Entity

Time filter

Source Type


Isaja M.,Engineering Ingegneria Informatica SpA
Lecture Notes in Business Information Processing | Year: 2014

The BIVEE acronym stands for Business Innovation and Virtual Enterprise Environment. The ICT outcome of the BIVEE Project is the BIVEE System: an integrated solution enabling business innovation in virtual factories and enterprises. In line with the Future Internet vision, the BIVEE System is delivered as a set of modular applications deployed on top of a commodity, cloud-ready service platform, This service platform, named BIVEE Platform, provides a base layer of data, knowledge, services and capabilities. This paper briefly describes the BIVEE Platform, from both the conceptual and the technical point of view. © Springer International Publishing Switzerland 2014. Source


De Panfilis S.,Engineering Ingegneria Informatica SpA | Missikoff M.,Marche Polytechnic University
CEUR Workshop Proceedings | Year: 2012

Innovation is probably one of the most popular terms, used in different contexts, when talking about the future. From economic contexts, where it is used to indicate a key strategy to go out of the current critical economic phase, to business contexts, where it is clear that without innovation a company cannot survive. In this paper we propose an ontology-based approach to business innovation. The proposal is based on a reference framework: BIRF (Business Innovation Reference Framework) and a novel, document-centric approach. The document-centric approach starts from the idea that chasing innovation by defining specific processes will turn in imposing limitations to imagination and creativity. Conversely, the documents represents sharable traces of inspirations, ideas, and all the knowledge that is collected and produced during an innovation initiative. But documents need to be semantically enriched, therefore, the central pillar of our approach is a federation of ontologies aimed at supporting the unconstrained, imaginative adventure of innovation. Source


Montecchi L.,University of Florence | Lollini P.,University of Florence | Bondavalli A.,University of Florence | La Mattina E.,Engineering Ingegneria Informatica SpA
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2012

Biometric authentication systems verify the identity of users by relying on their distinctive traits, like fingerprint, face, iris, signature, voice, etc. Biometrics is commonly perceived as a strong authentication method; in practice several well-known vulnerabilities exist, and security aspects should be carefully considered, especially when it is adopted to secure the access to applications controlling critical systems and infrastructures. In this paper we perform a quantitative security evaluation of the CASHMA multi-biometric authentication system, assessing the security provided by different system configurations against attackers with different capabilities. The analysis is performed using the ADVISE modeling formalism, a formalism for security evaluation that extends attack graphs; it allows to combine information on the system, the attacker, and the metrics of interest to produce quantitative results. The obtained results provide useful insight on the security offered by the different system configurations, and demonstrate the feasibility of the approach to model security threats and countermeasures in real scenarios. © 2012 Springer-Verlag Berlin Heidelberg. Source


Ceccarelli A.,University of Florence | Montecchi L.,University of Florence | Brancati F.,Resiltech Srl | Lollini P.,University of Florence | And 2 more authors.
IEEE Transactions on Dependable and Secure Computing | Year: 2015

Session management in distributed Internet services is traditionally based on username and password, explicit logouts and mechanisms of user session expiration using classic timeouts. Emerging biometric solutions allow substituting username and password with biometric data during session establishment, but in such an approach still a single verification is deemed sufficient, and the identity of a user is considered immutable during the entire session. Additionally, the length of the session timeout may impact on the usability of the service and consequent client satisfaction. This paper explores promising alternatives offered by applying biometrics in the management of sessions. A secure protocol is defined for perpetual authentication through continuous user verification. The protocol determines adaptive timeouts based on the quality, frequency and type of biometric data transparently acquired from the user. The functional behavior of the protocol is illustrated through Matlab simulations, while model-based quantitative analysis is carried out to assess the ability of the protocol to contrast security attacks exercised by different kinds of attackers. Finally, the current prototype for PCs and Android smartphones is discussed. © 2015 IEEE. Source


During M.,CVCE | Wieneke L.,CVCE | Croce V.,Engineering Ingegneria Informatica SpA
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2015

Network visualizations are powerful albeit suggestive means to represent and explore complex relations between entities (people, words, places…) and have become increasingly popular in the humanities. In this article we briefly introduce the functionality of histoGraph, a technical demonstrator for the network-based analysis of photographs, survey current applications of network visualizations in the cultural heritage domain, and outline histoGraph’s future development as an open source tool for the visualization of cultural heritage data. © Springer International Publishing Switzerland 2015. Source

Discover hidden collaborations