Usage control in computer security: A survey A Lazouski, F Martinelli, P Mori Computer Science Review 4 (2), 81-99, 2010 | 189 | 2010 |
A proposal on enhancing XACML with continuous usage control features M Colombo, A Lazouski, F Martinelli, P Mori Grids, P2P and Services Computing, 133-146, 2010 | 77 | 2010 |
Usage control in cloud systems A Lazouski, G Mancini, F Martinelli, P Mori 2012 International Conference for Internet Technology and Secured …, 2012 | 65 | 2012 |
Usage control on cloud systems E Carniani, D D’Arenzo, A Lazouski, F Martinelli, P Mori Future Generation Computer Systems 63, 37-55, 2016 | 58 | 2016 |
The Contrail approach to cloud federations M Coppola, P Dazzi, A Lazouski, F Martinelli, P Mori, J Jensen, I Johnson, ... Proceedings of the International Symposium on Grids and Clouds (ISGC’12) 2, 1, 2012 | 55 | 2012 |
A prototype for enforcing usage control policies based on XACML A Lazouski, F Martinelli, P Mori International Conference on Trust, Privacy and Security in Digital Business …, 2012 | 50 | 2012 |
Risk-aware usage decision making in highly dynamic systems L Krautsevich, A Lazouski, F Martinelli, A Yautsiukhin 2010 Fifth International Conference on Internet Monitoring and Protection, 29-34, 2010 | 40 | 2010 |
Extending Security-by-Contract with quantitative trust on mobile devices G Costa, N Dragoni, A Lazouski, F Martinelli, F Massacci, I Matteucci 2010 International Conference on Complex, Intelligent and Software Intensive …, 2010 | 36 | 2010 |
Stateful data usage control for android mobile devices A Lazouski, F Martinelli, P Mori, A Saracino International Journal of Information Security 16, 345-369, 2017 | 30 | 2017 |
Risk-based usage control for service oriented architecture L Krautsevich, A Lazouski, F Martinelli, A Yautsiukhin 2010 18th Euromicro Conference on Parallel, Distributed and Network-based …, 2010 | 26 | 2010 |
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization H Koshutanski, A Lazouski, F Martinelli, P Mori International Journal of Information Security 8 (4), 291-314, 2009 | 24 | 2009 |
Architecture, workflows, and prototype for stateful data usage control in cloud A Lazouski, G Mancini, F Martinelli, P Mori 2014 IEEE Security and Privacy Workshops, 23-30, 2014 | 17 | 2014 |
Security-by-Contract-with-Trust for mobile devices G Costa, A Lazouski, F Martinelli, I Matteucci, V Issarny, R Saadi, ... Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2010 | 17 | 2010 |
Towards attribute-based access control policy engineering using risk L Krautsevich, A Lazouski, F Martinelli, A Yautsiukhin Risk Assessment and Risk-Driven Testing: First International Workshop, RISK …, 2014 | 16 | 2014 |
Usage control, risk and trust L Krautsevich, A Lazouski, F Martinelli, P Mori, A Yautsiukhin Trust, Privacy and Security in Digital Business: 7th International …, 2010 | 15 | 2010 |
Influence of attribute freshness on decision making in usage control L Krautsevich, A Lazouski, F Martinelli, A Yautsiukhin Security and Trust Management: 6th International Workshop, STM 2010, Athens …, 2011 | 14 | 2011 |
Usage control in cloud federations GF Anastasi, E Carlini, M Coppola, P Dazzi, A Lazouski, F Martinelli, ... 2014 IEEE International Conference on Cloud Engineering, 141-146, 2014 | 12 | 2014 |
Towards policy engineering for attribute-based access control L Krautsevich, A Lazouski, F Martinelli, A Yautsiukhin Trusted Systems: 5th International Conference, INTRUST 2013, Graz, Austria …, 2013 | 12 | 2013 |
An implementation of role-base trust management extended with weights on mobile devices D Fais, M Colombo, A Lazouski Electronic Notes in Theoretical Computer Science 244, 53-65, 2009 | 10 | 2009 |
Cost-effective enforcement of access and usage control policies under uncertainties L Krautsevich, A Lazouski, F Martinelli, A Yautsiukhin IEEE Systems Journal 7 (2), 223-235, 2012 | 9 | 2012 |