All Stories

  1. Relying on Trust to Balance Protection and Performance in Cryptographic Access Control
  2. Cross-Domain Sharing of User Claims: A Design Proposal for OpenID Connect Attribute Authorities
  3. Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness
  4. SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes
  5. Demo: TLSAssistant v2: A Modular and Extensible Framework for Securing TLS
  6. A Modular and Extensible Framework for Securing TLS
  7. Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud
  8. Do Security Reports Meet Usability?
  9. DoS Attacks in Available MQTT Implementations
  10. Secure Pull Printing with QR Codes and National eID Cards
  11. Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization
  12. Formal Analysis of Mobile Multi-Factor Authentication with Single Sign-On Login
  13. The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications
  14. Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies
  15. A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies
  16. Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes
  17. Automated analysis of RBAC policies with temporal constraints and static role hierarchies