L
Luigi Lo Iacono
Researcher at Cologne University of Applied Sciences
Publications - 115
Citations - 2194
Luigi Lo Iacono is an academic researcher from Cologne University of Applied Sciences. The author has contributed to research in topics: Password & SOAP. The author has an hindex of 17, co-authored 107 publications receiving 1919 citations. Previous affiliations of Luigi Lo Iacono include Ruhr University Bochum & NEC.
Papers
More filters
Proceedings ArticleDOI
On Technical Security Issues in Cloud Computing
TL;DR: This paper focuses on technical security issues arising from the usage of Cloud services and especially by the underlying technologies used to build these cross-domain Internet-connected collaborations.
Proceedings ArticleDOI
All your clouds are belong to us: security analysis of cloud management interfaces
TL;DR: This research results are alarming: in regards to the Amazon EC2 and S3 services, the control interfaces could be compromised via the novel signature wrapping and advanced XSS techniques and the Eucalyptus control interfaces were vulnerable to classical signature wrapping attacks, and had nearly no protection against XSS.
Journal ArticleDOI
Security and Privacy-Enhancing Multicloud Architectures
TL;DR: A survey on the achievable security merits by making use of multiple distinct clouds simultaneously according to their security and privacy capabilities and prospects is provided.
Proceedings ArticleDOI
Vulnerable Cloud: SOAP Message Security Validation Revisited
Nils Gruschka,Luigi Lo Iacono +1 more
TL;DR: The verification steps required to effectively validate an incoming SOAP request are discussed and a practical guideline for achieving a robust and effective SOAP message security validation mechanism is provided.
Journal ArticleDOI
Strategies for health data exchange for secondary, cross-institutional clinical research
Bernice Simone Elger,Jimison Iavindrasana,Luigi Lo Iacono,Henning Müller,Nicolas Roduit,Paul Summers,Jessica Wright +6 more
TL;DR: An overview of technical, practical, legal, and ethical aspects of secondary data use are given and their implementation in the multi-institutional @neurIST research project is discussed.