Internet of Things: A survey on the security of IoT frameworks M Ammar, G Russello, B Crispo Journal of Information Security and Applications 38, 8-27, 2018 | 415 | 2018 |
Shared and searchable encrypted data for untrusted servers C Dong, G Russello, N Dulay Journal of Computer Security 19 (3), 367-397, 2011 | 258 | 2011 |
Shared and searchable encrypted data for untrusted servers C Dong, G Russello, N Dulay IFIP Annual Conference on Data and Applications Security and Privacy, 127-143, 2008 | 138 | 2008 |
MOSES: supporting operation modes on smartphones G Russello, M Conti, B Crispo, E Fernandes Proceedings of the 17th ACM symposium on Access Control Models and …, 2012 | 102 | 2012 |
Authorisation and conflict resolution for hierarchical domains G Russello, C Dong, N Dulay Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007 | 82 | 2007 |
Supporting publication and subscription confidentiality in pub/sub networks M Ion, G Russello, B Crispo International Conference on Security and Privacy in Communication Systems …, 2010 | 76 | 2010 |
Yaase: Yet another android security extension G Russello, B Crispo, E Fernandes, Y Zhauniarovich 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 75 | 2011 |
Firedroid: Hardening security in almost-stock android G Russello, AB Jimenez, H Naderi, W van der Mark Proceedings of the 29th Annual Computer Security Applications Conference …, 2013 | 71 | 2013 |
MOSES: supporting and enforcing security profiles on smartphones Y Zhauniarovich, G Russello, M Conti, B Crispo, E Fernandes IEEE Transactions on Dependable and Secure Computing 11 (3), 211-223, 2014 | 66 | 2014 |
Design and implementation of a confidentiality and access control solution for publish/subscribe systems M Ion, G Russello, B Crispo Computer networks 56 (7), 2014-2037, 2012 | 56 | 2012 |
Supporting complex queries and access policies for multi-user encrypted databases MR Asghar, G Russello, B Crispo, M Ion Proceedings of the 2013 ACM workshop on Cloud computing security workshop, 77-88, 2013 | 53 | 2013 |
Security system and method for operating systems G Russello, AB Jimenez, H Naderi, W van der Mark US Patent 9,208,328, 2015 | 51 | 2015 |
Privacy and identity management for life J Camenisch, S Fischer-Hübner, K Rannenberg Springer Science & Business Media, 2011 | 50 | 2011 |
Securing data provenance in the cloud MR Asghar, M Ion, G Russello, B Crispo International Workshop on Open Problems in Network Security, 145-160, 2011 | 47 | 2011 |
A workflow-based access control framework for e-health applications G Russello, C Dong, N Dulay 22nd International Conference on Advanced Information Networking and …, 2008 | 45 | 2008 |
Fair private set intersection with a semi-trusted arbiter C Dong, L Chen, J Camenisch, G Russello IFIP Annual Conference on Data and Applications Security and Privacy, 128-144, 2013 | 38 | 2013 |
Consent-based workflows for healthcare management G Russello, C Dong, N Dulay 2008 IEEE Workshop on Policies for Distributed Systems and Networks, 153-161, 2008 | 38 | 2008 |
A policy-based publish/subscribe middleware for sense-and-react applications G Russello, L Mostarda, N Dulay Journal of Systems and Software 84 (4), 638-654, 2011 | 36 | 2011 |
Enforcing multi-user access policies to encrypted cloud databases M Ion, G Russello, B Crispo 2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011 | 32 | 2011 |
Application analysis system for electronic devices G Russello US Patent App. 14/693,038, 2015 | 31 | 2015 |