Skip to content

Commit

Permalink
Update publication information
Browse files Browse the repository at this point in the history
  • Loading branch information
marcopernpruner committed Sep 27, 2024
1 parent 148d03a commit ac0e06d
Showing 1 changed file with 5 additions and 19 deletions.
24 changes: 5 additions & 19 deletions _data/publications.yml
Original file line number Diff line number Diff line change
Expand Up @@ -17,8 +17,8 @@
doi: 10.1007/978-3-642-15763-9_36

- id: HVC2010
id_iris: 21635
title: Automated Symbolic Analysis of ARBAC Policies
id_iris: 270624
title: The SMT-LIB Initiative and the Rise of SMT
authors:
- ClarkBarrett
- LeonardoDeMoura
Expand Down Expand Up @@ -2033,21 +2033,6 @@
- SMPC
- PrivacyEnhancingCryptography
- DecentralizationOfTrust

- id: POLSIM2023
#id_iris: 323366
title: "A Simulation Framework for the Experimental Evaluation of Access Control Enforcement Mechanisms based on Business Processes"
authors:
- StefanoBerlato
- RobertoCarbone
- SilvioRanise
abstract: >
While the security analysis of Access Control (AC) policies has received a lot of attention, the same cannot be said for their enforcement. As systems become more distributed (e.g., centralized services may become a bottleneck) and legal compliance constraints stricter (e.g., the problem of honest but curious Cloud providers in the light of privacy regulations), the fine-tuning of AC enforcement mechanisms is likely to become more and more important. This is especially true in scenarios where the quality of service may suffer from computationally heavy security mechanisms and low latency is a prominent requirement. As a first step towards a principled approach to fine-tune AC enforcement, this paper introduces a methodology providing the means to measure the performance of AC enforcement mechanisms through the simulation of realistic deployment scenarios. To do so, we base our methodology on Business Process Model and Notation (BPMN) workflows—that provide for an appropriate abstraction of the sequence of requests toward AC enforcement mechanisms performed by applications—to derive lists of AC operations (e.g., access a resource, revoke a permission) and execute them to evaluate and compare the performance of different mechanisms. Finally, we implement our methodology and apply it to three case studies representative of both traditional centralized AC—i.e., the Open Policy Agent (OPA) and the eXtensible Access Control Markup Language (XACML)—and decentralized Cryptographic Access Control (CAC)—i.e., CryptoAC—.
destination: POLSIM2023
year: 2023
#doi: 10.1145/3320269.3384767
urlComplementary: /complementary/POLSIM2023
#urlNews: /news/2020/02/15/paper-accepted-at-asiaccs-2020/

- id: RACS2023
id_iris: 344627
Expand Down Expand Up @@ -2155,8 +2140,8 @@
- GiadaSciarretta
- SilvioRanise
abstract: >
The paper addresses the design of identity proofing flows based on the validation of authoritative identity evidence (such as electronic passports or identity documents) for metaverse-based applications. This problem arises in business use cases where users can perform sensitive or legally binding operations with their Virtual Reality (VR) headsets.<br />
To this end, a cross-device flow is proposed where users first interact with their mobile device to get securely identified by presenting a valid identity evidence, and successively wear the headset to set their access credentials by presenting a suitably designed identity transfer code. According to best practices for cross-device flows, the proposed approach incorporates a number of both known and newly introduced security measures, which are thoroughly discussed in relation to possible impersonation attacks against the cross-device transfer phase.
This paper presents a secure identity proofing flow for metaverse-based applications, enabling the validation of authoritative identity evidence (such as electronic passports and identity cards) to support sensitive or legally binding operations performed through virtual reality (VR) headsets. These use cases, common in business environments, require users' credentials to be strongly linked to verified real-world identities, ensuring compliance with regulatory standards.<br />
The solution involves a cross-device flow where users first verify their identity on a mobile device by presenting valid identity evidence. This verified identity is then transferred to the VR headset, where users can register and activate credentials for future authentication. Beyond providing key security considerations and defining a taxonomy of possible attacks, we discuss how our design choices enhance the security of the flow.
destination: iMETA2024
year: 2024
#doi:
Expand All @@ -2173,6 +2158,7 @@
In the rapidly evolving landscape of Artificial Intelligence (AI), ensuring the trustworthiness of AI tools deployed in sensitive use cases, such as judicial or healthcare processes, is paramount. The management of AI risks in judicial systems necessitates a holistic approach that includes various elements, such as technical, ethical considerations, and legal responsibilities. This approach should not only involve the application of risk management frameworks and regulations but also focus on the education and training of legal professionals. For this, we propose a risk-based approach designed to evaluate and mitigate potential risks associated with AI applications in judicial settings. Our approach is a semi-automated process that integrates both user (i.e., judge) feedback and technical insights to assess the AI tool’s alignment with Trustworthy AI principles.
destination: Ital-IA2024
year: 2024
url: https://ceur-ws.org/Vol-3762/469.pdf
urlNews: /news/2024/04/24/paper-accepted-at-ital-ia-2024/

- id: JISA2024
Expand Down

0 comments on commit ac0e06d

Please sign in to comment.