A framework for the extended evaluation of ABAC policies
Morisset, Charles, Willemse, Tim A. C., Zannone, Nicola
Published in Cybersecurity (Singapore) (01.12.2019)
Published in Cybersecurity (Singapore) (01.12.2019)
Get full text
Journal Article
Editorial: 2021 editors' pick: Computer science
Lukowicz, Paul, Nijholt, Anton, Siddiqi, Kaleem, Pelillo, Marcello, Laerhoven, Kristof Van, Viganò, Luca, Zannone, Nicola
Published in Frontiers in computer science (Lausanne) (07.11.2022)
Published in Frontiers in computer science (Lausanne) (07.11.2022)
Get full text
Journal Article
Access control in Internet-of-Things: A survey
Ravidas, Sowmya, Lekidis, Alexios, Paci, Federica, Zannone, Nicola
Published in Journal of network and computer applications (15.10.2019)
Published in Journal of network and computer applications (15.10.2019)
Get full text
Journal Article
A survey on multi-factor authentication for online banking in the wild
Sinigaglia, Federico, Carbone, Roberto, Costa, Gabriele, Zannone, Nicola
Published in Computers & security (01.08.2020)
Published in Computers & security (01.08.2020)
Get full text
Journal Article
A reference model for reputation systems
Vavilis, Sokratis, Petković, Milan, Zannone, Nicola
Published in Decision Support Systems (01.05.2014)
Published in Decision Support Systems (01.05.2014)
Get full text
Journal Article
Privacy-preserving policy evaluation in multi-party access control
Sheikhalishahi, Mina, Stork, Ischa, Zannone, Nicola
Published in Journal of computer security (01.01.2021)
Published in Journal of computer security (01.01.2021)
Get full text
Journal Article
Formal analysis of XACML policies using SMT
Turkmen, Fatih, den Hartog, Jerry, Ranise, Silvio, Zannone, Nicola
Published in Computers & security (01.05.2017)
Published in Computers & security (01.05.2017)
Get full text
Journal Article
Discovering anomalous frequent patterns from partially ordered event logs
Genga, Laura, Alizadeh, Mahdi, Potena, Domenico, Diamantini, Claudia, Zannone, Nicola
Published in Journal of intelligent information systems (01.10.2018)
Published in Journal of intelligent information systems (01.10.2018)
Get full text
Journal Article