Implementation and Validation of a Localisation Assurance Service Provider

Interdisciplinary Research Group in Socio-technical CybersecurityImplementation and Validation of a Localisation Assurance Service ProviderChen Xihui, Harpes Carlo, Lenzini Gabriele, Martins Miguel, Mauw Sjouke, Pang Jun🗎 Abstract:Existing Global Navigation Satellite Systems offer no authentication to the open service signals and so stand-alone receivers are vulnerable to meaconing and spoofing attacks. These attacks interfere with the integrity … Continued

A group signature based electronic toll pricing system

Interdisciplinary Research Group in Socio-technical CybersecurityA group signature based electronic toll pricing systemChen Xihui, Lenzini Gabriele, Mauw Sjouke, Pang Jun🗎 Abstract:With the prevalence and development of GNSS technologies, location-based vehicle services (LBVS) have experienced a rapid growth in recent years. However, location is a sensitive and private piece of information, so the design and development … Continued

Trustworthy agent-based recommender system in a mobile P2P environment

Interdisciplinary Research Group in Socio-technical CybersecurityTrustworthy agent-based recommender system in a mobile P2P environmentSahli Nabil, Lenzini Gabriele, Eertink Henk🗎 Abstract:Current major P2P systems focus on PCs and do not provide services for the mobile environment. Compared to traditional P2P, characteristics of Mobile P2P include unreliable connections, limited bandwidth and constraints of mobile devices. In addition, … Continued

Defending against insider threats and internal data leakage

Interdisciplinary Research Group in Socio-technical CybersecurityDefending against insider threats and internal data leakageYou Ilsun, Lenzini Gabriele, Ogiela Marek R., Bertino Elisa🗎 Abstract:In the last decade, computer science researchers have been working hard to prevent attacks against the security of information systems. Different adversary models have incarnated the malicious entities against which researchers have defined security … Continued

STAST 2011 Proc. of the 1st Workshop on Socio-Technical Aspects in Security and Trust

Interdisciplinary Research Group in Socio-technical CybersecuritySTAST 2011 Proc. of the 1st Workshop on Socio-Technical Aspects in Security and TrustColes-Kemp Lizzie, Lenzini Gabriele, Ryan Peter, Bella Giampaolo 🗎 Abstract:🖎 Authors:Coles-Kemp Lizzie, Lenzini Gabriele, Ryan Peter, Bella Giampaolo 🖈 Publication date:2011🖅 Published in:IEEE🖯 Reference:Coles-Kemp, L., Lenzini, G., Ryan, P., & Bella, G. (2011). STAST 2011 Proc. of … Continued

Adaptive Trust Management

Interdisciplinary Research Group in Socio-technical CybersecurityAdaptive Trust ManagementSeigneur Jean-Marc, Lenzini Gabriele, Hulsebosch Bob 🗎 Abstract:Chapter 8 of this book has explained how computational trust and reputation can be used to select the trustworthy pieces of software among the plethora of pieces of software emerging from this dynamic self-organising software world as envisioned in this book. … Continued

Selective location blinding using hash chains

Interdisciplinary Research Group in Socio-technical CybersecuritySelective location blinding using hash chainsLenzini Gabriele, Mauw Sjouke, Pang Jun🗎 Abstract:Location-based applications require a user’s movements and positions to provide customized services. However, location is a sensitive piece of information that should not be revealed unless strictly necessary. In this paper we propose a procedure that allows a user … Continued

Accomplishing transparency within the General Data Protection Regulation (Auxiliary material)

Interdisciplinary Research Group in Socio-technical CybersecurityAccomplishing transparency within the General Data Protection Regulation (Auxiliary material)Pierina Brustolin, Spagnuelo Dayana, Ferreira Ana, Lenzini Gabriele🗎 Abstract:This document intends to complement and expand the content presented in [Spagnuelo et al., 2019]. In this auxiliary material we present current Transparency Enhancing Tools (TETs) and their correlation with the European General … Continued

DaPIS: an Ontology-Based Data Protection Icon Set

Privacy policies are known to be impenetrable and lengthy texts that are hardly read and poorly understood. This is why GDPR introduces provisions to enhance information transparency including icons as visual means to clarify data practices.