Skip to content

Commit d7997b8

Browse files
Update publications
1 parent bffa2e9 commit d7997b8

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

_data/publications.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2089,7 +2089,8 @@
20892089
abstract: >
20902090
Authentication protocols represent the entry point to online services, so they must be sturdily designed in order to allow only authorized users to access the underlying data. However, designing authentication protocols is a complex process: security designers should carefully select the technologies to involve and integrate them properly in order to prevent potential vulnerabilities. In addition, these choices are usually restricted by further factors, such as the requirements associated with the scenario, the regulatory framework, the dimensions to balance (e.g., security vs. usability), and the standards to rely on. We come to the rescue by presenting an automated multi-layered methodology we have developed to assist security designers in this phase: by repeatedly evaluating their protocols, they can select the security mitigations to consider until they reach the desired security level, thus enabling a security-by-design approach. For concreteness, we also show how we have applied our methodology to a real use case scenario in the context of a collaboration with the Italian Government Printing Office and Mint.
20912091
destination: TDSC
2092-
year: 2023
2092+
destinationAddon: Volume 21, Issue 4, July/August 2024, Pages 1935-1950
2093+
year: 2024
20932094
doi: 10.1109/TDSC.2023.3296210
20942095
urlComplementary: /complementary/TDSC2022
20952096
urlNews: /news/2023/07/17/paper-accepted-at-tdsc/

0 commit comments

Comments
 (0)