Clara Bertolissi
Orcid: 0000-0001-9283-1386
According to our database1,
Clara Bertolissi
authored at least 35 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Proceedings of the Logic-Based Program Synthesis and Transformation, 2024
2023
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
2022
Modular Composition of Access Control Policies: A Framework to Build Multi-Site Multi-Level Combinations.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Formal methods applied to access control policy design, verification and enforcement.
, 2022
2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
2018
Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
2016
Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, 2016
2015
Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies.
Proceedings of the SECRYPT 2015, 2015
Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
A metamodel of access control for distributed environments: Applications and properties.
Inf. Comput., 2014
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014
2013
Proceedings of the 7th Workshop on Programming languages meets program verification, 2013
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Verification of Composed Array-Based Systems with Applications to Security-Aware Workflows.
Proceedings of the Frontiers of Combining Systems, 2013
2010
Proceedings of the Recent Trends in Algebraic Development Techniques, 2010
Proceedings of the Security and Trust Management - 6th International Workshop, 2010
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010
2009
2008
Proceedings of the Third International Workshop on Security and Rewriting Techniques, 2008
Proceedings of the 10th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2008
Proceedings of the NTMS 2008, 2008
Proceedings of the CRiSIS '08, 2008
2007
Proceedings of the 7th International Workshop on Reduction Strategies in Rewriting and Programming, 2007
Proceedings of the Foundations of Software Science and Computational Structures, 2007
Proceedings of the Data and Applications Security XXI, 2007
2006
High. Order Symb. Comput., 2006
2005
PhD thesis, 2005
Proceedings of the Theoretical Computer Science, 9th Italian Conference, 2005
2004
Proceedings of the 2nd International Workshop on Term Graph Rewriting, 2004
2003
Proceedings of the 4th International Workshop on Rule-Based Programming, 2003