Giovanni Russello

Orcid: 0000-0001-6987-0803

According to our database1, Giovanni Russello authored at least 114 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Result Pattern Hiding Boolean Searchable Encryption: Achieving Negligible False Positive Rates in Low Storage Overhead.
IACR Cryptol. ePrint Arch., 2024

Exploring Content Concealment in Email.
CoRR, 2024

RAGent: Retrieval-based Access Control Policy Generation.
CoRR, 2024

SoK: Identifying Limitations and Bridging Gaps of Cybersecurity Capability Maturity Models (CCMMs).
CoRR, 2024

No Vandalism: Privacy-Preserving and Byzantine-Robust Federated Learning.
CoRR, 2024

Keep Me Updated: An Empirical Study on Embedded JavaScript Engines in Android Apps.
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024

Eyes on the Phish(er): Towards Understanding Users' Email Processing Pattern and Mental Models in Phishing Detection.
Proceedings of the 2024 European Symposium on Usable Security, 2024

2023
<i>HT2ML</i>: An efficient hybrid framework for privacy-preserving Machine Learning using HE and TEE.
Comput. Secur., December, 2023

SoK: Human-centered Phishing Susceptibility.
ACM Trans. Priv. Secur., August, 2023

Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward and Backward Privacy.
Proc. Priv. Enhancing Technol., April, 2023

Obfuscating Decision Trees.
IACR Cryptol. ePrint Arch., 2023

Zero-knowledge Proof Meets Machine Learning in Verifiability: A Survey.
CoRR, 2023

SoK: Access Control Policy Generation from High-level Natural Language Requirements.
CoRR, 2023

GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference.
CoRR, 2023

Zero-Knowledge Proof-based Practical Federated Learning on Blockchain.
CoRR, 2023

What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility.
CoRR, 2023

A Large-Scale Study of Device and Link Presentation in Email Phishing Susceptibility.
Proceedings of the 35th Australian Computer-Human Interaction Conference, 2023

AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management Solutions.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Obfuscating Evasive Decision Trees.
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023

CryptoMask: Privacy-Preserving Face Recognition.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Selective Encryption Framework for Securing Communication in Industrial Control Systems.
Proceedings of the IEEE International Conference on Communications, 2023

Preventing Reverse Engineering of Control Programs in Industrial Control Systems.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023

Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2022

Automated Security-focused Network Configuration Management: State of the Art, Challenges, and Future Directions.
Proceedings of the 9th International Conference on Dependable Systems and Their Applications, 2022

EnclaveTree: Privacy-preserving Data Stream Training and Inference Using TEE.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Scalable Private Decision Tree Evaluation with Sublinear Communication.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage.
ACM Trans. Priv. Secur., 2021

e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving Privacy.
IEEE Trans. Dependable Secur. Comput., 2021

Collusion Defender: Preserving Subscribers' Privacy in Publish and Subscribe Systems.
IEEE Trans. Dependable Secur. Comput., 2021

2020
Multi-CDN: Towards Privacy in Content Delivery Networks.
IEEE Trans. Dependable Secur. Comput., 2020

Real-time Smartphone Activity Classification Using Inertial Sensors - Recognition of Scrolling, Typing, and Watching Videos While Sitting or Walking.
Sensors, 2020

CUPS: Secure opportunistic cloud of things framework based on attribute-based encryption scheme supporting access policy update.
Secur. Priv., 2020

Towards a Theory of Special-Purpose Program Obfuscation.
Proceedings of the 19th IEEE International Conference on Trust, 2020

GPU-based State Adaptive Random Forest for Evolving Data Streams.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

SMART: Shared Memory based SDN Architecture to Resist DDoS ATtacks.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
Privacy-preserving Searchable Databases with Controllable Leakage.
CoRR, 2019

When are Opaque Predicates Useful?
Proceedings of the 18th IEEE International Conference On Trust, 2019

On the Fairness of Multiple-Variant Multiple-Choice Examinations.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

A Photo Forensics-Based Prototype to Combat Revenge Porn.
Proceedings of the 2nd IEEE Conference on Multimedia Information Processing and Retrieval, 2019

2018
Internet of Things: A survey on the security of IoT frameworks.
J. Inf. Secur. Appl., 2018

PANDORA: Preserving Privacy in PRNU-Based Source Camera Attribution.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Malicious Entities are in Vain: Preserving Privacy in Publish and Subscribe Systems.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Secure publish and subscribe systems with efficient revocation.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Coop-DAAB: Cooperative Attribute Based Data Aggregation for Internet of Things Applications.
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2018 Conferences, 2018

EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control.
Proceedings of the Network and System Security - 12th International Conference, 2018

SECOD: SDN sEcure control and data plane algorithm for detecting and defending against DoS attacks.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Preserving Access Pattern Privacy in SGX-Assisted Encrypted Search.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Towards Blockchain-Based Scalable and Trustworthy File Sharing.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Emergency Access Control Management Via Attribute Based Encrypted QR Codes.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

C-ABSC: Cooperative Attribute Based SignCryption Scheme for Internet of Things Applications.
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018

PU-ABE: Lightweight Attribute-Based Encryption Supporting Access Policy Update for Cloud Assisted IoT.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Indistinguishable Predicates: A New Tool for Obfuscation.
IACR Cryptol. ePrint Arch., 2017

Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database.
Proceedings of the Information Security Theory and Practice, 2017

Privacy-Preserving Content Delivery Networks.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

A Review of Privacy and Consent Management in Healthcare: A Focus on Emerging Data Sources.
Proceedings of the 13th IEEE International Conference on e-Science, 2017

Secure and Practical Searchable Encryption: A Position Paper.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

P-McDb: Privacy-Preserving Search Using Multi-Cloud Encrypted Databases.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
$2DCrypt$ : Image Scaling and Cropping in Encrypted Domains.
IEEE Trans. Inf. Forensics Secur., 2016

3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

2015
STRATUS: Towards Returning Data Control to Cloud Users.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

E-GRANT: Enforcing Encrypted Dynamic Security Constraints in the Cloud.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Automating Consent Management Lifecycle for Electronic Healthcare Systems.
Proceedings of the Medical Data Privacy Handbook, 2015

2014
MOSES: Supporting and Enforcing Security Profiles on Smartphones.
IEEE Trans. Dependable Secur. Comput., 2014

PIDGIN: privacy-preserving interest and content sharing in opportunistic networks.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments.
IACR Cryptol. ePrint Arch., 2013

ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments.
IACR Cryptol. ePrint Arch., 2013

ESPOON<sub>ERBAC</sub>: Enforcing security policies in outsourced environments.
Comput. Secur., 2013

Toward Unified and Flexible Security Policies Enforceable within the Cloud.
Proceedings of the Distributed Applications and Interoperable Systems, 2013

Supporting complex queries and access policies for multi-user encrypted databases.
Proceedings of the CCSW'13, 2013

FireDroid: hardening security in almost-stock Android.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Fair Private Set Intersection with a Semi-trusted Arbiter.
IACR Cryptol. ePrint Arch., 2012

Design and implementation of a confidentiality and access control solution for publish/subscribe systems.
Comput. Networks, 2012

MOSES: supporting operation modes on smartphones.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems.
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012

Demonstrating the effectiveness of MOSES for separation of execution modes.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
A policy-based publish/subscribe middleware for sense-and-react applications.
J. Syst. Softw., 2011

Shared and searchable encrypted data for untrusted servers.
J. Comput. Secur., 2011

Supporting Publication and Subscription Confidentiality in Pub/Sub Networks.
IACR Cryptol. ePrint Arch., 2011

YAASE: Yet Another Android Security Extension.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Enforcing Multi-user Access Policies to Encrypted Cloud Databases.
Proceedings of the POLICY 2011, 2011

Flexible and Dynamic Consent-Capturing.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011

Securing Data Provenance in the Cloud.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011

Poster: ESPOON<sub>ERBAC</sub>: enforcing security policies in outsourced environments with encrypted RBAC.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Providing data confidentiality against malicious hosts in Shared Data Spaces.
Sci. Comput. Program., 2010

Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Providing Confidentiality in Content-based Publish/subscribe Systems.
Proceedings of the SECRYPT 2010, 2010

Mobile PAES: Demonstrating Authority Devolution for Policy Evaluation in Crisis Management Scenarios.
Proceedings of the POLICY 2010, 2010

Coordinating Data Usage Control in Loosely-Connected Networks.
Proceedings of the POLICY 2010, 2010

An opportunistic authority evaluation scheme for data security in crisis management scenarios.
Proceedings of the 5th ACM Symposium on Information, 2010

An implementation of event and filter confidentiality in pub/sub systems and its application to e-health.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Realizing the CDL Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research Directions.
Proceedings of the POLICY 2009, 2009

xDUCON: Cross Domain Usage Control through Shared Data Spaces.
Proceedings of the POLICY 2009, 2009

xDUCON: Coordinating Usage Control Policies in Distributed Domains.
Proceedings of the Third International Conference on Network and System Security, 2009

An Architectural Approach for Self-Managing Security Services.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
GSpace: an architectural approach for self-managing extra-functional concerns.
Proceedings of the CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, 2008

Consent-Based Workflows for Healthcare Management.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Personalising situated workflow systems for pervasive healthcare applications.
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008

Flexible Resolution of Authorisation Conflicts in Distributed Systems.
Proceedings of the Managing Large-Scale Service Deployment, 2008

Encrypted Shared Data Spaces.
Proceedings of the Coordination Models and Languages, 10th International Conference, 2008

ESCAPE: A Component-Based Policy Framework for Sense and React Applications.
Proceedings of the Component-Based Software Engineering, 11th International Symposium, 2008

A Workflow-Based Access Control Framework for e-Health Applications.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
An experimental evaluation of self-managing availability in shared data spaces.
Sci. Comput. Program., 2007

Authorisation and Conflict Resolution for Hierarchical Domains.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Trust Transfer in Distributed Systems.
Proceedings of the Trust Management, 2007

Enforcing Fine-Grained Authorization Policies for Java Mobile Agents.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2005
Dynamically Adapting Tuple Replication for Managing Availability in a Shared Data Space.
Proceedings of the Coordination Models and Languages, 7th International Conference, 2005

2004
Exploiting Differentiated Tuple Distribution in Shared Data Spaces.
Proceedings of the Euro-Par 2004 Parallel Processing, 2004

Dynamic Adaptation of Data Distribution Policies in a Shared Data Space System.
Proceedings of the On the Move to Meaningful Internet Systems 2004: CoopIS, 2004

2003
Customizable Data Distribution for Shared Data Spaces.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

2002
Using Aspect-GAMMA in the design of embedded systems.
Proceedings of the Seventh IEEE International High-Level Design Validation and Test Workshop 2002, 2002


  Loading...