Method and system for run-time dynamic and interactive identification of software authorization requirements and privileged code locations, and for validation of other software … P Centonze, J Gomes, M Pistoia US Patent App. 11/416,839, 2007 | 59 | 2007 |
Static analysis of role-based access control in J2EE applications G Naumovich, P Centonze ACM SIGSOFT Software Engineering Notes 29 (5), 1-10, 2004 | 57 | 2004 |
Method and system for run-time dynamic and interactive identification software authorization requirements and privileged code locations, and for validation of other software … P Centonze, J Gomes, M Pistoia US Patent 9,449,190, 2016 | 50 | 2016 |
Role-based access control consistency validation P Centonze, G Naumovich, SJ Fink, M Pistoia Proceedings of the 2006 international symposium on Software testing and …, 2006 | 43 | 2006 |
Security and Privacy Frameworks for Access Control Big Data Systems. P Centonze Computers, Materials & Continua 59 (2), 2019 | 32 | 2019 |
Combining static and dynamic analysis for automatic identification of precise access-control policies P Centonze, RJ Flynn, M Pistoia Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007 | 25 | 2007 |
Automatic optimization of string allocations in a computer program P Centonze, M Mostafa, M Pistoia, T Tateishi US Patent 8,473,899, 2013 | 24 | 2013 |
System and method for the automatic verification of privilege-asserting and subject-executed code P Centonze, M Pistoia US Patent 8,006,233, 2011 | 23 | 2011 |
System, apparatus, and method for identifying authorization requirements in component-based systems M Pistoia, L Koved, P Centonze US Patent App. 10/842,805, 2005 | 20 | 2005 |
Static analysis for verification of software program access to secure resources for computer systems R Berg, P Centonze, M Pistoia, O Tripp US Patent 8,381,242, 2013 | 18 | 2013 |
System and method for the automatic evaluation of existing security policies and automatic creation of new security policies P Centonze, M Pistoia US Patent 8,230,477, 2012 | 17 | 2012 |
Labyrinth: Visually configurable data-leakage detection in mobile applications M Pistoia, O Tripp, P Centonze, JW Ligman 2015 16th IEEE International Conference on Mobile Data Management 1, 279-286, 2015 | 16 | 2015 |
System and method for the automatic identification of subject-executed code and subject-granted access rights P Centonze, M Pistoia US Patent 8,332,939, 2012 | 15 | 2012 |
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies P Centonze, YA Haviv, R Hay, M Pistoia, A Sharabani, O Tripp US Patent 8,572,727, 2013 | 14 | 2013 |
Method and system for the creation of service clients J Gomes, P Centonze, S Zeng, M Singh, I Boier-Martin, L Balmelli US Patent App. 11/408,184, 2007 | 14 | 2007 |
Carbon management for sourcing and logistics M Ben-Hamida, C Boucher, P Centonze, ME Helander, KK Katircloglu, ... US Patent 8,346,595, 2013 | 13 | 2013 |
Carbon management in assembly manufacturing logistics K Sourirajan, P Centonze, ME Helander, K Katircioglu, M Ben-Hamida, ... IBM Journal of Research and Development 53 (3), 8: 1-8: 16, 2009 | 13 | 2009 |
Static analysis for verification of software program access to secure resources for computer systems R Berg, P Centonze, M Pistoia, O Tripp US Patent 8,793,800, 2014 | 12 | 2014 |
Apparatus, System, Method and Computer Program Product for Analysis of Fraud in Transaction Data A Sheopuri, P Centonze, S Zeng, J Gomes, I Boier-Martin US Patent App. 11/557,520, 2008 | 10 | 2008 |
Cross-platform access-rights analysis of mobile applications W Squires, P Centonze Proceedings of the International Conference on Mobile Software Engineering …, 2016 | 9 | 2016 |