Seguir
Alessandro Sorniotti
Alessandro Sorniotti
IBM Research - Zurich
Dirección de correo verificada de zurich.ibm.com - Página principal
Título
Citado por
Citado por
Año
Hyperledger fabric: a distributed operating system for permissioned blockchains
E Androulaki, A Barger, V Bortnikov, C Cachin, K Christidis, A De Caro, ...
Proceedings of the thirteenth EuroSys conference, 1-15, 2018
45812018
A secure data deduplication scheme for cloud storage
J Stanek, A Sorniotti, E Androulaki, L Kencl
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
3122014
Boosting efficiency and security in proof of ownership for deduplication
R Di Pietro, A Sorniotti
Proceedings of the 7th ACM symposium on information, computer and …, 2012
2932012
Smotherspectre: exploiting speculative execution through port contention
A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
2332019
System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger
E Androulaki, A DeCaro, T Kramp, A Sorniotti, M Vukolic
US Patent 9,992,028, 2018
1722018
Blockchain and trusted computing: Problems, pitfalls, and a solution for hyperledger fabric
M Brandenburger, C Cachin, R Kapitza, A Sorniotti
arXiv preprint arXiv:1805.08541, 2018
1352018
Secure isolation of tenant resources in a multi-tenant storage system using a security gateway
ME Factor, D Hadas, EK Kolodner, A Kurmus, A Shulman-Peleg, ...
US Patent 9,411,973, 2016
1052016
An authentication flaw in browser-based single sign-on protocols: Impact and remediations
A Armando, R Carbone, L Compagna, J Cuéllar, G Pellegrino, A Sorniotti
Computers & Security 33, 41-58, 2013
952013
A tunable proof of ownership scheme for deduplication using bloom filters
J Blasco, R Di Pietro, A Orfila, A Sorniotti
2014 IEEE Conference on Communications and Network Security, 481-489, 2014
842014
Policy-based secure deletion
C Cachin, K Haralambiev, HC Hsiao, A Sorniotti
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
842013
Robust data sharing with key-value stores
C Basescu, C Cachin, I Eyal, R Haas, M Vukolic
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of …, 2011
832011
Resisting replay attacks efficiently in a permissioned and privacy-preserving blockchain network
E Androulaki, A De Caro, T Kramp, DW Kravitz, A Sorniotti, M Vukolic
US Patent 10,230,756, 2019
632019
Secure and trusted in-network data processing in wireless sensor networks: a survey
A Sorniotti, L Gomez, K Wrona, L Odorico
Journal of Information Assurance and Security 2 (3), 189-199, 2007
632007
Attack surface reduction for commodity OS kernels: trimmed garden plants may attract less bugs
A Kurmus, A Sorniotti, R Kapitza
Proceedings of the Fourth European Workshop on System Security, 1-6, 2011
552011
Secure logical isolation for multi-tenancy in cloud storage
M Factor, D Hadas, A Harnama, N Har'El, EK Kolodner, A Kurmus, ...
2013 IEEE 29th Symposium on Mass Storage Systems and Technologies (MSST), 1-5, 2013
492013
Searchable encryption for outsourcing data analytics
F Kerschbaum, A Sorniotti
US Patent 8,291,509, 2012
482012
Reconciling end-to-end confidentiality and data reduction in cloud storage
N Baracaldo, E Androulaki, J Glider, A Sorniotti
Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing …, 2014
472014
Proof of ownership for deduplication systems: a secure, scalable, and efficient solution
R Di Pietro, A Sorniotti
Computer Communications 82, 71-82, 2016
452016
From multiple credentials to browser-based single sign-on: Are we more secure?
A Armando, R Carbone, L Compagna, J Cuellar, G Pellegrino, A Sorniotti
IFIP International Information Security Conference, 68-79, 2011
452011
Streamchain: Do blockchains need blocks?
Z István, A Sorniotti, M Vukolić
Proceedings of the 2nd Workshop on Scalable and Resilient Infrastructures …, 2018
442018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20