ANNA LISA FERRARA CURRICULUM VITAE CONTACT INFORMATION Department of Computer Science University of Bristol Merchant Ventures Building Woodland Road Bristol BS8 1UB United Kingdom E-mail: anna.lisa.ferrara@bristol.ac.uk Web: http://www.cs.bris.ac.uk/home/csxaf/ PERSONAL Name: Anna Lisa Last Name: Ferrara Citizenship: Italian Citizen CURRENT POSITION Research Assistant, University of Bristol Bristol Cryptography Group, Department of Computer Science, Bristol, UK. Nov 2011 Present EDUCATION Doctor of Philosophy (Ph.D.) in Computer Science 11 April 2006 Università degli Studi di Salerno, Italy. Advisors: Prof. Alfredo De Santis Thesis title: On Access Control Policies and Key Assignment Schemes Laurea Degree (M.Sc. equivalent) in Computer Science 25 July 2002 Università degli Studi di Salerno, Italy. Thesis title: Assegnamento di Chiavi in una Gerarchia (in Italian). Grade: 110/110 summa cum laude PAST ACADEMIC POSITIONS Post-Doctoral Fellowships, University of Southampton May 2011 Oct 2011 School of Electronics and Computer Science, Hosted by M. Butler Southampton, UK. Postdoctoral Research Associate, Università degli Studi di Salerno Jun 2009 May 2011 Dept. of Computer Science Hosted by A. De Santis Fisciano, Italy. Visiting Scholar, University of Illinois at Urbana-Champaign July 2011 Hosted by P. Madhusudan Urbana, USA. Post-Doctoral Fellowship, University of Illinois at Urbana-Champaign Feb 2008 April 2009 Hosted by M. Prabhakaran Urbana, USA.
Curriculum Vitae: Anna Lisa Ferrara Page 2 Post-Doctoral Fellowship, Johns Hopkins University Feb 2007 Jan 2008 Hosted by G. Ateniese Baltimore, USA. Postdoctoral Research Associate, Università degli Studi di Salerno Dec 2005 Jan 2007 Dept. of Computer Science Hosted by A. De Santis Fisciano, Italy. RESEARCH EXPERIENCES Visiting Scholar, University of Illinois at Urbana-Champaign July 2011 Hosted by P. Madhusudan Urbana, USA. Visiting Student, University of Waterloo Sept 2004 May 2005 Centre for Applied Cryptographic Research Hosted by D. Stinson Waterloo, Ontario, Canada. RESEARCH INTERESTS Computer Security Applied Cryptography Formal Methods for Computer Security Access Control CURRENT RESEARCH PROJECTS Cryptographic Enforcement of Access Control Models Verification of Access Control Models Privacy Issues in Cryptographic Access Control Data Leakage in Discretionary Access Control SOFTWARE/TOOLS VAC : Verifier of Access Control. http://users.ecs.soton.ac.uk/gp4/vac.html HONORS Teaching qualification for Associate professor in Italy 2014 Teaching qualification in France (Maitre de Conferences in Informatique) 2011.
Curriculum Vitae: Anna Lisa Ferrara Page 3 PROFESSIONAL ACTIVITIES Refereed journals and conferences: ACM Transactions on Information and System Security (TISSEC) Theoretical Computer Science (TCS) Design, Codes and Cryptography (DCC) IEEE Transaction on Computers Information Processing Letters (IPL) IEEE Transaction on Knowledge and Data Engineering IEEE Transaction on Information Forensic and Security Information Sciences Int l ACM Conference on Computer and Communications Security (CCS) Int l Conference on Practice and Theory of Public-Key Cryptography (PKC) Int l Symposium on Logic in Computer Science (LICS) Int l Colloquium on Automata, Languages, and Programming (ICALP) Int l Theory of Cryptography Conference (TCC) Int l Conference Selected Areas in Cryptography (SAC) Int l Conference on the Theory and Application of Cryptology and Inf. Security (AsiaCrypt) Int l Conference on the Theory and Applications of Security and Cryptography (AfricaCrypt) Int l Conference on Principles of Security and Trust (Post) Int l Conference on Information and Communication Systems (ICICS) Int l Symposium on Privacy Enhancing Technologies (PET) Int l Conference on Security and Cryptography for Networks (SCN) Service PC Member: 10th International Conference on Electronic Commerce and Web Technologies - EC-Web 2009. PC Member: 11th International Conference on Electronic Commerce and Web Technologies - EC-Web 2010. TEACHING EXPERIENCE Advanced Topics in Network Security - Access Control: An Information Theoretic Approach and Provable Secure Solutions, Class offered in May 2009 (20 hours), International Doctorate School, Trento, Italy. Network Security, Class offered in Spring 2011 (72 hours), Master in Computer Science, Università degli Studi di Salerno, Italy. Cryptography, Tutor for the class, every year since 2006, Master in System Security and Networks (online edition), Università degli Studi di Milano, Italy. INVITED TALKS Design and Analysis of Security Systems Department of Informatics, King s College London, UK, November 2012. Cryptography Group, Bristol University, UK, September 2011. Design and Analysis of Cryptographic Protocols Department of Informatics, King s College London, UK, July 2011. Cryptographic Enforcment of Access Control Policies School of Electronics and Computer Science, University of Southampton, UK,
Curriculum Vitae: Anna Lisa Ferrara Page 4 February 2011. Batch Verification of Short Signatures Dipartimento di Ingegneria e Scienza dell Informazione, Universita di Trento, Italy, December 2007. Provably-secure Hierarchical Key Assignment Schemes Department of Computer Science, University of Illinois at Urbana-Champaign, USA, December 2006. MEMBER OF PROJECTS Advanced Grant European Research Council: ERC-2010-Adg-267188-CRIPTO. European Network of Excellence in Cryptology - ECRYPT II - MAYA. European Network of Excellence in Cryptology - ECRYPT I. NSF Grant: FormalSecurity Analysis of Access Control Models and Extensions. NSF Program: Trustworthy Computing. Principal Investigator:P. Madhusudan, University of Illinois at Urbana-Champaign. Italian Projects FARB (ex 60 %), from 2002 to 2010 (University of Salerno). Italian Project PRIN 2006: Progettazione, analisi ed implementazione di protocolli crittografici per la protezione dei dati sensibili e la gestione dei privilegi per il controllo degli accessi in basi di dati distribuite. LEAVES Maternity Leave from 20 February 2013 to 10 June 2013. REFERENCES References available upon request.
Curriculum Vitae: Anna Lisa Ferrara Page 5 PUBLICATIONS * THESES [T1] On Access Control Policies and Key Assignment Schemes. Dissertation (Ph.D.), Università degli Studi di Salerno, Italy, April 2006. [T2] Assegnamento di Chiavi in una Gerarchia (in italian). Laurea degree s thesis, Università degli Studi di Salerno, Italy, July 2002. JOURNAL ARTICLES [1] Security Analysis for Temporal Role Based Access Control. Journal of Computer Security, 2014. To appear. (with E. Uzun, V. Atluri, S. Sural, J. Vaidya, G. Parlato, and P. Madhusudan). [2] A Note on Time-Bound Hierarchical Key Assignment Schemes. Information Processing Letters, Inf. 113(5-6): 151-155, 2013 (with G. Ateniese, A. De Santis and B. Masucci). [3] Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. Journal of Cryptology, vol. 25(2), pp. 243-270, 2012 (with G. Ateniese, A. De Santis, and B. Masucci). [4] Efficient Provably-Secure Hierarchical Key Assignment Schemes. Theorethical Computer Science, vol. 412(41), pp. 5684-5699, 2011 (with A. De Santis and B. Masucci). [5] Variations on a Theme by Akl and Taylor: Security and Tradeoffs. Theorethical Computer Science, vol. 411, pp. 213-227, 2010 (with P. D Arco, A. De Santis, and B. Masucci). [6] An Attack on a Payment Scheme. Information Sciences, Vol. 178, No. 5, pp. 1418-1421, March 2008 ( with A. De Santis, and B. Masucci). [7] New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. Theoretical Computer Science, Vol. 407, pp. 213-230, 2008 ( with A. De Santis, and B. Masucci). [8] Enforcing the Security of a Time-bound Hierarchical Key Assignment Scheme. Information Sciences, Vol. 176, No. 12, pp. 1684 1694, June 2006 (with A. De Santis, and B. Masucci). [9] Unconditionally Secure Key Assignment Schemes. Discrete Applied Mathematics, Vol. 154, No. 2, pp. 234 252, February 2006 (with A. De Santis, and B. Masucci). [10] Ideal Contrast Visual Cryptography Schemes with Reversing. Information Processing Letters, Vol. 93, n. 4, pp. 199-206, February 28, 2005 (with S. Cimato, A. De Santis, and B. Masucci). [11] A Simple Algorithm for the Constrained Sequence Problems. Information Processing Letters, Vol. 92, n. 4, pp. 199-205, November 30, 2004 (with A. De Santis, and B. Masucci). [12] Modeling A Certified Email Protocol using I/O Automata. Electronic Notes in Theoretical Computer Science, vol. 99, 2004, pp. 339-359 (with C. Blundo, S. Cimato and R. De Prisco).
Curriculum Vitae: Anna Lisa Ferrara Page 6 PENDING PUBLICATIONS [13] Privacy-preserving Cryptographic RBAC Enforcement. Under submission, 2014. (with G. Fuchsbauer, and B. Warinschi). [14] Identifying and Preventing Unauthorized Data Flows in DAC. Under submission, 2014. (with E. Uzun, V. Atluri, J. Vaidya, G. Parlato, S. Sural, and D. Lorenzi). CONFERENCE PUBLICATIONS [15] VAC: Verifier of Administrative Role-based Access Control Policies. In Proc. 26th International Conference on Computer Aided Verification (CAV 2014), To appear, Vienna, Austria, July 2014 (with P. Madhusudan, T. L. Nguyen, and G. Parlato). [16] Cryptographically Enforced RBAC. In Proc. IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013 (CSF 2013) (with G. Fuchsbauer, and B. Warinschi). [17] Policy Analysis for Self-Administrated Role-Based Access Control. In Proc. 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2013), volume 7795 of LNCS, pages 432 447, Rome, Italy, March 2013 (with P. Madhusudan, and G. Parlato.). [18] Security Analysis of Access Control Policies through Program Verification. In Proc. 25th IEEE Computer Security Foundations Symposium (CSF 2012), pages 113 125, Harvard University, Cambridge MA, USA, June 2012 (with P. Madhusudan, and G. Parlato). [19] Analyzing Temporal Role Based Access Control Models. In Proc. 17th ACM Symposium on Access Control Models and Technologies (SACMAT 2012), pages 177 186, Rutgers University, Newark NJ, USA, June 2012 (with V. Atluri, P. Madhusudan, G. Parlato, S. Sural, E. Uzun, and J. Vaidya). [20] Security and Tradeoffs of the Akl-Taylor Scheme and its Variants. In Proc. 34th International Symposium on Mathematical Foundations of Computer Science ( MFCS 2009), Lecture Notes in Computer Science, Vol. 5734, pp. 247-257, Springer Verlag, 2009 (with P. D Arco, A. De Santis, and B. Masucci). [21] Practical Short Signature Batch Verification. In Proc. Topics in Cryptology. The Cryptographers Track at the RSA Conference 2009 (CT-RSA 2009), Lecture Notes in Computer Science, vol. 5473, pp. 309 324, Springer Verlag, 2009 (with M. Green, S. Hohenberger, M. O. Pedersen). [22] Efficient Provably-Secure Hierarchical Key Assignment Schemes. In Proc. 32nd International Symposium on Mathematical Foundations of Computer Science (MFCS 2007), Lecture Notes in Computer Science, Vol. 4708, pp. 371 382, Springer Verlag, 2007 (with A. De Santis, and B. Masucci). [23] New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. In Proc. 12th ACM Symposium on Access Control Models and Technologies (SACMAT 2007), Sophia Antipolis, France, June 20-22 2007, pp. 133 138 (with A. De Santis, and B. Masucci). [24] Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. In Proc. 14th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, Virginia, USA, November 2006 (with G. Ateniese, A. De Santis, and B. Masucci). [25] A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy. In Proc.International Workshop on Coding and Cryptography (WCC 2005), Lecture Notes in Computer Science, Vol. 3969, pp. 202 217, Springer Verlag, 2006 (with A. De Santis, and B. Masucci).
Curriculum Vitae: Anna Lisa Ferrara Page 7 [26] Unconditionally Secure Hierarchical Key Assignment Schemes. In Proc. International Workshop on Coding and Cryptography (WCC 2003), Veirsalles, France, March 24-28, 2003 (with A. De Santis, and B. Masucci). [27] An Information-Theoretic Approach to the Access Control Problem. in Proc. of The Eighth Italian Conference on Theoretical Computer Science - ICTCS 2003, University Center Bertinoro, Italy, October 13-15, 2003, Lecture Notes in Computer Science, Vol. 2841, pp. 342 354, Springer Verlag, 2003 (with B. Masucci). CHAPTERS IN BOOKS [28] Visual Cryptography Schemes with Reversing. In Visual Cryptography and Secret Image Sharing, CRC Press, Boca Raton, USA, August 2011. (with A. De Santis, and B. Masucci ).