Alessandro Colantonio

According to our database1, Alessandro Colantonio
  • authored at least 19 papers between 2008 and 2015.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2015
EXPEDITE: EXPress closED ITemset Enumeration.
Expert Syst. Appl., 2015

VISIO: A Visual Approach for Singularity Detection in Recommendation Systems.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Visual detection of singularities in review platforms.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

2012
Visual Role Mining: A Picture Is Worth a Thousand Roles.
IEEE Trans. Knowl. Data Eng., 2012

A business-driven decomposition methodology for role mining.
Computers & Security, 2012

Role engineering: from theory to practice.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
A new role mining framework to elicit business roles and to mitigate enterprise risk.
Decision Support Systems, 2011

2010
Concise: Compressed 'n' Composable Integer Set.
Inf. Process. Lett., 2010

CONCISE: Compressed 'n' Composable Integer Set
CoRR, 2010

Taming role mining complexity in RBAC.
Computers & Security, 2010

Mining Business-Relevant RBAC States through Decomposition.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

ABBA: adaptive bicluster-based approach to impute missing values in binary matrices.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Evaluating the Risk of Adopting RBAC Roles.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
A Probabilistic Bound on the Basic Role Mining Problem and Its Applications.
Proceedings of the Emerging Challenges for Security, 2009

Mining Stable Roles in RBAC.
Proceedings of the Emerging Challenges for Security, 2009

A formal framework to elicit roles with business meaning in RBAC systems.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

2008
An Activity-Based Model for Separation of Duty
CoRR, 2008

Leveraging Lattices to Improve Role Mining.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A cost-driven approach to role engineering.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008


  Loading...