Skip to content

Commit

Permalink
New accepted paper
Browse files Browse the repository at this point in the history
  • Loading branch information
marcopernpruner committed Sep 2, 2024
1 parent 37f136d commit b4b4e3f
Show file tree
Hide file tree
Showing 5 changed files with 43 additions and 1 deletion.
9 changes: 9 additions & 0 deletions _data/destinations.yml
Original file line number Diff line number Diff line change
Expand Up @@ -1093,6 +1093,15 @@
startDate: "2024-07-08"
endDate: "2024-07-12"

- id: iMETA2024
name: "2nd International Conference on Intelligent Metaverse Technologies & Applications"
acronym: iMETA2024
url: https://imeta-conference.org/2024/
type: conference
location: Dubai, UAE
startDate: "2024-11-26"
endDate: "2024-11-29"

- id: Ital-IA2024
name: 4th CINI National Conference on Artificial Intelligence
acronym: Ital-IA 2024
Expand Down
16 changes: 15 additions & 1 deletion _data/publications.yml
Original file line number Diff line number Diff line change
Expand Up @@ -1996,7 +1996,6 @@
doi: 10.1007/978-3-031-37586-6_7

- id: ECML/PKDD2023_W
id_iris: 323366
title: Towards a Fine-Grained Threat Model for Video-Based Remote Identity Proofing
authors:
- CeciliaPasquini
Expand Down Expand Up @@ -2112,6 +2111,21 @@
doi: 10.1109/EuroSP60621.2024.00016
urlComplementary: https://st.fbk.eu/complementary/EuroSP2024

- id: iMETA2024
title: "Beyond Screens: Investigating Identity Proofing for the Metaverse Through Cross-Device Flows"
authors:
- MarcoPernpruner
- CeciliaPasquini
- GiadaSciarretta
- SilvioRanise
abstract: >
The paper addresses the design of identity proofing flows based on the validation of authoritative identity evidence (such as electronic passports or identity documents) for metaverse-based applications. This problem arises in business use cases where users can perform sensitive or legally binding operations with their Virtual Reality (VR) headsets.<br />
To this end, a cross-device flow is proposed where users first interact with their mobile device to get securely identified by presenting a valid identity evidence, and successively wear the headset to set their access credentials by presenting a suitably designed identity transfer code. According to best practices for cross-device flows, the proposed approach incorporates a number of both known and newly introduced security measures, which are thoroughly discussed in relation to possible impersonation attacks against the cross-device transfer phase.
destination: iMETA2024
year: 2024
doi:
urlNews: /news/2024/09/02/paper-accepted-at-imeta-2024/

- id: Ital-IA2024
title: "A Risk-based Approach to Trustworthy AI Systems for Judicial Procedures"
authors:
Expand Down
15 changes: 15 additions & 0 deletions _news/2024-09-02-paper-accepted-at-imeta-2024.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
---
title: Paper accepted at iMETA2024
papers:
- iMETA2024

people:
- MarcoPernpruner
- CeciliaPasquini
- GiadaSciarretta
- SilvioRanise

projects:
- METAfora

---
3 changes: 3 additions & 0 deletions _projects/METAfora.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,9 @@
---
project: METAfora

publications:
- iMETA2024

---
METAfora wants to implement new and innovative models of digital identity management and use cases, at the intersection between the progress of European top-down regulations on the subject and the dynamics of the evolving technological framework of the metaverse.

Expand Down
1 change: 1 addition & 0 deletions _topics/IdentityManagement.md
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,7 @@ publications:
- ARES2023
- RACS2023
- EUROSP2024
- iMETA2024

theses:
- DamianoSartori_B
Expand Down

0 comments on commit b4b4e3f

Please sign in to comment.