Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Masi, Massimiliano
Tiani “Spirit” GmbH
Vienna, Austria
   Featured Reviewer
   Reader Recommended
   Reviewer Selected
Follow this Reviewer

Massimiliano Masi started his career in computer science at the University of Florence. He earned his MS while working at the European Organization for Nuclear Research (CERN), in its information technology (IT) department, in 2006. In those years, CERN was focused on building the grid computing facility to process the data collected by its ambitious Large Hadron Collider (LHC): the Enabling Grids for E-sciencE (EGEE). There, Massimiliano had the opportunity to work with the first instances of high-performance computing by deeply understanding and developing its pioneering software tools—what we now refer to as “the cloud.”

Massimiliano obtained his PhD in theoretical computer science from the University of Florence, in 2012, where he applied formal methods to the cybersecurity of eHealth systems. His studies focused on the authentication and authorization aspects used to share electronic health records (EHRs), together with Tiani “Spirit” GmbH. Major findings became part of the international standard maintained by Integrating the Healthcare Enterprises (IHE), and some of the architectural integration profiles have also been mentioned by the European Union (EU) Commission Decision 2015/1302. Massimiliano’s EU-funded research and pre-procurement projects (epSOS, e-SENS) are now part of the architecture specifications for EHR sharing across Europe. He also contributed to IT architecture for eHealth projects in the US and Africa (especially Senegal and South Africa).

After spending more than ten years in eHealth, Massimiliano moved to standards development and Java-based mockups for cybersecurity in the smart grid and virtual power plant (VPP), by joining the Austrian-funded Integrating the Energy System (IES) project. As a natural continuation of this work, he now serves as an IT cybersecurity architect at Autostrade per L’Italia, where he is currently establishing cybersecurity services for smart roads (so-called cooperative intelligent transport systems) and securing industrial control systems deployed over 3300 kilometers of motorways.

Massimiliano’s research interests include enterprise architecture, models, formal methods, and cybersecurity. He is currently involved in standardization activities and is an active member of international technical committees. He plays bossa nova guitar and loves running.

Date Reviewed  
- 10 of 44 reviews

  Edge intelligence: concepts, architectures, applications and future directions
Mendez J., Bierzynski K., Cuéllar M., Morales D. ACM Transactions on Embedded Computing Systems 1(1): 1-38, 2022.  Type: Article

Nowadays, cyber-physical systems are omnipresent. Internet of Things (IoT) devices give physical sensing to computers. However, they also pose serious architectural challenges due to a number of reasons: they usually have different (and limited) c...

Dec 28 2022  
   Internet of Things: concepts and system design
Milenkovic M., Springer International Publishing, New York, NY, 2020. 315 pp.  Type: Book (978-3-030413-45-3)

The Internet of Things (IoT) is a paradigm shift. With computers growing from workstations to powerful cloud systems capable of performing huge operations, the IoT has given to such systems the feeling of the physical world. Attaching ...

Nov 16 2021  
   Carl Adam Petri: ideas, personality, impact
Reisig W., Rozenberg G., Springer International Publishing, New York, NY, 2019. 249 pp.  Type: Book (978-3-319961-53-8)

Every computer scientist studies Petri nets in their early academic years. Petri nets are a powerful yet very intuitive modeling tool for concurrent and distributed systems. Such networks were introduced by Carl Adam Petri (1926-2010) ...

Mar 25 2021  
   Dynamic malware analysis in the modern era--a state of the art survey
Or-Meir O., Nissim N., Elovici Y., Rokach L. ACM Computing Surveys 52(5): 1-48, 2019.  Type: Article

Malware is a problem. Its spreading within industrial networks and critical infrastructures shows that there is an always increasing need for cybersecurity expertise to detect, protect, and react to infections. Unfortunately, analyzing...

May 14 2020  
  Optimization of diagnosis and treatment of chronic diseases based on association analysis under the background of regional integration
Xia K., Zhong X., Zhang L., Wang J. Journal of Medical Systems 43(3): 1-8, 2019.  Type: Article

Digitized clinical data analysis can help to improve patient care and increase medical quality in regional clinical systems. Specifically, it enables population health queries and clinical research and improves clinical processes throu...

Mar 3 2020  
  Challenges of privacy-preserving machine learning in IoT
Zheng M., Xu D., Jiang L., Gu C., Tan R., Cheng P.  AIChallengeIoT 2019 (Proceedings of the First International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things, New York, NY, Nov 10-13, 2019) 1-7, 2019.  Type: Proceedings

The widespread adoption of Internet of Things (IoT) devices has made available a huge amount of data, thus enabling the development of applications that use machine learning (ML) to gather and dig up information, even from a user&#...

Feb 3 2020  
  Automatic software repair: a bibliography
Monperrus M. ACM Computing Surveys 51(1): 1-24, 2018.  Type: Article, Reviews: (2 of 2)

There is a well-known saying in Silicon Valley about the omnipresence of programmable computers in our everyday life: software is eating the world, but unfortunately each bite comes with bugs. Such software can even be a threat to user...

Nov 13 2019  
  ContractFuzzer: fuzzing smart contracts for vulnerability detection
Jiang B., Liu Y., Chan W.  ASE 2018 (Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, Montpellier, France, Sep 3-7, 2018) 259-269, 2018.  Type: Proceedings

Many fields exploit blockchain technology, including those related to human and life sciences, supply chains, and clinical research. However, especially in the past couple years (namely 2017), almost all transactions running on public ...

Oct 11 2019  
  Empirically-based secure OS design
Weber S., Shostack A., Solworth J., Zurko M.  NSPW 2017 (Proceedings of the 2017 New Security Paradigms Workshop, Santa Cruz, CA, Oct 1-4, 2017) 90-93, 2017.  Type: Proceedings

In this New Security Paradigms Workshop (NSPW) panel, four people discuss research methods and the actual meaning of a secure operating system (OS)....

Jun 13 2019  
  Mending the patchwork of requirements from multiple standards using participative goal modelling: a case in the food industry
Barata J., Cunha P. Requirements Engineering 23(4): 425-441, 2018.  Type: Article

It is a truth, especially in Europe and the US, that with the emergence of new regulations such as eIDAS (EU 910/2014), the General Data Protection Regulation (GDPR, EU 679/2016), and the Health Insurance Portability and Accountability...

Jan 18 2019  
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy