Fulvio VALENZA

Email : fulvio.valenza [at] ieiit.cnr.it
PHOTO
Phone : +39 011 0905432
Fax : +39 011 0905429
Site :Torino
Position : Research Fellow

Publications

journals |conference proceedings |book chapters |

journals

F. Valenza, T. Su, S. Spinoso, A. Lioy, R. Sisto, M. Vallini

A formal approach for network security policy validation

Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 8 (1), pp. 79-100, 2017


C. Basile, D. Canavese, C. Pitscheider, A. Lioy, F. Valenza

Assessing network authorization policies via reachability analysis

Computers & Electrical Engineering, (In Press), 2017


C. Basile, D. Canavese, A. Lioy, C. Pitscheider, F. Valenza

Inter-function anomaly analysis for correct SDN/NFV deployment

International Journal of Network Management, 26(1), pp. 25-43, 2016


conference proceedings

F. Valenza, M. Vallini, A. Lioy

Online and offline security policy assessment

8th ACM CCS international workshop on Managing Insider Security Threats (MIST'16), 2016


C. Basile, A. Lioy, C. Pitscheider, F. Valenza, M. Vallini

A novel approach for integrating security policy enforcement with dynamic network virtualization

1st IEEE Conference on Network Softwarization (NetSoft-2015), pp. 1-5, 2015


F. Valenza, S. Spinoso, C. Basile, R. Sisto, A. Lioy

A Formal Model of Network Policy Analysis

1st IEEE Int. Forum on Research and Technologies for Society and Industry (RTSI 2015), pp. 516-522, 2015


C. Basile, D.Canavese, J. D’Annoville, B. De Sutter, F. Valenza

Automatic discovery of software attacks via backward reasoning

1st IEEE/ACM International Workshop on Software Protection (SPRO 2015), pp. 52-58, 2015


F. Valenza, C. Basile, D. Canavese, A. Lioy

Inter-technology conflict analysis for communication protection policies

9th International Conference on Risks and Security of Internet and Systems (CRiSIS-2014), pp. 148-163, 2014


book chapters

C. Basile, C. Pitscheider, F. Risso, F. Valenza, M. Vallini

Towards the Dynamic Provision of Virtualized Security Services

Cyber Security and Privacy, F. Cleary F. and M. Felici, pp. 65-76, 2015