A Note on Time-Bound Hierarchical Key Assignment Schemes,
Information Processing Letters, to appear,
DOI: 10.1016/j.ipl.2013.01.006,
with G. Ateniese, A. De Santis and B. Masucci.
Policy Analysis for Self-Administrated Role-Based Access Control,
19th Int'l Conference on Tools and Algorithms for the Construction and Analysis of Systems - TACAS 2013,
Rome, Italy, 2013,
with P. Madhusudan, and G. Parlato.
Security Analysis of Access Control Policies through Program Verification,
25th IEEE Computer Security Foundations Symposium -
CSF 2012,
Harvard University, Cambridge MA, USA, 2012,
with P. Madhusudan, and G. Parlato.
Analyzing Temporal Role Based Access Control Models,
17th ACM Symposium on Access Control Models and Technologies - SACMAT 2012,
Newark, USA, 2012,
with V. Atluri, P. Madhusudan, S. Sural, G. Parlato, E. Uzun, and J. Vaidya.
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes,
Journal of Cryptology,
vol. 25(2), pp. 243-270, 2012,
with G. Ateniese, A. De Santis, and B. Masucci.
Efficient Provably-Secure Hierarchical Key Assignment Schemes,
Theorethical Computer Science, vol. 412(41),
pp. 5684-5699, 2011,
with A. De Santis and B. Masucci.
Variations on a Theme by Akl and Taylor: Security and Tradeoffs,
Theorethical Computer Science, vol. 411,
pp. 213-227, 2010,
with P. D'Arco, A. De Santis, and B. Masucci.
(TCS2010)
Security and Tradeoffs of the Akl-Taylor Scheme and its Variants,
in Proc. of the 34th International Symposium on Mathematical Foundations of Computer Science - MFCS 2009,
Novy Smokovec, High Tatras, Slovak Republic, August 24 - 28, 2009, R. Kralovic and D. Niwinski (Eds.),
Lecture Notes in Computer Science, Vol. 5734, pp. 247-257,
Springer Verlag, 2009,
with P. D'Arco, A. De Santis, and B. Masucci.
(MFCS09)
Practical Short Signature Batch Verification,
Topics in Cryptology. The Cryptographers' Track at the RSA Conference 2009 - CT-RSA 2009 ,
Marc Fischlin (Ed.), Lecture Notes in Computer
Science, vol. 5473, pp. 309--324, Springer Verlag, 2009,
with M. Green, S. Hohenberger, M. O.
Pedersen.
(CT-RSA09)
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes,
Theoretical Computer Science, Vol. 407,
pp. 213--230, November 2008,
with A.
De Santis, and B. Masucci.
(TCS08)
An Attack on a Payment Scheme,
Information Sciences, Vol. 178,
No. 5, pp. 1418-1421, March 2008,
with A. De Santis, and B. Masucci.
(InfSc08)
Efficient Provably-Secure Hierarchical Key Assignment Schemes,
in Proc. of the 32nd International Symposium on Mathematical
Foundations of Computer Science - MFCS 2007,
Cesky Krumlov, Czech
Republic, August 27 - 31, 2007,
L. Kucera and A. Kucera (Eds.),
Lecture Notes in Computer Science, Vol. 4708, pp. 371--382, Springer
Verlag, 2007,
with A. De Santis,
and B. Masucci.
(MFCS07)
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes,
in Proc. of the 12th ACM Symposium on Access Control Models and Technologies - SACMAT 2007,
Sophia Antipolis, France, June 20 - 22 2007,
pp. 133--138,
with A. De Santis, and
B. Masucci.
(SACMAT07)
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes,
in Proc. of the 14th ACM Conference on Computer and Communications
Security - CCS 2006,
Alexandria, Virginia, USA, November 2006,
with G. Ateniese, A. De Santis,
and B. Masucci.
(CCS06)
Enforcing the Security of a Time-bound Hierarchical Key Assignment Scheme,
Information
Sciences, Vol. 176, No. 12, pp. 1684--1694, June 2006,
with A.
De Santis, and B. Masucci.
(InfSc06)
Unconditionally Secure Key Assignment Schemes,
Discrete Applied Mathematics, Vol.
154, No. 2 , pp. 234--252, February 2006,
with A. De Santis, and B. Masucci.
(DAM06)
A New Key Assignment Scheme for Access Control in a Complete Tree
Hierarchy,
in Proc. of the International Workshop on Coding and Cryptography -
WCC 2005,
Bergen, Norway, March 14 - 18 2005, O. Ytrehus (Ed.),
Lecture Notes in Computer Science,
Vol. 3969, pp. 202--217, Springer Verlag, 2006,
with A. De Santis, and
B. Masucci.
(WCC05)
Ideal Contrast Visual Cryptography Schemes with Reversing,
Information Processing Letters,
Vol. 93, n. 4, pp. 199-206, February 28, 2005,
with S.
Cimato, A. De Santis, and B. Masucci.
(IPL05)
Information Processing Letters, Vol. 92, n. 4, pp. 199-205, November 30,
2004,
with A. De Santis, and B. Masucci.
(IPL04)
Information Processing Letters, vol. 90, n. 4,
pp. 175-179, May 31, 2004,
with Y.L. Chin, A. De Santis, N.L. Ho, and S.K. Kim.
(IPL04b)
Modeling A Certified Email Protocol using I/O Automata,
Electronic Notes in Theoretical Computer Science, vol. 99,
2004, pp. 339-359,
with C.
Blundo, S. Cimato and R. De Prisco.
(ENTCS04)
An Information-Theoretic Approach to the Access Control Problem,
in Proc. of The Eighth Italian Conference on Theoretical Computer
Science - ICTCS 2003,
University Center Bertinoro, Italy, October
13 - 15, 2003, Lecture Notes in Computer Science,
Vol. 2841, pp.
342--354, Springer Verlag, 2003,
with B. Masucci.
(ICTCS03)
in Proc. of the International Workshop on Coding and Cryptography -
WCC 2003,
Veirsalles, France, March 24 - 28, 2003,
with A. De Santis, and B. Masucci.