Alberto Trombetta

Orcid: 0000-0002-2567-9297

According to our database1, Alberto Trombetta authored at least 76 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On-line Anomaly Detection and Qualification of Random Bit Streams.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

2023
A review of domain ontologies for disability representation.
Expert Syst. Appl., October, 2023

A novel agile ontology engineering methodology for supporting organizations in collaborative ontology development.
Comput. Ind., October, 2023

Graph-based Tool for Exploring PubMed Knowledge Base.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

A Serverless Architecture for Efficient and Scalable Monte Carlo Markov Chain Computation.
Proceedings of the 7th International Conference on Cloud and Big Data Computing, 2023

GASTon: A Graph-Exploration System for Indexing, Annotating and Visualizing PubMed Articles to Enhance the Analysis of Social deTerminants of Health.
Proceedings of the 16th International Joint Conference on Biomedical Engineering Systems and Technologies, 2023

2022
Secure Selections on Encrypted Multi-writer Streams.
ACM Trans. Priv. Secur., 2022

DOMUS: a domestic ontology managed ubiquitous system.
J. Ambient Intell. Humaniz. Comput., 2022

QPQ 1DLT: A system for the rapid deployment of secure and efficient EVM-based blockchains.
CoRR, 2022

1DLT: Rapid Deployment of Secure and Efficient EVM-Based Blockchains.
Proceedings of the 4th International Conference on Blockchain Economics, 2022

A Semantic-Based Collaborative Ambient-Assisted Working Framework.
Proceedings of the Collaborative Networks in Digitalization and Society 5.0, 2022

Towards an Ontology-Based Decision Support System to Support Car-Reconfiguration for Novice Wheelchair Users.
Proceedings of the Computers Helping People with Special Needs, 2022

Adaptive Replication Strategy in Highly Distributed Data Management Systems.
Proceedings of the IEEE International Conference on Cloud Engineering, 2022

2021
Privacy-Preserving Distributed Support Vector Machines.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2021

2020
An ontology-based framework for a Less Invasive Domestic Management System (LIDoMS).
Proceedings of the 16th International Conference on Intelligent Environments, 2020

2019
An event-driven integrative framework enabling information notification among manufacturing resources.
Int. J. Comput. Integr. Manuf., 2019

2018
Semantic based events signaling for AAL systems.
J. Ambient Intell. Humaniz. Comput., 2018

Strengthening the Cybersecurity of Manufacturing Companies: A Semantic Approach Compliant with the NIST Framework.
ERCIM News, 2018

An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Secure Data Sharing in Cloud Usingan Efficient Inner-Product ProxyRe-Encryption Scheme.
J. Cyber Secur. Mobil., 2017

Secure Queries on Encrypted Multi-writer Tables.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Secure and Efficient Data Sharing with Atribute-based Proxy Re-encryption Scheme.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2014
Answering queries using pairings.
CoRR, 2014

Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014

Discovering non-constant Conditional Functional Dependencies with Built-in Predicates.
Proceedings of the Database and Expert Systems Applications, 2014

Multidimensional Reputation Network for Service Composition in the Internet of Things.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
Distributed access control policies for spectrum sharing.
Secur. Commun. Networks, 2013

A Framework for Trust-Based Multidisciplinary Team Recommendation.
Proceedings of the User Modeling, Adaptation, and Personalization, 2013

Querying data across different legal domains.
Proceedings of the 17th International Database Engineering & Applications Symposium, 2013

Identity-based security systems for vehicular ad-hoc networks.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

Data Quality Evaluation of Scientific Datasets - A Case Study in a Policy Support Context.
Proceedings of the DATA 2013 - Proceedings of the 2nd International Conference on Data Technologies and Applications, Reykjavík, Iceland, 29, 2013

2012
A Flexible Approach to Multisession Trust Negotiations.
IEEE Trans. Dependable Secur. Comput., 2012

BPMN: An introduction to the standard.
Comput. Stand. Interfaces, 2012

A Method and Guidelines for the Cooperation of Ontologies and Relational Databases in Semantic Web Applications.
Proceedings of the 2nd International Workshop on Semantic Digital Archives, 2012

2011
A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems.
IEEE Trans. Ind. Informatics, 2011

Privacy-Preserving Updates to Anonymous and Confidential Databases.
IEEE Trans. Dependable Secur. Comput., 2011

Secure and Policy-Private Resource Sharing in an Online Social Network.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

A rule-based policy language for selective trust propagation in social networks.
Proceedings of the First ACM SIGMOD Workshop on Databases and Social Networks, 2011

2010
Group-Based Negotiations in P2P Systems.
IEEE Trans. Parallel Distributed Syst., 2010

Privacy-aware role-based access control.
ACM Trans. Inf. Syst. Secur., 2010

Advanced trust negotiations in critical infrastructures.
Int. J. Crit. Infrastructures, 2010

Distributed Intrusion Detection System for SCADA Protocols.
Proceedings of the Critical Infrastructure Protection IV, 2010

State-Based Firewall for Industrial Protocols with Critical-State Prediction Monitor.
Proceedings of the Critical Information Infrastructures Security, 2010

Combining access control and trust negotiations in an On-line Social Network.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Modbus/DNP3 State-Based Intrusion Detection System.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Adaptive and Distributed Access Control in Cognitive Radio Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
An experimental investigation of malware attacks on SCADA systems.
Int. J. Crit. Infrastructure Prot., 2009

Integrating Privacy Policies into Business Processes.
J. Res. Pract. Inf. Technol., 2009

Modeling and Validating BPMN Diagrams.
Proceedings of the 2009 IEEE Conference on Commerce and Enterprise Computing, 2009

Design and Implementation of a Secure Modbus Protocol.
Proceedings of the Critical Infrastructure Protection III, 2009

State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept.
Proceedings of the Critical Information Infrastructures Security, 2009

2008
Building a Domain Ontology from Glossaries: A General Methodology.
Proceedings of the 5th Workshop on Semantic Web Applications and Perspectives (SWAP2008), 2008

Introducing privacy in a hospital information system.
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008

Privately Updating Suppression and Generalization based k-Anonymous Databases.
Proceedings of the 24th International Conference on Data Engineering, 2008

Identity-based long running negotiations.
Proceedings of the 4th Workshop on Digital Identity Management, 2008

Scada Malware, a Proof of Concept.
Proceedings of the Critical Information Infrastructure Security, 2008

2007
Privacy-aware role based access control.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

2006
Equivalences and optimizations in an expressive XSLT subset.
Acta Informatica, 2006

Private Updates to Anonymous Databases.
Proceedings of the 22nd International Conference on Data Engineering, 2006

2005
A framework for modeling and evaluating automatic semantic reconciliation.
VLDB J., 2005

A model for short-term content adaptation.
Proceedings of the 14th international conference on World Wide Web, 2005

Representation and management of ontologies in cultural heritage domain.
Proceedings of the SWAP 2005, 2005

Short-Term Content Adaptation in Web-based Learning Systems.
Proceedings of the IASTED International Conference on Web Technologies, 2005

2004
Equivalences and Optimizations in an Expressive XSLT Fragment.
Proceedings of the 8th International Database Engineering and Applications Symposium (IDEAS 2004), 2004

2003
A similarity based relational algebra for Web and multimedia data.
Inf. Process. Manag., 2003

Evaluating Matching Algorithms: the Monotonicity Principle.
Proceedings of IJCAI-03 Workshop on Information Integration on the Web (IIWeb-03), 2003

A Model for Schema Integration in Heterogeneous Databases.
Proceedings of the 7th International Database Engineering and Applications Symposium (IDEAS 2003), 2003

Imprecision Based Queries Over Materialized and Virtual Integrated Views.
Proceedings of the ICEIS 2003, 2003

2002
Workflow Architecture for Interactive Video Management Systems.
Distributed Parallel Databases, 2002

2001
An Imprecision-based Language for the Web.
J. Vis. Lang. Comput., 2001

2000
Fuzzy and Presentation Algebras for Web and Multimedia Data.
Proceedings of the 2000 International Database Engineering and Applications Symposium, 2000

Imprecision and User Preferences in Multimedia Queries: A Generic Algebraic Approach.
Proceedings of the Foundations of Information and Knowledge Systems, 2000

1999
Similarity Search through Fuzzy Relational Algebra.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

1998
An Extraction Language for the Web.
Proceedings of the CIKM'98 First Workshop on Web Information and Data Management (WIDM'98), 1998

1997
Optimal Comparison Strategies in Ulam's Searching Game with Two Errors.
Theor. Comput. Sci., 1997


  Loading...