All Stories

  1. Cross-Domain Sharing of User Claims: A Design Proposal for OpenID Connect Attribute Authorities
  2. Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness
  3. SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes
  4. Demo: TLSAssistant v2: A Modular and Extensible Framework for Securing TLS
  5. A Modular and Extensible Framework for Securing TLS
  6. Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud
  7. Do Security Reports Meet Usability?
  8. DoS Attacks in Available MQTT Implementations
  9. Secure Pull Printing with QR Codes and National eID Cards
  10. Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization
  11. Formal Analysis of Mobile Multi-Factor Authentication with Single Sign-On Login
  12. The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications
  13. Automated and efficient analysis of administrative temporal RBAC policies with role hierarchies
  14. A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies
  15. Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes
  16. Automated analysis of RBAC policies with temporal constraints and static role hierarchies