Found 4 result(s)
Found 1 page(s)
Page Size: 10, 20, 50
Export: bibtex, xml, json, csv

CNR Author
Luca Ferrucci 4
Francesco Gennai 3
Marina Buzzi 2
Conference object 3
Report 1
English 3
Italian 1
2014 2
2015 1
2016 1
Unknown 3
Open Access 1
2014 Conference object Unknown

An LTL semantics of business working rows with recovery
Ferrucci L., Bersani M. M., Mazzara M.
We describe a business workï¬,ow case study with abnormal behavior management (i.e. recovery) and demonstrate how temporal logics and model checking can provide a methodology to iteratively revise the design and obtain a correct-by construction system. To do so we define a formal semantics by giving a compilation of generic workï¬,ow patterns into LTL and we use the bound model checker Zot to prove specific properties and requirements validity. The working assumption is that such a lightweight approach would easily fit into processes that are already in place without the need for a radical change of procedures, tools and people's attitudes. The complexity of formalisms and invasiveness of methods have been demonstrated to be one of the major drawback and obstacle for deployment of formal engineering techniques into mundane projects.Source: ICSOFT-PT 2014 - 9th International Conference on Software Paradigm Trends, pp. 29–40, Wien, Austria, 29-31 August 2014
DOI: 10.5220/0005110000290040

See at: DOI Resolver | CNR People |

2014 Report Unknown

Proposta di aggiornamento delle specifiche tecniche per la Posta Elettronica Certificata
Gennai F., Buzzi M., Ferrucci L.
In this technical report, we present a proposal to modify the protocol of the PEC (Certified Mail), the Italian infrastructure which exploits the well-known SMTP protocol to send e-mail messages and guarantee the non-repudiation of the sender and of the recipient using appropriate XML receipts and timestamps. The paper begins by describing the current problems of the PEC and try to solve the problem of identifying and retrieve the list of the authorized PEC domains avoiding the use of a centralized system, but taking advantage of the infrastructure of the secure DNS, DNSSec, in order to standardize the method. After a brief discussion of the standards DNS and DNSSec, and the introduction of standards for the publication of X.509v3 certificates inside the DNSSec itself, proposed with RFC6698 by the IETF's DANE group, the technical report introduces the proposed modifications, using a small case study to exemplify them. Finally there is a section analysis of the costs and benefits introduced by the proposal.

See at: CNR People

2016 Conference object Open Access OPEN

A proposed evolution for the Italian certified electronic mail system
Buzzi M., Ferrucci L., Gennai F., Petrucci C.
One the main objective of the European Commission is to innovate and bring ICT to its full potential in any sector, including eGovernment, eCommerce, and eHealth services. Certified Electronic Mail (CEM) systems of Member States are currently not interoperable, thus impacting on economic growth and competitiveness. The paper investigates the use of the DNSSec technology as a technological evolution of the Italian CEM System and the first step towards interoperability and adherence to international standards.Source: Third International Conference on eDemocracy & eGovernment (ICEDEG), pp. 34–41, Quito, Ecuador, 30/03/2016
DOI: 10.1109/ICEDEG.2016.7461693

See at: PUblication MAnagement Open Access | DOI Resolver | | CNR People

2015 Conference object Unknown

Introducing new technology into italian certified electronic mail: a proposal
Buzzi M., Ferrucci L., Gennai F., Petrucci C.
Over the last decade, an increasing number of Certified E-Mail systems (CEM) have been implemented in Europe and worldwide, but their diffusion and validity are mainly restricted in a national arena. Despite the effort of European Union (EU) that recently defined a specification for guaranteeing interoperability of CEM systems between Member States, its adoption has not be not yet fuelled, mainly since any CEM system receives a legal value by its State legislation. It is difficult to extend the legal value of CEM security mechanisms, e.g. receipts with timestamps which are considered evidences and legal proofs in disputes that may arise from different Parties inside a State, unless a common political and legal agreement will be created. At this aim, recently EU introduce the new Regulation on Electronic Identification and Trust Services (eIDAS), to address this issue. We believe that the first step for encouraging a more large adoption between communities is to implement CEMs using standard worldwide recognized solutions. In this paper we propose a technical evolution of the Italian CEM, called Posta Elettronica Certificata (PEC) moving from a close mechanisms to the adoption of a more standardized, distributed solution, based on DNS Security Extensions (DNSSec). This proposal would have a minimal impact on the legislation, restricted to the annex that defines PEC technical rules.Source: TELERISE '15 - First International Workshop on TEchnical and LEgal aspects of data pRIvacy, pp. 32–37, Firenze, Italy, 18 May 2015

See at: | CNR People