Paolina Centonze
Paolina Centonze
Professor of Computer Science, Iona College, New Rochelle, New York
Verified email at iona.edu - Homepage
Title
Cited by
Cited by
Year
Static analysis of role-based access control in J2EE applications
G Naumovich, P Centonze
ACM SIGSOFT Software Engineering Notes 29 (5), 1-10, 2004
562004
Method and system for run-time dynamic and interactive identification of software authorization requirements and privileged code locations, and for validation of other software …
P Centonze, J Gomes, M Pistoia
US Patent App. 11/416,839, 2007
482007
Method and system for run-time dynamic and interactive identification software authorization requirements and privileged code locations, and for validation of other software …
P Centonze, J Gomes, M Pistoia
US Patent 9,449,190, 2016
432016
Role-based access control consistency validation
P Centonze, G Naumovich, SJ Fink, M Pistoia
Proceedings of the 2006 international symposium on Software testing and …, 2006
402006
Combining static and dynamic analysis for automatic identification of precise access-control policies
P Centonze, RJ Flynn, M Pistoia
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
242007
Automatic optimization of string allocations in a computer program
P Centonze, M Mostafa, M Pistoia, T Tateishi
US Patent 8,473,899, 2013
222013
System and method for the automatic verification of privilege-asserting and subject-executed code
P Centonze, M Pistoia
US Patent 8,006,233, 2011
192011
System, apparatus, and method for identifying authorization requirements in component-based systems
M Pistoia, L Koved, P Centonze
US Patent App. 10/842,805, 2005
182005
Security and privacy frameworks for access control big data systems
P Centonze
Comput. Mater. Continua 59 (2), 361-374, 2019
172019
System and method for the automatic evaluation of existing security policies and automatic creation of new security policies
P Centonze, M Pistoia
US Patent 8,230,477, 2012
142012
Method and system for the creation of service clients
J Gomes, P Centonze, S Zeng, M Singh, I Boier-Martin, L Balmelli
US Patent App. 11/408,184, 2007
142007
Static analysis for verification of software program access to secure resources for computer systems
R Berg, P Centonze, M Pistoia, O Tripp
US Patent 8,381,242, 2013
132013
System and method for the automatic identification of subject-executed code and subject-granted access rights
P Centonze, M Pistoia
US Patent 8,332,939, 2012
132012
Labyrinth: Visually configurable data-leakage detection in mobile applications
M Pistoia, O Tripp, P Centonze, JW Ligman
2015 16th IEEE International Conference on Mobile Data Management 1, 279-286, 2015
122015
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
P Centonze, YA Haviv, R Hay, M Pistoia, A Sharabani, O Tripp
US Patent 8,572,727, 2013
122013
Static analysis for verification of software program access to secure resources for computer systems
R Berg, P Centonze, M Pistoia, O Tripp
US Patent 8,793,800, 2014
92014
Carbon management for sourcing and logistics
M Ben-Hamida, C Boucher, P Centonze, ME Helander, KK Katircloglu, ...
US Patent 8,346,595, 2013
92013
Apparatus, System, Method and Computer Program Product for Analysis of Fraud in Transaction Data
A Sheopuri, P Centonze, S Zeng, J Gomes, I Boier-Martin
US Patent App. 11/557,520, 2008
82008
System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies
P Centonze, YA Haviv, R Hay, M Pistoia, A Sharabani, O Tripp
US Patent 9,607,154, 2017
62017
Static analysis for verification of software program access to secure resources for computer systems
R Berg, P Centonze, M Pistoia, O Tripp
US Patent 8,683,599, 2014
62014
The system can't perform the operation now. Try again later.
Articles 1–20