Sfoglia per Autore
Mostrati risultati da 1 a 9 di 9
MODELING A CERTIFIED EMAIL PROTOCOL USING I/O AUTOMATA
2004-01-01 Blundo, Carlo; Cimato, Stelvio; DE PRISCO, Roberto; Ferrara, ANNA LISA
Authenticated Web-Services: A WS-Security Based Implementation
2007-01-01 Auletta, Vincenzo; Blundo, Carlo; Cimato, Stelvio; Emiliano De, Cristofaro; Raimato, Guerriero
Probabilistic Visual Cryptography Schemes
2012-01-01 Cimato, Stelvio; DE PRISCO, Roberto; DE SANTIS, Alfredo
Constrained Role Mining
2013-01-01 Blundo, Carlo; Cimato, Stelvio
PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining
2017-01-01 Blundo, Carlo; Cimato, Stelvio; Siniscalchi, Luisa
PostProcessing in Constrained Role Mining
2018-01-01 Blundo, Carlo; Cimato, Stelvio; Siniscalchi, Luisa
Heuristics for constrained role mining in the post-processing framework
2022-01-01 Blundo, C.; Cimato, S.; Siniscalchi, L.
Role mining under User-Distribution cardinality constraint
2023-01-01 Blundo, Carlo; Cimato, Stelvio
Heuristics for constrained role mining in the post-processing framework
2023-01-01 Blundo, C.; Cimato, S.; Siniscalchi, L.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
MODELING A CERTIFIED EMAIL PROTOCOL USING I/O AUTOMATA | 1-gen-2004 | Blundo, Carlo; Cimato, Stelvio; DE PRISCO, Roberto; Ferrara, ANNA LISA | |
Authenticated Web-Services: A WS-Security Based Implementation | 1-gen-2007 | Auletta, Vincenzo; Blundo, Carlo; Cimato, Stelvio; Emiliano De, Cristofaro; Raimato, Guerriero | |
Probabilistic Visual Cryptography Schemes | 1-gen-2012 | Cimato, Stelvio; DE PRISCO, Roberto; DE SANTIS, Alfredo | |
Constrained Role Mining | 1-gen-2013 | Blundo, Carlo; Cimato, Stelvio | |
PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining | 1-gen-2017 | Blundo, Carlo; Cimato, Stelvio; Siniscalchi, Luisa | |
PostProcessing in Constrained Role Mining | 1-gen-2018 | Blundo, Carlo; Cimato, Stelvio; Siniscalchi, Luisa | |
Heuristics for constrained role mining in the post-processing framework | 1-gen-2022 | Blundo, C.; Cimato, S.; Siniscalchi, L. | |
Role mining under User-Distribution cardinality constraint | 1-gen-2023 | Blundo, Carlo; Cimato, Stelvio | |
Heuristics for constrained role mining in the post-processing framework | 1-gen-2023 | Blundo, C.; Cimato, S.; Siniscalchi, L. |
Mostrati risultati da 1 a 9 di 9
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile