Alessandro Colantonio
Alessandro Colantonio
Core Security
Verified email at coresecurity.com
Title
Cited by
Cited by
Year
Concise: Compressed ‘n’composable integer set
A Colantonio, R Di Pietro
Information Processing Letters 110 (16), 644-650, 2010
832010
A cost-driven approach to role engineering
A Colantonio, R Di Pietro, A Ocello
Proceedings of the 2008 ACM symposium on Applied computing, 2129-2136, 2008
762008
A formal framework to elicit roles with business meaning in RBAC systems
A Colantonio, R Di Pietro, A Ocello, NV Verde
Proceedings of the 14th ACM symposium on Access control models and …, 2009
692009
Visual role mining: A picture is worth a thousand roles
A Colantonio, R Di Pietro, A Ocello, NV Verde
IEEE Transactions on Knowledge and Data Engineering 24 (6), 1120-1133, 2011
532011
A new role mining framework to elicit business roles and to mitigate enterprise risk
A Colantonio, R Di Pietro, A Ocello, NV Verde
Decision Support Systems 50 (4), 715-731, 2011
442011
Taming role mining complexity in RBAC
A Colantonio, R Di Pietro, A Ocello, NV Verde
Computers & Security 29 (5), 548-564, 2010
432010
Leveraging lattices to improve role mining
A Colantonio, R Di Pietro, A Ocello
IFIP International Information Security Conference, 333-347, 2008
362008
ABBA: Adaptive bicluster-based approach to impute missing values in binary matrices
A Colantonio, R Di Pietro, A Ocello, NV Verde
Proceedings of the 2010 ACM Symposium on Applied Computing, 1026-1033, 2010
292010
A business-driven decomposition methodology for role mining
A Colantonio, R Di Pietro, NV Verde
Computers & Security 31 (7), 844-855, 2012
252012
Mining stable roles in RBAC
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP International Information Security Conference, 259-269, 2009
252009
Role engineering: from theory to practice
NV Verde, J Vaidya, V Atluri, A Colantonio
Proceedings of the second ACM conference on Data and Application Security …, 2012
242012
A probabilistic bound on the basic role mining problem and its applications
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP International Information Security Conference, 376-386, 2009
232009
Mining business-relevant RBAC states through decomposition
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP International Information Security Conference, 19-30, 2010
162010
Evaluating the risk of adopting RBAC roles
A Colantonio, R Di Pietro, A Ocello, NV Verde
IFIP Annual Conference on Data and Applications Security and Privacy, 303-310, 2010
122010
EXPEDITE: EXPress closED ITemset Enumeration
G Aliberti, A Colantonio, R Di Pietro, R Mariani
Expert Systems with Applications 42 (8), 3933-3944, 2015
102015
Role mining in business: Taming role-based access control administration
R Di Pietro, A Colantonio, A Ocello
World Scientific, 2012
82012
Prioritizing role engineering objectives using the analytic hierarchy process
A Colantonio
Information systems: crossroads for organization, management, accounting and …, 2012
72012
Role mining techniques to improve RBAC administration
A Colantonio
Universitą degli studi Roma Tre, 2011
42011
An activity-based model for separation of duty
A Colantonio, R Di Pietro, A Ocello
arXiv preprint arXiv:0810.5351, 2008
32008
Visual detection of singularities in review platforms
A Colantonio, R Di Pietro, M Petrocchi, A Spognardi
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 1294-1295, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20