• Publications
  • Influence
Shared and Searchable Encrypted Data for Untrusted Servers
tl;dr
We propose an encryption scheme where each authorised user in the system has his own keys to encrypt and decrypt data. Expand
  • 133
  • 17
Internet of Things: A survey on the security of IoT frameworks
tl;dr
We survey the security of IoT frameworks, a total of 8 frameworks are considered. Expand
  • 252
  • 10
  • Open Access
Shared and Searchable Encrypted Data for Untrusted Servers
tl;dr
We propose an encryption scheme where each authorised user in the system has his own keys to encrypt and decrypt data. Expand
  • 192
  • 7
  • Open Access
MOSES: supporting operation modes on smartphones
tl;dr
We present MOSES, a policy-based framework for enforcing software isolation of applications and data on the Android platform. Expand
  • 79
  • 6
  • Open Access
Supporting complex queries and access policies for multi-user encrypted databases
tl;dr
This paper extends work on multi-user encrypted search schemes by supporting SQL-like encrypted queries on encrypted databases and introduces access control on the data stored in the cloud. Expand
  • 45
  • 6
  • Open Access
Securing Data Provenance in the Cloud
tl;dr
This paper proposes a scheme to secure data provenance in the cloud while offering the encrypted search. Expand
  • 36
  • 6
  • Open Access
Design and implementation of a confidentiality and access control solution for publish/subscribe systems
tl;dr
The publish/subscribe model offers a loosely-coupled communication paradigm where applications interact indirectly and asynchronously. Expand
  • 43
  • 5
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
tl;dr
In this paper, we provide a novel scheme that supports (i) confidentiality for events and filters; (ii) filters can express very complex constraints on events even if brokers are not able to access any information on both events. Expand
  • 76
  • 5
  • Open Access
YAASE: Yet Another Android Security Extension
tl;dr
We present Yet Another Android Security Extension that provides a fine-grained security mechanism while protecting the user from malicious applications that attempt to leak sensitive information via network access. Expand
  • 56
  • 5
Authorisation and Conflict Resolution for Hierarchical Domains
tl;dr
In this paper we generalise the authorisation policy model supported by the Ponder policy language for hierarchically organised domains of managed objects to support subject-based policies and return policies. Expand
  • 67
  • 4
  • Open Access