Skip to main content

Showing 1–15 of 15 results for author: Ranise, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.08196  [pdf, other

    cs.CR

    On Cryptographic Mechanisms for the Selective Disclosure of Verifiable Credentials

    Authors: Andrea Flamini, Giada Sciarretta, Mario Scuro, Amir Sharif, Alessandro Tomasi, Silvio Ranise

    Abstract: Verifiable credentials are a digital analogue of physical credentials. Their authenticity and integrity are protected by means of cryptographic techniques, and they can be presented to verifiers to reveal attributes or even predicates about the attributes included in the credential. One way to preserve privacy during presentation consists in selectively disclosing the attributes in a credential. I… ▽ More

    Submitted 16 January, 2024; originally announced January 2024.

    Comments: 37 pages, 6 tables, 3 figures

  2. arXiv:2207.07385  [pdf, other

    cs.CR

    Identifying and Quantifying Trade-offs in Multi-Stakeholder Risk Evaluation with Applications to the Data Protection Impact Assessment of the GDPR

    Authors: Majid Mollaeefar, Silvio Ranise

    Abstract: Cybersecurity risk management consists of several steps including the selection of appropriate controls to minimize risks. This is a difficult task that requires to search through all possible subsets of a set of available controls and identify those that minimize the risks of all stakeholders. Since stakeholders may have different perceptions of the risks (especially when considering the impact o… ▽ More

    Submitted 15 July, 2022; originally announced July 2022.

  3. Blockchain Tree for eHealth

    Authors: Sergii Kushch, Silvio Ranise, Giada Sciarretta

    Abstract: The design of access control mechanisms for healthcare systems is challenging: it must strike the right balance between permissions and restrictions. In this work, we propose a novel approach that is based on the Blockchain technology for storage patient medical data and create an audit logging system able to protect health data from unauthorized modification and access. The proposed method consis… ▽ More

    Submitted 13 August, 2019; originally announced August 2019.

    Journal ref: 2019 IEEE Global Conference on Internet of Things (GCIoT), Dubai, United Arab Emirates, 2019, pp. 1-5

  4. arXiv:1806.05766  [pdf, other

    cs.CR

    PADS: Practical Attestation for Highly Dynamic Swarm Topologies

    Authors: Moreno Ambrosin, Mauro Conti, Riccardo Lazzeretti, Md Masoom Rabbani, Silvio Ranise

    Abstract: Remote attestation protocols are widely used to detect device configuration (e.g., software and/or data) compromise in Internet of Things (IoT) scenarios. Unfortunately, the performances of such protocols are unsatisfactory when dealing with thousands of smart devices. Recently, researchers are focusing on addressing this limitation. The approach is to run attestation in a collective way, with the… ▽ More

    Submitted 14 June, 2018; originally announced June 2018.

    Comments: Submitted to ESORICS 2018

  5. arXiv:1706.07205  [pdf, other

    cs.CR cs.SE

    A Survey on Workflow Satisfiability, Resiliency, and Related Problems

    Authors: Daniel Ricardo dos Santos, Silvio Ranise

    Abstract: Workflows specify collections of tasks that must be executed under the responsibility or supervision of human users. Workflow management systems and workflow-driven applications need to enforce security policies in the form of access control, specifying which users can execute which tasks, and authorization constraints, such as Separation of Duty, further restricting the execution of tasks at run-… ▽ More

    Submitted 22 June, 2017; originally announced June 2017.

  6. arXiv:1507.08153  [pdf, other

    cs.CR cs.LO

    A Declarative Framework for Specifying and Enforcing Purpose-aware Policies

    Authors: Riccardo De Masellis, Chiara Ghidini, Silvio Ranise

    Abstract: Purpose is crucial for privacy protection as it makes users confident that their personal data are processed as intended. Available proposals for the specification and enforcement of purpose-aware policies are unsatisfactory for their ambiguous semantics of purposes and/or lack of support to the run-time enforcement of policies. In this paper, we propose a declarative framework based on a first-… ▽ More

    Submitted 29 July, 2015; originally announced July 2015.

    Comments: Extended version of the paper accepted at the 11th International Workshop on Security and Trust Management (STM 2015)

  7. arXiv:1507.07479  [pdf, other

    cs.SE cs.CR

    Modularity for Security-Sensitive Workflows

    Authors: Daniel Ricardo dos Santos, Silvio Ranise, Serena Elisa Ponta

    Abstract: An established trend in software engineering insists on using components (sometimes also called services or packages) to encapsulate a set of related functionalities or data. By defining interfaces specifying what functionalities they provide or use, components can be combined with others to form more complex components. In this way, IT systems can be designed by mostly re-using existing component… ▽ More

    Submitted 27 July, 2015; originally announced July 2015.

  8. arXiv:1206.3180  [pdf, other

    cs.LO

    Automated Analysis of Scenario-based Specifications of Distributed Access Control Policies with Non-Mechanizable Activities (Extended Version)

    Authors: Michele Barletta, Silvio Ranise, Luca ViganĂ²

    Abstract: The advance of web services technologies promises to have far-reaching effects on the Internet and enterprise networks allowing for greater accessibility of data. The security challenges presented by the web services approach are formidable. In particular, access control solutions should be revised to address new challenges, such as the need of using certificates for the identification of users an… ▽ More

    Submitted 14 June, 2012; originally announced June 2012.

  9. Quantifier-Free Interpolation of a Theory of Arrays

    Authors: Roberto Bruttomesso, Silvio Ghilardi, Silvio Ranise

    Abstract: The use of interpolants in model checking is becoming an enabling technology to allow fast and robust verification of hardware and software. The application of encodings based on the theory of arrays, however, is limited by the impossibility of deriving quantifier- free interpolants in general. In this paper, we show that it is possible to obtain quantifier-free interpolants for a Skolemized vers… ▽ More

    Submitted 26 April, 2012; v1 submitted 11 April, 2012; originally announced April 2012.

    ACM Class: F.4.1, F.3.1

    Journal ref: Logical Methods in Computer Science, Volume 8, Issue 2 (April 27, 2012) lmcs:934

  10. arXiv:1203.3730  [pdf, ps, other

    cs.LO

    From Strong Amalgamability to Modularity of Quantifier-Free Interpolation

    Authors: Roberto Bruttomesso, Silvio Ghilardi, Silvio Ranise

    Abstract: The use of interpolants in verification is gaining more and more importance. Since theories used in applications are usually obtained as (disjoint) combinations of simpler theories, it is important to modularly re-use interpolation algorithms for the component theories. We show that a sufficient and necessary condition to do this for quantifier-free interpolation is that the component theories hav… ▽ More

    Submitted 24 April, 2012; v1 submitted 16 March, 2012; originally announced March 2012.

    Report number: RI 337-12

  11. arXiv:1012.5590  [pdf, other

    cs.CR cs.LO

    Automated Symbolic Analysis of ARBAC-Policies (Extended Version)

    Authors: A. Armando, S. Ranise

    Abstract: One of the most widespread framework for the management of access-control policies is Administrative Role Based Access Control (ARBAC). Several automated analysis techniques have been proposed to help maintaining desirable security properties of ARBAC policies. One limitation of many available techniques is that the sets of users and roles are bounded. In this paper, we propose a symbolic framewor… ▽ More

    Submitted 27 December, 2010; originally announced December 2010.

    Comments: Long version of the paper entitled "Automated Symbolic Analysis of ARBAC Policies" published in Proc. of 6th Int. Workshop on Security and Trust Management (co-located with EUROPKI'10, CRITIS'10, and ESORICS'10), Athens, Sept. 23-24 (2010). Also, to appear in LNCS

  12. Backward Reachability of Array-based Systems by SMT solving: Termination and Invariant Synthesis

    Authors: Silvio Ghilardi, Silvio Ranise

    Abstract: The safety of infinite state systems can be checked by a backward reachability procedure. For certain classes of systems, it is possible to prove the termination of the procedure and hence conclude the decidability of the safety problem. Although backward reachability is property-directed, it can unnecessarily explore (large) portions of the state space of a system which are not required to verif… ▽ More

    Submitted 21 December, 2010; v1 submitted 9 October, 2010; originally announced October 2010.

    Comments: Accepted for publication in Logical Methods in Computer Science

    ACM Class: D.2.4, F.3.1, I.2.2

    Journal ref: Logical Methods in Computer Science, Volume 6, Issue 4 (December 21, 2010) lmcs:966

  13. arXiv:1009.4625  [pdf, other

    cs.CR cs.LO cs.SE

    Automated Validation of Security-sensitive Web Services specified in BPEL and RBAC (Extended Version)

    Authors: Alberto Calvi, Silvio Ranise, Luca ViganĂ²

    Abstract: We formalize automated analysis techniques for the validation of web services specified in BPEL and a RBAC variant tailored to BPEL. The idea is to use decidable fragments of first-order logic to describe the state space of a certain class of web services and then use state-of-the-art SMT solvers to handle their reachability problems. To assess the practical viability of our approach, we have de… ▽ More

    Submitted 7 September, 2010; originally announced September 2010.

    Comments: 12 pages, 3 figures, short version to appear in the Proceedings of WOSS'10, 1st Workshop on Software Services: Frameworks and Platforms

  14. arXiv:0906.4570  [pdf, other

    cs.CR cs.LO

    Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures (Full version)

    Authors: Michele Barletta, Silvio Ranise, Luca ViganĂ²

    Abstract: A widespread design approach in distributed applications based on the service-oriented paradigm, such as web-services, consists of clearly separating the enforcement of authorization policies and the workflow of the applications, so that the interplay between the policy level and the workflow level is abstracted away. While such an approach is attractive because it is quite simple and permits on… ▽ More

    Submitted 25 June, 2009; originally announced June 2009.

    Comments: 16 pages, 4 figures, full version of paper at Symposium on Secure Computing (SecureCom09)

    ACM Class: C.2.2; D.2.4

  15. New results on rewrite-based satisfiability procedures

    Authors: Alessandro Armando, Maria Paola Bonacina, Silvio Ranise, Stephan Schulz

    Abstract: Program analysis and verification require decision procedures to reason on theories of data structures. Many problems can be reduced to the satisfiability of sets of ground literals in theory T. If a sound and complete inference system for first-order logic is guaranteed to terminate on T-satisfiability problems, any theorem-proving strategy with that system and a fair search plan is a T-satisfi… ▽ More

    Submitted 31 May, 2008; v1 submitted 12 April, 2006; originally announced April 2006.

    Comments: To appear in the ACM Transactions on Computational Logic, 49 pages

    Report number: RR 36/2005

    Journal ref: ACM Transactions on Computational Logic, 10(1):129-179, January 2009