Obserwuj
Anna Lisa Ferrara
Anna Lisa Ferrara
Zweryfikowany adres z unimol.it
Tytuł
Cytowane przez
Cytowane przez
Rok
Practical short signature batch verification
AL Ferrara, M Green, S Hohenberger, MØ Pedersen
Topics in Cryptology–CT-RSA 2009: The Cryptographers’ Track at the RSA …, 2009
2752009
Provably-secure time-bound hierarchical key assignment schemes
G Ateniese, A De Santis, AL Ferrara, B Masucci
Proceedings of the 13th ACM conference on Computer and communications …, 2006
1982006
Ideal contrast visual cryptography schemes with reversing
S Cimato, A De Santis, AL Ferrara, B Masucci
Information Processing Letters 93 (4), 199-206, 2005
1322005
A simple algorithm for the constrained sequence problems
FYL Chin, A De Santis, AL Ferrara, NL Ho, SK Kim
Information Processing Letters 90 (4), 175-179, 2004
1222004
Cryptographic key assignment schemes for any access control policy
A De Santis, AL Ferrara, B Masucci
Information Processing Letters 92 (4), 199-205, 2004
602004
New constructions for provably-secure time-bound hierarchical key assignment schemes
A De Santis, AL Ferrara, B Masucci
Proceedings of the 12th ACM symposium on Access control models and …, 2007
502007
Analyzing temporal role based access control models
E Uzun, V Atluri, S Sural, J Vaidya, G Parlato, AL Ferrara, M Parthasarathy
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
472012
Enforcing the security of a time-bound hierarchical key assignment scheme
A De Santis, AL Ferrara, B Masucci
Information Sciences 176 (12), 1684-1694, 2006
472006
Efficient provably-secure hierarchical key assignment schemes
A De Santis, AL Ferrara, B Masucci
International Symposium on Mathematical Foundations of Computer Science, 371-382, 2007
432007
Policy analysis for self-administrated role-based access control
AL Ferrara, P Madhusudan, G Parlato
Tools and Algorithms for the Construction and Analysis of Systems: 19th …, 2013
382013
Security analysis of role-based access control through program verification
AL Ferrara, P Madhusudan, G Parlato
2012 IEEE 25th Computer Security Foundations Symposium, 113-125, 2012
38*2012
Unconditionally secure key assignment schemes
A De Santis, AL Ferrara, B Masucci
Discrete applied mathematics 154 (2), 234-252, 2006
352006
Cryptographically enforced RBAC
AL Ferrara, G Fuchsbauer, B Warinschi
2013 IEEE 26th Computer Security Foundations Symposium, 115-129, 2013
342013
Variations on a theme by Akl and Taylor: Security and tradeoffs
P D’Arco, A De Santis, AL Ferrara, B Masucci
Theoretical Computer Science 411 (1), 213-227, 2010
342010
Efficient provably-secure hierarchical key assignment schemes
A De Santis, AL Ferrara, B Masucci
Theoretical Computer Science 412 (41), 5684-5699, 2011
312011
Vac - Verifier of Administrative Role-Based Access Control Policies
AL Ferrara, P Madhusudan, TL Nguyen, G Parlato
Computer Aided Verification: 26th International Conference, CAV 2014, Held …, 2014
252014
An information-theoretic approach to the access control problem
AL Ferrara, B Masucci
Theoretical Computer Science: 8th Italian Conference, ICTCS 2003, Bertinoro …, 2003
242003
Security analysis for temporal role based access control
E Uzun, V Atluri, J Vaidya, S Sural, AL Ferrara, G Parlato, P Madhusudan
Journal of computer security 22 (6), 961-996, 2014
222014
Policy privacy in cryptographic access control
AL Ferrara, G Fachsbauer, B Liu, B Warinschi
2015 IEEE 28th Computer Security Foundations Symposium, 46-60, 2015
192015
A note on time-bound hierarchical key assignment schemes
G Ateniese, A De Santis, AL Ferrara, B Masucci
Information Processing Letters 113 (5), 151-155, 2013
122013
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20