WARNING! Starting from January 1st, 2017 this website will no longer be updated. The new website is create-net.fbk.eu

Create-Net Publications


Export 26 results:
Filters: Author is Giovanni Russello  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Asghar, M. R., and G. Russello, "ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems", IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), July, 2012, Conference Paper .
Russello, G., and N. Dulay, "An Architectural Approach for Self-Managing Security Services", Proc. of AINA Workshops: IEEE, pp. 153 -158, May, 2009, Conference Paper .
C
Russello, G., C. Dong, and N. Dulay, "Consent–Based Workflows for Healthcare Management", Proc. of IEEE POLICY, Palisades, New York, USA, pp. 153–161, June, 2008, Conference Paper .
E
Russello, G., C. Dong, N. Dulay, M. Chaudron, and V. M. Steen, "Encrypted shared data spaces", Proc. of COORDINATION, Oslo, Norway, Springer–Verlag, pp. 264–279, June, 2008, Conference Paper .
Russello, G., L. Mostarda, and N. Dulay, "ESCAPE: A Component–Based Policy Framework for Sense and React Applications", Proc. of CBSE, Karlsruhe, Germany, Springer–Verlag, pp. 212–229, October, 2008, Conference Paper .
Asghar, M. R., M. Ion, G. Russello, and B. Crispo, "ESPOONERBAC: Enforcing Security Policies in Outsourced Environments", Elsevier Computers & Security (COSE), December, 2012, Journal Article .
F
Asghar, M. R., and G. Russello, "Flexible and Dynamic Consent-Capturing", Proc. of IFIP iNetSec, 2011, Conference Paper .
Dong, C., G. Russello, and N. Dulay, "Flexible Resolution of Authorisation Conflicts in Distributed Systems", Proc. of IFIP/IEEE DSOM, Samos Island, Greece, Springer–Verlag, pp. 95–108, September, 2008, Conference Paper .
G
Russello, G., N. Dulay, M. Chaudron, and V. M. Steen, "GSpace: an Architectural Approach for Self–managing Extra–functional Concerns", Proc. of ACM CSTST, Cergy–Pontoise, France, pp. 492–498, October, 2008, Conference Paper .
I
P
Asghar, M. R., A. Gehani, B. Crispo, and G. Russello, "PIDGIN: Privacy Preserving Interest and Content Sharing in Opportunistic Networks", The 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, Japan, ACM, 2014, Conference Paper . Abstract
R
S
Asghar, M. R., M. Ion, G. Russello, and B. Crispo, "Securing Data Provenance in the Cloud", Proc. of IFIP iNetSec, 2011, Conference Paper .
Russello, G., C. Dong, and N. Dulay, "Shared and Searchable Encrypted Data for Untrusted Servers", Proc. of the 22nd Annual Working Conference on Data and Applications Security, London, UK, Springer–Verlag, pp. 127–143, July, 2008, Conference Paper .
Russello, G., N. Dulay, and C. Dong, "Situated Workfows for Pervasive Health–care Applications", Proc. of PervasiveHealth, no. 173–177, Tampere, Finland, January, 2008, Conference Paper .
Asghar, M. R., G. Russello, B. Crispo, and M. Ion, "Supporting Complex Queries and Access Policies for Multi-user Encrypted Databases", The 5th ACM Workshop on Cloud Computing Security Workshop (CCSW), Berlin, Germany, 2013, Workshop paper . Abstract
T
W
Russello, G., C. Dong, and N. Dulay, "A Workflow–Based Access Control Framework for e–Health Applications", Proc. of AINA, GinoWan,Okinawa, Japan, pp. 111–120, March, 2008, Conference Paper .
X
Russello, G., and N. Dulay, "xDUCON: Coordinating Usage Control Policies in Distributed Domains", Proc. of IEEE NSS, pp. 246 -253, Oct., 2009, Conference Paper .