Umberto Morelli

Orcid: 0000-0003-2899-2227

According to our database1, Umberto Morelli authored at least 13 papers between 2017 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Coercion-resistant i-voting with short PIN and OAuth 2.0.
IACR Cryptol. ePrint Arch., 2024

2022
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system.
Int. J. Inf. Sec., 2022

End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Secure Pull Printing with QR Codes and National eID Cards: A Software-oriented Design and an Open-source Implementation.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

DoS Attacks in Available MQTT Implementations: Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

2019
Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations.
Proceedings of the Security and Trust Management - 15th International Workshop, 2019

MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers.
Proceedings of the 2019 IEEE World Congress on Services, 2019

An Open and Flexible CyberSecurity Training Laboratory in IT/OT Infrastructures.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

2018
A Lazy Approach to Access Control as a Service (ACaaS) for IoT: An AWS Case Study.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

2017
Assisted Authoring, Analysis and Enforcement of Access Control Policies in the Cloud.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017


  Loading...