Anna Cinzia Squicciarini

Orcid: 0000-0002-7396-1895

Affiliations:
  • Pennsylvania State University, College of Information Sciences and Technology, State College, PA, USA


According to our database1, Anna Cinzia Squicciarini authored at least 220 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A longitudinal dataset and analysis of Twitter ISIS users and propaganda.
Soc. Netw. Anal. Min., December, 2024

Scalable Optimization for Locally Relevant Geo-Location Privacy.
CoRR, 2024

ACCORD: Constraint-driven Mediation of Multi-user Conflicts in Cloud Services.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Fine-Grained Geo-Obfuscation to Protect Workers' Location Privacy in Time-Sensitive Spatial Crowdsourcing.
Proceedings of the Proceedings 27th International Conference on Extending Database Technology, 2024

2023
Lived experiences of online harm amongst marginalized and vulnerable individuals in support-seeking communities on Reddit.
CoRR, 2023

Content Sharing Design for Social Welfare in Networked Disclosure Game.
Proceedings of the Uncertainty in Artificial Intelligence, 2023

CORGI: An interactive framework for Customizable and Robust Location Obfuscation.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

User Customizable and Robust Geo-Indistinguishability for Location Privacy.
Proceedings of the Proceedings 26th International Conference on Extending Database Technology, 2023

RoCourseNet: Robust Training of a Prediction Aware Recourse Model.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

2022
An Extended Ultimatum Game for Multi-Party Access Control in Social Networks.
ACM Trans. Web, 2022

Location Privacy Protection in Vehicle-Based Spatial Crowdsourcing via Geo-Indistinguishability.
IEEE Trans. Mob. Comput., 2022

Automated Detection of Doxing on Twitter.
Proc. ACM Hum. Comput. Interact., 2022

Contagion of Offensive Behavior for Transient Interactions in Online Commenting Platforms.
Int. J. Hum. Comput. Interact., 2022

TACO: A Tree-based Approach to Customizing Location Obfuscation based on User Policies.
CoRR, 2022

RoCourseNet: Distributionally Robust Training of a Prediction Aware Recourse Model.
CoRR, 2022

A Longitudinal Dataset of Twitter ISIS Users.
CoRR, 2022

PrivacyAlert: A Dataset for Image Privacy Prediction.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

The Contribution of Verified Accounts to Self-Disclosure in COVID-Related Twitter Conversations.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

Distributed Data-Sharing Consensus in Cooperative Perception of Autonomous Vehicles.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

TrafficAdaptor: an adaptive obfuscation strategy for vehicle location privacy against traffic flow aware attacks.
Proceedings of the 30th International Conference on Advances in Geographic Information Systems, 2022

COVID-19 and Haters - A User Model Perspective.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022

A Synthetic Prediction Market for Estimating Confidence in Published Work.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Detecting Suspicious File Migration or Replication in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

The Expertise Involved in Deciding which HITs are Worth Doing on Amazon Mechanical Turk.
Proc. ACM Hum. Comput. Interact., 2021

A study of self-disclosure during the Coronavirus pandemic.
First Monday, 2021

Self-disclosure on Twitter During the COVID-19 Pandemic: A Network Perspective.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021

A Few Shot Transfer Learning Approach Identifying Private Images With Fast User Personalization.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Modeling Longitudinal Behavior Dynamics Among Extremist Users in Twitter Data.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Understanding and Predicting Retractions of Published Work.
Proceedings of the Workshop on Scientific Document Understanding co-located with 35th AAAI Conference on Artificial Inteligence, 2021

2020
REMIND: Risk Estimation Mechanism for Images in Network Distribution.
IEEE Trans. Inf. Forensics Secur., 2020

Privacy in Crisis: A study of self-disclosure during the Coronavirus pandemic.
CoRR, 2020

Multi-party Access Control - 10 Years of Successes and Lessons Learned.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

A Semantics-based Approach to Disclosure Classification in User-Generated Online Content.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

A Tipping Point? Heightened self-disclosure during the Coronavirus pandemic.
Proceedings of the 2nd IEEE International Conference on Cognitive Machine Intelligence, 2020

Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based Systems.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Time-Efficient Geo-Obfuscation to Protect Worker Location Privacy over Road Networks in Spatial Crowdsourcing.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

A Study of Self-Privacy Violations in Online Public Discourse.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Contextual representation of self-disclosure and supportiveness in short text.
Proceedings of the 3rd Workshop on Affective Content Analysis (AffCon 2020) co-located with Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI 2020), 2020

2019
A Cloud Brokerage Architecture for Efficient Cloud Service Selection.
IEEE Trans. Serv. Comput., 2019

Opinion Dynamics in the Presence of Increasing Agreement Pressure.
IEEE Trans. Cybern., 2019

Consensus and Information Cascades in Game-Theoretic Imitation Dynamics with Static and Dynamic Network Topologies.
SIAM J. Appl. Dyn. Syst., 2019

Power Law Public Goods Game for Personal Information Sharing in News Comments.
CoRR, 2019

Discovering reliable evidence of data misuse by exploiting rule redundancy.
Comput. Secur., 2019

Detection and Analysis of Self-Disclosure in Online News Commentaries.
Proceedings of the World Wide Web Conference, 2019

FriendGuard: A Friend Search Engine with Guaranteed Friend Exposure Degree.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Location Privacy Protection in Vehicle-Based Spatial Crowdsourcing Via Geo-Indistinguishability.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Power Law Public Goods Game for Personal Information Sharing in News Commentaries.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Rating Mechanisms for Sustainability of Crowdsourcing Platforms.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

Toward Image Privacy Classification and Spatial Attribution of Private Content.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Incentivizing Distributive Fairness for Crowdsourcing Workers.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Hierarchical Clustering for Discrimination Discovery: A Top-Down Approach.
Proceedings of the 2nd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2019

2018
Towards Privacy-Preserving and Practical Image-Centric Social Discovery.
IEEE Trans. Dependable Secur. Comput., 2018

Survey on Access Control for Community-Centered Collaborative Systems.
ACM Comput. Surv., 2018

Combating Crowdsourced Review Manipulators: A Neighborhood-Based Approach.
Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, 2018

Multi-Party Access Control: Requirements, State of the Art and Open Challenges.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Flexible Inference for Cyberbully Incident Detection.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018

Privacy-Aware Tag Recommendation for Image Sharing.
Proceedings of the 29th on Hypertext and Social Media, 2018

Server-Based Manipulation Attacks Against Machine Learning Models.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Toward Automated Multiparty Privacy Conflict Detection.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

CrowdEval: A Cost-Efficient Strategy to Evaluate Crowdsourced Worker's Reliability.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Combating Behavioral Deviance via User Behavior Control.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Uncovering Scene Context for Predicting Privacy of Online Shared Images.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Positive and negative behavioral analysis in social networks.
WIREs Data Mining Knowl. Discov., 2017

Toward Automated Online Photo Privacy.
ACM Trans. Web, 2017

MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs.
IEEE Trans. Mob. Comput., 2017

MMB<sup>cloud</sup>-Tree: Authenticated Index for Verifiable Cloud Service Selection.
IEEE Trans. Dependable Secur. Comput., 2017

Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds.
IEEE Trans. Cloud Comput., 2017

Increasing Peer Pressure on any Connected Graph Leads to Consensus.
CoRR, 2017

From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

A Group-Based Personalized Model for Image Privacy Classification and Labeling.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Dynamic Contract Design for Heterogenous Workers in Crowdsourcing for Quality Control.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Real-Time Detection of Illegal File Transfers in the Cloud.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Toward Group-Based User-Attribute Policies in Azure-Like Access Control Systems.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Consensus on Social Graphs under Increasing Peer Pressure.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
Editor's Note.
IEEE Trans. Dependable Secur. Comput., 2016

A hybrid epidemic model for deindividuation and antinormative behavior in online social networks.
Soc. Netw. Anal. Min., 2016

Tweet Factors Influencing Trust and Usefulness During Both Man-Made and Natural Disasters.
Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016

An Emotional Step Towards Automated Trust Detection in Crisis Social Media.
Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016

An In-Depth Study of Peer Influence on Collective Decision Making for Multi-party Access Control (Invited Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Content-Driven Detection of Cyberbullying on the Instagram Social Network.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Invited Paper: A Model of Paradoxical Privacy Behavior in Online Users.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Efficient Network Path Verification for Policy-routedQueries.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

CrowdSelect: Increasing Accuracy of Crowdsourcing Tasks through Behavior Prediction and User Selection.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Uncovering the Spatio-Temporal Dynamics of Memes in the Presence of Incomplete Information.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Constrained Social-Energy Minimization for Multi-Party Sharing in Online Social Networks.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

LAST-HDFS: Location-Aware Storage Technique for Hadoop Distributed File System.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites.
IEEE Trans. Knowl. Data Eng., 2015

Privacy-aware access control for message exchange in vehicular ad hoc networks.
Telecommun. Syst., 2015

A Large Scale Study of Web Service Vulnerabilities.
J. Internet Serv. Inf. Secur., 2015

MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection.
IACR Cryptol. ePrint Arch., 2015

Uncovering Crowdsourced Manipulation of Online Reviews.
Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2015

Privacy and Access Control: How are These Two concepts Related?
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

SecLoc: Securing Location-Sensitive Storage in the Cloud.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

An evolutionary game model for the spread of non-cooperative behavior in online social networks.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Twitter Mining for Disaster Response: A Domain Adaptation Approach.
Proceedings of the 12th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2015

Determining a Discrete Set of Site-Constrained Privacy Options for Users in Social Networks Through Stackelberg Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Epidemic Behavior of Negative Users in Online Social Sites.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Toward De-Anonymizing Bitcoin by Mapping Users Location.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Towards Provenance-Based Anomaly Detection in MapReduce.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

Identification and characterization of cyberbullying dynamics in an online social network.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

A Hybrid Epidemic Model for Antinormative Behavior in Online Social Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Why and how to deceive: game results with sociological evidence.
Soc. Netw. Anal. Min., 2014

The relativity of privacy preservation based on social tagging.
Inf. Sci., 2014

Preface.
Int. J. Cooperative Inf. Syst., 2014

A cooperate-defect model for the spread of deviant behavior in social networks.
CoRR, 2014

Identifying hidden social circles for advanced privacy configuration.
Comput. Secur., 2014

PriMa: a comprehensive approach to privacy protection in social network sites.
Ann. des Télécommunications, 2014

Online abusive users analytics through visualization.
Proceedings of the 23rd International World Wide Web Conference, 2014

Policy Driven Node Selection in MapReduce.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Securing Resource Discovery in Content Hosting Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

In the wild: a large scale study of web services vulnerabilities.
Proceedings of the Symposium on Applied Computing, 2014

Mapping moods: Geo-mapped sentiment analysis during hurricane sandy.
Proceedings of the 11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2014

Enabling Privacy-Preserving Image-Centric Social Discovery.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Analyzing images' privacy for the modern web.
Proceedings of the 25th ACM Conference on Hypertext and Social Media, 2014

Situational awareness through reasoning on network incidents.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Toward Detecting Compromised MapReduce Workers through Log Analysis.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014

Identifying valuable information from twitter during natural disasters.
Proceedings of the Connecting Collections, Cultures, and Communities, 2014

2013
Agent-based accountable grid computing systems.
J. Supercomput., 2013

Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

WS-Rec: Web services recommendations using heterogeneous criteria.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

Policy-Compliant Search Query Routing for Web Service Discovery in Peer to Peer Networks.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Detecting Malicious Co-resident Virtual Machines Indulging in Load-Based Attacks.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Privacy aware service selection of composite web services invited paper.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Adaptive data protection in distributed systems.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Ensuring Distributed Accountability for Data Sharing in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2012

A Flexible Approach to Multisession Trust Negotiations.
IEEE Trans. Dependable Secur. Comput., 2012

Access control for online social networks third party applications.
Comput. Secur., 2012

Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

Two Species Evolutionary Game Model of User and Moderator Dynamics.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012

An Informed Model of Personal Information Release in Social Networking Sites.
Proceedings of the 2012 International Conference on Privacy, 2012

Early Detection of Policies Violations in a Social Media Site: A Bayesian Belief Network Approach.
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012

Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks.
Proceedings of the Network and System Security - 6th International Conference, 2012

Location Privacy Policy Management System.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Automatic social group organization and privacy management.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Adaptive data management for self-protecting objects in cloud computing systems.
Proceedings of the 8th International Conference on Network and Service Management, 2012

A moving zone based architecture for message dissemination in VANETs.
Proceedings of the 8th International Conference on Network and Service Management, 2012

ReasONets: a fuzzy-based approach for reasoning on network incidents.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

A Brokerage-Based Approach for Cloud Service Selection.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Adaptive Reordering and Clustering-Based Framework for Efficient XACML Policy Evaluation.
IEEE Trans. Serv. Comput., 2011

CoPE: Enabling collaborative privacy management in online social networks.
J. Assoc. Inf. Sci. Technol., 2011

Security and Privacy in Social Networks.
IEEE Internet Comput., 2011

Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor.
IEEE Secur. Priv., 2011

Trust establishment in the formation of Virtual Organizations.
Comput. Stand. Interfaces, 2011

Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks.
Computer, 2011

Towards a Game Theoretical Model for Identity Validation in Social Network Sites.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Profile-Based Selection of Accountability Policies in Grid Computing Systems.
Proceedings of the POLICY 2011, 2011

A Privacy-Preserving Approach for Web Service Selection and Provisioning.
Proceedings of the IEEE International Conference on Web Services, 2011

A3P: adaptive policy prediction for shared images over popular content sharing sites.
Proceedings of the HT'11, 2011

Distributed Java-Based Content Protection.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

PAIM: Peer-Based Automobile Identity Management in Vehicular Ad-Hoc Network.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Privacy through web-traveler policies in social network environments.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems.
Proceedings of the 11th IEEE/ACM International Symposium on Cluster, 2011

Promoting Distributed Accountability in the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Erratum to: Web-Traveler Policies for Images on Social Networks.
World Wide Web, 2010

Privacy policies for shared content in social network sites.
VLDB J., 2010

Multifactor Identity Verification Using Aggregated Proof of Knowledge.
IEEE Trans. Syst. Man Cybern. Part C, 2010

Group-Based Negotiations in P2P Systems.
IEEE Trans. Parallel Distributed Syst., 2010

Learning based access control in online social networks.
Proceedings of the 19th International Conference on World Wide Web, 2010

DeCore: Detecting Content Repurposing Attacks on Clients' Systems.
Proceedings of the Security and Privacy in Communication Networks, 2010

Data protection models for service provisioning in the cloud.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

User Centric Policy Management in Online Social Networks.
Proceedings of the POLICY 2010, 2010

Biometrics-based identifiers for digital identity management.
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010

Vulnerabilities leading to denial of services attacks in grid computing systems: a survey.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

PriMa: an effective privacy protection mechanism for social networks.
Proceedings of the 5th ACM Symposium on Information, 2010

Preventing Information Leakage from Indexing in the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

Security for Web Services and Service-Oriented Architectures.
Springer, ISBN: 978-3-540-87741-7, 2010

2009
Web-Traveler Policies for Images on Social Networks.
World Wide Web, 2009

An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices.
J. Softw., 2009

Collective privacy management in social networks.
Proceedings of the 18th International Conference on World Wide Web, 2009

Statistics & Clustering Based Framework for Efficient XACML Policy Evaluation.
Proceedings of the POLICY 2009, 2009

The Design and Evaluation of Accountable Grid Computing System.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

An assessment of accountability policies for large-scale distributed computing systems.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Towards automatic privacy management in Web 2.0 with semantic analysis on annotations.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

2008
Verification of Receipts from M-commerce Transactions on NFC Cellular Phones.
Proceedings of the 10th IEEE International Conference on E-Commerce Technology (CEC 2008) / 5th IEEE International Conference on Enterprise Computing, 2008

VeryIDX - A Digital Identity Management System for Pervasive Computing Environments.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2008

Automatic Compliance of Privacy Policies in Federated Digital Identity Management.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Beyond User-to-User Access Control for Online Social Networks.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Protecting Databases from Query Flood Attacks.
Proceedings of the 24th International Conference on Data Engineering, 2008

Privacy policies compliance across digital identity management systems.
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008

Identity-based long running negotiations.
Proceedings of the 4th Workshop on Digital Identity Management, 2008

Minimal credential disclosure in trust negotiations.
Proceedings of the 4th Workshop on Digital Identity Management, 2008

End-to-end accountability in grid computing systems for coalition information sharing.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

Monitoring Contract Enforcement within Virtual Organizations.
Proceedings of the Collaborative Computing: Networking, 2008

Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering.
Proceedings of the Collaborative Computing: Networking, 2008

A Unified Theory of Trust and Collaboration.
Proceedings of the Collaborative Computing: Networking, 2008

A Policy-Based Accountability Tool for Grid Computing Systems.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
PP-trust-X: A system for privacy preserving trust negotiations.
ACM Trans. Inf. Syst. Secur., 2007

Privacy preserving multi-factor authentication with biometrics.
J. Comput. Secur., 2007

Trust Negotiation in Identity Management.
IEEE Secur. Priv., 2007

Information carrying identity proof trees.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

A privacy preserving assertion based policy language for federation systems.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

Privacy Requirements in Identity Management Solutions.
Proceedings of the Human Interface and the Management of Information. Interacting in Information Environments, 2007

Access Control Strategies for Virtualized Environments in Grid Computing Systems.
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007

2006
Ws-AC: A Fine Grained Access Control System for Web Services.
World Wide Web, 2006

Achieving Privacy in Trust Negotiations with an Ontology-Based Approach.
IEEE Trans. Dependable Secur. Comput., 2006

An Adaptive Access Control Model for Web Services.
Int. J. Web Serv. Res., 2006

Establishing and protecting digital identity in federation systems.
J. Comput. Secur., 2006

A secure framework for publishing virtual community contracts.
Int. J. Web Based Communities, 2006

Policy Languages for Digital Identity Management in Federation Systems.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Trust Negotiations with Customizable Anonymity.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Privacy preserving multi-factor authentication with biometrics.
Proceedings of the 2006 Workshop on Digital Identity Management, 2006

A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2005
Anonymity Preserving Techniques in Trust Negotiations.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

2004
Trust-X: A Peer-to-Peer Framework for Trust Establishment.
IEEE Trans. Knowl. Data Eng., 2004

Trust negotiations: concepts, systems, and languages.
Comput. Sci. Eng., 2004

A Framework for Contractual Resource Sharing in Coalitions.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

Privacy-Preserving Trust Negotiations.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

A Flexible Access Control Model for Web Services.
Proceedings of the Flexible Query Answering Systems, 6th International Conference, 2004

Trust Negotiation Systems.
Proceedings of the Current Trends in Database Technology - EDBT 2004 Workshops, 2004

A Fine-Grained Access Control Model for Web Services.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

2003
X-TNL: An XML-based Language for Trust Negotiations.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Trust-Chi: An XML Framework for Trust Negotiations.
Proceedings of the Communications and Multimedia Security, 2003


  Loading...