Follow
Paolina Centonze
Paolina Centonze
Professor of Computer Science, Managing Director of Cybersecurity, Iona University, New Rochelle
Verified email at iona.edu - Homepage
Title
Cited by
Cited by
Year
Method and system for run-time dynamic and interactive identification of software authorization requirements and privileged code locations, and for validation of other software …
P Centonze, J Gomes, M Pistoia
US Patent App. 11/416,839, 2007
582007
Static analysis of role-based access control in J2EE applications
G Naumovich, P Centonze
ACM SIGSOFT Software Engineering Notes 29 (5), 1-10, 2004
572004
Method and system for run-time dynamic and interactive identification software authorization requirements and privileged code locations, and for validation of other software …
P Centonze, J Gomes, M Pistoia
US Patent 9,449,190, 2016
502016
Role-based access control consistency validation
P Centonze, G Naumovich, SJ Fink, M Pistoia
Proceedings of the 2006 international symposium on Software testing and …, 2006
432006
Security and Privacy Frameworks for Access Control Big Data Systems.
P Centonze
Computers, Materials & Continua 59 (2), 2019
322019
Automatic optimization of string allocations in a computer program
P Centonze, M Mostafa, M Pistoia, T Tateishi
US Patent 8,473,899, 2013
242013
Combining static and dynamic analysis for automatic identification of precise access-control policies
P Centonze, RJ Flynn, M Pistoia
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
242007
System and method for the automatic verification of privilege-asserting and subject-executed code
P Centonze, M Pistoia
US Patent 8,006,233, 2011
232011
System, apparatus, and method for identifying authorization requirements in component-based systems
M Pistoia, L Koved, P Centonze
US Patent App. 10/842,805, 2005
202005
Static analysis for verification of software program access to secure resources for computer systems
R Berg, P Centonze, M Pistoia, O Tripp
US Patent 8,381,242, 2013
182013
System and method for the automatic evaluation of existing security policies and automatic creation of new security policies
P Centonze, M Pistoia
US Patent 8,230,477, 2012
172012
Labyrinth: Visually configurable data-leakage detection in mobile applications
M Pistoia, O Tripp, P Centonze, JW Ligman
2015 16th IEEE International Conference on Mobile Data Management 1, 279-286, 2015
152015
System and method for the automatic identification of subject-executed code and subject-granted access rights
P Centonze, M Pistoia
US Patent 8,332,939, 2012
152012
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
P Centonze, YA Haviv, R Hay, M Pistoia, A Sharabani, O Tripp
US Patent 8,572,727, 2013
142013
Method and system for the creation of service clients
J Gomes, P Centonze, S Zeng, M Singh, I Boier-Martin, L Balmelli
US Patent App. 11/408,184, 2007
142007
Carbon management for sourcing and logistics
M Ben-Hamida, C Boucher, P Centonze, ME Helander, KK Katircloglu, ...
US Patent 8,346,595, 2013
132013
Carbon management in assembly manufacturing logistics
K Sourirajan, P Centonze, ME Helander, K Katircioglu, M Ben-Hamida, ...
IBM Journal of Research and Development 53 (3), 8: 1-8: 16, 2009
132009
Static analysis for verification of software program access to secure resources for computer systems
R Berg, P Centonze, M Pistoia, O Tripp
US Patent 8,793,800, 2014
122014
Apparatus, System, Method and Computer Program Product for Analysis of Fraud in Transaction Data
A Sheopuri, P Centonze, S Zeng, J Gomes, I Boier-Martin
US Patent App. 11/557,520, 2008
102008
Cross-platform access-rights analysis of mobile applications
W Squires, P Centonze
Proceedings of the International Conference on Mobile Software Engineering …, 2016
92016
The system can't perform the operation now. Try again later.
Articles 1–20