Sfoglia per Autore
Security analysis for temporal role based access control
2014-01-01 Uzun, Emre; Atluri, Vijayalakshmi; Vaidya, Jaideep; Sural, Shamik; Ferrara, Anna Lisa; Parlato, Gennaro; Madhusudan, P.
Policy Privacy in Cryptographic Access Control
2015-01-01 Ferrara, Anna Lisa; Fachsbauer, Georg; Liu, Bin; Warinschi, Bogdan
Toward group-based user-attribute policies in azure-like access control systems
2017-01-01 Ferrara, Anna Lisa; Squicciarini, Anna; Liao, Cong; Nguyen, Truc L.
Preventing unauthorized data flows
2017-01-01 Uzun, Emre; Parlato, Gennaro; Atluri, Vijayalakshmi; Ferrara, Anna Lisa; Vaidya, Jaideep; Sural, Shamik; Lorenzi, David
Visual cryptography schemes with reversing
2017-01-01 De Santis, Alfredo; Ferrara, Anna Lisa; Masucci, Barbara
Fuzzy-based approach to assess and prioritize privacy risks
2020-01-01 Hart, S.; Ferrara, A. L.; Paci, F.
Verifiable Hierarchical Key Assignment Schemes
2021-01-01 Ferrara, A. L.; Paci, F.; Ricciardi, C.
Security Analysis of Access Control Policies for Smart Homes
2023-01-01 Cimorelli Belfiore, Roberta; Ferrara, Anna Lisa
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Security analysis for temporal role based access control | 1-gen-2014 | Uzun, Emre; Atluri, Vijayalakshmi; Vaidya, Jaideep; Sural, Shamik; Ferrara, Anna Lisa; Parlato, Gennaro; Madhusudan, P. | |
Policy Privacy in Cryptographic Access Control | 1-gen-2015 | Ferrara, Anna Lisa; Fachsbauer, Georg; Liu, Bin; Warinschi, Bogdan | |
Toward group-based user-attribute policies in azure-like access control systems | 1-gen-2017 | Ferrara, Anna Lisa; Squicciarini, Anna; Liao, Cong; Nguyen, Truc L. | |
Preventing unauthorized data flows | 1-gen-2017 | Uzun, Emre; Parlato, Gennaro; Atluri, Vijayalakshmi; Ferrara, Anna Lisa; Vaidya, Jaideep; Sural, Shamik; Lorenzi, David | |
Visual cryptography schemes with reversing | 1-gen-2017 | De Santis, Alfredo; Ferrara, Anna Lisa; Masucci, Barbara | |
Fuzzy-based approach to assess and prioritize privacy risks | 1-gen-2020 | Hart, S.; Ferrara, A. L.; Paci, F. | |
Verifiable Hierarchical Key Assignment Schemes | 1-gen-2021 | Ferrara, A. L.; Paci, F.; Ricciardi, C. | |
Security Analysis of Access Control Policies for Smart Homes | 1-gen-2023 | Cimorelli Belfiore, Roberta; Ferrara, Anna Lisa |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile