Here's Johnny: a methodology for developing attacker personas A Atzeni, C Cameroni, S Faily, J Lyle, I Fléchais 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 53 | 2011 |
Electronic Identification for Universities: Building Cross-Border Services Based on the eIDAS Infrastructure D Berbecaru, A Lioy, C Cameroni Information 10 (6), 210, 2019 | 30 | 2019 |
Providing Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach DG Berbecaru, A Lioy, C Cameroni IEEE Access 8, 126186-126200, 2020 | 22 | 2020 |
Providing digital identity and academic attributes through European eID infrastructures: Results achieved, limitations, and future steps D Berbecaru, A Lioy, C Cameroni Software: Practice and Experience 49 (11), 1643-1662, 2019 | 21 | 2019 |
Supporting Authorize-then-Authenticate for Wi-Fi access based on an electronic identity infrastructure. D Berbecaru, A Lioy, C Cameroni J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11 (2), 34-54, 2020 | 16 | 2020 |
Model-driven architectural risk analysis using architectural and contextualised attack patterns S Faily, J Lyle, C Namiluko, A Atzeni, C Cameroni Proceedings of the Workshop on Model-Driven Security, 1-6, 2012 | 14 | 2012 |
On Enabling Additional Natural Person and Domain-Specific Attributes in the eIDAS Network DG Berbecaru, A Lioy, C Cameroni IEEE Access 9, 134096-134121, 2021 | 8 | 2021 |
Authorize-then-authenticate: Supporting authorization decisions prior to authentication in an electronic identity infrastructure D Berbecaru, A Lioy, C Cameroni Intelligent Distributed Computing XIII, 313-322, 2020 | 6 | 2020 |
ATEMA: An attribute enablement module for attribute retrieval and transfer through the eIDAS Network D Berbecaru, C Cameroni 2020 24th International Conference on System Theory, Control and Computing …, 2020 | 4 | 2020 |
Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework S Faily, J Lyle, I Fléchais, A Atzeni, C Cameroni, H Myrhaug, A Göker, ... British Computer Society, 2014 | 2 | 2014 |
Policies in Context: Factors Influencing the Elicitation and Categorisation of Context− Sensitive Security Policies S Faily, J Lyle, I Flechais, A Atzeni, C Cameroni, H Myrhaug, A Goker, ... | | 2013 |