This is an old revision of the document!
Talks of the Security Group in Trento
This page list in chronological order the main public talks of the Security Group in Trento. You can also find them in the individual research topics.
2013
Luca Allodi
Risk metrics for vulnerabilities exploited in the wild Lecture at University of Milan, April 2013.
Abstract(slides to come)
Luca Allodi
Exploitation in the wild: what do attackers do, and what should(n’t) we care about. UniRoma Tor Vergata. February 2013.
Slides
Vadim Kotov (ESSOS).
2012
-
Federica Paci.
How do you know that a security requirements method actually work? ITT Trust and Security Seminar (TSS), University of Illinois, Urbana-Champaign, IL, USA, September 26 2012.
Slides.Work funded by the project
NESSOS.
-
-
Muhammad Rizwan Asghar, ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems, The 13th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Chapel Hill, North Carolina, USA, July 2012.
Muhammad Rizwan Asghar, ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments, The 6th IEEE International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, August 2011.
2011
Muhammad Rizwan Asghar, ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments, The 6th IEEE International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, August 2011.
Muhammad Rizwan Asghar, Securing Data Provenance in the Cloud, IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland, June 2011.
Muhammad Rizwan Asghar, Flexible and Dynamic Consent-Capturing, IFIP WG 11.4 - Open Problems in Network Security (iNetSec), Lucerne, Switzerland, June 2011.
Muhammad Rizwan Asghar, Enforcing Multi-user Access Policies to Encrypted Cloud Databases, The 12th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Pisa, Italy, June 2011.
-
-
-