Alessandro Colantonio
Alessandro Colantonio
SecureAuth
Verified email at secureauth.com
TitleCited byYear
Concise: Compressed ‘n’composable integer set
A Colantonio, R Di Pietro
Information Processing Letters 110 (16), 644-650, 2010
712010
A cost-driven approach to role engineering
A Colantonio, R Di Pietro, A Ocello
Proceedings of the 2008 ACM symposium on Applied computing, 2129-2136, 2008
692008
A formal framework to elicit roles with business meaning in RBAC systems
A Colantonio, R Di Pietro, A Ocello, NV Verde
Proceedings of the 14th ACM symposium on Access control models and …, 2009
642009
Visual role mining: A picture is worth a thousand roles
A Colantonio, R Di Pietro, A Ocello, NV Verde
IEEE Transactions on Knowledge and Data Engineering 24 (6), 1120-1133, 2011
442011
A new role mining framework to elicit business roles and to mitigate enterprise risk
A Colantonio, R Di Pietro, A Ocello, NV Verde
Decision Support Systems 50 (4), 715-731, 2011
372011
Taming role mining complexity in RBAC
A Colantonio, R Di Pietro, A Ocello, NV Verde
Computers & Security 29 (5), 548-564, 2010
372010
Leveraging lattices to improve role mining
A Colantonio, R Di Pietro, A Ocello
IFIP International Information Security Conference, 333-347, 2008
312008
ABBA: Adaptive bicluster-based approach to impute missing values in binary matrices
A Colantonio, R Di Pietro, A Ocello, NV Verde
Proceedings of the 2010 ACM Symposium on Applied Computing, 1026-1033, 2010
262010
A business-driven decomposition methodology for role mining
A Colantonio, R Di Pietro, NV Verde
Computers & Security 31 (7), 844-855, 2012
222012
Role engineering: from theory to practice
NV Verde, J Vaidya, V Atluri, A Colantonio
Proceedings of the second ACM conference on Data and Application Security …, 2012
222012
Mining stable roles in RBAC
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP International Information Security Conference, 259-269, 2009
202009
A probabilistic bound on the basic role mining problem and its applications
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP International Information Security Conference, 376-386, 2009
192009
Mining business-relevant RBAC states through decomposition
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP International Information Security Conference, 19-30, 2010
112010
Prioritizing role engineering objectives using the analytic hierarchy process
A Colantonio
Information systems: crossroads for organization, management, accounting and …, 2012
72012
EXPEDITE: EXPress closED ITemset Enumeration
G Aliberti, A Colantonio, R Di Pietro, R Mariani
Expert Systems with Applications 42 (8), 3933-3944, 2015
62015
Role Mining in Business: Taming Role-Based Access Control Administration
C Alessandro, O Alberto
World Scientific, 2012
62012
Evaluating the risk of adopting RBAC roles
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP Annual Conference on Data and Applications Security and Privacy, 303-310, 2010
62010
Role Mining Techniques To Improve RBAC Administration
A Colantonio, RD Pietro, L Chierchia
Rome, 2011
32011
Visual detection of singularities in review platforms
A Colantonio, R Di Pietro, M Petrocchi, A Spognardi
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 1294-1295, 2015
22015
An activity-based model for separation of duty
A Colantonio, R Di Pietro, A Ocello
arXiv preprint arXiv:0810.5351, 2008
22008
The system can't perform the operation now. Try again later.
Articles 1–20