Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fabio Ricciato is active.

Publication


Featured researches published by Fabio Ricciato.


design automation conference | 2003

A timing-accurate modeling and simulation environment for networked embedded systems

Franco Fummi; Giovanni Perbellini; Paolo Gallo; Massimo Poncino; Stefano Martini; Fabio Ricciato

The design of state-of-the-art, complex embedded system requires the capability of modeling and simulating the complex networked environment in which such systems operate. This implies the availability of both a networking modeling environment and traditional system-level modeling and simulation methodology based on a timing accurate integration of a system-level modeling language (SystemC) and a network simulation environment (NS-2). The efficiency of the proposed design environment has been demonstrated on a description of an 802.11 MAC layer.


ieee international symposium on policies for distributed systems and networks | 2012

Cross-Platform Access Control for Mobile Web Applications

John Lyle; Salvatore Monteleone; Shamal Faily; Davide Patti; Fabio Ricciato

Web browsers are a common platform for delivering cross-platform applications. However, they currently fail to provide consistent access control for security and privacy sensitive JavaScript APIs, such as geolocation and local storage. This problem is exacerbated by new HTML5 APIs and the increasing number of personal devices people own and use. In this paper we present the webinos platform which aims to provide a single, cross-device policy system for web applications on a wide range of web-enabled devices including TVs, smartphones, in-car systems and PCs. webinos solves the existing deficiencies in web authorisation by introducing the concept of a personal zone, the set of all devices and services owned by a particular user. All devices in this zone can synchronize their access control policies through interoperable middleware and can create flexible rules which may refer to an individual user, device or the entire zone. We provide details of the architecture and explain how our experience during design highlighted several conceptual challenges.


2013 International Conference on Privacy and Security in Mobile Systems (PRISMS) | 2013

SecureDroid: An Android security framework extension for context-aware policy enforcement

Valerio Arena; Vincenzo Catania; Giuseppe La Torre; Salvatore Monteleone; Fabio Ricciato

Mobile devices became the main repository of personal data and source of user-generated contents as well as the principal controller of our social networked life. In this scenario, malicious applications try to take advantage of all the possibilities left open by users and operating systems. In this paper, we propose SecureDroid: an extension of the Android security framework able to enforce flexible and declarative security policies at run-time, providing a fine-grained access control system. In particular, we focus on context dependent policies that allow the user to specify the way in which applications work according to current context.


international conference on mobile and ubiquitous systems: networking and services | 2005

Embedded SW design issues for distributed applications on mobile terminals

Franco Fummi; Stefano Martini; Giovanni Perbellini; Fabio Ricciato; Maura Turolla

Mobile terminals are embedded systems with growing elaboration capacity, even still limited, which are continuously connected to a worldwide communication network. Thus, the idea of embedding in mobile terminals remote computing services seems attractive and it is more and more exploited. This paper evaluates a middleware platform based on the simple object access protocol (SOAP) to develop distributed applications on mobile terminals.


Innovations in Systems and Software Engineering | 2006

Finding the Mobile Trusted Element

Fabio Ricciato; Maura Turolla; Antonio Varriale

Nowadays a number of services and applications delivered on mobile terminals need to be secured in order to guarantee the user privacy, the business stakeholders and the commercial and legal issues related to security threads.


Archive | 2004

Method and System for Access Control and Data Protection in Digital Memories, Related Digital Memory and Computer Program Product Therefor

Alberto Bianco; Laura Colazzo; Fabio Ricciato; Maura Turolla; Antonio Varriale


Archive | 2004

Method of and system for secure management of data stored on electronic tags

Elisa Alessio; Fabio Ricciato; Maura Turolla


Archive | 2007

Method and system for displaying user-related information on users'handsets

Maurizio Marcelli; Sergio Collesei; Fabio Ricciato; Francesco Baietto; Marco Funari


Archive | 2003

Method and system for controlling resources via a mobile terminal, related network and computer program product therefor

Roberto Fantini; Fabio Ricciato; Maura Turolla


Archive | 2002

System and method for making complex electronic circuits

Pierangelo Garino; Fabio Ricciato; Alfredo Ruscitto; Maura Turolla; Antonio Varriale

Collaboration


Dive into the Fabio Ricciato's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge