Roberto Carbone

According to our database1, Roberto Carbone authored at least 31 papers between 2008 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
A Wizard-based Approach for Secure Code Generation of Single Sign-On and Access Delegation Solutions for Mobile Native Apps.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019

2018
Design and Security Assessment of Usable Multi-factor Authentication and Single Sign-On Solutions for Mobile Applications - A Workshop Experience Report.
Proceedings of the Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data, 2018

Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience.
Proceedings of the Principles of Security and Trust - 7th International Conference, 2018

2017
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements.
Comput. Secur., 2017

Strong Authentication for e-Banking: A Survey on European Regulations and Implementations.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

PolEnA: Enforcing Fine-grained Permission Policies in Android.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
SATMC: a SAT-based model checker for security protocols, business processes, and security APIs.
STTT, 2016

Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

A delegated authorization solution for smart-city mobile applications.
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016

Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Security Threat Identification and Testing.
Proceedings of the 8th IEEE International Conference on Software Testing, 2015

Android Permissions Unleashed.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

2014
SATMC: A SAT-Based Model Checker for Security-Critical Systems.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2014

Selective Release of Smart Metering Data in Multi-domain Smart Grids.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Attribute based access control for APIs in spring security.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

2013
An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations.
Comput. Secur., 2013

Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols.
Proceedings of the Network and System Security - 7th International Conference, 2013

2012
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap.
Proceedings of the Tests and Proofs - 6th International Conference, 2012

The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

Formal Analysis of a Privacy-Preserving Billing Protocol.
Proceedings of the Smart Grid Security - First International Workshop, 2012

2011
LTL model-checking for security protocols.
AI Commun., 2011

Automated Analysis of Semantic-Aware Access Control Policies: A Logic-Based Approach.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement.
Proceedings of the Middleware 2011, 2011

Towards Formal Validation of Trust and Security in the Internet of Services.
Proceedings of the Future Internet, 2011

2010
Model-Checking Driven Security Testing of Web-Based Applications.
Proceedings of the Third International Conference on Software Testing, 2010

2009
Verification of S&D Solutions for Network Communications and Devices.
Proceedings of the Security and Dependability for Ambient Intelligence, 2009

LTL model checking for security protocols.
Journal of Applied Non-Classical Logics, 2009

2008
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008


  Loading...