replication in large scale distributed systems. IPDPS 2007: 1
73EEMauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. MobiHoc 2007: 80-89
72EEMauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi: RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. PerCom Workshops 2007: 229-234
71EEMauro Conti, Roberto Di Pietro, Luigi V. Mancini: ECCE: Enhanced cooperative channel establishment for secure pair-wise communication in wireless sensor networks. Ad Hoc Networks 5(1): 49-62 (2007)
70EEGiovanni Di Crescenzo, Luigi V. Mancini: Preface. Electr. Notes Theor. Comput. Sci. 171(1): 1-2 (2007)
69EERoberto Di Pietro, Luigi V. Mancini, Giorgio Zanin: Efficient and Adaptive Threshold Signatures for Ad hoc networks. Electr. Notes Theor. Comput. Sci. 171(1): 93-105 (2007)
68EEGiorgio Zanin, Roberto Di Pietro, Luigi V. Mancini: Robust RSA distributed signatures for large-scale long-lived ad hoc networks. Journal of Computer Security 15(1): 171-196 (2007)
2006
67EERoberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil: Addressing the shortcomings of one-way chains. ASIACCS 2006: 289-296
66EEAlan A. Bertossi, Luigi V. Mancini, Alessandra Menapace: Scheduling Hard-Real-Time Tasks with Backup Phasing Delay. DS-RT 2006: 107-118
65EEGiorgio Zanin, Alessandro Mei, Luigi V. Mancini: A Secure and Efficient Large Scale Distributed System for Data Sharing. ICDCS 2006: 27
64EEMauro Conti, Roberto Di Pietro, Luigi V. Mancini: Secure Cooperative Channel Establishment inWireless Sensor Networks. PerCom Workshops 2006: 327-331
63EEMaria Calagna, Huiping Guo, Luigi V. Mancini, Sushil Jajodia: A robust watermarking system based on SVD compression. SAC 2006: 1341-1347
62EERoberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks 12(6): 709-721 (2006)
2005
61 Maria Calagna, Luigi V. Mancini: A Blind Method for Digital Watermarking Attacks. EuroIMSA 2005: 265-270
60EEManuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce: Graph-based specification of access control policies. J. Comput. Syst. Sci. 71(1): 1-33 (2005)
2004
59 Ehud Gudes, Luigi V. Mancini, Francesco Parisi-Presicce: Information Flow Analysis for File Systems and Databases Using Labels. DBSec 2004: 125-141
58EERoberto Battistoni, Emanuele Gabrielli, Luigi V. Mancini: A Host Intrusion Prevention System for Windows Operating Systems. ESORICS 2004: 352-368
57EERoberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment. IPDPS 2004
56EEGiorgio Zanin, Luigi V. Mancini: Towards a formal model for security policies specification and validation in the selinux system. SACMAT 2004: 136-145
55EEManuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce: Administrative scope in the graph-based framework. SACMAT 2004: 97-104
54EERoberto Di Pietro, Luigi V. Mancini, Alessandro Mei, Alessandro Panconesi, Jaikumar Radhakrishnan: Connectivity properties of secure wireless sensor networks. SASN 2004: 53-58
53 Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Key management for high bandwidth secure multicast. Journal of Computer Security 12(5): 693-709 (2004)
2003
52EERoberto Di Pietro, Luigi V. Mancini, Yee Wei Law, Sandro Etalle, Paul J. M. Havinga: LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks. ICPP Workshops 2003: 397-
51EERoberto Di Pietro, Luigi V. Mancini, Alessandro Mei: Random key-assignment for secure Wireless Sensor Networks. SASN 2003: 62-71
50 Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei: A Time Driven Methodology for Key Dimensioning in Multicast Communications. SEC 2003: 121-132
49EERoberto Di Pietro, Antonio Durante, Luigi V. Mancini: A Reliable Key Authentication Schema for Secure Multicast Communications. SRDS 2003: 231-240
48EERoberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Networks 1(4): 455-468 (2003)
47EERoberto Di Pietro, Luigi V. Mancini: Security and privacy issues of handheld and wearable wireless devices. Commun. ACM 46(9): 74-79 (2003)
46EEAlessandro Mei, Luigi V. Mancini, Sushil Jajodia: Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems. IEEE Trans. Parallel Distrib. Syst. 14(9): 885-896 (2003)
2002
45EEManuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce: Decidability of Safety in Graph-Based Models for Access Control. ESORICS 2002: 229-243
44EEAntonio Durante, Roberto Di Pietro, Luigi V. Mancini: Formal Specification for Fast Automatic IDS Training. FASec 2002: 191-204
43EEManuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce: Conflict Detection and Resolution in Access Control Policy Specifications. FoSSaCS 2002: 223-237
42EERoberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Efficient and secure keys management for wireless mobile communications. POMC 2002: 66-73
41 Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Secure Selective Exclusion in Ad Hoc Wireless Network. SEC 2002: 423-434
40EEMassimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini: Remus: a security-enhanced operating system. ACM Trans. Inf. Syst. Secur. 5(1): 36-61 (2002)
39EEManuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce: A graph-based formalism for RBAC. ACM Trans. Inf. Syst. Secur. 5(3): 332-365 (2002)
2001
38EEManuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce: Foundations for a Graph-Based Approach to the Specification of Access Control Policies. FoSSaCS 2001: 287-302
37EEManuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce: On the specification and evolution of access control policies. SACMAT 2001: 121-130
36EEManuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce: Graph Transformations for the Specification of Access Control Policies. Electr. Notes Theor. Comput. Sci. 51: (2001)
2000
35EEMassimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini: Operating system enhancements to prevent the misuse of system calls. ACM Conference on Computer and Communications Security 2000: 174-183
34EEManuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce: A Formal Model for Role-Based Access Control Using Graph Transformation. ESORICS 2000: 122-139
33EEGiovanni Chiola, Gianni Conte, Luigi V. Mancini: Workshop on Personal Computer Based Networks of Workstation. IPDPS Workshops 2000: 1-3
32EELuigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino: Flexible Transaction Dependencies in Database Systems. Distributed and Parallel Databases 8(4): 399-446 (2000)
31EEIndrajit Ray, Luigi V. Mancini, Sushil Jajodia, Elisa Bertino: ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. IEEE Trans. Knowl. Data Eng. 12(6): 880-899 (2000)
1999
30 José D. P. Rolim, Frank Mueller, Albert Y. Zomaya, Fikret Erçal, Stephan Olariu, Binoy Ravindran, Jan Gustafsson, Hiroaki Takada, Ronald A. Olsson, Laxmikant V. Kalé, Peter H. Beckman, Matthew Haines, Hossam A. ElGindy, Denis Caromel, Serge Chaumette, Geoffrey Fox, Yi Pan, Keqin Li, Tao Yang, G. Ghiola, Gianni Conte, Luigi V. Mancini, Dominique Méry, Beverly A. Sanders, Devesh Bhatt, Viktor K. Prasanna: Parallel and Distributed Processing, 11 IPPS/SPDP'99 Workshops Held in Conjunction with the 13th International Parallel Processing Symposium and 10th Symposium on Parallel and Distributed Processing, San Juan, Puerto Rico, USA, April 12-16, 1999, Proceedings Springer 1999
29 Giovanni Chiola, Giuseppe Ciaccio, Luigi V. Mancini, Pierluigi Rotondo: GAMMA on DEC 2114x with Efficient Flow Control. PDPTA 1999: 2337-2343
28EEAlan A. Bertossi, Luigi V. Mancini, Federico Rossini: Fault-Tolerant Rate-Monotonic First-Fit Scheduling in Hard-Real-Time Systems. IEEE Trans. Parallel Distrib. Syst. 10(9): 934-945 (1999)
1998
27EESushil Jajodia, Luigi V. Mancini, Sanjeev Setia: A Fair Locking Protocol for Multilevel Secure Databases. CSFW 1998: 168-178
26EEElisa Bertino, Giovanni Chiola, Luigi V. Mancini: Deadlock Detection in the Face of Transaction and Data Dependencies in Advanced Transaction Models. ICATPN 1998: 266-285
25EEElisa Bertino, Sushil Jajodia, Luigi V. Mancini, Indrajit Ray: Advanced Transaction Processing in Multilevel Secure File Stores. IEEE Trans. Knowl. Data Eng. 10(1): 120-135 (1998)
1997
24EEAlan A. Bertossi, Andrea Fusiello, Luigi V. Mancini: Fault-Tolerant Deadline-Monotonic Algorithm for Scheduling Hard-Real-Time Tasks. IPPS 1997: 133-138
23 Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino: Flexible Commit Protocols for Advanced Transaction Processing. Advanced Transaction Models and Architectures 1997: 0-
22 Maciej Koutny, Luigi V. Mancini, Giuseppe Pappalardo: Two Implementation Relations and the Correctness of Communicating Replicated Processes. Formal Asp. Comput. 9(2): 119-148 (1997)
1996
21EEIndrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini: An Advanced Commit Protocol for MLS Distributed Database Systems. ACM Conference on Computer and Communications Security 1996: 119-128
20 Sushil Jajodia, Luigi V. Mancini, Indrajit Ray: Secure Locking Protocols for Multilevel Database Management Systems. DBSec 1996: 177-194
19EELuigi V. Mancini, Indrajit Ray: Secure Concurrency Control in MLS Databases with Two Versions of Data. ESORICS 1996: 304-323
1995
18 Alan A. Bertossi, Massimo Bonometto, Luigi V. Mancini: Increasing Processor Utilization in Hard-Real-Time Systems with Checkpoints. Real-Time Systems 9(1): 5-29 (1995)
1994
17EEAlessandro Ciampichetti, Elisa Bertino, Luigi V. Mancini: Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems. ESORICS 1994: 359-373
16 Alan A. Bertossi, Luigi V. Mancini: Scheduling Algorithms for Fault-Tolerance in Hard-Real-Time Systems. Real-Time Systems 7(3): 229-245 (1994)
1993
15 Maciej Koutny, Luigi V. Mancini, Giuseppe Pappalardo: Modelling Replicated Processing. PARLE 1993: 672-675
14 Santosh K. Shrivastava, Luigi V. Mancini, Brian Randell: The Duality of Fault-tolerant System Structures. Softw., Pract. Exper. 23(7): 773-798 (1993)
1992
13EENicoletta De Francesco, Gigliola Vaglini, Luigi V. Mancini, A. Pereira Paz: Specification of Concurrency Control in Persistent Programming Languages. POS 1992: 126-143
12EELuigi V. Mancini: Garbage Collection and Reachability POS 1992: 394-395
1991
11 Maciej Koutny, Luigi V. Mancini, Giuseppe Pappalardo: Formalising Replicated Distributed Processing. SRDS 1991: 108-117
10 Luigi V. Mancini, Vittoria Rotella, Simonetta Venosa: Copying Garbage Collection for Distributed Object Stores. SRDS 1991: 218-227
9 Luigi V. Mancini, Santosh K. Shrivastava: Fault-Tolerant Reference Counting for Garbage Collection in Distributed Systems. Comput. J. 34(6): 503-513 (1991)
1989
8 Luigi V. Mancini, Giuseppe Pappalardo: Proving Correctness Properties of a Replicated Synchronous Program. Comput. J. 32(5): 437-444 (1989)
7EEMaciej Koutny, Luigi V. Mancini: Synchronizing events in replicated systems. Journal of Systems and Software 9(3): 183-190 (1989)
1988
6 Luigi V. Mancini, Giuseppe Pappalardo: Towards a Theory of Replicated Processing. FTRTFT 1988: 175-192
5 Luigi V. Mancini, Giuseppe Pappalardo: Hoare logic of distributed redundant systems. Comput. Syst. Sci. Eng. 3(4): 171-180 (1988)
4 Luigi V. Mancini: A Technique for Subclassing and its Implementation Exploiting Polymorphic Procedures. Softw., Pract. Exper. 18(4): 287-300 (1988)
1987
3 Santosh K. Shrivastava, Luigi V. Mancini, Brian Randell: On the Duality of Fault Tolerant System Structures. Experiences with Distributed Systems 1987: 19-37
1986
2EELuigi V. Mancini, Maciej Koutny: Formal specification of N-modular redundancy. ACM Conference on Computer Science 1986: 199-204
1 Luigi V. Mancini: Modular Redundancy in a Message Passing System. IEEE Trans. Software Eng. 12(1): 79-86 (1986)

Coauthor Index

1Roberto Battistoni [58] [80]
2Peter H. Beckman [30]
3Massimo Bernaschi [35] [40]
4Elisa Bertino [17] [21] [23] [25] [26] [31] [32]
5Alan A. Bertossi [16] [18] [24] [28] [66]
6Devesh Bhatt [30]
7Alessandro Di Biagio [80]
8Massimo Bonometto [18]
9Maria Calagna [61] [63]
10Denis Caromel [30]
11Serge Chaumette [30]
12Giovanni Chiola [26] [29] [33]
13Giuseppe Ciaccio [29]
14Alessandro Ciampichetti [17]
15Gianni Conte [30] [33]
16Mauro Conti [64] [71] [72] [73] [79] [82]
17Giovanni Di Crescenzo [70]
18Antonio Durante [44] [49] [67]
19Hossam A. ElGindy [30]
20Fikret Erçal [30]
21Sandro Etalle [52]
22Matteo Formica [80]
23Geoffrey Fox (Geoffrey Charles Fox) [30]
24Nicoletta De Francesco [13]
25Andrea Fusiello [24]
26Andrea Gabrielli [75]
27Emanuele Gabrielli [35] [40] [58]
28G. Ghiola [30]
29Ehud Gudes [59]
30Huiping Guo [63]
31Jan Gustafsson [30]
32Matthew Haines [30]
33Paul J. M. Havinga [52]
34Sushil Jajodia [20] [21] [23] [25] [27] [31] [32] [41] [42] [46] [48] [63] [82]
35Laxmikant V. Kalé [30]
36Manuel Koch [34] [36] [37] [38] [39] [43] [45] [55] [60]
37Maciej Koutny [2] [7] [11] [15] [22]
38Yee Wei Law [52]
39Keqin Li [30]
40Alessandro Mei [46] [50] [51] [53] [54] [57] [62] [65] [73] [74] [76] [78] [79]
41Alessandra Menapace [66]
42Dominique Méry [30]
43Frank Mueller [30]
44Stephan Olariu [30]
45Ronald A. Olsson [30]
46Yi Pan [30]
47Alessandro Panconesi [54] [78]
48Giuseppe Pappalardo [5] [6] [8] [11] [15] [22]
49Francesco Parisi-Presicce [34] [36] [37] [38] [39] [43] [45] [55] [59] [60]
50Vishwas Patil [67] [76]
51A. Pereira Paz [13]
52Roberto Di Pietro [41] [42] [44] [47] [48] [49] [50] [51] [52] [53] [54] [57] [62] [64] [67] [68] [69] [71] [72] [73] [74] [78] [79] [80] [81] [82]
53Viktor K. Prasanna (V. K. Prasanna Kumar) [30]
54Jaikumar Radhakrishnan [54] [78]
55Brian Randell [3] [14]
56Binoy Ravindran [30]
57Indrajit Ray [19] [20] [21] [23] [25] [31] [32]
58José D. P. Rolim [30]
59Federico Rossini [28]
60Vittoria Rotella [10]
61Pierluigi Rotondo [29]
62Sankardas Roy [82]
63Beverly A. Sanders [30]
64Sanjeev Setia [27]
65Santosh K. Shrivastava [3] [9] [14]
66Claudio Soriente [81]
67Angelo Spognardi [72] [81]
68Hiroaki Takada [30]
69Gene Tsudik [81]
70Gigliola Vaglini [13]
71Simonetta Venosa [10]
72Tao Yang [30]
73Giorgio Zanin [56] [65] [68] [69]
74Lei Zhang [82]
75Albert Y. Zomaya [30]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)