scispace - formally typeset
E

Elena Ferrari

Researcher at University of Insubria

Publications -  358
Citations -  10892

Elena Ferrari is an academic researcher from University of Insubria. The author has contributed to research in topics: Access control & Information privacy. The author has an hindex of 49, co-authored 333 publications receiving 10150 citations. Previous affiliations of Elena Ferrari include Georgia Institute of Technology & Royal Institute of Technology.

Papers
More filters
Journal ArticleDOI

TRBAC: A temporal role-based access control model

TL;DR: Temporal-RBAC (TRBAC), an extension of the RBAC model, is introduced, which supports periodic role enabling and disabling, and temporal dependencies among such actions, expressed by means of role triggers.
Journal ArticleDOI

The specification and enforcement of authorization constraints in workflow management systems

TL;DR: A language is presented to express both static and dynamic authorization constraints as clauses in a logic program and formal notions of constraint consistency are provided to check the consistency of constraints and assign users and roles to tasks that constitute the workflow in such a way that no constraints are violated.
Journal ArticleDOI

Secure and selective dissemination of XML documents

TL;DR: This article defines a formal model of access control policies for XML documents and proposes an approach, based on an extension of the Cryptolope#8482; approach, which essentially allows one to send the same document to all users, and yet to enforce the statedAccess control policies.
Proceedings ArticleDOI

TRBAC: a temporal role-based access control model

TL;DR: Temporal-RBAC (TRBAC), an extensions of the RBAC model, supports both periodic activations and deactivations of roles, and temporal dependencies among such actions, expressed by means of role triggers.
Journal ArticleDOI

Enforcing access control in Web-based social networks

TL;DR: All the protocols underlying the access control mechanism for Web-based social networks, which adopts a rule-based approach for specifying access policies on the resources owned by network participants, and where authorized users are denoted in terms of the type, depth, and trust level of the relationships existing between nodes in the network are presented.