20 result(s)
Page Size: 10, 20, 50
Export: bibtex, xml, json, csv
Order by:

CNR Author operator: and / or
more
Typology operator: and / or
Language operator: and / or
Date operator: and / or
more
Rights operator: and / or
2018 Conference article Open Access OPEN

How blind people can manage a remote control system: a case study
Buzzi M., Gennai F., Leporini B.
Remote Control Systems (RCSs) are increasingly being installed in homes and offices. Technology evolves very rapidly and sensors and devices are becoming smaller, smarter and more powerful. Mobile and Web apps are commonly used to remotely configure and control devices. Home control is especially valuable for blind people, since they can benefit from technology to control and turn on/off devices autonomously. Remote control can offer meaningful support, especially when devices are not directly accessible (e.g,. thermostat to manage heating temperature). Therefore, if RCS interfaces are not accessible via screen reader, blind users may miss a great opportunity to achieve greater autonomy at home. This paper investigates the accessibility of the web user interfaces offered by RCSs for blind people. To do this, the Fibaro, a popular Remote Control System, was tested as a case study by analyzing the interaction via screen reader. Results indicate that accessibility and especially usability need to be improved to make interaction easier and more satisfying for blind people. To this aim, some suggestions are offered to aid developers in designing more accessible RCS user interfaces.Source: GOODTECHS 2017 - International Conference on Smart Objects and Technologies for Social Good, pp. 71–81, Pisa, Italy, 29-30 November 2017
DOI: 10.1007/978-3-319-76111-4_8

See at: ISTI Repository Open Access | academic.microsoft.com Restricted | dblp.uni-trier.de Restricted | link.springer.com Restricted | link.springer.com Restricted | CNR ExploRA Restricted | rd.springer.com Restricted


2018 Other Restricted

Regolamento utilizzo dei sistemi informatici, rete telematica e sicurezza Istituto di Scienza e Tecnologie dell'informazione "A. Faedo"
Deluca R., Diciotti R., Fantini E., Gennai F., Piccioli T.
Regolamento interno diretto ad evitare che comportamenti inconsapevoli possano innescare problemi o minacce alla sicurezza nel trattamento dei dati personali.

See at: CNR ExploRA Restricted | regolamento.isti.cnr.it Restricted


2017 Report Restricted

Introduzione alla gestione di un cluster OpenVMS
Martusciello L., Gennai F.
Introduzione alla gestione di un cluster OpenVMS.Source: ISTI Technical reports, 2017

See at: CNR ExploRA Restricted


2017 Conference article Restricted

Interoperability challenge of certified communication systems via internet
Buzzi M., Gennai F., Petrucci C.
Developing the full potential of Information and Communication Technology (ICT) can greatly innovate and promote society in a number of sectors, including eCommerce, eGovernment, and eHealth. The European Commission works to innovate and bring ICT to its full potential in any sector. Lack of interoperability and adherence to international standards heavily impacts on economic growth and competitiveness. This study suggests a conceptual model to support and fuel worldwide interoperability of Internet Certified Communication Systems (CCSs) worldwide. Current European CCS systems certify the source of an email or message but they also address specific national needs (government) by implementing closed solutions, which impedes cross-border and worldwide interoperability. The Generic CCS model (GCCS) defines an open solution that is able to redefine "closed" CCS systems, planting the seed for building worldwide interoperability between certified communication systems. Few scenarios of use illustrate the potential of the proposed model.Source: eGose '17 - Internationsl Conference on Electronic Governance and Open Society: Challenges in Eurasia, pp. 166–171, St. Petersburg, Russia, 04-06 September 2017
DOI: 10.1145/3129757.3129785

See at: academic.microsoft.com Restricted | dl.acm.org Restricted | dl.acm.org Restricted | CNR ExploRA Restricted


2016 Conference article Restricted

A proposed evolution for the Italian certified electronic mail system
Buzzi M., Ferrucci L., Gennai F., Petrucci C.
One the main objective of the European Commission is to innovate and bring ICT to its full potential in any sector, including eGovernment, eCommerce, and eHealth services. Certified Electronic Mail (CEM) systems of Member States are currently not interoperable, thus impacting on economic growth and competitiveness. The paper investigates the use of the DNSSec technology as a technological evolution of the Italian CEM System and the first step towards interoperability and adherence to international standards.Source: Third International Conference on eDemocracy & eGovernment (ICEDEG), pp. 34–41, Quito, Ecuador, 30/03/2016
DOI: 10.1109/icedeg.2016.7461693

See at: academic.microsoft.com Restricted | ieeexplore.ieee.org Restricted | ieeexplore.ieee.org Restricted | CNR ExploRA Restricted | xplorestaging.ieee.org Restricted


2015 Conference article Open Access OPEN

Introducing new technology into italian certified electronic mail: a proposal
Buzzi M., Ferrucci L., Gennai F., Petrucci C.
Over the last decade, an increasing number of Certified E-Mail systems (CEM) have been implemented in Europe and worldwide, but their diffusion and validity are mainly restricted in a national arena. Despite the effort of European Union (EU) that recently defined a specification for guaranteeing interoperability of CEM systems between Member States, its adoption has not be not yet fuelled, mainly since any CEM system receives a legal value by its State legislation. It is difficult to extend the legal value of CEM security mechanisms, e.g. receipts with timestamps which are considered evidences and legal proofs in disputes that may arise from different Parties inside a State, unless a common political and legal agreement will be created. At this aim, recently EU introduce the new Regulation on Electronic Identification and Trust Services (eIDAS), to address this issue. We believe that the first step for encouraging a more large adoption between communities is to implement CEMs using standard worldwide recognized solutions. In this paper we propose a technical evolution of the Italian CEM, called Posta Elettronica Certificata (PEC) moving from a close mechanisms to the adoption of a more standardized, distributed solution, based on DNS Security Extensions (DNSSec). This proposal would have a minimal impact on the legislation, restricted to the annex that defines PEC technical rules.Source: TELERISE '15 - First International Workshop on TEchnical and LEgal aspects of data pRIvacy, pp. 32–37, Firenze, Italy, 18 May 2015
DOI: 10.1109/telerise.2015.14

See at: puma.isti.cnr.it Open Access | academic.microsoft.com Restricted | dblp.uni-trier.de Restricted | ieeexplore.ieee.org Restricted | ieeexplore.ieee.org Restricted | CNR ExploRA Restricted | xplorestaging.ieee.org Restricted


2014 Conference article Restricted

E-Government services: Italian certified electronic mail
Buzzi M., Gennai F., Petrucci C., Vinciarelli A.
Efficiency, reliability, transparency and simplification of processes are key elements for enhancing progress in our society. In particular, e-Government services are improving our everyday life and email is frequently used by citizens to communicate with local and central Government. To provide legal validity for these communications, security mechanisms can be associated with exchanged messages. Since 2005 Italy has acknowledged the legal validity of certified electronic mail systems. The solution adopted by the Italian Government favors usability while ensuring server-to-server security and interoperability. In this paper certified email is briefly discussed, highlighting pros and limitations and discussing future steps, aimed at sharing, enhancing and reshaping certified electronic mail along with the international scientific community, to ensure worldwide interoperability and favor its diffusion.Source: 13th International Conference WWW/INTERNET, Porto, Portugal, 25 - 27 October 2014

See at: CNR ExploRA Restricted | www.internet-conf.org Restricted


2014 Report Open Access OPEN

Proposta di aggiornamento delle specifiche tecniche per la posta elettronica certificata
Gennai F., Buzzi M., Ferrucci L.
In this technical report, we present a proposal to modify the protocol of the PEC (Certified Mail), the Italian infrastructure which exploits the well-known SMTP protocol to send e-mail messages and guarantee the non-repudiation of the sender and of the recipient using appropriate XML receipts and timestamps. The paper begins by describing the current problems of the PEC and try to solve the problem of identifying and retrieve the list of the authorized PEC domains avoiding the use of a centralized system, but taking advantage of the infrastructure of the secure DNS, DNSSec, in order to standardize the method. After a brief discussion of the standards DNS and DNSSec, and the introduction of standards for the publication of X.509v3 certificates inside the DNSSec itself, proposed with RFC6698 by the IETF's DANE group, the technical report introduces the proposed modifications, using a small case study to exemplify them. Finally there is a section analysis of the costs and benefits introduced by the proposal.Source: ISTI Technical reports, 2014

See at: ISTI Repository Open Access | CNR ExploRA Open Access


2012 Conference article Restricted

E-government services: Quality Assurance of the Italian Certified Electronic Mail
Buzzi M., Gennai F., Petrucci C., Vinciarelli A.
The Internet has revolutionized our society profoundly. Efficiency, reliability, transparency and simplification of processes are keywords of the new eSociety. In particular, eGovernment services have simplified the interaction of citizens with local and central Government. Of these Internet services, email-based communications are central due their simplicity of use. Since 2005 Italy has acknowledged the legal validity of Certified Electronic Mail (PEC) systems. The solution adopted by the Italian Government enhances usability while assuring server-to-server security and interoperability. In this paper we focus on the quality of PEC service. First, motivation for the introduction of certified email is briefly discussed. Next, we present the interoperability test, carried out cyclically for verifying and ensuring the high quality of PEC service. Last, future steps are proposed for sharing, enhancing and reshaping PEC together with the international scientific community, to assure worldwide interoperability and enhance its diffusionSource: HCITOCH 2012, pp. 1–12, Venezia, Italy, 2012

See at: CNR ExploRA Restricted


2007 Report Open Access OPEN

Guida all'installazione di Java e JBoss in ambiente OpenVMS
Ermini D., Gennai F.
This document is a step by step guide explaining all it is necessary to do to install Java and JBoss Application Server on OpenVMS I64 systems. It also exposes the tests we utilized to verify the Java Virtual Machine's behaviour on OpenVMS I64 environment. The aim of this guide is that to obtain a suitable OpenVMS environment, where to be able to running Java and J2EE compliant applications.Source: ISTI Technical reports, 2007

See at: ISTI Repository Open Access | CNR ExploRA Open Access


2005 Conference article Restricted

A certified email system for the public administration in Italy
Gennai F., Martusciello L., Buzzi M.
The growth of Internet services poses problems of security assurance such as providing trustiness of on-line transactions, guaranteeing user privacy, and furnishing message confidentiality. This paper describes issues related to sending documents via "certified email", as required by Italian law. Issues of cryptography and digital signature are introduced followed by a brief description of the certified email system we developed, which successfully passed the interoperability and technical test carried out by the National Center for Informatics in the Public Administration of ItalySource: IADIS International Conference WWW/Internet 2005, pp. 143–147, Lisbona, 19-22 Ottobre 2005

See at: CNR ExploRA Restricted | www.iadisportal.org Restricted


2005 Report Open Access OPEN

Installazione e configurazione di un server Lightweight Directory Access Protocol
Martusciello L., Gennai F.
Un semplice esempio di installazione e configurazione di un server Lightweight Directory Access ProtocolSource: ISTI Technical reports, 2005

See at: ISTI Repository Open Access | CNR ExploRA Open Access


2005 Other Unknown

Note sullo sviluppo del sistema ISTI di Posta Elettronica Certificata (ISTI - PEC)
Gennai F.
non disponibile

See at: CNR ExploRA


2004 Journal article Open Access OPEN

La firma digitale
Gennai F.
L'utilizzo della rete Internet nell'ambito delle attivita' di Document Delivery svolte dalle biblioteche, ha portato notevoli benefici: la diminuizione dei tempi di evasione delle richieste, il miglioramento della qualità del servizio, e al tempo stesso la diminuzione dei costi di trasmissione, rispetto all'utilizzo di strumenti classici come il fax e la posta di superficie. Data la natura delicata delle operazioni di fornitura elettronica che spesso coinvolgono documenti soggetti a copyright un aspetto fondamentale è legato alla certificazione delle transazioni elettroniche in termini di: . certificazione dei corrispondenti (mittente, destinatario); . certificazione della azione (trasmissione); . garanzia della correttezza dei dati trasmessi (che non siano stati modificati durante il transito); . confidenzialità dei dati (solo il destinatario deve avere accesso al contenuto). Le tecnologie di firma elettronica e di cifratura possono essere applicate a tutte quelle operazioni di trattamento dei dati per le quali sono richieste una o più delle suddette garanzie.Source: Bibliotime (Bologna) VII (2004).

See at: CNR ExploRA Open Access


2004 Report Open Access OPEN

DnsManager - Nota tecnica
Gennai F.
DnsManager e' un modulo software per la gestione via web di un name server (Domain Name System), basato sul modello Centralizzato con Delega Amministrativa.Source: ISTI Technical reports, 2004

See at: ISTI Repository Open Access | CNR ExploRA Open Access


2003 Report Open Access OPEN

DnsManager
Gennai F.
DnsManager è un software per la gestione via web di un name server (Domain Name System), basato sul modello Centralizzato con Delega Amministrativa.Source: ISTI Technical reports, 2003

See at: ISTI Repository Open Access | CNR ExploRA Open Access


2002 Report Open Access OPEN

Progetto biblio-MIME: technical report n. 2
Gennai F., Abba L., Buzzi M., Magno R., Mangiaracina S.
Il Servizio di Document Delivery (DDS) permette alle biblioteche di scambiare articoli, pubblicazioni o lavori estratti da libri, riviste scientifiche, periodici, etc., sulla base delle richieste degli utenti. Il progetto Biblio-MIME nasce da una collaborazione tra: oArea della Ricerca (AdR) di Bologna: Biblioteca di Area (BdA) e Biblioteca dell'Istituto MASPEC di Parma; oIstituto per le Applicazioni Telematiche (IAT) di Pisa; intesa a progettare e a realizzare strumenti a supporto delle attività di Document Delivery delle biblioteche del CNR. Il progetto è stato finanziato negli anni 2000 e 2001 dalla Commissione di Studio per lo Sviluppo della Infrastruttura di Rete Telematica (CIRT) del CNR. Questo Report descrive le attività del secondo anno (2001) mettendole in relazione con i risultati attesi.Source: ISTI Technical reports, 2002

See at: CNR ExploRA Open Access


1994 Report Open Access OPEN

Sperimentazione del sistema CDS/ISIS su diverse piattaforme hardware e software.
Biagioni S., Buzzi M., Carlesi C., Gennai F., Musa D.
In previsione del trasferimento degli Istituti CNR di Pisa nella nuova Area di Ricerca, il Gruppo di Lavoro "Biblioteca di Area" sta lavorando alla definizione del sistema informativo per la futura biblioteca di "area", e alla raccolta e standardizzazione dei dati bibliografici delle biblioteche dei vari Istituti. Negli Istituti CNR di Pisa esistono situazioni eterogenee: i dati sono gestiti con sistemi differenti (RESP, DB3, ISIS, etc...) ed in alcuni casi vengono ancora organizzati solo su carta. Nel periodo di transizione, e stato deciso di usare il sistema CDS/ISIS (distribuito gratuitamente dall'UNESCO) per creare un sistema informativo che attualmente consiste: - di un insieme di cataloghi locali, uno per ciascun istituto CNR, funzionanti su PC e gestiti dal sistema ISIS. In tali cataloghi sono immessi sia i dati bibliografici relativi alla biblioteca locale, sia i dati di tutti gli altri Istituti pisani; essi percio sono veri e propri cataloghi collettivi, aggiornabili in linea per quanto riguarda le nuove accessioni della biblioteca locale e fuori linea, ad opportuni intervalli, per quanto riguarda le nuove accessioni delle altre biblioteche; - di cataloghi collettivi, gestiti dai sistemi Gopher/WAIS sulla macchina server destinata alla biblioteca di area, accessibili via rete geografica Internet. Per il futuro sistema informativo della biblioteca di area, sono state previste le seguenti soluzioni: - uso di istallazioni ISIS/DOS connessi in rete locale sia per le operazioni di gestione dei dati biblioteconomici; una di tali istallazioni costituira il "server" per il recupero delle informazioni da parte degli utenti connessi alla rete locale; - eventuale accesso da parte di utenti remoti al server ISIS via Internet; - accesso remote attraverso le funzionalita offerte dall'architettura clientserver del software Gopher e Wais. Nel presente lavoro e stata verificata la fattibilita di tale sistema operativo.Source: pp.1–15, 1994

See at: CNR ExploRA Open Access | puma.isti.cnr.it Open Access


1992 Other Open Access OPEN

Analizzatore di protocollo INTERVIEW 7200 guida rapida all'utilizzo
Gennai F., Lazzari P.
Abstract non disponibile

See at: CNR ExploRA Open Access


1991 Report Open Access OPEN

Guida al collegamento di terminali remoti al CNUCE
Miori Vittorio, Canino Domenico, Gennai Francesco
Manuale d'uso per guidare l'utente al collegamento ai mainframe residenti presso l'Istituto CNUCE del CNR, tramite terminali remoti.Source: ISTI Technical reports, 1991

See at: CNR ExploRA Open Access