Instructions
Select a paper and notify the teaching staff of your interest. If the paper is available, you may take it. Prepare a presentation describing the context and challenges, main contributions, results and your critical analysis. In your analysis, identify what you consider the be the advantages and limitations of the concept, or of the results presented.
The presentation shall take at most 20 minutes, to be presented on the last lecture.
- A Comparison of Commercial and Military Computer Security Policies
- A Comprehensive Study on Passwordless Authentication
- A Context-Driven Modelling Framework for Dynamic Authentication Decisions
- A Qualitative Study on Usability and Acceptability of Yubico Security Key
- A Survey on Security and Privacy Issues in Internet-of-Things
- A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework
- ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks
- AuthGuide - Analyzing Security, Privacy and Usability Trade-offs in Multi-Factor Authentication
- BiolD: a multimodal biometric identification system
- Deep Facial Expression Recognition: A Survey
- Deep Learning with Differential Privacy
- DID and VC - Untangling Decentralized Identifiers and Verifiable Credentials for the Web of Trust
- Enhancing user authentication in claim-based identity management
- Enhancing security and privacy in biometrics-based authentication systems
- FIDO – that dog won’t hunt
- From Anonymity to Identification
- Future-proof Web Authentication - Bring Your Own FIDO2 Extensions
- Houdini’s Escape - Breaking the Resource Rein of Linux Control Groups
- Human Identification Using Temporal Information Preserving Gait Template
- Improved Identity Management with Verifiable Credentials and FIDO
- Integrating Cyber Deception Into Attribute-Based Access Control (ABAC) for Insider Threat Detection
- Is It Really You - User Identification Via Adaptive Behavior Fingerprinting
- Kerberos: an authentication service for computer networks
- Labels and Event Processes in the Asbestos Operating System
- Linux Capabilities - making them work
- Minimal Information Disclosure with Efficiently Verifiable Credentials
- Privacy Protection p-Sensitive k-Anonymity Property
- Providing K–Anonymity in Location Based Services
- Robust De-anonymization of Large Sparse Datasets
- Role-Based Access Control (RBAC) Authorization in Kubernetes
- RootAsRole - Towards a Secure Alternative to sudo or su Commands for Home Users and SME Administrators
- Security Policies and Security Models
- Security Analysis of eIDAS – The Cross-Country Authentication Scheme in Europe
- Should We Rush to Implement Password-less Single Factor FIDO2 based Authentication
- Smart Card Technology and the FIDO Protocols
- SmartAuth - Dynamic Context Fingerprinting for Continuous User Authentication
- SoK: Authentication in Augmented and Virtual Reality
- The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
- Using RBAC to Enforce the Principle of Least Privilege in Industrial Remote Maintenance Sessions