Making search engines faster by lowering the cost of querying business rules through fpgas F Maschi, M Owaida, G Alonso, M Casalino, A Hock-Koon Proceedings of the 2020 ACM SIGMOD International Conference on Management of …, 2020 | 11 | 2020 |
Detection of configuration vulnerabilities in distributed (web) environments MM Casalino, M Mangili, H Plate, SE Ponta International Conference on Security and Privacy in Communication Systems …, 2012 | 10 | 2012 |
Runtime configuration checks for composite applications H Plate, S Ponta, MM Casalino, T Scholte US Patent 9,009,534, 2015 | 8 | 2015 |
FcgiOCSP: a scalable OCSP‐based certificate validation system exploiting the FastCGI interface D Berbecaru, MM Casalino, A Lioy Software: Practice and Experience 43 (12), 1489-1518, 2013 | 7 | 2013 |
Refactoring Multi-Layered Access Control Policies Through (De)Composition MM Casalino, R Thion Network and Service Management (CNSM), 2013 9th International Conference on …, 2013 | 7 | 2013 |
Transversal policy conflict detection MM Casalino, H Plate, S Trabelsi International Symposium on Engineering Secure Software and Systems, 30-37, 2012 | 6 | 2012 |
D4. 8–PROTOTYPE: STANDARDIZED AUDIT INTERFACE. Deliverable O Bettan, S Ponta, K Musaraj, M Casalino FP7-ICT-2009.1. 4 Project PoSecCo, 0 | 3* | |
Configuration assessment as a service MM Casalino, H Plate, SE Ponta International Workshop on Data Privacy Management, 217-226, 2012 | 2 | 2012 |
Access control configuration for J2EE web applications: a formal perspective MM Casalino, R Thion, MS Hacid International Conference on Trust, Privacy and Security in Digital Business …, 2012 | 2 | 2012 |
D3. 2: Security Ontology Definition C Basile, J Silvestro, A Lioy, D Canavese, MA Neri, S Paraboschi, ... PoSecCo Project Deliverable, 2011 | 2 | 2011 |
From Research to Proof-of-Concept: Analysis of a Deployment of FPGAs on a Commercial Search Engine F Maschi, G Alonso, A Hock-Koon, N Bondoux, T Roy, M Boudia, ... arXiv preprint arXiv:2108.09073, 2021 | 1 | 2021 |
Increasing Trust in the Cloud through Configuration Validation MM Casalino, H Plate, SE Ponta OTM Confederated International Conferences" On the Move to Meaningful …, 2014 | 1 | 2014 |
Extending Multivalued Dependencies for Access Control Policy Refactoring MM Casalino, R Thion 29eme journées Bases de Données Avancées (BDA). Conference without formal …, 2013 | 1 | 2013 |
Detection of conflicts in security policies C Basile, MM Casalino, S Mutti, S Paraboschi Computer and Information Security Handbook, 781-800, 2013 | 1 | 2013 |
D3. 7–ENFORCEABILITY ANALYSIS. Deliverable C Basile, M Vallini, M Casalino FP7-ICT-2009.1. 4 Project PoSecCo, 0 | 1 | |
Techniques for security configuration management in distributed information systems.(Approches pour la gestion de configurations de sécurité dans les systèmes d'information … MM Casalino Claude Bernard University Lyon 1, France, 2014 | | 2014 |