Publications
"In science one tries to tell people, in such a way as to be understood by everyone, something that no one ever knew before. But in poetry, it's the exact opposite."
Paul Dirac (1902-1984)

Books Journal Conferences Newspaper Editor Miscellanea

"Floodgate: A Micropayment Incentivised P2P Content Distribution Network"
Srijith K. Nair, E. Zentveld, B. Crispo, A. S. Tanenbaum, to be presented at ICCCN08: 17th Internation Conference on Computer Communications and Networks, August 3 - 7, 2008, St. Thomas U.S. Virgin Islands, USA.
"XACML Policy Integration Algorithms."
P. Mazzoleni, B. Crispo, S. Sivasubramanian, E. Bertino: , ACM Transactions on Information and System Security (TISSEC), vol.11 n.1, February, 2008.
"Turning Teenagers into Stores",
Srijith K. Nair, R. Gerrits, B. Crispo and A. S. Tanenbaum, IEEE Computer Magazine, February 2008 (Vol. 41, No. 2) pp. 58-62.
"P-CDN: Extending Access Control Capabilities of P2P Systems to provide CDN Services",
F. Turkmen, B. Crispo, P. Mazzoleni and E. Bertino, to be presented at ISCC08: IEEE Symposium on Computers and Communications, July 6 - 9, 2008, Marrakech, Morocco.
"Proceedings of the 13th Security Protocol International Workshop"" ,
Christianson, B.; Crispo, B.; Malcom, J.A.; Roe, M. (Eds.), 2007, LNCS Vol. 4631, Springer.

 

Books

"The Global Internet Trust Register"
R.J. Anderson, B. Crispo, J.H. Lee, C. Manifavas, V. Matyas Jr. F.A.P. Petitcolas, MIT Press, Boston, MA, USA, ISBN 0-262-51105-3.
"The Global Trust Register"
R.J. Anderson, B. Crispo, J.H. Lee, C. Manifavas,  V. Matyas Jr. F.A.P. Petitcolas, Northgate Consultants Ltd., UK.

Articles in Journals and Magazines

"Design and Implementation of a Secure Wide-Area Object Middleware" ,
B.C. Popescu, B. Crispo, A.S. Tanenbaum and A. Bakker, Computer Networks, pp. 2484-2513, vol. 51, issue 10, July 2007, Elsevier.
"RFID Malware: Design Principles and Examples",
M.R. Rieback, N.D. Simpson, B. Crispo and A.S. Tanenbaum, Pervasive and Mobile Computing (PMC) Journal, vol 2 (4), pp. 405-426, Elsevier, 2006.
"Taking Sensor Networks from the Lab to the Jungle" ,
A. S. Tanenbaum, C. Gamage and B. Crispo, IEEE Computer Magazine, vol. 39 n. 8, August 2006, pp. 98-100.
"Malware: Truth vs. Myth." ,
M.R. Rieback, B. Crispo and A.S. Tanenbaum, IEEE Security and Privacy Magazine, vol 4, n. 4, July/August 2006, pp. 70-72.
"The Evolution of RFID Security",
M. Rieback, B. Crispo and A.S. Tanenbaum, IEEE Pervasive Computing Magazine, vol. 5, n. 1, January-March 2006, pp. 62-69.
"How to Incorporate Revocation Status Information into the Trust Metrics fro Public-Key Certification",
K. Bicakci, B., Crispo, and A. S. Tanenbaum., International Journal for Infonomics. ISSN 1742-4720 (Extended version of the paper accepted at ACM SAC 2005).
"Individual Authentication in Multiparty Communications"
F. Bergadano, D. Cavagnino and B. Crispo. Computer & Security, Elsevier Science, vol. 21 n. 8, November 2002, pp.719-735.
"WWW Security and Trusted Third Party Services"
B. Crispo, P. Landrock and Vaclav Matyas Jr., Future Generation Computer System: Special Issue "Security on the Web", vol. 16 n.4, pp.331-341, February 2000.
"A New Family of Authentication Protocols"
R.J. Anderson, F. Bergadano, B. Crispo, J.H. Lee, C. Manifavas and R.M. Needham, Operating Systems Review, vol. 32, n. 4, pp. 9-20, October 1998, ACM Press.
"High Dictionary Compression for Proactive Password Checking"
F. Bergadano, B. Crispo, G. Ruffo, ACM Transactions on Information and System Security (TISSEC), vol.1 n.1, November, 1998.
"Strong Authentication and Privacy with Standard Browsers" 
F. Bergadano, B. Crispo, M. Lomas, Journal of Computer Security, Special Issue on World Wide Web Security, vol 5, n. 3 pp191-212, IOS Press, 1997.

Articles in Conferences and Workshops

"ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems",
D. Bolzoni, B. Crispo, and S.Etalle, in the proceedings of Usenix LISA 2007: 21st Large Installation System Administration Conference, November 2007.
"Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices",,
I. Ion, B. Dragovic and B. Crispo, , ACSAC 07: 23rd Annual Computer Security Applications Conference, December 2007.
"Secure Web Service Federation Management using TPM Virtualisation",
Srijith K. Nair, I. Djordjevic, B. Crispo and T. Dimitrakos", SWS'07: 2007 ACM Workshop on Secure Web Services, November 2007.
"A Virtual Machine Based Information Flow Control System for Policy Enforcement",
Srijith K. Nair, P.N.D. Simpson, B. Crispo and A. S. Tanenbaum, REM2007: 1st International Workshop on Run Time Enforcement for Mobile and Distributed Systems, September 2007.
A Hybrid PKI-IBC Based Ephemerizer System,
Srijith K. Nair, M.T. Dashti, B. Crispo, and A.S. Tanenbaum, in the proceedings of SEC 2007: 22nd IFIP TC-11 International Information Security Conference, May 2007.
"A Platform for RFID Security and Privacy Administration" ,
M.R. Rieback, G.N. Gaydadjiev, B. Crispo, R.F.H. Hofman and A.S. Tanenbaum, to be presented at Usenix LISA 2006: 20th Large Installation System Administration Conference, December 2006. (Best paper Award)
"Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System" ,
B.C. Popescu, B. Crispo, and A.S. Tanenbaum, in the Proceedings of the 12th Security Protocol International Workshop" , pp. 213-230, LNCS vol. 3957, Springer.
"An Identity-based Ring Signature Scheme with Enhanced Privacy",
C. Gamage, B. Gras, B. Crispo and A.S. Tanenbaum in the Proc. of IEEE SecureComm, August 2006.
"XACML Policy Integration Algorithms",
P. Mazzoleni, E. Bertino, B. Crispo and S. Sivasubramanian, in the Proceedings of SACMAT 2006: ACM Symposium on Access Control Model and Technologies, June 2006.
"Security for the Mythical Air-dropped Sensor Net work",
C. Gamage, K. Bicakci, B. Crispo, and A. S. Tanenbaum, to be presented at ISCC 2006: IEEE Symposium on Computers and Communications, June 26-29 2006.
"Is Your Cat Infected with a Computer Virus?"
M. Rieback, B. Crispo and A.S. Tanenbaum, in the proceedings of PerCom 06: 4th Annual IEEE International Conference on Pervasive Computing and Communications", March 2006. (Best Paper Award)
"A Cost-Efficient Counter-Intrusion Scheme for One-Time Sensor Networks"
C. Gamage, J. Leiwo, K. Bicakci, B. Crispo and A.S. Tanenbaum, in the proceedings of ISSNIP: 2nd International Conference on Intelligent Sensors, Sensor Networks and Information Processing", December 2005.
"One-Time Sensors: A Novel Concept to Mitigate Node-Capture Attacks"
K. Bicakci, C. Gamage, B. Crispo and A.S. Tanenbaum, in the proceedings of ESAS 2005: 2nd European Workshop on Security and Privacy in Ad-Hoc and Sensors Networks, July 2005
"Efficient Integration of Fine-grained Access Control in Large-scale Grid Services"
P. Mazzoleni, B. Crispo, S. Sivasubramanian, E. Bertino, in the proceedings of SCC 2005: IEEE International Conference on Service Computing, July 2005. (Best Paper Award)
"RFID Guardian: A Battery-Powered Mobile Device for Personal RFID Privacy Management"
M. Rieback, B. Crispo and A.S. Tanenbaum, in the proceedings of ACISP 2005: 10th Australiasian Conference on Information Security,July 2005.
"Counting Abuses Using Flexible Off-line Credentials"
K, Bicakci, B. Crispo and A.S. Tanenbaum, in the proceedings of ACISP 2005: 10th Australiasian Conference on Information Security, July 2005.
"Enabling DRM-preserving Digital Content Redistribution"
S.K. Nair, B.C. Popescu, C. Gamage, B. Crispo and A.S. Tanenbaum, in the proceedings of CEC 2005: 7th International IEEE Conference on e-Commerce Technology, July 2005..
"P-Hera: Scalable fine-grained access control for P2P"
B. Crispo, S. Sivasubramanian, P. Mazzoleni and E. Bertino, in the proceedings of ICPADS 2005: 11th International Conference on Parallel and Distributed Systems, July 2005.
"Keep on Blockin' in the Free World: Personal Access Contrl for Low-Cost RFID Tags"
M. Rieback, B. Crispo and A.S. Tanenbaum, in the proceedings of the "13th Security Protocol International Workshop", April 2005.
"Securely Replicated Web Documents"
B.C. Popescu, J. Sacha, M. van Steen, B. Crispo, A. S. Tanenbaum and I. Kuz, in the proceedings of IPDPS 2005: 19th International Parallel and Distributed Processing Symposium, April 2005.
"How to Incorporate Revocation Status Information into the Trust Metrics for Publik-Key Certification"
K. Bicakci, B. Crispo and A. S. Tanenbaum in the proceedings of SAC 2005: 20th Annual ACM Symposium on Applied Computing, March 2005.
A DRM Security Architecture for Home Networks"
B. Popescu, B. Crispo, F.L.A.J. Kamperman and A. S. Tanenbaum in the proceedings of DRM 2004: The 4th ACM Workshop on Digital Rights Management, October 2004.
"Support for Multi-Level Security Policies in DRM Architectures"
B. Popescu, B. Crispo and A. S. Tanenbaum in the proceedings of the NSPW 2004: New Security Paradigm Workshop,, September 2004.
Symmetric Key Authentication Services Revisited
B. Crispo, B. Popescu, A. S. Tanenbaum in the proceedings of ACISP 2004: The 9th Australasian Conference on Information Security and Privacy,, July 2004.
"Support Multi-Dimensional Trustworthiness for Grid Workflow",
E. Bertino, B. Crispo and P. Mazzoleni in the proceedings of 6th Themathic Workshop of the EU Network of Excellence DELOS on Digital Library, June 2004.
Towards Supporting Fine-grained Access Control for Grid Resources,
E. Bertino, P. Mazzoleni, B. Crispo, S. Sivasubramanian and E. Ferrari in the proceedings of FTDCS 2004: 10th Int.l Workshop on Future Trends in Distributed Computing Systems, May 2004.
"Secure Data Replication on Un-Trusted Hosts"
B.C. Popescu, B. Crispo. and A.S. Tanenbaum in the proceedings of HotOS-IX, May 2003.
"A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System"
B.C. Popescu, B. Crispo. and A.S. Tanenbaum in the proceedings of ISCC 03: 8th IEEE Symposium on Computer and Communications, July 2003.
Enforcing Security Policies for Distributed Objects Applications
B.C. Popescu, B. Crispo, A.S. Tanenbaum and M. Zeeman, presented at the "11th Security Protocols International Workshop", April, 2003.
"Reasoning about Accountability within Delegation"
B. Crispo. and G. Ruffo In the Proceedings of "ICICS 2001: 3rd International Conference on Information and Communications Security", November 2001.
"Architecture and Security Aspect of a Signature Server" 
B. Crispo and S. Sheye. Accepted at the conference "e-2001: e-Business and e-Work Conference", October 2001.
"Delegation Protocols for Electronic Commerce"
B. Crispo. In the proceedings of the "6th IEEE Symposium on Computers and Communications", July 2001.
"Chained Stream Authentication" 
F. Bergadano, D. Cavagnino, B. Crispo. In the proceedings of the "7th Annual Workshop on Selected Areas in Cryptography: SAC 2000", August 2000, Waterloo, Ontario, Canada. D. R. Stinson, S. Tavares Eds., LNCS 2012, pages 144-157, Springer.
"Public-key Crypto-systems Using Symmetric-Key Crypto-algorithms"
B. Christianson, B. Crispo and J.A. Malcolm, Proceedings of the "8th Security Protocols International Workshop", April 3-5, 2000. Springer-Verlag LNCS vol. 2133, ISBN 3-540-42566-7, pp. 182-193.
"Individual Single Source Authentication on the Mbone"
F. Bergadano, D. Cavagnino, B. Crispo Proceedings of the "ICME 2000: IEEE International Conference on Mutlimedia & Expo 2000", August 2000.
"A Note About the Semantics of Delegation" 
Bruno Crispo and Bruce Christianson. In the proceedings of the "3rd Conference on Autonomous Agent (Agent '99)", May 1999.
"Banks, Trusted Third Parties and Electronic Commerce: Position Paper" 
Bruno Crispo, Peter Landrock, Matyas Jr. Vaclav. In the proceedings of "Information Systems Security in the Financial Sector", March 1999, pp. 87-92, ISBN 80-85655-11-X.
"The Global Trust Register" 
Ross J. Anderson, Bruno Crispo, Jong-Hyeon Lee, Charalampos Manifavas, Matyas Jr. Vaclav, and Fabien A.P. Petitcolas. In the proceedings of Datasem '98, October 1998, pp. 129-141, ISBN 80-238-2888-6.
"Selezione preliminare di password in ambiente NT"(in italian)
F. Bergadano, B. Crispo, G. Moretto and G. Ruffo. Proceedings of AICA Conference, November 1998.
"Delegation of Responsibilities"
B. Crispo Proceedings of the "1998 Security Protocols International Workshop" April 1998, Cambridge, UK, Springer-Verlag LNCS vol. 1550, ISBN 3-540-65663-4, pp. 118-130.
"Secure WWW Transactions Using Standard HTTP and Java Applets"
F. Bergadano, B. Crispo and M. Eccettuato, Proceedings "3rd USENIX Workshop on Electronic Commerce" September 1998, Boston, Massachusetts, USA. ISBN 1-880446-97-9 pp. 109-119, USENIX Association.
"A Certification Scheme for Electronic Commerce"
B. Crispo, M. Lomas Proceedings "1996 Security Protocols International Workshop" April 1996 Cambridge UK Springer-Verlag LNCS vol. 1189 ISBN 3-540-62494-5 pp. 19-32
"Proactive Password Checking with Decision Trees"
F. Bergadano, B. Crispo, G. Ruffo, Proc. 4th ACM Conference on Computer and Communications Security, Zurich, April 1997.
"How to Build Evidence in a Public-Key Infrastructure for Multi-Domain Environments"
B. Crispo. Proceedings "1997 Security Protocols International Workshop" April 1997 France. Springer-Verlag LNCS vol.1361 pp. 53-65.

Articles in Newspapers

"Diritto d'autore nell'era dei bit. Soluzioni tecniche a confronto"
B. Crispo and M. Leone. Article appeared in Tuttoscienze - La Stampa on 28th March 2001 (in italian).
"I soldi? Saranno bit"
F. Bergadano and B. Crispo. Article appeared in Tuttoscienze - La Stampa on 26th November 1997 (in italian).
"Le insidie nell'oceano di Internet"
F. Bergadano and B. Crispo. Article appeared in Tuttoscienze - La Stampa on 9th April 1997 (in italian).

Editor

Co-Editor of the 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th, and 13th edition of the Security Protocol International Workshop proceedings, published in the LNCS series by Springer-Verlag.

Miscellanea

"Internet Protocol Next Generation"[.ps],[.html]. Manuscript in italian.


Please e-mail any comments to Bruno Crispo

Return to indexHome