Recent papers

  • Clara Bertolissi and Maribel Fernández
    Modular Composition of Access Control Policies. SACMAT 2022. ACM. To appear
  • Clara Bertolissi, Maribel Fernández, Bhavani M. Thuraisingham:
    Graph-Based Specification of Admin-CBAC Policies. CODASPY 2021. ACM Proceedings, p. 173-184
  • Clara Bertolissi, Maribel Fernández, Bhavani M. Thuraisingham:
    Admin-CBAC: An Administration Model for Category-Based Access Control. CODASPY 2020. ACM, p. 73-84.
  • Clara Bertolissi, Jerry den Hartog, Nicola Zannone:
    Using Provenance for Secure Data Fusion in Cooperative Systems. SACMAT 2019. ACM, p. 185-194.
  • Clara Bertolissi, Daniel Ricardo dos Santos, Silvio Ranise:
    Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques. SACMAT 2018. ACM,  p. 117-128
  • Clara Bertolissi, Omar Boucelma, Worachet Uttha:
    Enhancing security in the cloud: When traceability meets access control. ICITST 2017.  IEEE, p. 365-366
  • Clara Bertolissi, Jean-Marc Talbot, Didier Villevalois:
    Analysis of access control policy updates through narrowing. PPDP 2016. ACM, Proceedings  p. 62-75
  • C. Bertolissi, D. Ricardo Dos Santos, S. Ranise. Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes. ASIACCS 2015. ACM,  p. 297-308.
  • C. Bertolissi, S. Ranise, W. Uttha. Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies. SECRYPT 2015,  SciTePress, p. 293-300
  • C. Bertolissi, S. Ranise. A SMT-based methodology for monitoring of security-aware workflows. Int. J. Internet Technology and Secured Transactions, Vol. 5, No. 3, 2014.
  • C. Bertolissi and M. Fernandez. A Meta-model of Access Control for Distributed Environments: Applications and Properties. Information and Computation, Special Issue on Security and Rewriting Techniques, pp. 187-207, 2014.
  • C. Bertolissi, S. Ranise. A methodology to build run-time monitors for Security-Aware Workflows. In Proceedings of ICITST'13, London, UK. IEEE, 2013.
  • C. Bertolissi, S. Ranise. Verification of Composed Array-Based Systems with Applications to Security-Aware Workflows. In Proceedings of FROCOS'13, Nancy, France. LNCS. Springer, 2013.
  • Clara Bertolissi, Worachet Uttha. Automated analysis of rule-based access control policies. In Proceedings of PLPV'13, co-located with POPL'13, Rome, Italy. ACM Press.