![]() |
| 1999 | ||
|---|---|---|
| 8 | EE | Luigi Giuri: Role-Based Access Control on the Web Using Java. ACM Workshop on Role-Based Access Control 1999: 11-18 |
| 1998 | ||
| 7 | EE | Luigi Giuri: Role-based Access Control in Java. ACM Workshop on Role-Based Access Control 1998: 91-100 |
| 6 | EE | Pietro Iglio, Fausto Fraticelli, Luigi Giuri: Rule-Based Filtering for Java Applets. ACSAC 1998: 112-119 |
| 1997 | ||
| 5 | EE | Luigi Giuri, Pietro Iglio: Role templates for content-based access control. ACM Workshop on Role-Based Access Control 1997: 153-159 |
| 1996 | ||
| 4 | EE | Luigi Giuri, Pietro Iglio: A Role-Based Secure Database Design Tool. ACSAC 1996: 203-213 |
| 3 | EE | Luigi Giuri, Pietro Iglio: A Formal Model for Role-Based Access Control with Constraints. CSFW 1996: 136-145 |
| 1995 | ||
| 2 | EE | Luigi Giuri: Role-based access control: a natural approach. ACM Workshop on Role-Based Access Control 1995 |
| 1994 | ||
| 1 | EE | Francesco Gentile, Luigi Giuri, Franco Guida, Emilio Montolivo, Michele Volpe: Security evaluation in information technology standards. Computers & Security 13(8): 647-650 (1994) |
| 1 | Fausto Fraticelli | [6] |
| 2 | Francesco Gentile | [1] |
| 3 | Franco Guida | [1] |
| 4 | Pietro Iglio | [3] [4] [5] [6] |
| 5 | Emilio Montolivo | [1] |
| 6 | Michele Volpe | [1] |