Zobrazeno 1 - 10
of 126
pro vyhledávání: '"Stelvio Cimato"'
Publikováno v:
IEEE Access, Vol 8, Pp 140497-140511 (2020)
Role-based access control (RBAC) is the most popular access control model currently adopted in several contexts to define security management. Constraints play a crucial role since they can drive the selection of the best representation of the organi
Externí odkaz:
https://doaj.org/article/ddc0354105d74a2ab8e02d37965af3b3
Publikováno v:
IEEE Transactions on Computers. 71:2927-2939
Background: Genetic information are the most sensitive data for a person and must be protected from malicious attacks. In this paper we focus on the application of secure multi-party computation, a subfield of cryptography, to the computation of edit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0b6e0c2e0585b15d845726f81e627317
https://doi.org/10.21203/rs.3.rs-2176027/v1
https://doi.org/10.21203/rs.3.rs-2176027/v1
Autor:
Lionel Brunie, Sonia Ben Mokhtar, Dorothée Brac de la Perrière, Damien Fabrègue, Laëtitia Tondu, Amélie Cordier, Virginie Delplanque, Alizée Bertrand, Ophélie Coueffe, Harald Kosch, Ernesto Damiani, Stelvio Cimato, Imad Alex Awada, Andrei Olaru, Roland Wossidlo, Giampaolo Fiorentino, Leandro Lombardo, Francesco Saverio Nucci, Oana Cramariuc
Publikováno v:
EDULEARN Proceedings.
Autor:
Lionel Brunie, Sonia Ben Mokhtar, Dorothée Brac de la Perrière, Damien Fabrègue, Laetitia Tondu, Amelie Cordier, Virginie Delplanque, Alizee Bertrand, Ophelie Coueffe, Harald Kosch, Ernesto Damiani, Stelvio Cimato, Imad Alex Awada, Andrei Olaru, Roland Wossidlo, Giampaolo Fiorentino, Leandro Lombardo, Francesco Saverio Nucci, Oana Cramariuc
Publikováno v:
EDULEARN Proceedings.
Publikováno v:
Blundo, C, Cimato, S & Siniscalchi, L 2022, ' Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints ', Computer Journal, vol. 65, no. 6, pp. 1386-1411 . https://doi.org/10.1093/comjnl/bxaa186
Role-based access control (RBAC) has become a de facto standard to control access to restricted resources in complex systems and is widely deployed in many commercially available applications, including operating systems, databases and other software
Publikováno v:
Journal of Real-Time Image Processing. 17:1-5
Publikováno v:
IEEE Access, Vol 8, Pp 140497-140511 (2020)
Blundo, C, Cimato, S & Siniscalchi, L 2020, ' Managing Constraints in Role Based Access Control ', IEEE Access, vol. 8, 9146129, pp. 140497-140511 . https://doi.org/10.1109/ACCESS.2020.3011310
Blundo, C, Cimato, S & Siniscalchi, L 2020, ' Managing Constraints in Role Based Access Control ', IEEE Access, vol. 8, 9146129, pp. 140497-140511 . https://doi.org/10.1109/ACCESS.2020.3011310
Role-based access control (RBAC) is the most popular access control model currently adopted in several contexts to define security management. Constraints play a crucial role since they can drive the selection of the best representation of the organi
Publikováno v:
Blundo, C, Cimato, S & Siniscalchi, L 2023, ' Heuristics for constrained role mining in the post-processing framework ', Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 8, pp. 9925-9937 . https://doi.org/10.1007/s12652-021-03648-1
Role mining techniques are frequently used to derive a set of roles representing the current organization of a company following the RBAC model and simplifying the definition and the implementation of security policies. Constraints on the resulting r
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e243c080b006c61facae6e75a46f083e
http://hdl.handle.net/11386/4779202
http://hdl.handle.net/11386/4779202