VAC: Verifier of Administrative Role-based Access Control Policies,
In Proc. 26th International Conference on Computer Aided Verification (CAV 2014), to appear,
with P. Madhusudan, T. L. Nguyen, and G. Parlato.

Security Analysis for Temporal Role Based Access Control,
Journal of Computer Security, 2014, to appear,
with E. Uzun, V. Atluri, S. Sural, J. Vaidya, G. Parlato, and P. Madhusudan.

Cryptographically Enforced RBAC,
26th IEEE Computer Security Foundations Symposium - CSF 2013,
with B. Warinschi, and G. Fuchsbauer.

A Note on Time-Bound Hierarchical Key Assignment Schemes,
Information Processing Letters, Inf. 113(5-6): 151-155, 2013 ,
DOI: 10.1016/j.ipl.2013.01.006,
with G. Ateniese, A. De Santis and B. Masucci.

Policy Analysis for Self-Administrated Role-Based Access Control,
19th Int'l Conference on Tools and Algorithms for the Construction and Analysis of Systems - TACAS 2013,
Rome, Italy, 2013,
with P. Madhusudan, and G. Parlato.

Security Analysis of Access Control Policies through Program Verification,
25th IEEE Computer Security Foundations Symposium - CSF 2012,
Harvard University, Cambridge MA, USA, 2012,
with P. Madhusudan, and G. Parlato.

Analyzing Temporal Role Based Access Control Models,
17th ACM Symposium on Access Control Models and Technologies - SACMAT 2012,
Newark, USA, 2012,
with V. Atluri, P. Madhusudan, S. Sural, G. Parlato, E. Uzun, and J. Vaidya.

Provably-Secure Time-Bound Hierarchical Key Assignment Schemes,
Journal of Cryptology, vol. 25(2), pp. 243-270, 2012,
with G. Ateniese, A. De Santis, and B. Masucci.

Efficient Provably-Secure Hierarchical Key Assignment Schemes,
Theorethical Computer Science, vol. 412(41), pp. 5684-5699, 2011,
with A. De Santis and B. Masucci.

Variations on a Theme by Akl and Taylor: Security and Tradeoffs,
Theorethical Computer Science, vol. 411, pp. 213-227, 2010,
with P. D'Arco, A. De Santis, and B. Masucci.
(TCS2010)

Security and Tradeoffs of the Akl-Taylor Scheme and its Variants,
in Proc. of the 34th International Symposium on Mathematical Foundations of Computer Science - MFCS 2009,
Novy Smokovec, High Tatras, Slovak Republic, August 24 - 28, 2009, R. Kralovic and D. Niwinski (Eds.),
Lecture Notes in Computer Science, Vol. 5734, pp. 247-257, Springer Verlag, 2009,
with P. D'Arco, A. De Santis, and B. Masucci.
(MFCS09)

Practical Short Signature Batch Verification,
Topics in Cryptology. The Cryptographers' Track at the RSA Conference 2009 - CT-RSA 2009 ,
Marc Fischlin (Ed.), Lecture Notes in Computer Science, vol. 5473, pp. 309--324, Springer Verlag, 2009,
with M. Green, S. Hohenberger, M. O. Pedersen.
(CT-RSA09)

New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes,
Theoretical Computer Science, Vol. 407, pp. 213--230, November 2008,
with A. De Santis, and B. Masucci.
(TCS08)

An Attack on a Payment Scheme,
Information Sciences, Vol. 178, No. 5, pp. 1418-1421, March 2008,
with A. De Santis, and B. Masucci.
(InfSc08)

Efficient Provably-Secure Hierarchical Key Assignment Schemes,
in Proc. of the 32nd International Symposium on Mathematical Foundations of Computer Science - MFCS 2007,
Cesky Krumlov, Czech Republic,  August 27 - 31, 2007,
L. Kucera and A. Kucera (Eds.), Lecture Notes in Computer Science, Vol. 4708, pp. 371--382, Springer Verlag, 2007,
with A. De Santis, and B. Masucci.
(MFCS07)

New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes,
in Proc. of the 12th ACM Symposium on Access Control Models and Technologies - SACMAT 2007,
Sophia Antipolis, France, June 20 - 22 2007,
pp. 133--138,
with A. De Santis, and B. Masucci.
(SACMAT07)

Provably-Secure Time-Bound Hierarchical Key Assignment Schemes,
in Proc. of the 14th ACM Conference on Computer and Communications Security - CCS 2006,
Alexandria, Virginia, USA, November 2006,
with G. Ateniese, A. De Santis, and B. Masucci.
(CCS06)

Enforcing the Security of a Time-bound Hierarchical Key Assignment Scheme,
Information Sciences, Vol. 176, No. 12, pp. 1684--1694, June 2006,
with A. De Santis, and B. Masucci.
(InfSc06)

Unconditionally Secure Key Assignment Schemes,
Discrete Applied Mathematics, Vol. 154, No. 2 , pp. 234--252, February 2006,
with A. De Santis, and B. Masucci.
(DAM06)

A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy,
in Proc. of the International Workshop on Coding and Cryptography - WCC 2005,                                                       
Bergen, Norway, March 14 - 18  2005, O. Ytrehus (Ed.),
Lecture Notes in Computer Science, Vol. 3969, pp. 202--217, Springer Verlag, 2006,
with A. De Santis, and B. Masucci.
(WCC05)

Ideal Contrast Visual Cryptography Schemes with Reversing,
Information Processing Letters, Vol. 93, n. 4, pp. 199-206, February 28, 2005,
with S. Cimato, A. De Santis, and B. Masucci.
(IPL05)

F A Simple Algorithm for the Constrained Sequence Problems,
Information Processing Letters, Vol. 92, n. 4, pp. 199-205, November 30, 2004,
with A. De Santis, and B. Masucci.
(IPL04)

F A Simple Algorithm for the Constrained Sequence Problems,
Information Processing Letters, vol. 90, n. 4, pp. 175-179, May 31, 2004, with Y.L. Chin, A. De Santis, N.L. Ho, and S.K. Kim.
(IPL04b)

Modeling A Certified Email Protocol using I/O Automata,
Electronic Notes in Theoretical Computer Science, vol. 99, 2004, pp. 339-359,
with C. Blundo, S. Cimato and R. De Prisco.
(ENTCS04)

An Information-Theoretic Approach to the Access Control Problem,
in Proc. of The Eighth Italian Conference on Theoretical Computer Science - ICTCS 2003,                                         
University Center Bertinoro, Italy, October 13 - 15, 2003, Lecture Notes in Computer Science,
Vol. 2841, pp. 342--354, Springer Verlag, 2003,
with B. Masucci.
(ICTCS03)

Unconditionally Secure Hierarchical Key Assignment Schemes,
in Proc. of the International Workshop on Coding and Cryptography - WCC 2003,
Veirsalles, France, March 24 - 28, 2003,
with A. De Santis, and B. Masucci.