Luigi Catuogno, PhD
List of publications
Legenda
Book chapters
Journals and Magazines
International Conferences
Workshops and events co-located with International Conferences
National Events, Meetings and Technical Reports
Thesis and unpublished manuscripts

L. Catuogno, C. Galdi
Analysis of a two-factor graphical password scheme
to appear on the International Journal of Information Security (IJIS)
DOI: 10.1007/s10207-014-0228-y

L. Catuogno, C. Galdi,
Interoperability Between Federated Authentication Systems
To be presented at the 4-th International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security (MCNCS 2014)., Birmingham (UK), July 2-4, 2014.

L. Catuogno, H. Loehr, M. Winandy, A.-R. Sadeghi
A Trusted Versioning File System for Passive Mobile Storage Devices
Journal of Network and Computer Applications (JNCA) Volume 38, February 2014, pp. 65-75.
DOI: http://dx.doi.org/10.1016/j.jnca.2013.05.006

L. Catuogno, C. Galdi
Towards the design of a film-based graphical password scheme
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions (ICITST 2013). London (UK), December 9-12, 2013.

A. Castiglione, L. Catuogno, A. Del Sorbo, U. Fiore, F. Palmieri
A Secure File Sharing Service for Distributed Computing Environments
The Journal of Supercomputing (JOS), Volume 67, No. 3, pp. 691-710 (2014);
DOI: http://dx.doi.org/10.1007/s11227-013-0975-y

L. Catuogno, P. Faruolo, U. F. Petrillo, I. Visconti
Reliable accounting in Grids
Journal of High Performance Computing and Networking (IJHPCN)
Volume 7, No.3, pp.186-194 (2013);
DOI: 10.1504/IJHPCN.2013.056520;

I. You, L. Catuogno, A. Castiglione, G. Cattaneo
On Asynchronous Enforcement of Security Policies in ``Nomadic'' Storage Facilities
Proceedings of the 22nd International Symposium on Industrial Electronics (ISIE 2013).
Taipei (Taiwan), May 28-31, 2013.

L. Catuogno, R. Gassirà, M. Masullo, I. Visconti
SmartK: Smart cards in operating systems at kernel level.
Information Security Technical Report (ISTR), vol.17, no. 3, february 2013, pp 93-104,
DOI: http://dx.doi.org/10.1016/j.istr.2012.10.003

A. Castiglione, G. Cattaneo, L. Catuogno, E. Cerrelli, C. Di Giampaolo, F. Marino, R. Rotondo, Virtual Lab: a concrete experience in building multi-purpose virtualized labs for Computer Science Education.
Presented at 20th International Conference on Software, Telecommunications and Computer Networks.(SoftCOM 2012).
Split (Croatia), September 11-13, 2012.

L. Catuogno, C. Galdi, Graphical Passwords
Chapter of: Threats, Countermeasures, and Advances in Applied Information Security, M. Gupta, J. Walp, R. Sharman editors, IGI Global, April 2012,
pp. 112-129, DOI: 10.4018/978-1-4666-0978-5, ISBN13: 9781466609785

A. Castiglione, G. Cattaneo, L. Catuogno, E. Cerrelli, C. Di Giampaolo, F. Marino, R. Rotondo, Virtual Lab: vantaggi e opportunita' per la didattica dell'informatica(italian)
Presented at Didamatica 2011 Italian Conference on IT and education.
Turin (Italy), May 4-6, 2011. (pdf)

L. Catuogno, H. Loehr, M. Manulis, A.-R. Sadeghi, C. Stuble, M. Winandy, Trusted Virtual Domains: Color your network
Datenschutz und Datensichereit (DuD), vol. 34, no. 4, May 2010, Springer Verlag, pp. 289--294. (www)

L. Catuogno, C. Galdi, On the Security of a two-factor Authentication Scheme
Presented at the 4th Workshop on Information Security Theory and Practices (Wistp'10).
Passau (Germany), April 12-14, 2010. (pdf)

L. Catuogno, A. Dmitrienko, K. Eriksson, D. Kuhlmann, G. Ramunno, A.-R. Sadeghi, S. Schulz, M. Schunter, M. Winandy, J. Zhan, Trusted Virtual Domains -- Design, Implementation and Lessons Learned, Proceedings of the International Conference on Trusted Systems 2009 (INTRUST 2009)
Beijing (China), December 17-18, 2009 (pdf)

L. Catuogno, H. Loehr, M. Manulis, A.-R. Sadeghi, M. Winandy, Transparent Mobile Storage Protection in Trusted Virtual Domains, Proceedings of the 23rd USENIX Large Installation System Administration Conference (LISA 2009) Baltimore MD (US), November 1-6, 2009 (pdf)

G. Cattaneo, L. Catuogno, F. Petagna, An Implementation of Interoperable Security Features for a Smart Card enabled VoIP Softphone, Workshop on ICT at 2008 International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2008)
Split, Dubrovnik(Croatia), September 25-27, 2008

L. Catuogno, PITO: a Children-friendly interface for Security tools, Proceedings of the "Learning to live in the knowledge society" technical conference (ED-L2L)
at IFIP's World Computer Conferences 2008 (WCC 2008), Milano (Italy), September 7-10, 2008. (pdf)

L. Catuogno, A. De Santis, An Internet Role-game for the laboratory of a Network Security Course, Proceedings of the 13th ACM Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE 2008). Madrid (Spain), June 30 - July 2, 2008. (pdf)

L. Catuogno, C. Galdi, A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost Devices, Proceedings of 2nd Workshop on Information Security Theory and Practices (Wistp'08). Sevilla (Spain), May 13-16, 2008. Volume 5019 of Lecture Notes in Computer Science, pp. 16-35. Springer-Verlag, 2008. (pdf)

L. Catuogno, PITO: Una Interfaccia Children-friendly per Strumenti di Sicurezza (italian).
Proceedings of Didamatica 2008 Italian Conference, pp. 960-964.
Taranto (Italy), April 28-30, 2008. (slides)

G. Cattaneo, L. Catuogno, F. Petagna, G. Di Matteo, L. Romano, iToken: a Wireless Smart Card Reader which Provides Handhelds with Desk Top Equivalent Security. The 2007 International Workshop on Secure and Multimodal Pervasive Environments (SMPE'07) Nice (FR), September 17, 2007.

L. Catuogno, C. Galdi, A Graphical PIN Authentication Mechanism for Smart Cards and Low-Cost Devices Presented at 2nd Italian Workshop on Privacy and Security (Prise2007). Proceedings are published as Technical Report of the Dipartimento di Informatica of the Universita' di Roma "La Sapienza", Rome(IT), June 6, 2007. (pdf)

L. Catuogno, R. Gassirà, M. masullo and I. Visconti, Securing Operating System Services Based on Smart Cards. Proceedings of the 2nd International Conference on Trust, Privacy, and Security in Digital Business (TrustBus'05) Copenhagen, Denmark, August 22-26, 2005. Volume 3592 of Lecture Notes in Computer Science, pp. 321, Springer-Verlag 2005. (pdf)

L. Catuogno, P. Faruolo, U. F. Petrillo and I. Visconti, Reliable Accounting in Grid Economic Transaction. Proceedings of Workshop on Information Security and Survivability for Grid (GISS04) October 21-24, 2004, Wuhan, China. Volume 3252 of Lecture Notes in Computer Science, pp. 514-521, Springer-Verlag 2004. (pdf)

L. Catuogno and I. Visconti, An Architecture for Kernel-Level Verification of Executables at Run Time, The Computer Journal, Oxford Press, Vol. 47, no. 5, September 2004.
(postscript, pdf)

G. Cattaneo, L. Catuogno, U. F. Petrillo and I. Visconti. A Lightweight Security Model for WBEM, WRSM 2003: Workshop on Reliable and Secure Middleware. November 3-7, 2003, Catania, ITALY. Volume 2889 of Lecture Notes in Computer Science, pp. 975-988, Springer-Verlag 2003.

A. Castiglione, L. Catuogno, U. F. Petrillo, D. Parente, A. Fresa, R. Casella, L. Auletta and A. De Gregorio. Applying WBEM to heterogeneus TLC Network Management: an evaluation., Proceedings of SoftCOM 2003: International Conference on Software, Telecommunications and Computer Networks. Split, Dubrovnik (Croatia), Ancona, Venice (Italy), October 7-10, 2003.

A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code, L. Catuogno and I. Visconti, Proceedings of the Third Conference on Security in Communication Networks (SCN) 2002 - Amalfi (Italy), Sep 12-13, 2002. Volume 2576 of Lecture Notes in Computer Science, Springer-Verlag 2003. (postscript, pdf)

L. Catuogno, U. Ferraro Petrillo, An extensible distributed management architecture,
Workshop su Sistemi Distribuiti, Algoritmi, Architetture e Linguaggi 2001 (WSDAAL 2001).
Como (Italy), september 10-12, 2001.

G. Cattaneo, L. Catuogno, A. Del Sorbo and G.Persiano,The design and implementation of a Transparent Cryptographic Filesystem for Unix, Proceedings of USENIX Annual Technical Conference 2001 - Freenix track Boston, June 25-30, 2001. (postscript, pdf).

L. Catuogno
Transparent Cryptographic File System for BSD. A primer
Unpublished manuscript, Salerno, April 15, 2000. (pdf).

Home page