CIMATO, Stelvio
CIMATO, Stelvio
Mostra
records
Risultati 1 - 9 di 9 (tempo di esecuzione: 0.018 secondi).
Authenticated Web-Services: A WS-Security Based Implementation
2007-01-01 Auletta, Vincenzo; Blundo, Carlo; Cimato, Stelvio; Emiliano De, Cristofaro; Raimato, Guerriero
Constrained Role Mining
2013-01-01 Blundo, Carlo; Cimato, Stelvio
Heuristics for constrained role mining in the post-processing framework
2022-01-01 Blundo, C.; Cimato, S.; Siniscalchi, L.
Heuristics for constrained role mining in the post-processing framework
2023-01-01 Blundo, C.; Cimato, S.; Siniscalchi, L.
MODELING A CERTIFIED EMAIL PROTOCOL USING I/O AUTOMATA
2004-01-01 Blundo, Carlo; Cimato, Stelvio; DE PRISCO, Roberto; Ferrara, ANNA LISA
PostProcessing in Constrained Role Mining
2018-01-01 Blundo, Carlo; Cimato, Stelvio; Siniscalchi, Luisa
Probabilistic Visual Cryptography Schemes
2012-01-01 Cimato, Stelvio; DE PRISCO, Roberto; DE SANTIS, Alfredo
PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining
2017-01-01 Blundo, Carlo; Cimato, Stelvio; Siniscalchi, Luisa
Role mining under User-Distribution cardinality constraint
2023-01-01 Blundo, Carlo; Cimato, Stelvio
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Authenticated Web-Services: A WS-Security Based Implementation | 1-gen-2007 | Auletta, Vincenzo; Blundo, Carlo; Cimato, Stelvio; Emiliano De, Cristofaro; Raimato, Guerriero | |
Constrained Role Mining | 1-gen-2013 | Blundo, Carlo; Cimato, Stelvio | |
Heuristics for constrained role mining in the post-processing framework | 1-gen-2022 | Blundo, C.; Cimato, S.; Siniscalchi, L. | |
Heuristics for constrained role mining in the post-processing framework | 1-gen-2023 | Blundo, C.; Cimato, S.; Siniscalchi, L. | |
MODELING A CERTIFIED EMAIL PROTOCOL USING I/O AUTOMATA | 1-gen-2004 | Blundo, Carlo; Cimato, Stelvio; DE PRISCO, Roberto; Ferrara, ANNA LISA | |
PostProcessing in Constrained Role Mining | 1-gen-2018 | Blundo, Carlo; Cimato, Stelvio; Siniscalchi, Luisa | |
Probabilistic Visual Cryptography Schemes | 1-gen-2012 | Cimato, Stelvio; DE PRISCO, Roberto; DE SANTIS, Alfredo | |
PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining | 1-gen-2017 | Blundo, Carlo; Cimato, Stelvio; Siniscalchi, Luisa | |
Role mining under User-Distribution cardinality constraint | 1-gen-2023 | Blundo, Carlo; Cimato, Stelvio |