Bruno Crispo

Orcid: 0000-0002-1252-8465

Affiliations:
  • University of Trento, DISI, Povo, Italy


According to our database1, Bruno Crispo authored at least 204 papers between 1996 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
AI-enabled IoT penetration testing: state-of-the-art and research challenges.
Enterp. Inf. Syst., September, 2023

A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes.
Pattern Recognit., July, 2023

Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devices.
IEEE Trans. Dependable Secur. Comput., 2023

Mind the CORS.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Device Behavioral Profiling for Autonomous Protection Using Deep Neural Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management Solutions.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

The Nonce-nce of Web Security: An Investigation of CSP Nonces Reuse.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

μIPS: Software-Based Intrusion Prevention for Bare-Metal Embedded Systems.
Proceedings of the Computer Security - ESORICS 2023, 2023

OAuth 2.0 Redirect URI Validation Falls Short, Literally.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
MPI: Memory Protection for Intermittent Computing.
IEEE Trans. Inf. Forensics Secur., 2022

IDeAuth: A novel behavioral biometric-based implicit deauthentication scheme for smartphones.
Pattern Recognit. Lett., 2022

RiderAuth: A cancelable touch-signature based rider authentication scheme for driverless taxis.
J. Inf. Secur. Appl., 2022

Step & turn - A novel bimodal behavioral biometric-based user verification scheme for physical access control.
Comput. Secur., 2022

Practical attacks on Login CSRF in OAuth.
Comput. Secur., 2022

NemesisGuard: Mitigating interrupt latency side channel attacks with static binary rewriting.
Comput. Networks, 2022

Web Cache Deception Escalates!
Proceedings of the 31st USENIX Security Symposium, 2022

PISTIS: Trusted Computing Architecture for Low-end Embedded Systems.
Proceedings of the 31st USENIX Security Symposium, 2022

WiP: Metamodel for Continuous Authorisation and Usage Control.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Generative adversarial networks for subdomain enumeration.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

End-to-End Encryption for Securing Communications in Industry 4.0.
Proceedings of the 4th IEEE Middle East and North Africa COMMunications Conference, 2022

Mollywood: Subtitles as an attack vector.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

On the (in)security of Memory Protection Units : A Cautionary Note.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
Risk-Driven Behavioral Biometric-based One-Shot-cum-Continuous User Authentication Scheme.
J. Signal Process. Syst., 2021

SWIPEGAN: Swiping Data Augmentation Using Generative Adversarial Networks for Smartphone User Authentication.
Proceedings of the WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021

Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

SIUV: A Smart Car Identity Management and Usage Control System Based on Verifiable Credentials.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

You've Got (a Reset) Mail: A Security Analysis of Email-Based Password Reset Procedures.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

The Full Gamut of an Attack: An Empirical Analysis of OAuth CSRF in the Wild.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

2020
WISE: A Lightweight Intelligent Swarm Attestation Scheme for the Internet of Things.
ACM Trans. Internet Things, 2020

StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications.
J. Syst. Softw., 2020

Cached and Confused: Web Cache Deception in the Wild.
Proceedings of the 29th USENIX Security Symposium, 2020

μSBS: Static Binary Sanitization of Bare-metal Embedded Devices for Fault Observability.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

SIMPLE: A Remote Attestation Approach for Resource-constrained IoT devices.
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020

Verify&Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
SμV - The Security MicroVisor: A Formally-Verified Software-Based Security Architecture for the Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2019

AnswerAuth: A bimodal behavioral biometric-based user authentication scheme for smartphones.
J. Inf. Secur. Appl., 2019

DriverAuth: Behavioral biometric-based driver authentication mechanism for on-demand ride and ridesharing infrastructure.
ICT Express, 2019

DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms.
Comput. Secur., 2019

PrivICN: Privacy-preserving content retrieval in information-centric networking.
Comput. Networks, 2019

A Decentralized and Scalable Model for Resource Discovery in IoT Network.
Proceedings of the 2019 International Conference on Wireless and Mobile Computing, 2019

Towards a standards-compliant pure-software trusted execution environment for resource-constrained embedded devices.
Proceedings of the 4th Workshop on System Software for Trusted Execution, 2019

Detecting malicious applications using system services request behavior.
Proceedings of the MobiQuitous 2019, 2019

SmartHandle: A Novel Behavioral Biometric-based Authentication Scheme for Smart Lock Systems.
Proceedings of the 3rd International Conference on Biometric Engineering and Applications, 2019

A Risk-Driven Model to Minimize the Effects of Human Factors on Smart Devices.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019

MicroGuard: Securing Bare-Metal Microcontrollers against Code-Reuse Attacks.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Towards Bridging the Gap between Modern and Legacy Automotive ECUs: A Software-Based Security Framework for Legacy ECUs.
Proceedings of the IEEE 2nd Connected and Automated Vehicles Symposium, 2019

2018
Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access.
Mob. Inf. Syst., 2018

Internet of Things: A survey on the security of IoT frameworks.
J. Inf. Secur. Appl., 2018

Large-Scale Analysis of Style Injection by Relative Path Overwrite.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

WISE: Lightweight Intelligent Swarm Attestation Scheme for IoT (The Verifier's Perspective).
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

Polyglot CerberOS: Resource Security, Interoperability and Multi-Tenancy for IoT Services on a Multilingual Platform.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

AirSign: A Gesture-Based Smartwatch User Authentication.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

SnapAuth: A Gesture-Based Unobtrusive Smartwatch User Authentication Scheme.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

SlimIoT: Scalable Lightweight Attestation Protocol for the Internet of Things.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

DIALERAUTH: A Motion-assisted Touch-based Smartphone User Authentication Scheme.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

SPEED: Secure Provable Erasure for Class-1 IoT Devices.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Security and privacy in vehicular communications: Challenges and opportunities.
Veh. Commun., 2017

Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps.
Proc. Priv. Enhancing Technol., 2017

TeICC: targeted execution of inter-component communications in Android.
Proceedings of the Symposium on Applied Computing, 2017

S<i>μ</i>V - the security microvisor: a virtualisation-based security middleware for the internet of things.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track, Las Vegas, NV, USA, December 11, 2017

Please hold on: Unobtrusive user authentication using smartphone's built-in sensors.
Proceedings of the IEEE International Conference on Identity, 2017

Mobile biometrics: Towards a comprehensive evaluation methodology.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment.
Proceedings of the Future Data and Security Engineering - 4th International Conference, 2017

CerberOS: A Resource-Secure OS for Sharing IoT Devices.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017

DLoc: Distributed Auditing for Data Location Compliance in Cloud.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

Evaluation of Motion-Based Touch-Typing Biometrics for Online Banking.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2017

2016
Cyber-Physical Security and Privacy [Guest editors' introduction].
IEEE Internet Comput., 2016

Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Empirical Analysis on the Use of Dynamic Code Updates in Android and Its Security Implications.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

Analyzing Gateways' Impact on Caching for Micro CDNs based on CCN.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

PROTECTOR: Privacy-preserving information lookup in content-centric networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Age, Gender and Operating-Hand Estimation on Smart Mobile Devices.
Proceedings of the 2016 International Conference of the Biometrics Special Interest Group, 2016

2015
Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones.
IEEE Trans. Parallel Distributed Syst., 2015

ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones.
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015

Touchstroke: Smartphone User Authentication Based on Touch-Typing Biometrics.
Proceedings of the New Trends in Image Analysis and Processing - ICIAP 2015 Workshops, 2015

E-GRANT: Enforcing Encrypted Dynamic Security Constraints in the Cloud.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Towards Black Box Testing of Android Apps.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
MOSES: Supporting and Enforcing Security Profiles on Smartphones.
IEEE Trans. Dependable Secur. Comput., 2014

FSquaDRA: Fast Detection of Repackaged Applications.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

VLOC: An Approach to Verify the Physical Location of a Virtual Machine In Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

PIDGIN: privacy-preserving interest and content sharing in opportunistic networks.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Less is more: cipher-suite negotiation for DNSSEC.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Virtual private social networks and a facebook implementation.
ACM Trans. Web, 2013

LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload.
ACM Trans. Internet Techn., 2013

Hybrid Static-Runtime Information Flow and Declassification Enforcement.
IEEE Trans. Inf. Forensics Secur., 2013

FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment.
IEEE Trans. Inf. Forensics Secur., 2013

Unprivileged Black-Box Detection of User-Space Keyloggers.
IEEE Trans. Dependable Secur. Comput., 2013

Windows Mobile LiveSD Forensics.
J. Netw. Comput. Appl., 2013

ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments.
IACR Cryptol. ePrint Arch., 2013

ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments.
IACR Cryptol. ePrint Arch., 2013

Providing Source Location Privacy in Wireless Sensor Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2013

ESPOON<sub>ERBAC</sub>: Enforcing security policies in outsourced environments.
Comput. Secur., 2013

Federated Authorization for Software-as-a-Service Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013

Introducing concurrency in policy-based access control.
Proceedings of the 8th Workshop on Middleware for Next Generation Internet Computing, 2013

CREPUSCOLO: A collusion resistant privacy preserving location verification system.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Enabling trusted stores for android.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Supporting complex queries and access policies for multi-user encrypted databases.
Proceedings of the CCSW'13, 2013

2012
CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android.
IEEE Trans. Inf. Forensics Secur., 2012

Design and implementation of a confidentiality and access control solution for publish/subscribe systems.
Comput. Networks, 2012

NoisyKey: Tolerating Keyloggers via Keystrokes Hiding.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System.
Proceedings of the Security Protocols XX, 2012

MOSES: supporting operation modes on smartphones.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Optimal Solutions for Pairing Services on Smartphones: A Strategy to Minimize Energy Consumption.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

Efficient run-time solving of RBAC user authorization queries: pushing the envelope.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Demonstrating the effectiveness of MOSES for separation of execution modes.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Memoirs of a browser: a cross-browser detection model for privacy-breaching extensions.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks.
IACR Cryptol. ePrint Arch., 2011

Events privacy in WSNs: A new model and its application.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

YAASE: Yet Another Android Security Extension.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Access Control via Lightweight Ontologies.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware.
Proceedings of the Recent Advances in Intrusion Detection - 14th International Symposium, 2011

Towards Run-Time Verification in Access Control.
Proceedings of the POLICY 2011, 2011

Enforcing Multi-user Access Policies to Encrypted Cloud Databases.
Proceedings of the POLICY 2011, 2011

Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement.
Proceedings of the Middleware 2011, 2011

Securing Data Provenance in the Cloud.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011

Virtual private social networks.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Poster: ESPOON<sub>ERBAC</sub>: enforcing security policies in outsourced environments with encrypted RBAC.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment.
Wirel. Pers. Commun., 2010

Censorship-Resilient Communications through Information Scattering.
Proceedings of the Security Protocols XVIII, 2010

MASTER as a Security Management Tool for Policy Compliance.
Proceedings of the Towards a Service-Based Internet - Third European Conference, 2010

Providing Confidentiality in Content-based Publish/subscribe Systems.
Proceedings of the SECRYPT 2010, 2010

A service-based context management framework for cross-enterprise collaboration.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Bait Your Hook: A Novel Detection Technique for Keyloggers.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Enforcing UCON Policies on the Enterprise Service Bus.
Proceedings of the On the Move to Meaningful Internet Systems, 2010

Reasoning about Relation Based Access Control.
Proceedings of the Fourth International Conference on Network and System Security, 2010

CRePE: Context-Related Policy Enforcement for Android.
Proceedings of the Information Security - 13th International Conference, 2010

xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

Event Handoff Unobservability in WSN.
Proceedings of the Open Research Problems in Network Security, 2010

Combining Enforcement Strategies in Service Oriented Architectures.
Proceedings of the Service-Oriented Computing - 8th International Conference, 2010

Time Warp: How Time Affects Privacy in LBSs.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

An implementation of event and filter confidentiality in pub/sub systems and its application to e-health.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

A Secure and Scalable Grid-Based Content Management System.
Proceedings of the ARES 2010, 2010

2009
Efficient integration of fine-grained access control and resource brokering in grid.
J. Supercomput., 2009

Anonymous opinion exchange over untrusted social networks.
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 2009

An efficient and scalable algorithm for policy compatibility in service virtualization.
Proceedings of the 2009 10th IEEE/ACM International Conference on Grid Computing, 2009

Ontology Driven Community Access Control.
Proceedings of the ESWC2009 Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009) Heraklion, 2009

Using Description Logics in Relation Based Access Control.
Proceedings of the 22nd International Workshop on Description Logics (DL 2009), 2009

2008
XACML Policy Integration Algorithms.
ACM Trans. Inf. Syst. Secur., 2008

Towards a Theory of White-Box Security.
IACR Cryptol. ePrint Arch., 2008

Turning Teenagers into Stores.
Computer, 2008

Weak data secrecy via obfuscation in network coding based content distribution.
Proceedings of the 1st IFIP Wireless Days, 2008

Performance evaluation of XACML PDP implementations.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

RelBAC: Relation Based Access Control.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008

An efficient weak secrecy scheme for network coding data dissemination in VANET.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

P-CDN: Extending access control capabilities of P2P systems to provide CDN services.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Floodgate: A Micropayment Incentivized P2P Content Delivery Network.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Enforcing DRM policies across applications.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008

2007
A Virtual Machine Based Information Flow Control System for Policy Enforcement.
Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems, 2007

Design and implementation of a secure wide-area object middleware.
Comput. Networks, 2007

Secure web service federation management using tpm virtualisation.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

Instructions to Reviewers.
Proceedings of the Security Protocols, 2007

A Hybrid PKI-IBC Based Ephemerizer System.
Proceedings of the New Approaches for Security, 2007

ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems.
Proceedings of the 21th Large Installation System Administration Conference, 2007

Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
The Evolution of RFID Security.
IEEE Pervasive Comput., 2006

RFID malware: Design principles and examples.
Pervasive Mob. Comput., 2006

RFID malware: truth vs. myth.
IEEE Secur. Priv., 2006

Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes.
IACR Cryptol. ePrint Arch., 2006

Taking Sensor Networks from the Lab to the Jungle.
Computer, 2006

Towards a Secure Application-Semantic Aware Policy Enforcement Architecture.
Proceedings of the Security Protocols, 2006

An Identity-based Ring Signature Scheme with Enhanced Privacy.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Is Your Cat Infected with a Computer Virus?.
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 2006

A Platform for RFID Security and Privacy Administration (Awarded Best Paper!).
Proceedings of the 20th Conference on Systems Administration (LISA 2006), 2006

Security for the Mythical Air-Dropped Sensor Network.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

2005
Enabling DRM-Preserving Digital Content Redistribution.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags.
Proceedings of the Security Protocols, 2005

How to incorporate revocation status information into the trust metrics for public-key certification.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Securely Replicated Web Documents.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

P-Hera: Scalable fine-grained access control for P2P infrastructures.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

Counting Abuses Using Flexible Off-line Credentials.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

Efficient Integration of Fine-grained Access Control in Large-scale Grid Services.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

2004
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System.
Proceedings of the Security Protocols, 2004

Security for grid-based computing systems issues and challenges.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Support for multi-level security policies in DRM architectures.
Proceedings of the New Security Paradigms Workshop 2004, 2004

Towards Supporting Fine-Grained Access Control for Grid Resources.
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004

A DRM security architecture for home networks.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004

Supporting Multi-Dimensional Trustworthiness for Grid Workflows.
Proceedings of the Digital Library Architectures: Peer-to-Peer, 2004

Symmetric Key Authentication Services Revisited.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Enforcing Security Policies for Distributed Objects Applications.
Proceedings of the Security Protocols, 2003

A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Secure Data Replication over Untrusted Hosts.
Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems, 2003

2002
Individual Authentication in Multiparty Communications.
Comput. Secur., 2002

2001
Delegation Protocols for Electronic Commerce.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

Reasoning about Accountability within Delegation.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
WWW security and trusted third party services.
Future Gener. Comput. Syst., 2000

Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms.
Proceedings of the Security Protocols, 2000

Chained Stream Authentication.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

Individual Single Source Authentication on the MBone.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

1999
Delegation of responsibility
PhD thesis, 1999

Issues in Multicast Security.
Proceedings of the Security Protocols, 1999

1998
High Dictionary Compression for Proactive Password Checking.
ACM Trans. Inf. Syst. Secur., 1998

A New Family of Authentication Protocols.
ACM SIGOPS Oper. Syst. Rev., 1998

Secure WWW Transactions Using Standard HTTP and Java Applets.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998

Delegation of Responsibility (Transcript of Discussion).
Proceedings of the Security Protocols, 1998

Delegation of Responsibility (Position Paper).
Proceedings of the Security Protocols, 1998

1997
Strong Authentication and Privacy with Standard Browsers.
J. Comput. Secur., 1997

How to Build Evidence in a Public-Key Infrastructure for Multi-domain Environments.
Proceedings of the Security Protocols, 1997

Proactive Password Checking with Decision Trees.
Proceedings of the CCS '97, 1997

1996
A Certification Scheme for Electronic Commerce.
Proceedings of the Security Protocols, 1996


  Loading...