Internet of Things: A survey on the security of IoT frameworks M Ammar, G Russello, B Crispo Journal of Information Security and Applications 38, 8-27, 2018 | 1055 | 2018 |
Shared and searchable encrypted data for untrusted servers C Dong, G Russello, N Dulay Journal of Computer Security 19 (3), 367-397, 2011 | 322 | 2011 |
Shared and searchable encrypted data for untrusted servers C Dong, G Russello, N Dulay IFIP Annual Conference on Data and Applications Security and Privacy, 127-143, 2008 | 164 | 2008 |
MOSES: supporting operation modes on smartphones G Russello, M Conti, B Crispo, E Fernandes Proceedings of the 17th ACM symposium on Access Control Models and …, 2012 | 118 | 2012 |
Supporting publication and subscription confidentiality in pub/sub networks M Ion, G Russello, B Crispo International Conference on Security and Privacy in Communication Systems …, 2010 | 90 | 2010 |
Authorisation and conflict resolution for hierarchical domains G Russello, C Dong, N Dulay Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007 | 90 | 2007 |
Firedroid: Hardening security in almost-stock android G Russello, AB Jimenez, H Naderi, W van der Mark Proceedings of the 29th Annual Computer Security Applications Conference …, 2013 | 88 | 2013 |
Yaase: Yet another android security extension G Russello, B Crispo, E Fernandes, Y Zhauniarovich 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 87 | 2011 |
Security system and method for operating systems G Russello, AB Jimenez, H Naderi, W van der Mark US Patent 9,208,328, 2015 | 85 | 2015 |
MOSES: supporting and enforcing security profiles on smartphones Y Zhauniarovich, G Russello, M Conti, B Crispo, E Fernandes IEEE Transactions on Dependable and Secure Computing 11 (3), 211-223, 2014 | 77 | 2014 |
Design and implementation of a confidentiality and access control solution for publish/subscribe systems M Ion, G Russello, B Crispo Computer networks 56 (7), 2014-2037, 2012 | 76 | 2012 |
Supporting complex queries and access policies for multi-user encrypted databases MR Asghar, G Russello, B Crispo, M Ion Proceedings of the 2013 ACM workshop on Cloud computing security workshop, 77-88, 2013 | 67 | 2013 |
Securing data provenance in the cloud MR Asghar, M Ion, G Russello, B Crispo Open Problems in Network Security: IFIP WG 11.4 International Workshop …, 2012 | 64 | 2012 |
Fair private set intersection with a semi-trusted arbiter C Dong, L Chen, J Camenisch, G Russello Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013 | 61 | 2013 |
Application analysis system for electronic devices G Russello US Patent App. 14/693,038, 2015 | 58 | 2015 |
A workflow-based access control framework for e-health applications G Russello, C Dong, N Dulay 22nd International Conference on Advanced Information Networking and …, 2008 | 50 | 2008 |
Consent-based workflows for healthcare management G Russello, C Dong, N Dulay 2008 IEEE Workshop on Policies for Distributed Systems and Networks, 153-161, 2008 | 49 | 2008 |
PU-ABE: Lightweight attribute-based encryption supporting access policy update for cloud assisted IoT S Belguith, N Kaaniche, G Russello 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 924-927, 2018 | 48 | 2018 |
A policy-based publish/subscribe middleware for sense-and-react applications G Russello, L Mostarda, N Dulay Journal of Systems and Software 84 (4), 638-654, 2011 | 46 | 2011 |
Mitigating ddos attacks in sdn-based iot networks leveraging secure control and data plane algorithm S Wang, K Gomez, K Sithamparanathan, MR Asghar, G Russello, ... Applied Sciences 11 (3), 929, 2021 | 44 | 2021 |