Gabriele Costa's Selected Publications

[9] A. Armando, G. Costa, A. Merlo, and L. Verderame. Formal modeling and automatic enforcement of bring your own device policies. International Journal of Information Security, pages 1--18, Aug. 2014. [ DOI | .pdf ]
[8] A. Armando, G. Costa, A. Merlo, and L. Verderame. Enabling byod through secure meta-market. In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec '14, pages 219--230, New York, NY, USA, July 2014. ACM. [ DOI | .pdf ]
[7] A. Armando, G. Costa, L. Verderame, and A. Merlo. Securing the “bring your own device” paradigm. IEEE Computer, 47(6):48--56, 2014. [ DOI | .pdf ]
[6] A. Armando, G. Costa, and A. Merlo. Formal modeling and reasoning about the android security framework. In C. Palamidessi and M. Ryan, editors, TGC'12: 7th International Symposium on Trustworthy Global Computing, volume 8191 of Lecture Notes in Computer Science, pages 64--81. Springer Berlin Heidelberg, 2013. [ DOI | .pdf ]
[5] A. Armando, A. Castiglione, G. Costa, U. Fiore, A. Merlo, L. Verderame, and I. You. Trustworthy opportunistic access to the internet of services. In ICT-EurAsia'13: Proceedings of the 2013 international conference on Information and Communication Technology, pages 469--478, Berlin, Heidelberg, 2013. Springer-Verlag. [ DOI | .pdf ]
[4] A. Armando, G. Costa, and A. Merlo. Bring your own device, securely. In SAC '13: Proceedings of the 28th Annual ACM Symposium on Applied Computing, pages 1852--1858, New York, NY, USA, 2013. ACM. [ DOI | .pdf ]
[3] G. Costa, A. Merlo, and L. Verderame. Market-based security for mobile devices. Ercim News, 93:32--33, 2013. [ .pdf ]
[2] G. Costa, F. Martinelli, and A. Yautsiukhin. Multi-dimensional secure service orchestration. In Business Process Management Workshops - BPM 2013 International Workshops, Beijing, China, August 26, 2013, Revised Papers, Lecture Notes in Business Information Processing, pages 473--485. Springer, 2013.
[1] A. Armando, G. Costa, A. Merlo, and L. Verderame. Securing the “bring your own device” policy. Journal of Internet Services and Information Security (JISIS), 2(3/4):3--17, 2012. Short version of this paper has been presented at the 4th International Workshop on Managing Insider Security Threats (MIST 2012), November 8-9, 2012 Nishijin Plaza, Kyushu University, Fukuoka, Japan. [ .pdf ]

This file was generated by bibtex2html 1.98.