Recent papers

  • Alba Martinez Anton, Clara Bertolissi, Jean-Marc Talbot:
    Solving Access Control Conflicts in Multi-User Systems SECRYPT 2024. To appear.
  • Gelareh Hasel Mehri, Benjamin Monmege, Clara Bertolissi and Nicola Zannone:
    A Bargaining-Game Framework for Multi-Party Access Control. SACMAT 2024. ACM, To appear.
  • Clara Bertolissi, Alba Martinez Anton, Nicola Zannone:
    Data Sharing in Social Networks.. SACMAT 2023, ACM, p. 181-192.
  • Clara Bertolissi, Maribel Fernández:
    Modular Composition of Access Control Policies: A Framework to Build Multi-Site Multi-Level Combinations.. SACMAT 2022. ACM, p. 7-18.
  • Clara Bertolissi, Maribel Fernández, Bhavani M. Thuraisingham:
    Graph-Based Specification of Admin-CBAC Policies. CODASPY 2021. ACM. p. 173-184.
  • Clara Bertolissi, Maribel Fernández, Bhavani M. Thuraisingham:
    Admin-CBAC: An Administration Model for Category-Based Access Control. CODASPY 2020. ACM, p. 73-84.
  • Clara Bertolissi, Jerry den Hartog, Nicola Zannone:
    Using Provenance for Secure Data Fusion in Cooperative Systems. SACMAT 2019. ACM, p. 185-194.
  • Clara Bertolissi, Daniel Ricardo dos Santos, Silvio Ranise:
    Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques. SACMAT 2018. ACM,  p. 117-128
  • Clara Bertolissi, Omar Boucelma, Worachet Uttha:
    Enhancing security in the cloud: When traceability meets access control. ICITST 2017.  IEEE, p. 365-366
  • Clara Bertolissi, Jean-Marc Talbot, Didier Villevalois:
    Analysis of access control policy updates through narrowing. PPDP 2016. ACM,  p. 62-75
  • C. Bertolissi, D. Ricardo Dos Santos, S. Ranise. Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes. ASIACCS 2015. ACM,  p. 297-308.
  • C. Bertolissi, S. Ranise, W. Uttha. Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies. SECRYPT 2015,  SciTePress, p. 293-300
  • C. Bertolissi, S. Ranise. A SMT-based methodology for monitoring of security-aware workflows. Int. J. Internet Technology and Secured Transactions, Vol. 5, No. 3, 2014.
  • C. Bertolissi and M. Fernandez. A Meta-model of Access Control for Distributed Environments: Applications and Properties. Information and Computation, Special Issue on Security and Rewriting Techniques, pp. 187-207, 2014.
  • C. Bertolissi, S. Ranise. A methodology to build run-time monitors for Security-Aware Workflows. In Proceedings of ICITST'13, London, UK. IEEE, 2013.
  • C. Bertolissi, S. Ranise. Verification of Composed Array-Based Systems with Applications to Security-Aware Workflows. In Proceedings of FROCOS'13, Nancy, France. LNCS. Springer, 2013.
  • Clara Bertolissi, Worachet Uttha. Automated analysis of rule-based access control policies. In Proceedings of PLPV'13, co-located with POPL'13, Rome, Italy. ACM Press.