Anna Lisa Ferrara

Orcid: 0000-0002-1026-5729

According to our database1, Anna Lisa Ferrara authored at least 32 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Provably-Secure One-Message Unilateral Entity Authentication Schemes.
IEEE Trans. Dependable Secur. Comput., 2024

Hierarchical Key Assignment Schemes with Key Rotation.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

Identity-Based Matchmaking Encryption from Standard Lattice Assumptions.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Security Analysis of Access Control Policies for Smart Homes.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

2021
Verifiable Hierarchical Key Assignment Schemes.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

2020
Fuzzy-based approach to assess and prioritize privacy risks.
Soft Comput., 2020

Verifiable Hierarchical Key Assignment Schemes.
IACR Cryptol. ePrint Arch., 2020

2017
Preventing Unauthorized Data Flows.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Toward Group-Based User-Attribute Policies in Azure-Like Access Control Systems.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

2015
Policy Privacy in Cryptographic Access Control.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
Security analysis for temporal role based access control.
J. Comput. Secur., 2014

Vac - Verifier of Administrative Role-Based Access Control Policies.
Proceedings of the Computer Aided Verification - 26th International Conference, 2014

2013
A note on time-bound hierarchical key assignment schemes.
Inf. Process. Lett., 2013

Cryptographically Enforced RBAC.
IACR Cryptol. ePrint Arch., 2013

Policy Analysis for Self-administrated Role-Based Access Control.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2013

2012
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes.
J. Cryptol., 2012

Analyzing temporal role based access control models.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Security Analysis of Role-Based Access Control through Program Verification.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

2011
Efficient provably-secure hierarchical key assignment schemes.
Theor. Comput. Sci., 2011

2010
Variations on a theme by Akl and Taylor: Security and tradeoffs.
Theor. Comput. Sci., 2010

2009
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants.
Proceedings of the Mathematical Foundations of Computer Science 2009, 2009

2008
New constructions for provably-secure time-bound hierarchical key assignment schemes.
Theor. Comput. Sci., 2008

An attack on a payment scheme.
Inf. Sci., 2008

Practical Short Signature Batch Verification.
IACR Cryptol. ePrint Arch., 2008

2006
Enforcing the security of a time-bound hierarchical key assignment scheme.
Inf. Sci., 2006

Unconditionally secure key assignment schemes.
Discret. Appl. Math., 2006

2005
Ideal contrast visual cryptography schemes with reversing.
Inf. Process. Lett., 2005

A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy.
Proceedings of the Coding and Cryptography, International Workshop, 2005

2004
Cryptographic key assignment schemes for any access control policy.
Inf. Process. Lett., 2004

A simple algorithm for the constrained sequence problems.
Inf. Process. Lett., 2004

2003
Modeling A Certified Email Protocol using I/O Automata.
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003

An Information-Theoretic Approach to the Access Control Problem.
Proceedings of the Theoretical Computer Science, 8th Italian Conference, 2003


  Loading...