Practical short signature batch verification AL Ferrara, M Green, S Hohenberger, MØ Pedersen Cryptographers’ Track at the RSA Conference, 309-324, 2009 | 291 | 2009 |
Provably-secure time-bound hierarchical key assignment schemes G Ateniese, A De Santis, AL Ferrara, B Masucci Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 210 | 2006 |
Ideal contrast visual cryptography schemes with reversing S Cimato, A De Santis, AL Ferrara, B Masucci Information Processing Letters 93 (4), 199-206, 2005 | 142 | 2005 |
A simple algorithm for the constrained sequence problems FYL Chin, A De Santis, AL Ferrara, NL Ho, SK Kim Information Processing Letters 90 (4), 175-179, 2004 | 127 | 2004 |
Cryptographic key assignment schemes for any access control policy A De Santis, AL Ferrara, B Masucci Information Processing Letters 92 (4), 199-205, 2004 | 60 | 2004 |
New constructions for provably-secure time-bound hierarchical key assignment schemes A De Santis, AL Ferrara, B Masucci Proceedings of the 12th ACM symposium on Access control models and …, 2007 | 53 | 2007 |
Analyzing temporal role based access control models E Uzun, V Atluri, S Sural, J Vaidya, G Parlato, AL Ferrara, M Parthasarathy Proceedings of the 17th ACM symposium on Access Control Models and …, 2012 | 48 | 2012 |
Efficient provably-secure hierarchical key assignment schemes A De Santis, AL Ferrara, B Masucci International Symposium on Mathematical Foundations of Computer Science, 371-382, 2007 | 48 | 2007 |
Enforcing the security of a time-bound hierarchical key assignment scheme A De Santis, AL Ferrara, B Masucci Information Sciences 176 (12), 1684-1694, 2006 | 47 | 2006 |
Variations on a theme by Akl and Taylor: Security and tradeoffs P D’Arco, A De Santis, AL Ferrara, B Masucci Theoretical Computer Science 411 (1), 213-227, 2010 | 41 | 2010 |
Policy analysis for self-administrated role-based access control AL Ferrara, P Madhusudan, G Parlato Tools and Algorithms for the Construction and Analysis of Systems: 19th …, 2013 | 40 | 2013 |
Security analysis of role-based access control through program verification AL Ferrara, P Madhusudan, G Parlato 2012 IEEE 25th Computer Security Foundations Symposium, 113-125, 2012 | 40* | 2012 |
Unconditionally secure key assignment schemes A De Santis, AL Ferrara, B Masucci Discrete applied mathematics 154 (2), 234-252, 2006 | 37 | 2006 |
Cryptographically enforced RBAC AL Ferrara, G Fuchsbauer, B Warinschi 2013 IEEE 26th Computer Security Foundations Symposium, 115-129, 2013 | 36 | 2013 |
Efficient provably-secure hierarchical key assignment schemes A De Santis, AL Ferrara, B Masucci Theoretical Computer Science 412 (41), 5684-5699, 2011 | 36 | 2011 |
Vac - Verifier of Administrative Role-Based Access Control Policies AL Ferrara, P Madhusudan, TL Nguyen, G Parlato Computer Aided Verification: 26th International Conference, CAV 2014, Held …, 2014 | 31 | 2014 |
An information-theoretic approach to the access control problem AL Ferrara, B Masucci Italian Conference on Theoretical Computer Science, 342-354, 2003 | 27 | 2003 |
Security analysis for temporal role based access control E Uzun, V Atluri, J Vaidya, S Sural, AL Ferrara, G Parlato, P Madhusudan Journal of computer security 22 (6), 961-996, 2014 | 24 | 2014 |
Policy privacy in cryptographic access control AL Ferrara, G Fachsbauer, B Liu, B Warinschi 2015 IEEE 28th Computer Security Foundations Symposium, 46-60, 2015 | 19 | 2015 |
Security and tradeoffs of the Akl-Taylor scheme and its variants P D’Arco, A De Santis, AL Ferrara, B Masucci Mathematical Foundations of Computer Science 2009: 34th International …, 2009 | 14 | 2009 |