


Остановите войну!
for scientists:


default search action
Giovanni Russello
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j16]Dandan Yuan, Cong Zuo, Shujie Cui, Giovanni Russello:
Result-pattern-hiding Conjunctive Searchable Symmetric Encryption with Forward and Backward Privacy. Proc. Priv. Enhancing Technol. 2023(2): 40-58 (2023) - [i19]Sijie Zhuo, Robert Biddle, Lucas Betts, Nalin Asanka Gamagedara Arachchilage, Yun Sing Koh, Danielle M. Lottridge, Giovanni Russello:
What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility. CoRR abs/2304.00664 (2023) - [i18]Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar:
Zero-Knowledge Proof-based Practical Federated Learning on Blockchain. CoRR abs/2304.05590 (2023) - [i17]Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello:
GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference. CoRR abs/2305.00645 (2023) - [i16]Shalini Banerjee, Steven D. Galbraith, Giovanni Russello:
Obfuscating Decision Trees. IACR Cryptol. ePrint Arch. 2023: 68 (2023) - 2022
- [c73]Qifan Wang, Shujie Cui, Lei Zhou, Ocean Wu, Yonghua Zhu, Giovanni Russello:
EnclaveTree: Privacy-preserving Data Stream Training and Inference Using TEE. AsiaCCS 2022: 741-755 - [c72]Jianli Bai, Xiangfu Song, Shujie Cui, Ee-Chien Chang, Giovanni Russello:
Scalable Private Decision Tree Evaluation with Sublinear Communication. AsiaCCS 2022: 843-857 - [c71]Jinglu Xu, Giovanni Russello:
Automated Security-focused Network Configuration Management: State of the Art, Challenges, and Future Directions. DSA 2022: 409-420 - [c70]Dandan Yuan, Shujie Cui, Giovanni Russello:
We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption. EuroS&P 2022: 587-605 - [i15]Sijie Zhuo, Robert Biddle, Yun Sing Koh, Danielle M. Lottridge, Giovanni Russello:
SoK: Human-Centered Phishing Susceptibility. CoRR abs/2202.07905 (2022) - [i14]Qifan Wang, Shujie Cui, Lei Zhou, Ocean Wu, Yonghua Zhu, Giovanni Russello:
EnclaveTree: Privacy-preserving Data Stream Training and Inference Using TEE. CoRR abs/2203.01438 (2022) - [i13]Jianli Bai, Xiangfu Song, Shujie Cui, Ee-Chien Chang, Giovanni Russello:
Scalable Private Decision Tree Evaluation with Sublinear Communication. CoRR abs/2205.01284 (2022) - [i12]Dandan Yuan, Shujie Cui, Giovanni Russello:
We Can Make Mistakes: Fault-tolerant Forward Private Verifiable Dynamic Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2022: 333 (2022) - 2021
- [j15]Manoranjan Mohanty
, Ming Zhang, Muhammad Rizwan Asghar
, Giovanni Russello:
e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving Privacy. IEEE Trans. Dependable Secur. Comput. 18(1): 426-437 (2021) - [j14]Shujie Cui
, Sana Belguith
, Pramodya De Alwis, Muhammad Rizwan Asghar
, Giovanni Russello:
Collusion Defender: Preserving Subscribers' Privacy in Publish and Subscribe Systems. IEEE Trans. Dependable Secur. Comput. 18(3): 1051-1064 (2021) - [j13]Shujie Cui
, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello:
Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage. ACM Trans. Priv. Secur. 24(3): 18:1-18:35 (2021) - 2020
- [j12]Sana Belguith
, Nesrine Kaaniche, Giovanni Russello:
CUPS: Secure opportunistic cloud of things framework based on attribute-based encryption scheme supporting access policy update. Secur. Priv. 3(4) (2020) - [j11]Sijie Zhuo, Lucas Sherlock, Gillian Dobbie
, Yun Sing Koh
, Giovanni Russello, Danielle M. Lottridge
:
Real-time Smartphone Activity Classification Using Inertial Sensors - Recognition of Scrolling, Typing, and Watching Videos While Sitting or Walking. Sensors 20(3): 655 (2020) - [j10]Shujie Cui
, Muhammad Rizwan Asghar
, Giovanni Russello:
Multi-CDN: Towards Privacy in Content Delivery Networks. IEEE Trans. Dependable Secur. Comput. 17(5): 984-999 (2020) - [c69]Nesrine Kaaniche, Sana Belguith, Maryline Laurent
, Ashish Gehani, Giovanni Russello:
Prov-Trust: Towards a Trustworthy SGX-based Data Provenance System. ICETE (2) 2020: 225-237 - [c68]Sana Belguith, Muhammad Rizwan Asghar, Song Wang, Karina Mabell Gomez, Giovanni Russello:
SMART: Shared Memory based SDN Architecture to Resist DDoS ATtacks. ICETE (2) 2020: 608-617 - [c67]Ocean Wu
, Yun Sing Koh, Giovanni Russello:
GPU-based State Adaptive Random Forest for Evolving Data Streams. IJCNN 2020: 1-8 - [c66]Muhammad Rizwan Asghar, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig:
Towards a Theory of Special-Purpose Program Obfuscation. TrustCom 2020: 394-401 - [i11]Muhammad Rizwan Asghar, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig:
Towards a Theory of Special-purpose Program Obfuscation. CoRR abs/2011.02607 (2020)
2010 – 2019
- 2019
- [c65]Manoranjan Mohanty, Ming Zhang, Giovanni Russello:
A Photo Forensics-Based Prototype to Combat Revenge Porn. MIPR 2019: 5-8 - [c64]Paul Denny, Sathiamoorthy Manoharan, Ulrich Speidel, Giovanni Russello, Angela Chang:
On the Fairness of Multiple-Variant Multiple-Choice Examinations. SIGCSE 2019: 462-468 - [c63]Lukas Zobernig, Steven D. Galbraith
, Giovanni Russello:
When are Opaque Predicates Useful? TrustCom/BigDataSE 2019: 168-175 - [e6]Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, Zhenkai Liang:
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019. ACM 2019, ISBN 978-1-4503-6752-3 [contents] - [i10]Shujie Cui, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello:
Privacy-preserving Searchable Databases with Controllable Leakage. CoRR abs/1909.11624 (2019) - 2018
- [j9]Mahmoud Ammar
, Giovanni Russello, Bruno Crispo:
Internet of Things: A survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38: 8-27 (2018) - [c62]Sana Belguith
, Nesrine Kaaniche, Giovanni Russello:
PU-ABE: Lightweight Attribute-Based Encryption Supporting Access Policy Update for Cloud Assisted IoT. IEEE CLOUD 2018: 924-927 - [c61]Sana Belguith
, Nesrine Kaaniche, Mohamed Mohamed, Giovanni Russello:
C-ABSC: Cooperative Attribute Based SignCryption Scheme for Internet of Things Applications. SCC 2018: 245-248 - [c60]Sana Belguith
, Sarada Prasad Gochhayat, Mauro Conti, Giovanni Russello:
Emergency Access Control Management Via Attribute Based Encrypted QR Codes. CNS 2018: 1-8 - [c59]Shujie Cui, Muhammad Rizwan Asghar, Giovanni Russello:
Towards Blockchain-Based Scalable and Trustworthy File Sharing. ICCCN 2018: 1-2 - [c58]Shujie Cui, Sana Belguith
, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello:
Preserving Access Pattern Privacy in SGX-Assisted Encrypted Search. ICCCN 2018: 1-9 - [c57]Sana Belguith
, Nesrine Kaaniche, Giovanni Russello:
Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT. ICETE (2) 2018: 301-312 - [c56]Song Wang, Sathyanarayanan Chandrasekharan, Karina Mabell Gomez, Kandeepan Sithamparanathan
, Akram Al-Hourani
, Muhammad Rizwan Asghar, Giovanni Russello, Paul Zanna
:
SECOD: SDN sEcure control and data plane algorithm for detecting and defending against DoS attacks. NOMS 2018: 1-5 - [c55]Nesrine Kaaniche, Sana Belguith
, Giovanni Russello:
EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control. NSS 2018: 187-201 - [c54]Sana Belguith
, Nesrine Kaaniche, Mohamed Mohamed, Giovanni Russello:
Coop-DAAB: Cooperative Attribute Based Data Aggregation for Internet of Things Applications. OTM Conferences (1) 2018: 498-515 - [c53]Sana Belguith
, Shujie Cui, Muhammad Rizwan Asghar, Giovanni Russello:
Secure publish and subscribe systems with efficient revocation. SAC 2018: 388-394 - [c52]Manoranjan Mohanty, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello:
PANDORA: Preserving Privacy in PRNU-Based Source Camera Attribution. TrustCom/BigDataSE 2018: 1202-1207 - [c51]Shujie Cui, Sana Belguith
, Pramodya De Alwis, Muhammad Rizwan Asghar, Giovanni Russello:
Malicious Entities are in Vain: Preserving Privacy in Publish and Subscribe Systems. TrustCom/BigDataSE 2018: 1624-1627 - 2017
- [c50]Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith
, Giovanni Russello:
P-McDb: Privacy-Preserving Search Using Multi-Cloud Encrypted Databases. CLOUD 2017: 334-341 - [c49]Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith
, Giovanni Russello:
Secure and Practical Searchable Encryption: A Position Paper. ACISP (1) 2017: 266-281 - [c48]Muhammad Rizwan Asghar, TzeHowe Lee, Mirza Mansoor Baig, Ehsan Ullah, Giovanni Russello, Gillian Dobbie:
A Review of Privacy and Consent Management in Healthcare: A Focus on Emerging Data Sources. eScience 2017: 518-522 - [c47]Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith
, Giovanni Russello:
ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage. FPS 2017: 189-205 - [c46]Shujie Cui, Muhammad Rizwan Asghar, Giovanni Russello:
Privacy-Preserving Content Delivery Networks. LCN 2017: 607-610 - [c45]Shujie Cui, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello:
Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database. WISTP 2017: 41-55 - [i9]Muhammad Rizwan Asghar, TzeHowe Lee, Mirza Mansoor Baig, Ehsan Ullah, Giovanni Russello, Gillian Dobbie:
A Review of Privacy and Consent Management in Healthcare: A Focus on Emerging Data Sources. CoRR abs/1711.00546 (2017) - [i8]Lukas Zobernig, Steven D. Galbraith, Giovanni Russello:
Indistinguishable Predicates: A New Tool for Obfuscation. IACR Cryptol. ePrint Arch. 2017: 787 (2017) - 2016
- [j8]Manoranjan Mohanty, Muhammad Rizwan Asghar
, Giovanni Russello:
$2DCrypt$ : Image Scaling and Cropping in Encrypted Domains. IEEE Trans. Inf. Forensics Secur. 11(11): 2542-2555 (2016) - [c44]Manoranjan Mohanty, Muhammad Rizwan Asghar, Giovanni Russello:
3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud. SECRYPT 2016: 283-291 - 2015
- [c43]Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo:
E-GRANT: Enforcing Encrypted Dynamic Security Constraints in the Cloud. FiCloud 2015: 135-144 - [c42]Ryan K. L. Ko
, Giovanni Russello, Richard Nelson, Shaoning Pang, Aloysius Cheang, Gillian Dobbie, Abdolhossein Sarrafzadeh, Sivadon Chaisiri
, Muhammad Rizwan Asghar, Geoffrey Holmes:
STRATUS: Towards Returning Data Control to Cloud Users. ICA3PP (Workshops and Symposiums) 2015: 57-70 - [p1]Muhammad Rizwan Asghar, Giovanni Russello:
Automating Consent Management Lifecycle for Electronic Healthcare Systems. Medical Data Privacy Handbook 2015: 361-387 - 2014
- [j7]Yury Zhauniarovich, Giovanni Russello, Mauro Conti
, Bruno Crispo, Earlence Fernandes:
MOSES: Supporting and Enforcing Security Profiles on Smartphones. IEEE Trans. Dependable Secur. Comput. 11(3): 211-223 (2014) - [c41]Muhammad Rizwan Asghar, Ashish Gehani, Bruno Crispo, Giovanni Russello:
PIDGIN: privacy-preserving interest and content sharing in opportunistic networks. AsiaCCS 2014: 135-146 - 2013
- [j6]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOONERBAC: Enforcing security policies in outsourced environments. Comput. Secur. 35: 2-24 (2013) - [c40]Giovanni Russello, Arturo Blas Jimenez, Habib Naderi, Wannes van der Mark:
FireDroid: hardening security in almost-stock Android. ACSAC 2013: 319-328 - [c39]Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo, Mihaela Ion:
Supporting complex queries and access policies for multi-user encrypted databases. CCSW 2013: 77-88 - [c38]David M. Eyers, Giovanni Russello:
Toward Unified and Flexible Security Policies Enforceable within the Cloud. DAIS 2013: 181-186 - [c37]Changyu Dong, Liqun Chen
, Jan Camenisch, Giovanni Russello:
Fair Private Set Intersection with a Semi-trusted Arbiter. DBSec 2013: 128-144 - [i7]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. CoRR abs/1306.4828 (2013) - [i6]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON$_{ERBAC}$: Enforcing Security Policies In Outsourced Environments. CoRR abs/1308.3489 (2013) - [i5]Muhammad Rizwan Asghar, Giovanni Russello:
ACTORS: A Goal-driven Approach for Capturing and Managing Consent in e-Health Systems. CoRR abs/1309.2869 (2013) - [i4]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. IACR Cryptol. ePrint Arch. 2013: 277 (2013) - [i3]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments. IACR Cryptol. ePrint Arch. 2013: 587 (2013) - 2012
- [j5]Mihaela Ion, Giovanni Russello, Bruno Crispo:
Design and implementation of a confidentiality and access control solution for publish/subscribe systems. Comput. Networks 56(7): 2014-2037 (2012) - [c36]Giovanni Russello, Mauro Conti
, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich:
Demonstrating the effectiveness of MOSES for separation of execution modes. CCS 2012: 998-1000 - [c35]Muhammad Rizwan Asghar, Giovanni Russello:
ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems. POLICY 2012: 61-69 - [c34]Giovanni Russello, Mauro Conti
, Bruno Crispo, Earlence Fernandes:
MOSES: supporting operation modes on smartphones. SACMAT 2012: 3-12 - [e5]Ramjee Prasad, Károly Farkas, Andreas U. Schmidt, Antonio Lioy
, Giovanni Russello, Flaminia L. Luccio:
Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 94, Springer 2012, ISBN 978-3-642-30243-5 [contents] - [e4]Andreas U. Schmidt, Giovanni Russello, Ioannis Krontiris, Shiguo Lian:
Security and Privacy in Mobile Information and Communication Systems - 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 107, Springer 2012, ISBN 978-3-642-33391-0 [contents] - [e3]Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, Giovanni Russello:
Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers. IFIP Advances in Information and Communication Technology 375, Springer 2012, ISBN 978-3-642-31667-8 [contents] - [i2]Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello:
Fair Private Set Intersection with a Semi-trusted Arbiter. IACR Cryptol. ePrint Arch. 2012: 252 (2012) - 2011
- [j4]Changyu Dong, Giovanni Russello, Naranker Dulay:
Shared and searchable encrypted data for untrusted servers. J. Comput. Secur. 19(3): 367-397 (2011) - [j3]Giovanni Russello, Leonardo Mostarda, Naranker Dulay:
A policy-based publish/subscribe middleware for sense-and-react applications. J. Syst. Softw. 84(4): 638-654 (2011) - [c33]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. ARES 2011: 99-108 - [c32]Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo:
Poster: ESPOONERBAC: enforcing security policies in outsourced environments with encrypted RBAC. CCS 2011: 841-844 - [c31]Muhammad Rizwan Asghar, Giovanni Russello:
Flexible and Dynamic Consent-Capturing. iNetSeC 2011: 119-131 - [c30]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
Securing Data Provenance in the Cloud. iNetSeC 2011: 145-160 - [c29]Mihaela Ion, Giovanni Russello, Bruno Crispo:
Enforcing Multi-user Access Policies to Encrypted Cloud Databases. POLICY 2011: 175-177 - [c28]Giovanni Russello, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich:
YAASE: Yet Another Android Security Extension. SocialCom/PASSAT 2011: 1033-1040 - [i1]Mihaela Ion, Giovanni Russello, Bruno Crispo:
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks. IACR Cryptol. ePrint Arch. 2011: 25 (2011) - 2010
- [j2]Giovanni Russello, Changyu Dong, Naranker Dulay, Michel R. V. Chaudron
, Maarten van Steen
:
Providing data confidentiality against malicious hosts in Shared Data Spaces. Sci. Comput. Program. 75(6): 426-439 (2010) - [c27]Enrico Scalavino, Giovanni Russello, Rudi Ball, Vaibhav Gowadia, Emil C. Lupu
:
An opportunistic authority evaluation scheme for data security in crisis management scenarios. AsiaCCS 2010: 157-168 - [c26]Mihaela Ion, Giovanni Russello, Bruno Crispo:
An implementation of event and filter confidentiality in pub/sub systems and its application to e-health. CCS 2010: 696-698 - [c25]Giovanni Russello, Enrico Scalavino, Naranker Dulay, Emil C. Lupu
:
Coordinating Data Usage Control in Loosely-Connected Networks. POLICY 2010: 30-39 - [c24]Enrico Scalavino, Vaibhav Gowadia, Rudi Ball, Emil C. Lupu, Giovanni Russello:
Mobile PAES: Demonstrating Authority Devolution for Policy Evaluation in Crisis Management Scenarios. POLICY 2010: 53-56 - [c23]Mihaela Ion, Giovanni Russello, Bruno Crispo:
Providing Confidentiality in Content-based Publish/subscribe Systems. SECRYPT 2010: 287-292 - [c22]Mihaela Ion, Giovanni Russello, Bruno Crispo:
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks. SecureComm 2010: 272-289 - [c21]Giovanni Russello, Enrico Scalavino:
Exploiting Node Mobility for Coordinating Data Usage in Crisis Scenarios. WISTP 2010: 355-367 - [e2]Andreas U. Schmidt, Giovanni Russello, Antonio Lioy, Neeli R. Prasad, Shiguo Lian:
Security and Privacy in Mobile Information and Communication Systems - Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 47, Springer 2010, ISBN 978-3-642-17501-5 [contents]
2000 – 2009
- 2009
- [c20]Giovanni Russello, Naranker Dulay:
An Architectural Approach for Self-Managing Security Services. AINA Workshops 2009: 153-158 - [c19]Giovanni Russello, Naranker Dulay:
xDUCON: Coordinating Usage Control Policies in Distributed Domains. NSS 2009: 246-253 - [c18]Roshan K. Thomas, Giovanni Russello, Simon Tsang:
Realizing the CDL Cross-Domain Language in the Ponder2 Policy Framework: Experiences and Research Directions. POLICY 2009: 76-83 - [c17]Giovanni Russello, Naranker Dulay:
xDUCON: Cross Domain Usage Control through Shared Data Spaces. POLICY 2009: 178-181 - 2008
- [c16]Giovanni Russello, Changyu Dong, Naranker Dulay:
A Workflow-Based Access Control Framework for e-Health Applications. AINA Workshops 2008: 111-120 - [c15]Giovanni Russello, Leonardo Mostarda, Naranker Dulay:
ESCAPE: A Component-Based Policy Framework for Sense and React Applications. CBSE 2008: 212-229 - [c14]Giovanni Russello, Changyu Dong, Naranker Dulay, Michel R. V. Chaudron
, Maarten van Steen
:
Encrypted Shared Data Spaces. COORDINATION 2008: 264-279 - [c13]Changyu Dong, Giovanni Russello, Naranker Dulay:
Shared and Searchable Encrypted Data for Untrusted Servers. DBSec 2008: 127-143 - [c12]Changyu Dong, Giovanni Russello, Naranker Dulay:
Flexible Resolution of Authorisation Conflicts in Distributed Systems. DSOM 2008: 95-108 - [c11]Giovanni Russello, Changyu Dong, Naranker Dulay:
Personalising situated workflow systems for pervasive healthcare applications. PervasiveHealth 2008: 183-187 - [c10]Giovanni Russello, Changyu Dong, Naranker Dulay:
Consent-Based Workflows for Healthcare Management. POLICY 2008: 153-161 - [c9]Giovanni Russello, Naranker Dulay, Michel R. V. Chaudron
, Maarten van Steen
:
GSpace: an architectural approach for self-managing extra-functional concerns. CSTST 2008: 492-498 - [e1]Riccardo Scandariato, Giovanni Russello:
Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008. ACM 2008, ISBN 978-1-60558-363-1 [contents] - 2007
- [j1]Giovanni Russello, Michel R. V. Chaudron
, Maarten van Steen
, Ibrahim Bokharouss:
An experimental evaluation of self-managing availability in shared data spaces. Sci. Comput. Program. 64(2): 246-262 (2007) - [c8]Giovanni Russello, Changyu Dong, Naranker Dulay:
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents. AINA Workshops (1) 2007: 489-496 - [c7]Changyu Dong, Giovanni Russello, Naranker Dulay:
Trust Transfer in Distributed Systems. IFIPTM 2007: 17-29 - [c6]Giovanni Russello, Changyu Dong, Naranker Dulay:
Authorisation and Conflict Resolution for Hierarchical Domains. POLICY 2007: 201-210 - 2005
- [c5]Giovanni Russello, Michel R. V. Chaudron, Maarten van Steen
:
Dynamically Adapting Tuple Replication for Managing Availability in a Shared Data Space. COORDINATION 2005: 109-124 - 2004
- [c4]Giovanni Russello, Michel R. V. Chaudron, Maarten van Steen
:
Dynamic Adaptation of Data Distribution Policies in a Shared Data Space System. CoopIS/DOA/ODBASE (2) 2004: 1225-1242 - [c3]Giovanni Russello, Michel R. V. Chaudron, Maarten van Steen
:
Exploiting Differentiated Tuple Distribution in Shared Data Spaces. Euro-Par 2004: 579-586 - 2003
- [c2]Giovanni Russello, Michel R. V. Chaudron, Maarten van Steen:
Customizable Data Distribution for Shared Data Spaces. PDPTA 2003: 122-131 - 2002
- [c1]Mohammad Reza Mousavi, Giovanni Russello, Michel R. V. Chaudron, Michel A. Reniers, Twan Basten
, Angelo Corsaro, Sandeep K. Shukla, Rajesh K. Gupta, Douglas C. Schmidt:
Using Aspect-GAMMA in the design of embedded systems. HLDVT 2002: 69-74