Skip to content

Commit

Permalink
Add publication
Browse files Browse the repository at this point in the history
  • Loading branch information
marcopernpruner committed Jan 9, 2025
1 parent fe9a951 commit 130a0a7
Show file tree
Hide file tree
Showing 3 changed files with 34 additions and 0 deletions.
10 changes: 10 additions & 0 deletions _data/destinations.yml
Original file line number Diff line number Diff line change
Expand Up @@ -1133,6 +1133,16 @@
startDate: "2024-05-29"
endDate: "2024-05-30"

- id: OSVS2024
name: 1st Workshop on Operating Systems and Virtualization Security
proceedings: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
acronym: OSVS 2024
url: https://osvs.pages.dev/
type: workshop
location: Vienna, Austria
startDate: "2024-07-12"
endDate: "2024-07-12"

- id: SECRYPT2024
name: 21th International Conference on Security and Cryptography
acronym: SECRYPT 2024
Expand Down
8 changes: 8 additions & 0 deletions _data/people.yml
Original file line number Diff line number Diff line change
Expand Up @@ -687,6 +687,10 @@
name: Matteo
surname: Bregola

- id: MatteoFranzil
name: Matteo
surname: Franzil

- id: MatteoGrasso
name: Matteo
surname: Grasso
Expand Down Expand Up @@ -964,6 +968,10 @@
name: Sergio Manuel
surname: Nóbrega Gonçalves

- id: SilvioCretti
name: Silvio
surname: Cretti

- id: SilvioGhilardi
name: Silvio
surname: Ghilardi
Expand Down
16 changes: 16 additions & 0 deletions _data/publications.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2218,6 +2218,22 @@
doi: 10.1016/j.jisa.2024.103789
urlNews: /news/2024/05/10/paper-accepted-at-jisa/

- id: OSVS2024
id_iris: 350627
title: "Work-in-Progress: A Sidecar Proxy for Usable and Performance-Adaptable End-to-End Protection of Communications in Cloud Native Applications"
authors:
- StefanoBerlato
- MatteoRizzi
- MatteoFranzil
- SilvioCretti
- PietroDeMatteis
- RobertoCarbone
abstract: >
The characteristics of cloud native applications — like the inherent decentralization, the intricate threat model, and the presence of highly dynamic and interconnected microservices — bring forth a number of challenges to the security of the (often sensitive) data exchanged in cloud native applications. Besides, data security is not absolute, and its achievement must be mindful of relevant performance and usability aspects (e.g., minimal overhead, transparency, automation, interoperability with external services). In this work-in-progress paper, we discuss the use of Cryptographic Access Control (CAC) in sidecar proxies as a means to guarantee End-to-End (E2E) protection — in terms of confidentiality and integrity — for communications in cloud native applications, as well as usability and adaptable performance.
destination: OSVS2024
year: 2024
doi: 10.1109/EuroSPW61312.2024.00086

- id: SECRYPT2024
id_iris: 348308
title: "Automating Compliance for Improving TLS Security Postures: An Assessment of Public Administration Endpoints"
Expand Down

0 comments on commit 130a0a7

Please sign in to comment.