Skip to content

Commit

Permalink
Add new accepted article
Browse files Browse the repository at this point in the history
  • Loading branch information
marcopernpruner committed Jul 18, 2023
1 parent 48e6104 commit f216bd0
Show file tree
Hide file tree
Showing 4 changed files with 32 additions and 10 deletions.
6 changes: 6 additions & 0 deletions _data/destinations.yml
Original file line number Diff line number Diff line change
Expand Up @@ -102,6 +102,12 @@
url: https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6979
type: journal

- id: TDSC
name: IEEE Transactions on Dependable and Secure Computing
acronym: TDSC
url: https://www.computer.org/csdl/journals/tq
type: journal

- id: TIFS
name: IEEE Transactions on Information Forensics and Security
acronym: TIFS
Expand Down
24 changes: 14 additions & 10 deletions _data/publications.yml
Original file line number Diff line number Diff line change
Expand Up @@ -1918,16 +1918,6 @@
doi: 10.1145/3532105.3535042
urlNews: /news/2022/04/25/demo-accepted-at-sacmat-2022/

- id: TDSC2022
title: "A Multi-Layered Methodology to Assist the Secure and Risk-Aware Design of Authentication Protocols: Application to Passwordless Solutions based on eID Cards"
authors:
- MarcoPernpruner
- RobertoCarbone
- GiadaSciarretta
- SilvioRanise
abstract: >
Authentication protocols represent the entry point to online services, so they must be sturdily designed in order to allow only authorized users to access the underlying data. However, designing authentication protocols is a complex process: security designers should carefully select the technologies to involve and integrate them properly in order to prevent potential vulnerabilities. In addition, these choices are usually restricted by further factors, such as the requirements associated with the scenario, the regulatory framework, the dimensions to balance (e.g., security vs. usability), and the standards to rely on. We come to the rescue by presenting an automated multi-layered methodology we have developed to assist security designers in this phase: by repeatedly evaluating their protocols, they can select the security mitigations to consider until they reach the desired security level, thus enabling a security-by-design approach. For concreteness, we also show how we have applied our methodology to a real use case scenario in the context of a collaboration with the Italian Government Printing Office and Mint.
## 2023
- id: ARES2023
id_iris: 338827
Expand Down Expand Up @@ -2018,4 +2008,18 @@
doi: 10.5220/0012084000003555
urlNews: /news/2023-04-24-paper-accepted-at-secrypt/

- id: TDSC2022
title: "An Automated Multi-Layered Methodology to Assist the Secure and Risk-Aware Design of Multi-Factor Authentication Protocols"
authors:
- MarcoPernpruner
- RobertoCarbone
- GiadaSciarretta
- SilvioRanise
abstract: >
Authentication protocols represent the entry point to online services, so they must be sturdily designed in order to allow only authorized users to access the underlying data. However, designing authentication protocols is a complex process: security designers should carefully select the technologies to involve and integrate them properly in order to prevent potential vulnerabilities. In addition, these choices are usually restricted by further factors, such as the requirements associated with the scenario, the regulatory framework, the dimensions to balance (e.g., security vs. usability), and the standards to rely on. We come to the rescue by presenting an automated multi-layered methodology we have developed to assist security designers in this phase: by repeatedly evaluating their protocols, they can select the security mitigations to consider until they reach the desired security level, thus enabling a security-by-design approach. For concreteness, we also show how we have applied our methodology to a real use case scenario in the context of a collaboration with the Italian Government Printing Office and Mint.
destination: TDSC
year: 2023
doi: 10.1109/TDSC.2023.3296210
urlNews: /news/2023/07/17/paper-accepted-at-tdsc/

# PLEASE KEEP ALPHABETICAL ORDER BY ID WITHIN YEARS
11 changes: 11 additions & 0 deletions _news/2023-07-17-paper-accepted-at-tdsc.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
---
title: Paper accepted at TDSC
papers:
- TDSC2022

people:
- MarcoPernpruner
- GiadaSciarretta
- RobertoCarbone
- SilvioRanise
---
1 change: 1 addition & 0 deletions _topics/IdentityManagement.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,7 @@ publications:
- DBSEC2022
- FPS2019
- STM2019
- TDSC2022

theses:
- DamianoSartori_B
Expand Down

0 comments on commit f216bd0

Please sign in to comment.