Alessandro Sorniotti  Alessandro Sorniotti photo       

contact information

Researcher in cryptography and system security
Zurich Research Laboratory, Zurich, Switzerland
  +41dash44dash724dash87dash15

links



2016



2015

TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud
J. Bringer, B. Gallego, G. Karame, M. Kohler, P. Louridas, M. Önen, H. Ritzdorf, A. Sorniotti, D. Vallejo
International Conference on e-Democracy, pp. 193-197, 2015


2014

Reconciling End-to-End Confidentiality and Data Reduction In Cloud Storage
N. Baracaldo, E. Androulaki, J. Glider, A. Sorniotti
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, pp. 21-32, 2014

A tunable proof of ownership scheme for deduplication using bloom filters
J. Blasco, R. Di Pietro, A. Orfila, A. Sorniotti
IEEE Conference onCommunications and Network Security (CNS), pp. 481-489, 2014

A secure data deduplication scheme for cloud storage
J. Stanek, A. Sorniotti, E. Androulaki, L. Kencl
International Conference on Financial Cryptography and Data Security, pp. 99-118, 2014


2013

An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations
A. Armando, R. Carbone, L. Compagna, J. Cuellar, G. Pellegrino, A. Sorniotti
Computers & Security33, 41-58, Elsevier, 2013

Policy-based secure deletion
C. Cachin, K. Haralambiev, H.-C. Hsiao, A. Sorniotti
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 259-270


2012

Robust data sharing with key-value stores
C. Basescu, C. Cachin, I. Eyal, R. Haas, A. Sorniotti, M. Vukolic, I. Zachevsky
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), pp. 1-12

On limitations of using cloud storage for data replication
C. Cachin, B. Junker, A. Sorniotti
Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on, pp. 1--6

Boosting Efficiency and Security in Proof of Ownership for Deduplication
R. Di Pietro, A. Sorniotti
ASIACCS '12 Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security , pp. 81-82 , 2012


2011

Attack Surface Reduction for Commodity OS Kernels
A. Kurmus, A. Sorniotti, R. Kapitza
Proceedings of the Fourth European Workshop on System Security, pp. 6:1-6:6, 2011

Attack surface reduction for commodity OS kernels: trimmed garden plants may attract less bugs
A. Kurmus, A. Sorniotti, R. Kapitza
Proceedings of the Fourth European Workshop on System Security, pp. 6, 2011

From Multiple Credentials to Browser-based Single Sign-On: Are We More Secure?
A. Armando, R. Carbone, L. Compagna, J. Cuellar, G. Pellegrino, A. Sorniotti
Future Challenges in Security and Privacy for Academia and Industry, 68-79, 2011


2010

Security Patterns for Untraceable Secret Handshakes with optional Revocation
A. Laube, A. Sorniotti, P. El Khoury, L. Gomez, A. Cuevas
International Journal on Advances in Security 3(1&2), 2010

Privacy-aware policy matching
S. Trabelsi, E. Weil, A. Sorniotti, S. Short, M. Bezzi
2010 IEEE Symposium on Computers and Communications (ISCC), pp. 302-307

Secret interest groups (SIGs) in social networks with an implementation on Facebook
A. Sorniotti, R. Molva
Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 621-628

Searchable encryption for outsourced data analytics
F. Kerschbaum, A. Sorniotti
European Public Key Infrastructure Workshop, pp. 61-76, 2010

A provably secure secret handshake with dynamic controlled matching
A. Sorniotti, R. Molva
Computers \& Security 29(5), 619--627, Elsevier, 2010

Access Control in Mobile and Ubiquitous Environments
L. Gomez, A. Laube, A. Sorniotti
Ubiquitous and Pervasive Computing: Concepts, Methodologies, Tools, and Applications, 2010

Federated secret handshakes with support for revocation
A. Sorniotti, R. Molva
Information and Communications Security, 218-234, 2010


2009

Secret handshakes with revocation support
A. Sorniotti, R. Molva
International Conference on Information Security and Cryptology, pp. 274-299, 2009

A security pattern for untraceable secret handshakes
A. Cuevas, P. El Khoury, L. Gomez, A. Laube, A. Sorniotti
2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp. 8-14

Trustworthiness assessment of wireless sensor data for business applications
Gomez, Laurent and Laube, Annett and Sorniotti, Alessandro
2009 International Conference on Advanced Information Networking and Applications, pp. 355--362

RFID-based supply chain partner authentication and key agreement
Kerschbaum, Florian and Sorniotti, Alessandro
Proceedings of the second ACM conference on Wireless network security, pp. 41--50, 2009

Efficient access control for wireless sensor data
A. Sorniotti, R. Molva, L. Gomez, C. Trefois, A. Laube, P. Scaglioso
International Journal of Wireless Information Networks 16(3), 16--174, Springer, 2009


2008

Encryption-based access control for building management
L. Gomez, A. Laube, V. Ribiere, A. Sorniotti, C. Trefois, M. Valente, P. Wetterwald
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, pp. 27, 2008

Design guidelines for integration of wireless sensor networks with enterprise systems
L. Gomez, A. Laube, A. Sorniotti,
Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, pp. 12, 2008


2007

Secure and trusted in-network data processing in wireless sensor networks: a survey
A. Sorniotti, L. Gomez, K. Wrona, L. Odorico
Journal of Information Assurance and Security 2(3), 189-199, 2007