Papers to Review

Instructions

Select a paper and notify the teaching staff of your interest. If the paper is available, you may take it. Prepare a presentation describing the context and challenges, main contributions, results and your critical analysis. In your analysis, identify what you consider the be the advantages and limitations of the concept, or of the results presented.

The presentation shall take at most 20 minutes, to be presented on the last lecture.

  1. A Comparison of Commercial and Military Computer Security Policies
  2. A Comprehensive Study on Passwordless Authentication
  3. A Context-Driven Modelling Framework for Dynamic Authentication Decisions
  4. A Qualitative Study on Usability and Acceptability of Yubico Security Key
  5. A Survey on Security and Privacy Issues in Internet-of-Things
  6. A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework
  7. ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks
  8. AuthGuide - Analyzing Security, Privacy and Usability Trade-offs in Multi-Factor Authentication
  9. BiolD: a multimodal biometric identification system
  10. Deep Facial Expression Recognition: A Survey
  11. Deep Learning with Differential Privacy
  12. DID and VC - Untangling Decentralized Identifiers and Verifiable Credentials for the Web of Trust
  13. Enhancing user authentication in claim-based identity management
  14. Enhancing security and privacy in biometrics-based authentication systems
  15. FIDO – that dog won’t hunt
  16. From Anonymity to Identification
  17. Future-proof Web Authentication - Bring Your Own FIDO2 Extensions
  18. Houdini’s Escape - Breaking the Resource Rein of Linux Control Groups
  19. Human Identification Using Temporal Information Preserving Gait Template
  20. Improved Identity Management with Verifiable Credentials and FIDO
  21. Integrating Cyber Deception Into Attribute-Based Access Control (ABAC) for Insider Threat Detection
  22. Is It Really You - User Identification Via Adaptive Behavior Fingerprinting
  23. Kerberos: an authentication service for computer networks
  24. Labels and Event Processes in the Asbestos Operating System
  25. Linux Capabilities - making them work
  26. Minimal Information Disclosure with Efficiently Verifiable Credentials
  27. Privacy Protection p-Sensitive k-Anonymity Property
  28. Providing K–Anonymity in Location Based Services
  29. Robust De-anonymization of Large Sparse Datasets
  30. Role-Based Access Control (RBAC) Authorization in Kubernetes
  31. RootAsRole - Towards a Secure Alternative to sudo or su Commands for Home Users and SME Administrators
  32. Security Policies and Security Models
  33. Security Analysis of eIDAS – The Cross-Country Authentication Scheme in Europe
  34. Should We Rush to Implement Password-less Single Factor FIDO2 based Authentication
  35. Smart Card Technology and the FIDO Protocols
  36. SmartAuth - Dynamic Context Fingerprinting for Continuous User Authentication
  37. SoK: Authentication in Augmented and Virtual Reality
  38. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
  39. Using RBAC to Enforce the Principle of Least Privilege in Industrial Remote Maintenance Sessions
Previous
Next