Enhancing Java ME Security Support with Resource Usage Monitoring, 10th International Conference on Information and Communications Security (ICICS08), no. 5308 in Lectures Notes in Computer Science, 2008. ,
DOI : 10.1145/359576.359585
A Runtime Monitoring Environment for Mobile Java, 2008 IEEE International Conference on Software Testing Verification and Validation Workshop, 2008. ,
DOI : 10.1109/ICSTW.2008.3
The Connected Limited Device Configuration Specification, Java Standards Process JSR 139, 2003. ,
MIDP 2.0 security enhancements, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the, 2004. ,
DOI : 10.1109/HICSS.2004.1265679
Java for Mobile Devices: A Security Study, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.235-244, 2005. ,
DOI : 10.1109/CSAC.2005.34
Security Analysis of Mobile Java, 16th International Workshop on Database and Expert Systems Applications (DEXA'05), pp.231-235, 2005. ,
DOI : 10.1109/DEXA.2005.172
Security Evaluation of J2ME CLDC Embedded Java Platform., The Journal of Object Technology, vol.5, issue.2, pp.125-154, 2006. ,
DOI : 10.5381/jot.2006.5.2.a2
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), 2007. ,
DOI : 10.1109/ACSAC.2007.36
An access control language for security policies with complex contraints, Proceedings of Network and Distributed System Security Symphosium (NDSS01), 2001. ,
Security-by-contract on the .NET platform, Information Security Technical Report, vol.13, issue.1, pp.25-32, 2008. ,
DOI : 10.1016/j.istr.2008.02.001
The S3MS .NET run time monitoring, p.9, 2009. ,
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
Security-by-contract (sxc) for software and services of mobile systems, in: At your service: Service Engineering in the Information Society Technologies Program, 2009. ,
Conspec: A formal language for policy specification, Proceedings of the First Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS '07), 2007. ,
ConSpec: A formal language for policy specification, Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems (REM 07), ESORICS, 2007. ,
D. student in Computer Science at University of Pisa and a researcher of the Information Security Group of IIT-CNR. His research interests concern the foundational and practical aspects of the security of programming languages ,
URL : https://hal.archives-ouvertes.fr/hal-01125587
Ph.D. 1999) is a senior researcher of IIT-CNR, 1994. ,