Abstract
Cyber space is expanding fast with the introduction of new Internet of Things (IoT) and CPS devices. Wearables, smart watches, smart glasses, fitness trackers, medical devices, Internet-connected house appliances and vehicles have grown exponentially in a short...
Data privacy and security
-
-
In the era of microarchitectural side channels, vendors scramble to deploy mitigations for transient execution attacks, but leave traditional side-channel attacks against sensitive software (e.g., crypto programs) to be fixed by developers by means of constant-time programming (i.e., absence of...
-
Where and when: Monday, January 24th, 12 noon, Aula Magna@DIAGAbstractZero-knowledge proofs [GMR85] are among the most fascinating concepts in computer science. During the last 35 years they...
-
In Controlled Query Evaluation (CQE) confidential data are protected through a declarative policy and a (optimal) censor, which guarantees that answers to queries are maximized without disclosing secrets. In this paper we consider CQE over Description Logic ontologies and study query answering over...
-
-
-
Le attività di ricerca e sviluppo relative alla realizzazione di sistemi strategici quali, ad esempio, gli impianti produttivi distribuiti su vaste aree geografiche, i sistemi globali per le telecomunicazioni o i sistemi satellitari per l'osservazione terrestre, richiedono un notevole sforzo...
-
Controlled Query Evaluation (CQE) is a confidentiality-preserving framework in which private information is protected through a policy, and a (optimal) censor guarantees that answers to queries are maximized without violating the policy. CQE has been recently studied in the context of ontologies,...
-
The cybersecurity group is a multidisciplinary team of researchers that collates several knowledge areas and apply them to scientific problems in the context of IT security. The team works on several diverse topics related to cybersecurity, including:
Attack modeling...
-