default search action
Clara Bertolissi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Clara Bertolissi, Maribel Fernández, Bhavani Thuraisingham:
An Axiomatic Category-Based Access Control Model for Smart Homes. LOPSTR 2024: 131-148 - [c29]Gelareh Hasel Mehri, Benjamin Monmege, Clara Bertolissi, Nicola Zannone:
A Bargaining-Game Framework for Multi-Party Access Control. SACMAT 2024 - [c28]Alba Martinez Anton, Clara Bertolissi, Jean-Marc Talbot:
Solving Access Control Conflicts in Multi-User Systems. SECRYPT 2024: 492-499 - 2023
- [c27]Clara Bertolissi, Alba Martinez Anton, Nicola Zannone:
Data Sharing in Social Networks. SACMAT 2023: 181-192 - 2022
- [b2]Clara Bertolissi:
Formal methods applied to access control policy design, verification and enforcement. Aix-Marseille University, France, 2022 - [c26]Clara Bertolissi, Maribel Fernández:
Modular Composition of Access Control Policies: A Framework to Build Multi-Site Multi-Level Combinations. SACMAT 2022: 7-18 - 2021
- [c25]Clara Bertolissi, Maribel Fernández, Bhavani Thuraisingham:
Graph-Based Specification of Admin-CBAC Policies. CODASPY 2021: 173-184 - 2020
- [c24]Clara Bertolissi, Maribel Fernández, Bhavani Thuraisingham:
Admin-CBAC: An Administration Model for Category-Based Access Control. CODASPY 2020: 73-84
2010 – 2019
- 2019
- [c23]Clara Bertolissi, Jerry den Hartog, Nicola Zannone:
Using Provenance for Secure Data Fusion in Cooperative Systems. SACMAT 2019: 185-194 - 2018
- [c22]Clara Bertolissi, Daniel Ricardo dos Santos, Silvio Ranise:
Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques. SACMAT 2018: 117-128 - 2017
- [c21]Clara Bertolissi, Omar Boucelma, Worachet Uttha:
Enhancing security in the cloud: When traceability meets access control. ICITST 2017: 365-366 - 2016
- [c20]Clara Bertolissi, Jean-Marc Talbot, Didier Villevalois:
Analysis of access control policy updates through narrowing. PPDP 2016: 62-75 - 2015
- [c19]Clara Bertolissi, Daniel Ricardo dos Santos, Silvio Ranise:
Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes. AsiaCCS 2015: 297-308 - [c18]Worachet Uttha, Clara Bertolissi, Silvio Ranise:
Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies. SECRYPT 2015: 293-300 - 2014
- [j4]Clara Bertolissi, Maribel Fernández:
A metamodel of access control for distributed environments: Applications and properties. Inf. Comput. 238: 187-207 (2014) - [c17]Worachet Uttha, Clara Bertolissi, Silvio Ranise:
Towards a Reference Architecture for Access Control in Distributed Web Applications. ESSoS Doctoral Symposium 2014 - 2013
- [c16]Clara Bertolissi, Silvio Ranise:
Verification of Composed Array-Based Systems with Applications to Security-Aware Workflows. FroCos 2013: 40-55 - [c15]Clara Bertolissi, Silvio Ranise:
A methodology to build run-time monitors for security-aware workflows. ICITST 2013: 501-502 - [c14]Clara Bertolissi, Worachet Uttha:
Automated analysis of rule-based access control policies. PLPV 2013: 47-56 - 2010
- [c13]Clara Bertolissi, Maribel Fernández:
Category-Based Authorisation Models: Operational Semantics and Expressive Power. ESSoS 2010: 140-156 - [c12]Clara Bertolissi, Maribel Fernández:
Rewrite Specifications of Access Control Policies in Distributed Environments. STM 2010: 51-67 - [c11]Paolo Baldan, Clara Bertolissi:
Sharing in the Graph Rewriting Calculus. WADT 2010: 27-41
2000 – 2009
- 2009
- [j3]Clara Bertolissi, Maribel Fernández:
Distributed event-based access control. Int. J. Inf. Comput. Secur. 3(3/4): 306-320 (2009) - 2008
- [c10]Clara Bertolissi, Maribel Fernández:
An algebraic-functional framework for distributed access control. CRiSIS 2008: 1-8 - [c9]Clara Bertolissi, Maribel Fernández:
Time and Location Based Services with Access Control. NTMS 2008: 1-6 - [c8]Clara Bertolissi, Maribel Fernández:
A rewriting framework for the composition of access control policies. PPDP 2008: 217-225 - [c7]Steve Barker, Clara Bertolissi, Maribel Fernández:
Action Control by Term Rewriting. SecReT@LICS/CSF 2008: 19-36 - 2007
- [j2]Paolo Baldan, Clara Bertolissi, Horatiu Cirstea, Claude Kirchner:
A rewriting calculus for cyclic higher-order term graphs. Math. Struct. Comput. Sci. 17(3): 363-406 (2007) - [c6]Clara Bertolissi, Maribel Fernández, Steve Barker:
Dynamic Event-Based Access Control as Term Rewriting. DBSec 2007: 195-210 - [c5]Clara Bertolissi, Claude Kirchner:
The Rewriting Calculus as a Combinatory Reduction System. FoSSaCS 2007: 78-92 - [c4]Paolo Baldan, Clara Bertolissi, Horatiu Cirstea, Claude Kirchner:
Towards a Sharing Strategy for the Graph Rewriting Calculus. WRS@RDP 2007: 111-127 - 2006
- [j1]Clara Bertolissi, Horatiu Cirstea, Claude Kirchner:
Expressing combinatory reduction systems derivations in the rewriting calculus. High. Order Symb. Comput. 19(4): 345-376 (2006) - 2005
- [b1]Clara Bertolissi:
The graph rewriting calculus: properties and expressive capabilities. National Polytechnic Institute of Lorraine, Nancy, France, 2005 - [c3]Clara Bertolissi:
The Graph Rewriting Calculus: Confluence and Expressiveness. ICTCS 2005: 113-127 - 2004
- [c2]Clara Bertolissi, Paolo Baldan, Horatiu Cirstea, Claude Kirchner:
A Rewriting Calculus for Cyclic Higher-order Term Graphs. TERMGRAPH 2004: 21-41 - 2003
- [c1]Clara Bertolissi, Horatiu Cirstea, Claude Kirchner:
Translating Combinatory Reduction Systems into the Rewriting Calculus. RULE@RDP 2003: 28-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-25 01:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint