Clara Bertolissi

Orcid: 0000-0001-9283-1386

According to our database1, Clara Bertolissi authored at least 35 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Solving Access Control Conflicts in Multi-User Systems.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

A Bargaining-Game Framework for Multi-Party Access Control.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

An Axiomatic Category-Based Access Control Model for Smart Homes.
Proceedings of the Logic-Based Program Synthesis and Transformation, 2024

2023
Data Sharing in Social Networks.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

2022
Modular Composition of Access Control Policies: A Framework to Build Multi-Site Multi-Level Combinations.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Formal methods applied to access control policy design, verification and enforcement.
, 2022

2021
Graph-Based Specification of Admin-CBAC Policies.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
Admin-CBAC: An Administration Model for Category-Based Access Control.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
Using Provenance for Secure Data Fusion in Cooperative Systems.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

2018
Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

2017
Enhancing security in the cloud: When traceability meets access control.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

2016
Analysis of access control policy updates through narrowing.
Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, 2016

2015
Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies.
Proceedings of the SECRYPT 2015, 2015

Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
A metamodel of access control for distributed environments: Applications and properties.
Inf. Comput., 2014

Towards a Reference Architecture for Access Control in Distributed Web Applications.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

2013
Automated analysis of rule-based access control policies.
Proceedings of the 7th Workshop on Programming languages meets program verification, 2013

A methodology to build run-time monitors for security-aware workflows.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Verification of Composed Array-Based Systems with Applications to Security-Aware Workflows.
Proceedings of the Frontiers of Combining Systems, 2013

2010
Sharing in the Graph Rewriting Calculus.
Proceedings of the Recent Trends in Algebraic Development Techniques, 2010

Rewrite Specifications of Access Control Policies in Distributed Environments.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Category-Based Authorisation Models: Operational Semantics and Expressive Power.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

2009
Distributed event-based access control.
Int. J. Inf. Comput. Secur., 2009

2008
Action Control by Term Rewriting.
Proceedings of the Third International Workshop on Security and Rewriting Techniques, 2008

A rewriting framework for the composition of access control policies.
Proceedings of the 10th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2008

Time and Location Based Services with Access Control.
Proceedings of the NTMS 2008, 2008

An algebraic-functional framework for distributed access control.
Proceedings of the CRiSIS '08, 2008

2007
Towards a Sharing Strategy for the Graph Rewriting Calculus.
Proceedings of the 7th International Workshop on Reduction Strategies in Rewriting and Programming, 2007

The Rewriting Calculus as a Combinatory Reduction System.
Proceedings of the Foundations of Software Science and Computational Structures, 2007

Dynamic Event-Based Access Control as Term Rewriting.
Proceedings of the Data and Applications Security XXI, 2007

2006
Expressing combinatory reduction systems derivations in the rewriting calculus.
High. Order Symb. Comput., 2006

2005
The graph rewriting calculus: properties and expressive capabilities.
PhD thesis, 2005

The Graph Rewriting Calculus: Confluence and Expressiveness.
Proceedings of the Theoretical Computer Science, 9th Italian Conference, 2005

2004
A Rewriting Calculus for Cyclic Higher-order Term Graphs.
Proceedings of the 2nd International Workshop on Term Graph Rewriting, 2004

2003
Translating Combinatory Reduction Systems into the Rewriting Calculus.
Proceedings of the 4th International Workshop on Rule-Based Programming, 2003


  Loading...