References of "Ferreira, Ana"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailComparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare
Ferreira, Ana; Lenzini, Gabriele UL

in Proc. of the nd Int. Conference on International Conference in Information Systems Security and Privacy (ICISSP) (2016)

In healthcare security, Role-based Access Control (RBAC) should be flexible and include capabilities such as Break-the-Glass and Delegation. The former is useful in emergencies to overcome otherwise a ... [more ▼]

In healthcare security, Role-based Access Control (RBAC) should be flexible and include capabilities such as Break-the-Glass and Delegation. The former is useful in emergencies to overcome otherwise a denial of access, the latter to transfer rights temporarily, for example, to substitute doctors. Current research studies these policies separately, but it is unclear whether they are different and independent capabilities. Motivated to look into this matter, we present a formal characterization of Break-the-Glass andDelegation in the RBAC model and we inquire on how these two policies relate. After giving arguments in favour of keeping them apart as different policies, we propose an RBAC model that includes them [less ▲]

Detailed reference viewed: 166 (1 UL)
Full Text
Peer Reviewed
See detailDo graphical cues effectively inform users? A Socio-Technical Security Study in Accessing Wifi Networks
Ferreira, Ana; Huynen, Jean-Louis; Koenig, Vincent UL et al

in Proc. of the International Conference on Human Aspects of Information Security, Privacy, and Trust (2015, July 21)

We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not ... [more ▼]

We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not, finding the answer is not obvious; in our study we clarify whether the problem lies in uninformative and ambiguous cues or in the user who, despite understanding the cues, chooses otherwise. This paper describes experiments and comments the results that bring evidence to our study [less ▲]

Detailed reference viewed: 18 (0 UL)
Full Text
Peer Reviewed
See detailAn Analysis of Social Engineering Principles in Effective Phishing
Ferreira, Ana; Lenzini, Gabriele UL

in Proc. of the 5th International Workshop on Socio-Technical Security and Trust (2015)

Detailed reference viewed: 197 (8 UL)