Browse by Person
Up a level |
2006
Aceto, L. and Chen, Taolue and Fokkink, W.J. and Ingolfsdottir, A. (2006) On the axiomatizability of priority. In: Bugliesi, M. and Preneel, B. and Sassone, V. and Wegener, I. (eds.) ICALP 2006: Automata, Languages and Programming, 33rd International Colloquium. Lecture Notes in Computer Science 4052. Springer, pp. 480-491. ISBN 9783540359074.
1 January 2010
Sassone, V. and Hamadou, S. and Yang, Mu (2010) Trust in anonymity networks. In: International Conference on Concurrency Theory, 31 Aug - Sep 3 2010, Paris, France.
2011
Yang, Mu and Sassone, V. (2011) Minimising anonymity loss in anonymity networks under DoS attacks. In: International Conference on Information and Communications Security, 23-26 Nov 2011, Beijing, China.
2012
Yang, Mu and Sassone, V. and Hamadou, S. (2012) A game-theoretic analysis of cooperation in anonymity networks. In: Principles of Security and Trust, 24 Mar - 1 Apr 2012, Tallinn, Estonia.
February 2015
Hamadou, S. and Sassone, V. and Yang, Mu (2015) An analysis of trust in anonymity networks in the presence of adaptive attackers. Mathematical Structures in Computer Science 25 (2), pp. 429-456. ISSN 0960-1295.
2017
Ferdous, M.S. and Margheri, A. and Paci, F. and Yang, Mu and Sassone, V. (2017) Decentralised runtime monitoring for access control systems in cloud federations. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 05-08 Jun 2017, Atlanta, U.S..
Margheri, A. and Ferdous, M.S. and Yang, Mu and Sassone, V. (2017) A distributed infrastructure for democratic cloud federations. In: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 25-30 Jun 2017, Honololu, U.S..
November 2018
Yang, Mu and Margheri, A. and Hu, R. and Sassone, V. (2018) Differentially private data sharing in a Cloud Federation with Blockchain. IEEE Cloud Computing 5 (6), pp. 69-79. ISSN 2168-7161.
30 April 2020
Hu, R. and Stalla-Bourdillon, S. and Yang, Mu and Schiavo, V. and Sassone, V. (2020) Bridging policy, regulation and practice? A techno-legal analysis of three types of data in the GDPR. In: Leenes, R. and van Brakel, R. and Gutwirth, S. and De Hert, P. (eds.) Data Protection and Privacy: The Age of Intelligent Machines. Oregon, U.S.: Hart Publishing, p. 39. ISBN 9781509937486.