Laurea Degree (M.Sc. equivalent) in Computer Science 25 July 2002

Similar documents
Diploma (5-year degree), School of Applied Mathematics and Physics, NTUA (Greece) Major: Computer Science and Applied Mathematics.

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

Giulia Cereda. Mathematical Institute, Leiden University, Master thesis research project

How To Understand The Theory Of Network Routing In A Computer Program

An Object Oriented Role-based Access Control Model for Secure Domain Environments

CURRICULUM VITAE. Ankur Gupta

Gian-Luca Dei Rossi Curriculum Vitae et Studiorum

Italian. Strada di Montevaccino, 34, 38121, Trento, Italy.

CURRICULUM VITAE RANDOLPH LUCA BRUNO. Via dei Contarini 5, TITLE DEGREES & QUALIFICATIONS

CURRICULUM VITAE ET STUDIORUM Eugenio Capra

Curriculum Vitae of. Vicky G. Papadopoulou

Curriculum Vitae. Personal Details. Education. Qualifications. Professor Andrew Mountford. Nationality

Curriculum Vitae of Paola Boito

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud

Paolo Maistri. September 8, Personal Information 2. Education and Studies 2. Academic Activities and Affiliations 3

MATTEO RIONDATO Curriculum vitae

1991: Ph.D., Computer Science, (Universities of Turin and Milan) 1986: Degree ( Laurea ), Computer Science (University of Turin)

CURRICULUM VITAE CLARA GRAZIANO

Evaluating The Performance of Symmetric Encryption Algorithms

C U R R I C U L U M V I T A E T R I V A N L E

Francesco Merlo Curriculum Vitæ

Victoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5. Victoria Kostina

FRANCESCO BELLOCCHIO S CURRICULUM VITAE ET STUDIORUM

Curriculum Vitae et Studiorum Dossier n Cinzia Di Giusto

Curriculum Vitae. Education. Laura Paladino Dipartimento di Matematica Università di Pisa Largo Bruno Pontecorvo, Pisa (Cosenza)

University of Illinois at Chicago Office: SEO 521 Department of Mathematics, Statistics, (312) and Computer Science

Curriculum Vitae et Studiorum

MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS

Curriculum Vitae, Lisa Gianmoena December 2014

RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

Valeria Leggieri Curriculum Vitae

Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA (857)

June Zhang (Zhong-Ju Zhang)

Role Based Encryption with Efficient Access Control in Cloud Storage

Vincent Cheval. Curriculum Vitae. Research

Harrisonburg, VA 22807

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Trusted Public Auditing Process for Secure Cloud Storage

Alessandro Colantonio

Curriculum Vitae Michael M. Zavlanos

Antonino Freno. Curriculum Vitae. Phone (office): Office: +33 (0)

ANDREA COLOMBARI. Curriculum vitae

CURRICULUM VITAE. Dr. Massimo Contrafatto EDUCATION. MSc, PhD, Post Doc

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

Sofia Ceppi. Personal Information 2. Association Memberships 2. Education 2. Academic Positions and Affiliations 3

Information Security and Cryptography

CURRICULUM VITAE. AREAS OF COMPETENCE Philosophy of mind, logic, critical thinking, metaphysics, history of modern philosophy, applied ethics

Public Key Cryptography in Practice. c Eli Biham - May 3, Public Key Cryptography in Practice (13)

Curriculum Vitae. Daniela Genova

Curriculum Vitae. Zhenchang Xing

CLODIA VURRO. Curriculum Vitae

Guillaume Lajoie, PhD

Dr. Waleed A. Alrodhan (Biographical Sketch)

Doctor of Philosophy (Ph.D.) in Art Education

Truong-Huy Dinh Nguyen

Ph.D., Particle Physics Theory Thesis title: FCNC Processes of B and K Mesons from Lattice QCD University of Edinburgh October 1995 July1999

CURRICULUM VITAE of ANDREA TRAMONTANI (Last update: August 31, 2010)

CURRICULUM VITAE ET STUDIORUM Francesca Gardini

Best Paper Award, Hawaii International Conference on System Sciences, HICSS-36 (2003)

Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )

Michael R. Clarkson Curriculum Vitae

Mohammad Arzaghi.

Ph.D. in Philosophy and Science Studies (Chairs: William Bechtel and Nancy Cartwright), University of California, San Diego (2013)

Yevgeny Goncharov WORK EXPERIENCE

Curriculum Vitae NIKOLAOS GALATOS

Cloud Data Storage Services Considering Public Audit for Security

Integrating basic Access Control Models for efficient security along with encryption for the ERP System

EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE

A Secure Decentralized Access Control Scheme for Data stored in Clouds

CURRICULUM VITAE. (office) (personal)

Invited Conference Talk (20m), A Comparison of Heuristics for Solving Problems in Approximate

EDUCATION Laurea degree in Computer Science summa cum laude from the University of Pisa, Italy in 1984.

Prof. Dr. D. W. Cunningham, Berliner Strasse 35A, Cottbus, Germany

Andrea Pedeferri. Curriculum Vitae

Doctorate of Philosophy Candidate, Information and Communication Technologies, January March 2015.

Laboratoire d Informatique de Paris Nord, Institut Galilée, Université. 99 avenue Jean-Baptiste Clément, Villetaneuse, France.

Salvatore Capasso (MA Econ, PhD)

Curriculum Vitae. Alison M. Trude December Website: Department of Psychology, University of Chicago

CURRICULUM VITÆ ET STUDIORUM Silvia Gazzola

NSERC Alexander Graham Bell Canada Graduate Scholarship, Funding from the Canadian federal government to support graduate studies.

Ph.D. Mathematics University of South Carolina, Columbia, SC Advisor: László Székely

ELLEN E. ENGEL. Education Stanford University, Graduate School of Business, Ph.D. - Accounting, 1997.

2013- Postdoctoral Research Associate - Systems Neurobiology Laboratories, The Salk Institute. La Jolla, CA. Advisor: Edward M. Callaway, Ph.D.

FABRIZIO MONTECCHIANI

Martino Sykora CURRICULUM VITAE ET STUDIORUM

Professor of Economics, Department of Economics, Budapest University of Technology and Economics, and Phone: (36-1)

Back-end Server Reader Tag

Transcription:

ANNA LISA FERRARA CURRICULUM VITAE CONTACT INFORMATION Department of Computer Science University of Bristol Merchant Ventures Building Woodland Road Bristol BS8 1UB United Kingdom E-mail: anna.lisa.ferrara@bristol.ac.uk Web: http://www.cs.bris.ac.uk/home/csxaf/ PERSONAL Name: Anna Lisa Last Name: Ferrara Citizenship: Italian Citizen CURRENT POSITION Research Assistant, University of Bristol Bristol Cryptography Group, Department of Computer Science, Bristol, UK. Nov 2011 Present EDUCATION Doctor of Philosophy (Ph.D.) in Computer Science 11 April 2006 Università degli Studi di Salerno, Italy. Advisors: Prof. Alfredo De Santis Thesis title: On Access Control Policies and Key Assignment Schemes Laurea Degree (M.Sc. equivalent) in Computer Science 25 July 2002 Università degli Studi di Salerno, Italy. Thesis title: Assegnamento di Chiavi in una Gerarchia (in Italian). Grade: 110/110 summa cum laude PAST ACADEMIC POSITIONS Post-Doctoral Fellowships, University of Southampton May 2011 Oct 2011 School of Electronics and Computer Science, Hosted by M. Butler Southampton, UK. Postdoctoral Research Associate, Università degli Studi di Salerno Jun 2009 May 2011 Dept. of Computer Science Hosted by A. De Santis Fisciano, Italy. Visiting Scholar, University of Illinois at Urbana-Champaign July 2011 Hosted by P. Madhusudan Urbana, USA. Post-Doctoral Fellowship, University of Illinois at Urbana-Champaign Feb 2008 April 2009 Hosted by M. Prabhakaran Urbana, USA.

Curriculum Vitae: Anna Lisa Ferrara Page 2 Post-Doctoral Fellowship, Johns Hopkins University Feb 2007 Jan 2008 Hosted by G. Ateniese Baltimore, USA. Postdoctoral Research Associate, Università degli Studi di Salerno Dec 2005 Jan 2007 Dept. of Computer Science Hosted by A. De Santis Fisciano, Italy. RESEARCH EXPERIENCES Visiting Scholar, University of Illinois at Urbana-Champaign July 2011 Hosted by P. Madhusudan Urbana, USA. Visiting Student, University of Waterloo Sept 2004 May 2005 Centre for Applied Cryptographic Research Hosted by D. Stinson Waterloo, Ontario, Canada. RESEARCH INTERESTS Computer Security Applied Cryptography Formal Methods for Computer Security Access Control CURRENT RESEARCH PROJECTS Cryptographic Enforcement of Access Control Models Verification of Access Control Models Privacy Issues in Cryptographic Access Control Data Leakage in Discretionary Access Control SOFTWARE/TOOLS VAC : Verifier of Access Control. http://users.ecs.soton.ac.uk/gp4/vac.html HONORS Teaching qualification for Associate professor in Italy 2014 Teaching qualification in France (Maitre de Conferences in Informatique) 2011.

Curriculum Vitae: Anna Lisa Ferrara Page 3 PROFESSIONAL ACTIVITIES Refereed journals and conferences: ACM Transactions on Information and System Security (TISSEC) Theoretical Computer Science (TCS) Design, Codes and Cryptography (DCC) IEEE Transaction on Computers Information Processing Letters (IPL) IEEE Transaction on Knowledge and Data Engineering IEEE Transaction on Information Forensic and Security Information Sciences Int l ACM Conference on Computer and Communications Security (CCS) Int l Conference on Practice and Theory of Public-Key Cryptography (PKC) Int l Symposium on Logic in Computer Science (LICS) Int l Colloquium on Automata, Languages, and Programming (ICALP) Int l Theory of Cryptography Conference (TCC) Int l Conference Selected Areas in Cryptography (SAC) Int l Conference on the Theory and Application of Cryptology and Inf. Security (AsiaCrypt) Int l Conference on the Theory and Applications of Security and Cryptography (AfricaCrypt) Int l Conference on Principles of Security and Trust (Post) Int l Conference on Information and Communication Systems (ICICS) Int l Symposium on Privacy Enhancing Technologies (PET) Int l Conference on Security and Cryptography for Networks (SCN) Service PC Member: 10th International Conference on Electronic Commerce and Web Technologies - EC-Web 2009. PC Member: 11th International Conference on Electronic Commerce and Web Technologies - EC-Web 2010. TEACHING EXPERIENCE Advanced Topics in Network Security - Access Control: An Information Theoretic Approach and Provable Secure Solutions, Class offered in May 2009 (20 hours), International Doctorate School, Trento, Italy. Network Security, Class offered in Spring 2011 (72 hours), Master in Computer Science, Università degli Studi di Salerno, Italy. Cryptography, Tutor for the class, every year since 2006, Master in System Security and Networks (online edition), Università degli Studi di Milano, Italy. INVITED TALKS Design and Analysis of Security Systems Department of Informatics, King s College London, UK, November 2012. Cryptography Group, Bristol University, UK, September 2011. Design and Analysis of Cryptographic Protocols Department of Informatics, King s College London, UK, July 2011. Cryptographic Enforcment of Access Control Policies School of Electronics and Computer Science, University of Southampton, UK,

Curriculum Vitae: Anna Lisa Ferrara Page 4 February 2011. Batch Verification of Short Signatures Dipartimento di Ingegneria e Scienza dell Informazione, Universita di Trento, Italy, December 2007. Provably-secure Hierarchical Key Assignment Schemes Department of Computer Science, University of Illinois at Urbana-Champaign, USA, December 2006. MEMBER OF PROJECTS Advanced Grant European Research Council: ERC-2010-Adg-267188-CRIPTO. European Network of Excellence in Cryptology - ECRYPT II - MAYA. European Network of Excellence in Cryptology - ECRYPT I. NSF Grant: FormalSecurity Analysis of Access Control Models and Extensions. NSF Program: Trustworthy Computing. Principal Investigator:P. Madhusudan, University of Illinois at Urbana-Champaign. Italian Projects FARB (ex 60 %), from 2002 to 2010 (University of Salerno). Italian Project PRIN 2006: Progettazione, analisi ed implementazione di protocolli crittografici per la protezione dei dati sensibili e la gestione dei privilegi per il controllo degli accessi in basi di dati distribuite. LEAVES Maternity Leave from 20 February 2013 to 10 June 2013. REFERENCES References available upon request.

Curriculum Vitae: Anna Lisa Ferrara Page 5 PUBLICATIONS * THESES [T1] On Access Control Policies and Key Assignment Schemes. Dissertation (Ph.D.), Università degli Studi di Salerno, Italy, April 2006. [T2] Assegnamento di Chiavi in una Gerarchia (in italian). Laurea degree s thesis, Università degli Studi di Salerno, Italy, July 2002. JOURNAL ARTICLES [1] Security Analysis for Temporal Role Based Access Control. Journal of Computer Security, 2014. To appear. (with E. Uzun, V. Atluri, S. Sural, J. Vaidya, G. Parlato, and P. Madhusudan). [2] A Note on Time-Bound Hierarchical Key Assignment Schemes. Information Processing Letters, Inf. 113(5-6): 151-155, 2013 (with G. Ateniese, A. De Santis and B. Masucci). [3] Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. Journal of Cryptology, vol. 25(2), pp. 243-270, 2012 (with G. Ateniese, A. De Santis, and B. Masucci). [4] Efficient Provably-Secure Hierarchical Key Assignment Schemes. Theorethical Computer Science, vol. 412(41), pp. 5684-5699, 2011 (with A. De Santis and B. Masucci). [5] Variations on a Theme by Akl and Taylor: Security and Tradeoffs. Theorethical Computer Science, vol. 411, pp. 213-227, 2010 (with P. D Arco, A. De Santis, and B. Masucci). [6] An Attack on a Payment Scheme. Information Sciences, Vol. 178, No. 5, pp. 1418-1421, March 2008 ( with A. De Santis, and B. Masucci). [7] New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. Theoretical Computer Science, Vol. 407, pp. 213-230, 2008 ( with A. De Santis, and B. Masucci). [8] Enforcing the Security of a Time-bound Hierarchical Key Assignment Scheme. Information Sciences, Vol. 176, No. 12, pp. 1684 1694, June 2006 (with A. De Santis, and B. Masucci). [9] Unconditionally Secure Key Assignment Schemes. Discrete Applied Mathematics, Vol. 154, No. 2, pp. 234 252, February 2006 (with A. De Santis, and B. Masucci). [10] Ideal Contrast Visual Cryptography Schemes with Reversing. Information Processing Letters, Vol. 93, n. 4, pp. 199-206, February 28, 2005 (with S. Cimato, A. De Santis, and B. Masucci). [11] A Simple Algorithm for the Constrained Sequence Problems. Information Processing Letters, Vol. 92, n. 4, pp. 199-205, November 30, 2004 (with A. De Santis, and B. Masucci). [12] Modeling A Certified Email Protocol using I/O Automata. Electronic Notes in Theoretical Computer Science, vol. 99, 2004, pp. 339-359 (with C. Blundo, S. Cimato and R. De Prisco).

Curriculum Vitae: Anna Lisa Ferrara Page 6 PENDING PUBLICATIONS [13] Privacy-preserving Cryptographic RBAC Enforcement. Under submission, 2014. (with G. Fuchsbauer, and B. Warinschi). [14] Identifying and Preventing Unauthorized Data Flows in DAC. Under submission, 2014. (with E. Uzun, V. Atluri, J. Vaidya, G. Parlato, S. Sural, and D. Lorenzi). CONFERENCE PUBLICATIONS [15] VAC: Verifier of Administrative Role-based Access Control Policies. In Proc. 26th International Conference on Computer Aided Verification (CAV 2014), To appear, Vienna, Austria, July 2014 (with P. Madhusudan, T. L. Nguyen, and G. Parlato). [16] Cryptographically Enforced RBAC. In Proc. IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013 (CSF 2013) (with G. Fuchsbauer, and B. Warinschi). [17] Policy Analysis for Self-Administrated Role-Based Access Control. In Proc. 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013), volume 7795 of LNCS, pages 432 447, Rome, Italy, March 2013 (with P. Madhusudan, and G. Parlato.). [18] Security Analysis of Access Control Policies through Program Verification. In Proc. 25th IEEE Computer Security Foundations Symposium (CSF 2012), pages 113 125, Harvard University, Cambridge MA, USA, June 2012 (with P. Madhusudan, and G. Parlato). [19] Analyzing Temporal Role Based Access Control Models. In Proc. 17th ACM Symposium on Access Control Models and Technologies (SACMAT 2012), pages 177 186, Rutgers University, Newark NJ, USA, June 2012 (with V. Atluri, P. Madhusudan, G. Parlato, S. Sural, E. Uzun, and J. Vaidya). [20] Security and Tradeoffs of the Akl-Taylor Scheme and its Variants. In Proc. 34th International Symposium on Mathematical Foundations of Computer Science ( MFCS 2009), Lecture Notes in Computer Science, Vol. 5734, pp. 247-257, Springer Verlag, 2009 (with P. D Arco, A. De Santis, and B. Masucci). [21] Practical Short Signature Batch Verification. In Proc. Topics in Cryptology. The Cryptographers Track at the RSA Conference 2009 (CT-RSA 2009), Lecture Notes in Computer Science, vol. 5473, pp. 309 324, Springer Verlag, 2009 (with M. Green, S. Hohenberger, M. O. Pedersen). [22] Efficient Provably-Secure Hierarchical Key Assignment Schemes. In Proc. 32nd International Symposium on Mathematical Foundations of Computer Science (MFCS 2007), Lecture Notes in Computer Science, Vol. 4708, pp. 371 382, Springer Verlag, 2007 (with A. De Santis, and B. Masucci). [23] New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. In Proc. 12th ACM Symposium on Access Control Models and Technologies (SACMAT 2007), Sophia Antipolis, France, June 20-22 2007, pp. 133 138 (with A. De Santis, and B. Masucci). [24] Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. In Proc. 14th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, Virginia, USA, November 2006 (with G. Ateniese, A. De Santis, and B. Masucci). [25] A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy. In Proc.International Workshop on Coding and Cryptography (WCC 2005), Lecture Notes in Computer Science, Vol. 3969, pp. 202 217, Springer Verlag, 2006 (with A. De Santis, and B. Masucci).

Curriculum Vitae: Anna Lisa Ferrara Page 7 [26] Unconditionally Secure Hierarchical Key Assignment Schemes. In Proc. International Workshop on Coding and Cryptography (WCC 2003), Veirsalles, France, March 24-28, 2003 (with A. De Santis, and B. Masucci). [27] An Information-Theoretic Approach to the Access Control Problem. in Proc. of The Eighth Italian Conference on Theoretical Computer Science - ICTCS 2003, University Center Bertinoro, Italy, October 13-15, 2003, Lecture Notes in Computer Science, Vol. 2841, pp. 342 354, Springer Verlag, 2003 (with B. Masucci). CHAPTERS IN BOOKS [28] Visual Cryptography Schemes with Reversing. In Visual Cryptography and Secret Image Sharing, CRC Press, Boca Raton, USA, August 2011. (with A. De Santis, and B. Masucci ).