Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 13 di 13
Data di pubblicazione Titolo Autore(i) Tipo File
12-mag-2011 Secure user credential control Talamo, M; Arcieri, F; Marinelli, G; Schunck, C Brevetti
12-mag-2011 Secure user credential control Talamo, M; Arcieri, F; Marinelli, G; Schunck, C Brevetti
1-gen-2012 State space blow-up in the verification of secure smartcard interoperability Talamo, M; Galinium, M; Schunck, C; Arcieri, F Intervento a convegno
1-gen-2013 Conformance checking of electronic business processes to secure distributed transactions Talamo, M; Arcieri, F; Schunck, C; D'Iddio, A Intervento a convegno
1-gen-2013 Providing context-based security for inter-organizational electronic business processes Talamo, M; Arcieri, F; Schunck, C; D'Iddio, A Intervento a convegno
19-feb-2015 ADAPTIVE SYSTEM PROFILE Talamo, M; Arcieri, F; Schunck, C Brevetti
1-gen-2016 Providing online operational support for distributed, security sensitive electronic business processes Talamo, M; Povilionis, A; Arcieri, F; Schunck, C Intervento a convegno
1-gen-2016 Providing online operational support for distributed, security sensitive electronic business processes Talamo, M; Povilionis, A; Arcieri, F; Schunck, C Intervento a convegno
1-gen-2016 Online and offline conformance checking of inter-organizational business processes with incomplete process logs D'Iddio, A; Schunck, C; Arcieri, F; Talamo, M Intervento a convegno
5-mag-2016 STRING SEARCH AND MATCHING FOR GATE FUNCTIONALITY Talamo, M; Arcieri, F; Schunck, C Brevetti
7-dic-2016 STRING SEARCH AND MATCHING FOR GATE FUNCTIONALITY Talamo, M; Arcieri, F; Schunck, C; Povilionis, A Brevetti
12-dic-2016 Risk Evaluation and Forecasting Causal Relationships Talamo, M; Arcieri, F; Schunck, C; Dimitri, A Brevetti
1-gen-2017 Extending abstraction-refinement methods for compliance checking of inter-organizational business processes with incomplete information D'Iddio, A; Schunck, C; Arcieri, F; Talamo, M Intervento a convegno
Mostrati risultati da 1 a 13 di 13
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile