Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Luisa Siniscalchi"'
Publikováno v:
IEEE Access, Vol 8, Pp 140497-140511 (2020)
Role-based access control (RBAC) is the most popular access control model currently adopted in several contexts to define security management. Constraints play a crucial role since they can drive the selection of the best representation of the organi
Externí odkaz:
https://doaj.org/article/ddc0354105d74a2ab8e02d37965af3b3
Publikováno v:
Advances in Cryptology – EUROCRYPT 2023 ISBN: 9783031306167
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a9f3d5962a579ed8906a8cd8d18c3dae
https://doi.org/10.1007/978-3-031-30617-4_5
https://doi.org/10.1007/978-3-031-30617-4_5
Publikováno v:
Blundo, C, Cimato, S & Siniscalchi, L 2022, ' Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints ', Computer Journal, vol. 65, no. 6, pp. 1386-1411 . https://doi.org/10.1093/comjnl/bxaa186
Role-based access control (RBAC) has become a de facto standard to control access to restricted resources in complex systems and is widely deployed in many commercially available applications, including operating systems, databases and other software
Publikováno v:
IEEE Access, Vol 8, Pp 140497-140511 (2020)
Blundo, C, Cimato, S & Siniscalchi, L 2020, ' Managing Constraints in Role Based Access Control ', IEEE Access, vol. 8, 9146129, pp. 140497-140511 . https://doi.org/10.1109/ACCESS.2020.3011310
Blundo, C, Cimato, S & Siniscalchi, L 2020, ' Managing Constraints in Role Based Access Control ', IEEE Access, vol. 8, 9146129, pp. 140497-140511 . https://doi.org/10.1109/ACCESS.2020.3011310
Role-based access control (RBAC) is the most popular access control model currently adopted in several contexts to define security management. Constraints play a crucial role since they can drive the selection of the best representation of the organi
Publikováno v:
Blundo, C, Cimato, S & Siniscalchi, L 2023, ' Heuristics for constrained role mining in the post-processing framework ', Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 8, pp. 9925-9937 . https://doi.org/10.1007/s12652-021-03648-1
Role mining techniques are frequently used to derive a set of roles representing the current organization of a company following the RBAC model and simplifying the definition and the implementation of security policies. Constraints on the resulting r
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e243c080b006c61facae6e75a46f083e
http://hdl.handle.net/11386/4779202
http://hdl.handle.net/11386/4779202
Publikováno v:
Aggarwal, D, Obremski, M, Ribeiro, J, Simkin, M & Siniscalchi, L 2022, ' Privacy Amplification with Tamperable Memory via Non-Malleable Two-Source Extractors ', IEEE Transactions on Information Theory, vol. 68, no. 8, pp. 5475-5495 . https://doi.org/10.1109/TIT.2022.3167404
We extend the classical problem of privacy amplification to a setting where the active adversary, Eve, is also allowed to fully corrupt the internal memory (which includes the shared randomness, and local randomness tape) of one of the honest parties
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::49c9a538342e67ee56f17e85ab27f673
https://pure.au.dk/portal/da/publications/privacy-amplification-with-tamperable-memory-via-nonmalleable-twosource-extractors(4ccb1507-e57e-46ff-bd90-05d461aea4f1).html
https://pure.au.dk/portal/da/publications/privacy-amplification-with-tamperable-memory-via-nonmalleable-twosource-extractors(4ccb1507-e57e-46ff-bd90-05d461aea4f1).html
Publikováno v:
Theory of Cryptography ISBN: 9783031223648
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ab31a8e8e44d51ffc69cbc3dac7ce717
https://doi.org/10.1007/978-3-031-22365-5_11
https://doi.org/10.1007/978-3-031-22365-5_11
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031147906
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::217037f95a5c1c8ad6d83292b0dc3900
https://doi.org/10.1007/978-3-031-14791-3_22
https://doi.org/10.1007/978-3-031-14791-3_22
Publikováno v:
Advances in Cryptology – EUROCRYPT 2022 ISBN: 9783031069437
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5e5a19cfcb6f2e9e6d3247c1016ea97c
https://doi.org/10.1007/978-3-031-06944-4_12
https://doi.org/10.1007/978-3-031-06944-4_12
Publikováno v:
Advances in Cryptology – CRYPTO 2021-41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part II
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2021
Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842444
CRYPTO (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – CRYPTO 2021
Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842444
CRYPTO (2)
This paper closes the question of the possibility of two-round MPC protocols achieving different security guarantees with and without the availability of broadcast in any given round. Cohen et al. [CGZ20] study this question in the dishonest majority