Giampaolo Bella
Orcid: 0000-0002-7615-8643Affiliations:
- University of Catania, Italy
According to our database1,
Giampaolo Bella
authored at least 140 papers
between 1997 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dmi.unict.it
On csauthors.net:
Bibliography
2025
2024
Semantic Web, 2024
Appl. Ontology, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
Proceedings of the IEEE International Conference on Blockchain, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
The ontology for agents, systems and integration of services: OASIS version 2<sup>$</sup>.
Intelligenza Artificiale, 2023
CoRR, 2023
The AILA Methodology for Automated and Intelligent Likelihood Assignment in Risk Assessment.
IEEE Access, 2023
Proceedings of the 9th International Conference on Vehicle Technology and Intelligent Transport Systems, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
A Behaviouristic Approach to Representing Processes and Procedures in the OASIS 2 Ontology.
Proceedings of the Joint Ontology Workshops 2023 Episode IX: The Quebec Summer of Ontology co-located with the 13th International Conference on Formal Ontology in Information Systems (FOIS 2023), 2023
Proceedings of the Joint Ontology Workshops 2023 Episode IX: The Quebec Summer of Ontology co-located with the 13th International Conference on Formal Ontology in Information Systems (FOIS 2023), 2023
Proceedings of the Joint Ontology Workshops 2023 Episode IX: The Quebec Summer of Ontology co-located with the 13th International Conference on Formal Ontology in Information Systems (FOIS 2023), 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Multi-service threats: Attacking and protecting network printers and VoIP phones alike.
Internet Things, 2022
Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security.
Comput. Networks, 2022
The ontology for agents, systems and integration of services: recent advancements of OASIS.
Proceedings of the 23rd Workshop "From Objects to Agents", 2022
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022
Proceedings of the 6th International Conference on System Reliability and Safety, 2022
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version).
CoRR, 2021
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021
Proceedings of the Trust, Privacy and Security in Digital Business, 2021
Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, June 1-2, 2021., 2021
Proceedings of the 8th International Conference on Internet of Things: Systems, 2021
Blockchains Through Ontologies: The Case Study of the Ethereum ERC721 Standard in oasis.
Proceedings of the Intelligent Distributed Computing XIV, 2021
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2021
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021
2020
Proceedings of the Fifth International Conference on Fog and Mobile Edge Computing, 2020
Proceedings of the 16th European Dependable Computing Conference, 2020
2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the Formal Methods Teaching - Third International Workshop and Tutorial, 2019
Proceedings of the Computer Safety, Reliability, and Security, 2019
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the ACM Workshop on Automotive Cybersecurity, 2019
2018
J. Comput. Secur., 2018
Proceedings of the Computer Safety, Reliability, and Security, 2018
Proceedings of the 26th Euromicro International Conference on Parallel, 2018
2017
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), 2017
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017
2016
Proceedings of the Security Protocols XXIV, 2016
2015
Int. J. Inf. Sec., 2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
Proceedings of the Active Media Technology - 10th International Conference, 2014
2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
2012
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012
Verifying Privacy by Little Interaction and No Process Equivalence.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Seventh International Conference on Digital Information Management, 2012
2011
Comput. Secur., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Remote Management of Face-to-face Written Authenticated Though Anonymous Exams.
Proceedings of the CSEDU 2011, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Int. J. Inf. Sec., 2010
WATA - A System for Written Authenticated though Anonymous Exams.
Proceedings of the CSEDU 2010 - Proceedings of the Second International Conference on Computer Supported Education, Valencia, Spain, April 7-10, 2010, 2010
2009
Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing.
J. Comput. Secur., 2009
Proceedings of the Foundations and Applications of Security Analysis, 2009
Proceedings of the Computational Methods in Systems Biology, 7th International Conference, 2009
2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
Information Security and Cryptography, Springer, ISBN: 978-3-540-68134-2, 2007
2006
ACM Trans. Inf. Syst. Secur., 2006
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
2005
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
Locating Mobile Nodes Within Logical Networks.
Proceedings of the 2005 International Conference on Pervasive Systems and Computing, 2005
2004
Theory Pract. Log. Program., 2004
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Should We Prove Security Policies Correct?
Proceedings of the Electronic Government and Commerce: Design, Modeling, Analysis and Security, 2004
2003
Proceedings of the Theorem Proving in Higher Order Logics, 16th International Conference, 2003
Proceedings of the Security Protocols, 2003
Proceedings of the Security Protocols, 2003
Proceedings of the Security Protocols, 2003
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
2002
Proceedings of the Security Protocols, 2002
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
Proceedings of the Theorem Proving in Higher Order Logics, 14th International Conference, 2001
Proceedings of the Practical Aspects of Declarative Languages, 2001
Proceedings of the Smart Card Programming and Security, 2001
2000
Proceedings of the Security Protocols, 2000
Proceedings of the Security Protocols, 2000
Proceedings of the Computer Security, 2000
1999
1998
Proceedings of the Computer Security, 1998
Proceedings of the Computer Aided Verification, 10th International Conference, 1998
A Realistic Environment for Crypto-Protocol Analyses by ASMs.
Proceedings of the Fifth International Workshop on Abstract State Machines, 1998
1997
J. Univers. Comput. Sci., 1997