|
|
|
|
| Massimiliano Masi started his career in computer science at the University of Florence. He earned his MS while working at the European Organization for Nuclear Research (CERN), in its information technology (IT) department, in 2006. In those years, CERN was focused on building the grid computing facility to process the data collected by its ambitious Large Hadron Collider (LHC): the Enabling Grids for E-sciencE (EGEE). There, Massimiliano had the opportunity to work with the first instances of high-performance computing by deeply understanding and developing its pioneering software tools—what we now refer to as “the cloud.”
Massimiliano obtained his PhD in theoretical computer science from the University of Florence, in 2012, where he applied formal methods to the cybersecurity of eHealth systems. His studies focused on the authentication and authorization aspects used to share electronic health records (EHRs), together with Tiani “Spirit” GmbH. Major findings became part of the international standard maintained by Integrating the Healthcare Enterprises (IHE), and some of the architectural integration profiles have also been mentioned by the European Union (EU) Commission Decision 2015/1302. Massimiliano’s EU-funded research and pre-procurement projects (epSOS, e-SENS) are now part of the architecture specifications for EHR sharing across Europe. He also contributed to IT architecture for eHealth projects in the US and Africa (especially Senegal and South Africa).
After spending more than ten years in eHealth, Massimiliano moved to standards development and Java-based mockups for cybersecurity in the smart grid and virtual power plant (VPP), by joining the Austrian-funded Integrating the Energy System (IES) project. As a natural continuation of this work, he now serves as an IT cybersecurity architect at Autostrade per L’Italia, where he is currently establishing cybersecurity services for smart roads (so-called cooperative intelligent transport systems) and securing industrial control systems deployed over 3300 kilometers of motorways.
Massimiliano’s research interests include enterprise architecture, models, formal methods, and cybersecurity. He is currently involved in standardization activities and is an active member of international technical committees. He plays bossa nova guitar and loves running. |
|
|
|
Date Reviewed |
|
|
1 - 10 of 10
reviews
|
|
|
|
|
|
|
|
Dynamic malware analysis in the modern era--a state of the art survey Or-Meir O., Nissim N., Elovici Y., Rokach L. ACM Computing Surveys 52(5): 1-48, 2019. Type: Article
Malware is a problem. Its spreading within industrial networks and critical infrastructures shows that there is an always increasing need for cybersecurity expertise to detect, protect, and react to infections. Unfortunately, analyzing...
|
May 14 2020 |
|
|
|
|
|
|
The use case and smart grid architecture model approach: the IEC 62559-2 use case template and the SGAM applied in various domains Gottschalk M., Uslar M., Delfs C., Springer International Publishing, New York, NY, 2017. 93 pp. Type: Book (978-3-319492-28-5)
Creating sustainable information technology (IT) software architectures is a complex task, which is sometimes left to the inspiration of the architect. Although several patterns exist (for example, service oriented, pipes and filters, ...
|
Dec 29 2017 |
|
|
|
|
|
|
Evaluating software architecture evaluation methods: an internal replication Abrahão S., Insfran E. EASE 2017 (Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering, Karlskrona, Sweden, Jun 15-16, 2017) 144-153, 2017. Type: Proceedings
Software architecture plays a vital role in the development of products since it enables ex-ante analysis and tackles fundamentals early. In fact, starting the development of a software product with a no-architectural approach makes fu...
|
Jul 28 2017 |
|
|
|
|
|
|
iOS application security: the definitive guide for hackers and developers Thiel D., No Starch Press, San Francisco, CA, 2016. 296 pp. Type: Book (978-1-593276-01-0), Reviews: (2 of 2)
Smartphones and smartwatches are capable of leading us in any activity, from media display (for example, watching movies on YouTube) to healthcare applications (for example, fitness data, heartbeat measurement, estimation of body mass ...
|
Nov 18 2016 |
|
|
|
|
|
|
Rigorous modeling and analysis of interoperable medical devices Mashkoor A., Sametinger J. MSM 2016 (Proceedings of the Modeling and Simulation in Medicine Symposium, Pasadena, CA, Apr 3-6, 2016) 1-8, 2016. Type: Proceedings, Reviews: (1 of 2)
With the advent of the electronic health record (EHR), the quality of patient care increased. Many hospitals are encouraging patients to voluntarily provide their own health status (patient health record, PHR) to be used by doctors whe...
|
Aug 18 2016 |
|
|
|
|
|
|
Pro JavaScript techniques (2nd ed.) Resig J., Ferguson R., Paxton J., Apress, New York, NY, 2015. 204 pp. Type: Book (978-1-430263-91-3)
I was excited to have this book in my hands. I had high expectations for a book whose target audience is professional JavaScript developers. Honestly, all of my expectations have been satisfied. This is not just another introduction to...
|
Oct 15 2015 |
|
|
|
|
|
|
Fundamentals of database indexing and searching Bhattacharya A., Chapman & Hall/CRC, Boca Raton, FL, 2015. 280 pp. Type: Book (978-1-466582-54-5)
Don’t judge a book by its cover. With this one, I had different expectations at first--I was expecting more of a recipe book, a practical set of how-tos to boost performance for my actual deployments....
|
Aug 18 2015 |
|
|
|
|
|
|
Break-Glass: handling exceptional situations in access control Petritsch H., Springer Vieweg, Wiesbaden, Germany, 2014. 220 pp. Type: Book (978-3-658073-64-0)
Although there are many different models available for expressing access control in information technology (IT) environments, emergency situations are usually handled in a way that is either complex to manage for the policy designer or...
|
Jan 29 2015 |
|
|
|
|
|
|
Formal definitions for usable access control rule sets from goals to metrics Beckerle M., Martucci L. SOUPS 2013 (Proceedings of the 9th Symposium on Usable Privacy and Security, Newcastle, UK, Jul 24-26, 2013) 1-11, 2013. Type: Proceedings
The usability and manageability of access control policies in an attribute-based access control (ABAC) setting are the main focus of this paper. The authors aim to provide a scientific way to obtain a usable access control rule set.
|
May 28 2014 |
|
|
|
|
|
|
Secure and usable authentication on mobile devices Schlöglhofer R., Sametinger J. MoMM 2012 (Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, Bali, Indonesia, Dec 3-5, 2012) 257-262, 2012. Type: Proceedings
SecureLock, an authentication mechanism for Android-based devices, is proposed and compared with existing solutions in this paper. It is a replacement for the Android lock screen and provides four methods of authentication: PIN, passwo...
|
Mar 15 2013 |
|
|
|
|
|
|
|
|
|
|
|