Profil

GIUSTOLISI Rosario

Main Referenced Co-authors
LENZINI, Gabriele  (11)
Bella, Giampaolo (7)
RYAN, Peter Y A  (3)
Dreier, Jannik (2)
FERREIRA, Ana  (2)
Main Referenced Keywords
Ceremony Analysis (1); Human Computer Interaction (1); Self-enforcing privacy (1); Socio-Technical Security (1);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (1)
Interdisciplinary Centre for Security, Reliability and Trust - SnT (1)
Main Referenced Disciplines
Computer science (13)

Publications (total 13)

The most downloaded
743 downloads
Giustolisi, R., Lenzini, G., & Bella, G. (2013). What Security for Electronic Exams? In 8th International Conference onRisk and Security of Internet and Systems (CRiSIS), 2013. doi:10.1109/CRiSIS.2013.6766348 https://hdl.handle.net/10993/9914

The most cited

20 citations (Scopus®)

Bella, G., Giustolisi, R., & Riccobene, S. (2011). Enforcing privacy in e-commerce by balancing anonymity and trust. Computers and Security, 30 (8), 705 - 718. doi:10.1016/j.cose.2011.08.005 https://hdl.handle.net/10993/16945

Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., & Lenzini, G. (2015). A Framework for Analyzing Verifiability in Traditional and Electronic Exams. In Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015.
Peer reviewed

Bella, G., Giustolisi, R., Lenzini, G., & Ryan, P. (2015). A Secure Exam Protocol Without Trusted Parties. In ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015.
Peer reviewed

Giustolisi, R. (2015). Design and Analysis of Secure Exam Protocols [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/22769

Bella, G., Curzon, P., Giustolisi, R., & Lenzini, G. (2014). A Socio-Technical Methodology for the Security and Privacy Analysis of Services. In IEEE 38th Annual International Computers, Software and Applications Conference Workshops, 27–29 July 2014, Västerås, Sweden. doi:10.1109/COMPSACW.2014.69
Peer reviewed

Giustolisi, R., Lenzini, G., & Ryan, P. (2014). Remark!: A Secure Protocol for Remote Exams. Security Protocols XXII - Lecture Notes in Computer Science. doi:10.1007/978-3-319-12400-1_5
Peer reviewed

Bella, G., Giustolisi, R., & Lenzini, G. (2014). Secure exams despite malicious management. In Twelfth Annual International Conference on Privacy, Security and Trust (PST), Ryerson University, Toronto, July 23-24, 2014. doi:10.1109/PST.2014.6890949
Peer reviewed

Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., Lenzini, G., & Ryan, P. (2014). Formal Analysis of Electronic Exams. In SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014. doi:10.5220/0005050901010112
Peer reviewed

Ferreira, A., Giustolisi, R., Huynen, J.-L., & Lenzini, G. (12 April 2013). On Tools for Socio-Technical Security Analysis [Paper presentation]. Grande Region Security and Reliability Day 2013, Luxembourg, Luxembourg.

Ferreira, A., Giustolisi, R., Huynen, J.-L., Koenig, V., & Lenzini, G. (2013). Studies in Socio-Technical Security Analysis: Authentication of Identities with TLS Certificates. IEEE TrustCom. doi:10.1109/TrustCom.2013.190
Peer reviewed

Bella, G., Giustolisi, R., & Lenzini, G. (2013). Socio-technical formal analysis of TLS certificate validation in modern browsers. In PST (pp. 309-316). doi:10.1109/PST.2013.6596067
Peer reviewed

Giustolisi, R., Lenzini, G., & Bella, G. (2013). What Security for Electronic Exams? In 8th International Conference onRisk and Security of Internet and Systems (CRiSIS), 2013. doi:10.1109/CRiSIS.2013.6766348
Peer reviewed

Bella, G., Giustolisi, R., & Lenzini, G. (2013). A Socio-technical Understanding of TLS Certificate Validation. In Trust Management VII (pp. 281-288).
Peer reviewed

Bella, G., Giustolisi, R., & Riccobene, S. (2011). Enforcing privacy in e-commerce by balancing anonymity and trust. Computers and Security, 30 (8), 705 - 718. doi:10.1016/j.cose.2011.08.005
Peer Reviewed verified by ORBi

Contact ORBilu