Roberto Carbone
Orcid: 0000-0003-2853-4269
According to our database1,
Roberto Carbone
authored at least 55 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
An Automated Multi-Layered Methodology to Assist the Secure and Risk-Aware Design of Multi-Factor Authentication Protocols.
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the Ital-IA Intelligenza Artificiale, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Work-in-Progress: A Sidecar Proxy for Usable and Performance-Adaptable End-to-End Protection of Communications in Cloud Native Applications.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
2023
Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, 2023
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023
Cross-Domain Sharing of User Claims: A Design Proposal for OpenID Connect Attribute Authorities.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud.
ACM Trans. Priv. Secur., 2022
Best current practices for OAuth/OIDC Native Apps: A study of their adoption in popular providers and top-ranked Android clients.
J. Inf. Secur. Appl., 2022
End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay Between Functional and Security Requirements.
IEEE Veh. Technol. Mag., 2021
Proceedings of the IEEE International Conference on Smart Data Services, 2021
Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment.
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the Emerging Technologies for Authorization and Authentication, 2021
Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
2020
ACM Trans. Priv. Secur., 2020
Comput. Secur., 2020
Automated and Secure Integration of the OpenID Connect iGov Profile in Mobile Native Applications.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020
Micro-Id-Gym: A Flexible Tool for Pentesting Identity Management Protocols in the Wild and in the Laboratory.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020
The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the 3rd IEEE 5G World Forum, 2020
2019
A Wizard-based Approach for Secure Code Generation of Single Sign-On and Access Delegation Solutions for Mobile Native Apps.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019
2018
Design and Security Assessment of Usable Multi-factor Authentication and Single Sign-On Solutions for Mobile Applications - A Workshop Experience Report.
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018
Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018
2017
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements.
Comput. Secur., 2017
Strong Authentication for e-Banking: A Survey on European Regulations and Implementations.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the Computer Safety, Reliability, and Security, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
2016
SATMC: a SAT-based model checker for security protocols, business processes, and security APIs.
Int. J. Softw. Tools Technol. Transf., 2016
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
2015
Proceedings of the 8th IEEE International Conference on Software Testing, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
2014
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2014
Proceedings of the Smart Grid Security - Second International Workshop, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
2013
An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations.
Comput. Secur., 2013
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols.
Proceedings of the Network and System Security - 7th International Conference, 2013
2012
Proceedings of the Tests and Proofs - 6th International Conference, 2012
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012
Proceedings of the Smart Grid Security - First International Workshop, 2012
2011
Automated Analysis of Semantic-Aware Access Control Policies: A Logic-Based Approach.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement.
Proceedings of the Middleware 2011, 2011
Proceedings of the Future Internet, 2011
2010
Proceedings of the Third International Conference on Software Testing, 2010
2009
Proceedings of the Security and Dependability for Ambient Intelligence, 2009
2008
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008