Zobrazeno 1 - 10
of 205
pro vyhledávání: '"RANISE, SILVIO"'
The rapid evolution of Large Language Models (LLMs) has unlocked new possibilities for applying artificial intelligence across a wide range of fields, including privacy engineering. As modern applications increasingly handle sensitive user data, safe
Externí odkaz:
http://arxiv.org/abs/2410.08755
Autor:
Mollaeefar, Majid, Ranise, Silvio
Cybersecurity risk management consists of several steps including the selection of appropriate controls to minimize risks. This is a difficult task that requires to search through all possible subsets of a set of available controls and identify those
Externí odkaz:
http://arxiv.org/abs/2207.07385
Autor:
Flamini, Andrea, Sciarretta, Giada, Scuro, Mario, Sharif, Amir, Tomasi, Alessandro, Ranise, Silvio
Publikováno v:
In Journal of Information Security and Applications June 2024 83
Publikováno v:
2019 IEEE Global Conference on Internet of Things (GCIoT), Dubai, United Arab Emirates, 2019, pp. 1-5
The design of access control mechanisms for healthcare systems is challenging: it must strike the right balance between permissions and restrictions. In this work, we propose a novel approach that is based on the Blockchain technology for storage pat
Externí odkaz:
http://arxiv.org/abs/1908.04613
Autor:
Mollaeefar, Majid, Ranise, Silvio
Publikováno v:
In Computers & Security June 2023 129
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Remote attestation protocols are widely used to detect device configuration (e.g., software and/or data) compromise in Internet of Things (IoT) scenarios. Unfortunately, the performances of such protocols are unsatisfactory when dealing with thousand
Externí odkaz:
http://arxiv.org/abs/1806.05766
Workflows specify collections of tasks that must be executed under the responsibility or supervision of human users. Workflow management systems and workflow-driven applications need to enforce security policies in the form of access control, specify
Externí odkaz:
http://arxiv.org/abs/1706.07205
Publikováno v:
In Journal of Information Security and Applications March 2022 65