Follow
Alessandro Sorniotti
Alessandro Sorniotti
IBM Research - Zurich
Verified email at zurich.ibm.com - Homepage
Title
Cited by
Cited by
Year
Hyperledger fabric: a distributed operating system for permissioned blockchains
E Androulaki, A Barger, V Bortnikov, C Cachin, K Christidis, A De Caro, ...
Proceedings of the thirteenth EuroSys conference, 1-15, 2018
44982018
A secure data deduplication scheme for cloud storage
J Stanek, A Sorniotti, E Androulaki, L Kencl
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
3112014
Boosting efficiency and security in proof of ownership for deduplication
R Di Pietro, A Sorniotti
Proceedings of the 7th ACM symposium on information, computer and …, 2012
2902012
Smotherspectre: exploiting speculative execution through port contention
A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
2282019
System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger
E Androulaki, A DeCaro, T Kramp, A Sorniotti, M Vukolic
US Patent 9,992,028, 2018
1692018
Blockchain and trusted computing: Problems, pitfalls, and a solution for hyperledger fabric
M Brandenburger, C Cachin, R Kapitza, A Sorniotti
arXiv preprint arXiv:1805.08541, 2018
1322018
Secure isolation of tenant resources in a multi-tenant storage system using a security gateway
ME Factor, D Hadas, EK Kolodner, A Kurmus, A Shulman-Peleg, ...
US Patent 9,411,973, 2016
1052016
An authentication flaw in browser-based single sign-on protocols: Impact and remediations
A Armando, R Carbone, L Compagna, J Cuéllar, G Pellegrino, A Sorniotti
Computers & Security 33, 41-58, 2013
952013
Policy-based secure deletion
C Cachin, K Haralambiev, HC Hsiao, A Sorniotti
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
842013
Robust data sharing with key-value stores
C Basescu, C Cachin, I Eyal, R Haas, M Vukolic
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of …, 2011
832011
A tunable proof of ownership scheme for deduplication using bloom filters
J Blasco, R Di Pietro, A Orfila, A Sorniotti
2014 IEEE Conference on Communications and Network Security, 481-489, 2014
822014
Resisting replay attacks efficiently in a permissioned and privacy-preserving blockchain network
E Androulaki, A De Caro, T Kramp, DW Kravitz, A Sorniotti, M Vukolic
US Patent 10,230,756, 2019
632019
Secure and trusted in-network data processing in wireless sensor networks: a survey
A Sorniotti, L Gomez, K Wrona, L Odorico
Journal of Information Assurance and Security 2 (3), 189-199, 2007
632007
Attack surface reduction for commodity OS kernels: trimmed garden plants may attract less bugs
A Kurmus, A Sorniotti, R Kapitza
Proceedings of the Fourth European Workshop on System Security, 1-6, 2011
532011
Secure logical isolation for multi-tenancy in cloud storage
M Factor, D Hadas, A Harnama, N Har'El, EK Kolodner, A Kurmus, ...
2013 IEEE 29th Symposium on Mass Storage Systems and Technologies (MSST), 1-5, 2013
492013
Reconciling end-to-end confidentiality and data reduction in cloud storage
N Baracaldo, E Androulaki, J Glider, A Sorniotti
Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing …, 2014
462014
Searchable encryption for outsourcing data analytics
F Kerschbaum, A Sorniotti
US Patent 8,291,509, 2012
462012
From multiple credentials to browser-based single sign-on: Are we more secure?
A Armando, R Carbone, L Compagna, J Cuellar, G Pellegrino, A Sorniotti
IFIP International Information Security Conference, 68-79, 2011
452011
Proof of ownership for deduplication systems: a secure, scalable, and efficient solution
R Di Pietro, A Sorniotti
Computer Communications 82, 71-82, 2016
442016
RFID-based supply chain partner authentication and key agreement
F Kerschbaum, A Sorniotti
Proceedings of the second ACM conference on Wireless network security, 41-50, 2009
442009
The system can't perform the operation now. Try again later.
Articles 1–20