Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Masi, Massimiliano
Tiani “Spirit” GmbH
Vienna, Austria
 
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
   Highlighted
Follow this Reviewer
 
 
 

Massimiliano Masi started his career in computer science at the University of Florence. He earned his MS while working at the European Organization for Nuclear Research (CERN), in its information technology (IT) department, in 2006. In those years, CERN was focused on building the grid computing facility to process the data collected by its ambitious Large Hadron Collider (LHC): the Enabling Grids for E-sciencE (EGEE). There, Massimiliano had the opportunity to work with the first instances of high-performance computing by deeply understanding and developing its pioneering software tools—what we now refer to as “the cloud.”

Massimiliano obtained his PhD in theoretical computer science from the University of Florence, in 2012, where he applied formal methods to the cybersecurity of eHealth systems. His studies focused on the authentication and authorization aspects used to share electronic health records (EHRs), together with Tiani “Spirit” GmbH. Major findings became part of the international standard maintained by Integrating the Healthcare Enterprises (IHE), and some of the architectural integration profiles have also been mentioned by the European Union (EU) Commission Decision 2015/1302. Massimiliano’s EU-funded research and pre-procurement projects (epSOS, e-SENS) are now part of the architecture specifications for EHR sharing across Europe. He also contributed to IT architecture for eHealth projects in the US and Africa (especially Senegal and South Africa).

After spending more than ten years in eHealth, Massimiliano moved to standards development and Java-based mockups for cybersecurity in the smart grid and virtual power plant (VPP), by joining the Austrian-funded Integrating the Energy System (IES) project. As a natural continuation of this work, he now serves as an IT cybersecurity architect at Autostrade per L’Italia, where he is currently establishing cybersecurity services for smart roads (so-called cooperative intelligent transport systems) and securing industrial control systems deployed over 3300 kilometers of motorways.

Massimiliano’s research interests include enterprise architecture, models, formal methods, and cybersecurity. He is currently involved in standardization activities and is an active member of international technical committees. He plays bossa nova guitar and loves running.

 
 
Options:
Date Reviewed  
 
1
- 10 of 10 reviews

   
   Dynamic malware analysis in the modern era--a state of the art survey
Or-Meir O., Nissim N., Elovici Y., Rokach L. ACM Computing Surveys 52(5): 1-48, 2019.  Type: Article

Malware is a problem. Its spreading within industrial networks and critical infrastructures shows that there is an always increasing need for cybersecurity expertise to detect, protect, and react to infections. Unfortunately, analyzing...

May 14 2020  
   The use case and smart grid architecture model approach: the IEC 62559-2 use case template and the SGAM applied in various domains
Gottschalk M., Uslar M., Delfs C., Springer International Publishing, New York, NY, 2017. 93 pp.  Type: Book (978-3-319492-28-5)

Creating sustainable information technology (IT) software architectures is a complex task, which is sometimes left to the inspiration of the architect. Although several patterns exist (for example, service oriented, pipes and filters, ...

Dec 29 2017  
   Evaluating software architecture evaluation methods: an internal replication
Abrahão S., Insfran E.  EASE 2017 (Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering, Karlskrona, Sweden, Jun 15-16, 2017) 144-153, 2017.  Type: Proceedings

Software architecture plays a vital role in the development of products since it enables ex-ante analysis and tackles fundamentals early. In fact, starting the development of a software product with a no-architectural approach makes fu...

Jul 28 2017  
   iOS application security: the definitive guide for hackers and developers
Thiel D., No Starch Press, San Francisco, CA, 2016. 296 pp.  Type: Book (978-1-593276-01-0), Reviews: (2 of 2)

Smartphones and smartwatches are capable of leading us in any activity, from media display (for example, watching movies on YouTube) to healthcare applications (for example, fitness data, heartbeat measurement, estimation of body mass ...

Nov 18 2016  
   Rigorous modeling and analysis of interoperable medical devices
Mashkoor A., Sametinger J.  MSM 2016 (Proceedings of the Modeling and Simulation in Medicine Symposium, Pasadena, CA, Apr 3-6, 2016) 1-8, 2016.  Type: Proceedings, Reviews: (1 of 2)

With the advent of the electronic health record (EHR), the quality of patient care increased. Many hospitals are encouraging patients to voluntarily provide their own health status (patient health record, PHR) to be used by doctors whe...

Aug 18 2016  
   Pro JavaScript techniques (2nd ed.)
Resig J., Ferguson R., Paxton J., Apress, New York, NY, 2015. 204 pp.  Type: Book (978-1-430263-91-3)

I was excited to have this book in my hands. I had high expectations for a book whose target audience is professional JavaScript developers. Honestly, all of my expectations have been satisfied. This is not just another introduction to...

Oct 15 2015  
   Fundamentals of database indexing and searching
Bhattacharya A., Chapman & Hall/CRC, Boca Raton, FL, 2015. 280 pp.  Type: Book (978-1-466582-54-5)

Don’t judge a book by its cover. With this one, I had different expectations at first--I was expecting more of a recipe book, a practical set of how-tos to boost performance for my actual deployments....

Aug 18 2015  
   Break-Glass: handling exceptional situations in access control
Petritsch H., Springer Vieweg, Wiesbaden, Germany, 2014. 220 pp.  Type: Book (978-3-658073-64-0)

Although there are many different models available for expressing access control in information technology (IT) environments, emergency situations are usually handled in a way that is either complex to manage for the policy designer or...

Jan 29 2015  
   Formal definitions for usable access control rule sets from goals to metrics
Beckerle M., Martucci L.  SOUPS 2013 (Proceedings of the 9th Symposium on Usable Privacy and Security, Newcastle, UK, Jul 24-26, 2013) 1-11, 2013.  Type: Proceedings

The usability and manageability of access control policies in an attribute-based access control (ABAC) setting are the main focus of this paper. The authors aim to provide a scientific way to obtain a usable access control rule set.
May 28 2014  
   Secure and usable authentication on mobile devices
Schlöglhofer R., Sametinger J.  MoMM 2012 (Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, Bali, Indonesia, Dec 3-5, 2012) 257-262, 2012.  Type: Proceedings

SecureLock, an authentication mechanism for Android-based devices, is proposed and compared with existing solutions in this paper. It is a replacement for the Android lock screen and provides four methods of authentication: PIN, passwo...

Mar 15 2013  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy