Papers to Review

Instructions

Select a paper and notify the teaching staff of your interest. If the paper is available, you may take it. Prepare a presentation describing the context and challenges, main contributions, results and your critical analysis. In your analysis, identify what you consider the be the advantages and limitations of the concept, or of the results presented.

The presentation shall take at most 20 minutes.

  1. Using RBAC to Enforce the Principle of Least Privilege in Industrial Remote Maintenance Sessions
  2. A _qualitative Study on Usability and Acceptability of Yubico Security Key
  3. A Context-Driven Modelling Framework for Dynamic Authentication Decisions
  4. A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework
  5. AuthGuide - Analyzing Security, Privacy and Usability Trade-offs in Multi-Factor Authentication
  6. DID and VC - Untangling Decentralized Identifiers and Verifiable Credentials for the Web of Trust
  7. Enhancing user authentication in claim-based identity management
  8. FIDO – that dog won’t hunt
  9. From Anonymity to Identification
  10. Future-proof Web Authentication - Bring Your Own FIDO2 Extensions
  11. Houdini’s Escape - Breaking the Resource Rein of Linux Control Groups
  12. Improved Identity Management with Verifiable Credentials and FIDO
  13. Is It Really You - User Identification Via Adaptive Behavior Fingerprinting
  14. Labels and Event Processes in the Asbestos Operating System
  15. Linux Capabilities - making them work
  16. Minimal Information Disclosure with Efficiently Verifiable Credentials
  17. Privacy Protection p-Sensitive k-Anonymity Property
  18. Providing K–Anonymity in Location Based Services
  19. RootAsRole - Towards a Secure Alternative to sudo or su Commands for Home Users and SME Administrators
  20. Security Analysis of eIDAS – The Cross-Country Authentication Scheme in Europe
  21. Should We Rush to Implement Password-less Single Factor FIDO2 based Authentication
  22. Smart Card Technology and the FIDO Protocols
  23. SmartAuth - Dynamic Context Fingerprinting for Continuous User Authentication
Previous
Next