Follow
Cesare Cameroni
Cesare Cameroni
Research assistant, Politecnico di Torino
Verified email at polito.it
Title
Cited by
Cited by
Year
Here's Johnny: a methodology for developing attacker personas
A Atzeni, C Cameroni, S Faily, J Lyle, I Fléchais
2011 Sixth International Conference on Availability, Reliability and …, 2011
532011
Electronic Identification for Universities: Building Cross-Border Services Based on the eIDAS Infrastructure
D Berbecaru, A Lioy, C Cameroni
Information 10 (6), 210, 2019
292019
Providing Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach
DG Berbecaru, A Lioy, C Cameroni
IEEE Access 8, 126186-126200, 2020
212020
Providing digital identity and academic attributes through European eID infrastructures: Results achieved, limitations, and future steps
D Berbecaru, A Lioy, C Cameroni
Software: Practice and Experience 49 (11), 1643-1662, 2019
212019
Supporting Authorize-then-Authenticate for Wi-Fi access based on an electronic identity infrastructure.
D Berbecaru, A Lioy, C Cameroni
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11 (2), 34-54, 2020
162020
Model-driven architectural risk analysis using architectural and contextualised attack patterns
S Faily, J Lyle, C Namiluko, A Atzeni, C Cameroni
Proceedings of the Workshop on Model-Driven Security, 1-6, 2012
142012
On Enabling Additional Natural Person and Domain-Specific Attributes in the eIDAS Network
DG Berbecaru, A Lioy, C Cameroni
IEEE Access 9, 134096-134121, 2021
82021
Authorize-then-authenticate: Supporting authorization decisions prior to authentication in an electronic identity infrastructure
D Berbecaru, A Lioy, C Cameroni
Intelligent Distributed Computing XIII, 313-322, 2020
62020
ATEMA: An attribute enablement module for attribute retrieval and transfer through the eIDAS Network
D Berbecaru, C Cameroni
2020 24th International Conference on System Theory, Control and Computing …, 2020
42020
Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework
S Faily, J Lyle, I Fléchais, A Atzeni, C Cameroni, H Myrhaug, A Göker, ...
British Computer Society, 2014
22014
Policies in Context: Factors Influencing the Elicitation and Categorisation of Context− Sensitive Security Policies
S Faily, J Lyle, I Flechais, A Atzeni, C Cameroni, H Myrhaug, A Goker, ...
2013
The system can't perform the operation now. Try again later.
Articles 1–11