Follow
Alessandro Colantonio
Alessandro Colantonio
Core Security
Verified email at coresecurity.com
Title
Cited by
Cited by
Year
Concise: Compressed ‘n’composable integer set
A Colantonio, R Di Pietro
Information Processing Letters 110 (16), 644-650, 2010
1152010
A cost-driven approach to role engineering
A Colantonio, R Di Pietro, A Ocello
Proceedings of the 2008 ACM symposium on Applied computing, 2129-2136, 2008
952008
A formal framework to elicit roles with business meaning in RBAC systems
A Colantonio, R Di Pietro, A Ocello, NV Verde
Proceedings of the 14th ACM symposium on Access control models and …, 2009
782009
Visual role mining: A picture is worth a thousand roles
A Colantonio, R Di Pietro, A Ocello, NV Verde
IEEE Transactions on Knowledge and Data Engineering 24 (6), 1120-1133, 2011
662011
Taming role mining complexity in RBAC
A Colantonio, R Di Pietro, A Ocello, NV Verde
Computers & Security 29 (5), 548-564, 2010
522010
A new role mining framework to elicit business roles and to mitigate enterprise risk
A Colantonio, R Di Pietro, A Ocello, NV Verde
Decision Support Systems 50 (4), 715-731, 2011
482011
Leveraging lattices to improve role mining
A Colantonio, RD Pietro, A Ocello
IFIP International Information Security Conference, 333-347, 2008
402008
A business-driven decomposition methodology for role mining
A Colantonio, R Di Pietro, NV Verde
Computers & Security 31 (7), 844-855, 2012
342012
Role engineering: from theory to practice
NV Verde, J Vaidya, V Atluri, A Colantonio
Proceedings of the second ACM conference on Data and Application Security …, 2012
312012
ABBA: Adaptive bicluster-based approach to impute missing values in binary matrices
A Colantonio, R Di Pietro, A Ocello, NV Verde
Proceedings of the 2010 ACM Symposium on Applied Computing, 1026-1033, 2010
302010
Mining stable roles in RBAC
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP International Information Security Conference, 259-269, 2009
302009
A probabilistic bound on the basic role mining problem and its applications
A Colantonio, R Di Pietro, A Ocello, NV Verde
Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 …, 2009
272009
Mining business-relevant RBAC states through decomposition
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP International Information Security Conference, 19-30, 2010
192010
Role mining in business: taming role-based access control administration
R Di Pietro, A Colantonio, A Ocello
World Scientific, 2012
152012
Evaluating the risk of adopting RBAC roles
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP Annual Conference on Data and Applications Security and Privacy, 303-310, 2010
122010
EXPEDITE: EXPress closED ITemset enumeration
G Aliberti, A Colantonio, R Di Pietro, R Mariani
Expert Systems with Applications 42 (8), 3933-3944, 2015
112015
Prioritizing role engineering objectives using the analytic hierarchy process
A Colantonio
Information Systems: Crossroads for Organization, Management, Accounting and …, 2012
62012
Role mining techniques to improve RBAC administration
A Colantonio
Universitą degli studi Roma Tre, 2011
42011
An activity-based model for separation of duty
A Colantonio, R Di Pietro, A Ocello
arXiv preprint arXiv:0810.5351, 2008
32008
Visual detection of singularities in review platforms
A Colantonio, R Di Pietro, M Petrocchi, A Spognardi
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 1294-1295, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20