References

  • [1] Stefano Berlato, Roberto Carbone, Silvio Ranise, Adam J. Lee. Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization In the 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS20)

  • [2] Stefano Berlato, Roberto Carbone, Silvio Ranise, Adam J. Lee. Formal Modelling and Automated Trade-Off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud In ACM Transactions on Privacy and Security (TOPS), Volume 25, Issue 1, on pages 1–37 (February 2022)

  • [3] Stefano Berlato, Roberto Carbone, Silvio Ranise. Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment In the 18th International Conference on Security and Cryptography (SECRYPT 2021)

  • [4] Stefano Berlato, Umberto Morelli, Roberto Carbone, Silvio Ranise. End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies In the 36th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2022)

  • [5] Alessandro Colombo. Attribute Based Encryption for Advanced Data Protection in IoT with MQTT, bachelor in Computer Science at the University of Trento (2022)

  • [6] Enrico Marconi. Combining Blockchain-as-a-Service and Cryptographic Access Control for Secure Data Sharing Across Multiple Organizations, bachelor in Computer Science at the University of Trento (2022)

  • [7] Andreas Heider-Aviet, Danny Roswin Ollik, Stefano Berlato, Silvio Ranise, Roberto Carbone, Van Thanh Le, Nabil El Ioini, Claus Pahl, Hamid R. Barzegar. Blockchain Based RAN Data Sharing In the IEEE International Conference on Smart Data Services 2021 (SMDS 2021)

  • [8] W. C. Garrison, A. Shull, S. Myers and A. J. Lee. On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud In the IEEE Symposium on Security and Privacy (SP), 2016, pp. 819-838, doi: 10.1109/SP.2016.54

  • [9] American National Standard for Information Technology. Role based access control, https://profsandhu.com/journals/tissec/ANSI+INCITS+359-2004.pdf. American National Standards Institute, Inc., February 2004.