References of "Giustolisi, Rosario 50001862"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailA Secure Exam Protocol Without Trusted Parties
Bella, Giampaolo; Giustolisi, Rosario UL; Lenzini, Gabriele UL et al

in ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 (2015)

Detailed reference viewed: 214 (11 UL)
Full Text
Peer Reviewed
See detailA Framework for Analyzing Verifiability in Traditional and Electronic Exams.
Dreier, Jannik; Giustolisi, Rosario UL; Kassem, Ali et al

in Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015 (2015)

Detailed reference viewed: 73 (1 UL)
Full Text
Peer Reviewed
See detailA Socio-Technical Methodology for the Security and Privacy Analysis of Services
Bella, Giampaolo; Curzon, Paul; Giustolisi, Rosario UL et al

in IEEE 38th Annual International Computers, Software and Applications Conference Workshops, 27–29 July 2014, Västerås, Sweden (2014)

Detailed reference viewed: 79 (4 UL)
Full Text
Peer Reviewed
See detailFormal Analysis of Electronic Exams
Dreier, Jannik; Giustolisi, Rosario UL; Kassem, Ali et al

in SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014 (2014)

Detailed reference viewed: 203 (15 UL)
Full Text
Peer Reviewed
See detailSecure exams despite malicious management
Bella, Giampaolo; Giustolisi, Rosario UL; Lenzini, Gabriele UL

in Twelfth Annual International Conference on Privacy, Security and Trust (PST), Ryerson University, Toronto, July 23-24, 2014 (2014)

Detailed reference viewed: 72 (6 UL)
Full Text
Peer Reviewed
See detailRemark!: A Secure Protocol for Remote Exams
Giustolisi, Rosario UL; Lenzini, Gabriele UL; Ryan, Peter UL

in Security Protocols XXII - Lecture Notes in Computer Science (2014)

Detailed reference viewed: 314 (57 UL)
Full Text
Peer Reviewed
See detailOn Tools for Socio-Technical Security Analysis
Ferreira, Ana UL; Giustolisi, Rosario UL; Huynen, Jean-Louis UL et al

Scientific Conference (2013, April 12)

Detailed reference viewed: 94 (26 UL)
Full Text
Peer Reviewed
See detailStudies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates
Ferreira, Ana UL; Giustolisi, Rosario UL; Huynen, Jean-Louis UL et al

in IEEE TrustCom (2013)

Authenticating web identities with TLS certificates is a typical problem whose security depends on both technical and human aspects, and that needs, to be fully grasped, a socio-technical analysis. We ... [more ▼]

Authenticating web identities with TLS certificates is a typical problem whose security depends on both technical and human aspects, and that needs, to be fully grasped, a socio-technical analysis. We performed such an analysis, and in this paper we comment on the tools and methodology we found appropriate. We first analysed the interaction ceremonies between users and the most used browsers in the market. Then we looked at user's understanding of those interactions. Our tools and our methodology depend on whether the user model has a non-deterministic or a realistic behaviour. We successfully applied formal methods in the first case. In the second, we had to define a security framework consistent with research methods of experimental cognitive science. [less ▲]

Detailed reference viewed: 118 (33 UL)
Full Text
Peer Reviewed
See detailA Socio-technical Understanding of TLS Certificate Validation
Bella, Giampaolo; Giustolisi, Rosario UL; Lenzini, Gabriele UL

in Trust Management VII (2013)

Detailed reference viewed: 100 (19 UL)
Full Text
Peer Reviewed
See detailWhat Security for Electronic Exams?
Giustolisi, Rosario UL; Lenzini, Gabriele UL; Bella, Giampaolo

in 8th International Conference onRisk and Security of Internet and Systems (CRiSIS), 2013 (2013)

Detailed reference viewed: 79 (8 UL)
Full Text
Peer Reviewed
See detailEnforcing privacy in e-commerce by balancing anonymity and trust
Bella, Giampaolo; Giustolisi, Rosario UL; Riccobene, Salvatore

in Computers & Security (2011), 30(8), 705-718

Detailed reference viewed: 56 (5 UL)