Crispo, Bruno
64  Ergebnisse:
Personensuche X
?
1

Obligation Management Framework for Usage Control:

, In: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies,
Joumaa, Hussein ; Hariri, Ali ; Petrovska, Ana... - p. 149-157 , 2024
 
?
2

$$\mu $$IPS: Software-Based Intrusion Prevention for Bare-M..:

, In: Computer Security – ESORICS 2023; Lecture Notes in Computer Science,
Degani, Luca ; Salehi, Majid ; Martinelli, Fabio. - p. 311-331 , 2024
 
?
3

The Nonce-nce of Web Security: An Investigation of CSP Nonc..:

, In: Computer Security. ESORICS 2023 International Workshops; Lecture Notes in Computer Science,
 
?
4

AppBox: A Black-Box Application Sandboxing Technique for Mo..:

, In: 2023 IEEE Symposium on Computers and Communications (ISCC),
 
?
5

OAuth 2.0 Redirect URI Validation Falls Short, Literally:

, In: Proceedings of the 39th Annual Computer Security Applications Conference,
 
?
6

Mind the CORS:

, In: 2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA),
 
?
7

Usable Identity and Access Management Schemes for Smart Cit..:

, In: Collaborative Approaches for Cyber Security in Cyber-Physical Systems; Advanced Sciences and Technologies for Security Applications,
Gupta, Sandeep ; Crispo, Bruno - p. 47-61 , 2023
 
?
8

Device Behavioral Profiling for Autonomous Protection Using..:

, In: 2023 IEEE Symposium on Computers and Communications (ISCC),
Gupta, Sandeep ; Crispo, Bruno - p. 474-478 , 2023
 
?
9

WiP: Metamodel for Continuous Authorisation and Usage Contr..:

, In: Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies,
 
?
10

Generative adversarial networks for subdomain enumeration:

, In: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing,
 
?
11

On the (in)security of Memory Protection Units : A Cautiona..:

, In: 2022 IEEE International Conference on Cyber Security and Resilience (CSR),
 
?
12

End-to-End Encryption for Securing Communications in Indust..:

, In: 2022 4th IEEE Middle East and North Africa COMMunications Conference (MENACOMM),
 
?
13

Mollywood: Subtitles as an attack vector:

, In: 2022 IEEE Symposium on Computers and Communications (ISCC),
 
?
14

SIUV: A Smart Car Identity Management and Usage Control Sys..:

, In: ICT Systems Security and Privacy Protection; IFIP Advances in Information and Communication Technology,
 
?
15

Delegated attestation : scalable remote attestation of c..:

, In: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
 
1-15