Sfoglia per Autore  

Opzioni
Mostrati risultati da 1 a 20 di 28
Titolo Data di pubblicazione Autore(i) File
Cryptographic Key Assignment Schemes for any Access Control Policy 1-gen-2004 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Ideal Contrast Visual Cryptography Schemes with Reversing 1-gen-2005 Cimato, S; De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Enforcing the Security of a Time-bound Hierarchical Key Assignment Scheme 1-gen-2006 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 1-gen-2006 Ateniese, G; De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Efficient Provably-Secure Hierarchical Key Assignment Schemes 1-gen-2007 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 1-gen-2008 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
An Attack on a Payment Scheme 1-gen-2008 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants 1-gen-2009 D'Arco, P; De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Practical Short Signature Batch Verification 1-gen-2009 Ferrara, Anna Lisa; Green, M; Hohenberger, S; Pedersen, M.
Variations on a theme by Akl and Taylor: Security and tradeoffs 1-gen-2010 D'Arco, P; De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Efficient provably-secure hierarchical key assignment schemes 1-gen-2011 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Security Analysis of Role-Based Access Control through Program Verification 1-gen-2012 Ferrara, Anna Lisa; Madhusudan, P.; Parlato, G
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes 1-gen-2012 Ateniese, G; De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Analyzing temporal role based access control models 1-gen-2012 Emre, Uzun; Vijayalakshmi, Atluri; Shamik, Sural; Jaideep, Vaidya; Parlato, G; Ferrara, Anna Lisa; Parthasarathy, Madhusudan
Security Analysis of Role-Based Access Control through Program Verification 1-gen-2012 Ferrara, Anna Lisa; Madhusudan, P; Parlato, G.
Analyzing temporal role based access control models 1-gen-2012 Uzun, E; Atluri, V; Sural, S; Vaidya, J; Parlato, G; Ferrara, Anna Lisa; Madhusudan, P.
Cryptographically enforced RBAC 1-gen-2013 Ferrara, Anna Lisa; Fuchsbauer, Georg; Warinschi, Bogdan
A note on time-bound hierarchical key assignment schemes 1-gen-2013 Ateniese, Giuseppe; De Santis, Alfredo; Ferrara, Anna Lisa; Masucci, Barbara
Policy analysis for self-administrated role-based access control 1-gen-2013 Ferrara, Anna Lisa; Madhusudan, P.; Parlato, Gennaro
Vac - Verifier of administrative role-based access control policies 1-gen-2014 Ferrara, Anna Lisa; Madhusudan, P.; Nguyen, Truc L.; Parlato, Gennaro
Mostrati risultati da 1 a 20 di 28
Legenda icone

  •  file ad accesso aperto
  •  file disponibili sulla rete interna
  •  file disponibili agli utenti autorizzati
  •  file disponibili solo agli amministratori
  •  file sotto embargo
  •  nessun file disponibile