Login / Signup
Cesare Cameroni
ORCID
Publication Activity (10 Years)
Years Active: 2011-2021
Publications (10 Years): 7
Top Topics
Identity Authentication
Access Control
Risk Analysis
Wireless Devices
Top Venues
IEEE Access
BCS HCI
Inf.
MDsec@MoDELS
</>
Publications
</>
Diana Berbecaru
,
Antonio Lioy
,
Cesare Cameroni
On Enabling Additional Natural Person and Domain-Specific Attributes in the eIDAS Network.
IEEE Access
9 (2021)
Diana Berbecaru
,
Antonio Lioy
,
Cesare Cameroni
Providing Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach.
IEEE Access
8 (2020)
Diana Berbecaru
,
Antonio Lioy
,
Cesare Cameroni
Supporting Authorize-then-Authenticate for Wi-Fi access based on an electronic identity infrastructure.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
11 (2) (2020)
Diana Berbecaru
,
Cesare Cameroni
ATEMA: An attribute enablement module for attribute retrieval and transfer through the eIDAS Network.
ICSTCC
(2020)
Diana Berbecaru
,
Antonio Lioy
,
Cesare Cameroni
Providing digital identity and academic attributes through European eID infrastructures: Results achieved, limitations, and future steps.
Softw. Pract. Exp.
49 (11) (2019)
Diana Berbecaru
,
Antonio Lioy
,
Cesare Cameroni
Electronic Identification for Universities: Building Cross-Border Services Based on the eIDAS Infrastructure.
Inf.
10 (6) (2019)
Diana Berbecaru
,
Antonio Lioy
,
Cesare Cameroni
Authorize-then-Authenticate: Supporting Authorization Decisions Prior to Authentication in an Electronic Identity Infrastructure.
IDC
(2019)
Shamal Faily
,
John Lyle
,
Ivan Flechais
,
Andrea S. Atzeni
,
Cesare Cameroni
,
Hans I. Myrhaug
,
Ayse Göker
,
Robert Kleinfeld
Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework.
BCS HCI
(2014)
Shamal Faily
,
John Lyle
,
Cornelius Namiluko
,
Andrea S. Atzeni
,
Cesare Cameroni
Model-driven architectural risk analysis using architectural and contextualised attack patterns.
MDsec@MoDELS
(2012)
Andrea S. Atzeni
,
Cesare Cameroni
,
Shamal Faily
,
John Lyle
,
Ivan Flechais
Here's Johnny: A Methodology for Developing Attacker Personas.
ARES
(2011)