Sfoglia per Autore
Cryptographic Key Assignment Schemes for any Access Control Policy
2004-01-01 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Ideal Contrast Visual Cryptography Schemes with Reversing
2005-01-01 Cimato, S; De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Enforcing the Security of a Time-bound Hierarchical Key Assignment Scheme
2006-01-01 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
2006-01-01 Ateniese, G; De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Efficient Provably-Secure Hierarchical Key Assignment Schemes
2007-01-01 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
2008-01-01 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
An Attack on a Payment Scheme
2008-01-01 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants
2009-01-01 D'Arco, P; De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Practical Short Signature Batch Verification
2009-01-01 Ferrara, Anna Lisa; Green, M; Hohenberger, S; Pedersen, M.
Variations on a theme by Akl and Taylor: Security and tradeoffs
2010-01-01 D'Arco, P; De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Efficient provably-secure hierarchical key assignment schemes
2011-01-01 De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Security Analysis of Role-Based Access Control through Program Verification
2012-01-01 Ferrara, Anna Lisa; Madhusudan, P.; Parlato, G
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
2012-01-01 Ateniese, G; De Santis, A; Ferrara, Anna Lisa; Masucci, B.
Analyzing temporal role based access control models
2012-01-01 Emre, Uzun; Vijayalakshmi, Atluri; Shamik, Sural; Jaideep, Vaidya; Parlato, G; Ferrara, Anna Lisa; Parthasarathy, Madhusudan
Security Analysis of Role-Based Access Control through Program Verification
2012-01-01 Ferrara, Anna Lisa; Madhusudan, P; Parlato, G.
Analyzing temporal role based access control models
2012-01-01 Uzun, E; Atluri, V; Sural, S; Vaidya, J; Parlato, G; Ferrara, Anna Lisa; Madhusudan, P.
Cryptographically enforced RBAC
2013-01-01 Ferrara, Anna Lisa; Fuchsbauer, Georg; Warinschi, Bogdan
A note on time-bound hierarchical key assignment schemes
2013-01-01 Ateniese, Giuseppe; De Santis, Alfredo; Ferrara, Anna Lisa; Masucci, Barbara
Policy analysis for self-administrated role-based access control
2013-01-01 Ferrara, Anna Lisa; Madhusudan, P.; Parlato, Gennaro
Vac - Verifier of administrative role-based access control policies
2014-01-01 Ferrara, Anna Lisa; Madhusudan, P.; Nguyen, Truc L.; Parlato, Gennaro
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Cryptographic Key Assignment Schemes for any Access Control Policy | 1-gen-2004 | De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
Ideal Contrast Visual Cryptography Schemes with Reversing | 1-gen-2005 | Cimato, S; De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
Enforcing the Security of a Time-bound Hierarchical Key Assignment Scheme | 1-gen-2006 | De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes | 1-gen-2006 | Ateniese, G; De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
Efficient Provably-Secure Hierarchical Key Assignment Schemes | 1-gen-2007 | De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes | 1-gen-2008 | De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
An Attack on a Payment Scheme | 1-gen-2008 | De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants | 1-gen-2009 | D'Arco, P; De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
Practical Short Signature Batch Verification | 1-gen-2009 | Ferrara, Anna Lisa; Green, M; Hohenberger, S; Pedersen, M. | |
Variations on a theme by Akl and Taylor: Security and tradeoffs | 1-gen-2010 | D'Arco, P; De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
Efficient provably-secure hierarchical key assignment schemes | 1-gen-2011 | De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
Security Analysis of Role-Based Access Control through Program Verification | 1-gen-2012 | Ferrara, Anna Lisa; Madhusudan, P.; Parlato, G | |
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes | 1-gen-2012 | Ateniese, G; De Santis, A; Ferrara, Anna Lisa; Masucci, B. | |
Analyzing temporal role based access control models | 1-gen-2012 | Emre, Uzun; Vijayalakshmi, Atluri; Shamik, Sural; Jaideep, Vaidya; Parlato, G; Ferrara, Anna Lisa; Parthasarathy, Madhusudan | |
Security Analysis of Role-Based Access Control through Program Verification | 1-gen-2012 | Ferrara, Anna Lisa; Madhusudan, P; Parlato, G. | |
Analyzing temporal role based access control models | 1-gen-2012 | Uzun, E; Atluri, V; Sural, S; Vaidya, J; Parlato, G; Ferrara, Anna Lisa; Madhusudan, P. | |
Cryptographically enforced RBAC | 1-gen-2013 | Ferrara, Anna Lisa; Fuchsbauer, Georg; Warinschi, Bogdan | |
A note on time-bound hierarchical key assignment schemes | 1-gen-2013 | Ateniese, Giuseppe; De Santis, Alfredo; Ferrara, Anna Lisa; Masucci, Barbara | |
Policy analysis for self-administrated role-based access control | 1-gen-2013 | Ferrara, Anna Lisa; Madhusudan, P.; Parlato, Gennaro | |
Vac - Verifier of administrative role-based access control policies | 1-gen-2014 | Ferrara, Anna Lisa; Madhusudan, P.; Nguyen, Truc L.; Parlato, Gennaro |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile