Barbara Carminati

Orcid: 0000-0002-7502-4731

Affiliations:
  • University of Insubria, Varese, Italy


According to our database1, Barbara Carminati authored at least 157 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Protecting Privacy in Knowledge Graphs With Personalized Anonymization.
IEEE Trans. Dependable Secur. Comput., 2024

Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-materialisation.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

RF-WAVEGUARD: Enhancing UAV Security Against Signal Jamming Attacks through Radio Frequency Watermarking.
Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2024

2023
MalCon: A blockchain-based malware containment framework for Internet of Things.
Comput. Networks, September, 2023

Cyber Pandemics.
IEEE Internet Comput., 2023

Private, Fair and Secure Collaborative Learning Framework for Human Activity Recognition.
Proceedings of the Adjunct Proceedings of the 2023 ACM International Joint Conference on Pervasive and Ubiquitous Computing & the 2023 ACM International Symposium on Wearable Computing, 2023

ConPrEF: A Context-based Privacy Enforcement Framework for Edge Computing.
Proceedings of the IEEE International Conference on Edge Computing and Communications, 2023

Privacy-preserving Decentralized Learning of Knowledge Graph Embeddings.
Proceedings of the Workshops of the EDBT/ICDT 2023 Joint Conference, 2023

Message from the General Chairs and PC Chairs CIC 2023.
Proceedings of the 9th IEEE International Conference on Collaboration and Internet Computing, 2023

Early-Stage Ransomware Detection Based on Pre-attack Internal API Calls.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Blockchain-Based Privacy Enforcement in the IoT Domain.
IEEE Trans. Dependable Secur. Comput., 2022

A Risk Estimation Mechanism for Android Apps based on Hybrid Analysis.
Data Sci. Eng., 2022

Privacy and Security Issues for Human Digital Twins.
Proceedings of the 4th IEEE International Conference on Trust, 2022

PriApp-Install: Learning User Privacy Preferences on Mobile Apps' Installation.
Proceedings of the Information Security Practice and Experience, 2022

A Blockchain-based Framework in Support of Privacy Preferences Enforcement for Scientific Workflows : (Invited Paper).
Proceedings of the IEEE International Conference on Web Services, 2022

Enforcement of Laws and Privacy Preferences in Modern Computing Systems.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

MalRec: A Blockchain-based Malware Recovery Framework for Internet of Things.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Privacy-Aware Personal Data Storage (P-PDS): Learning how to Protect User Privacy from External Applications.
IEEE Trans. Dependable Secur. Comput., 2021

PAutoBotCatcher: A blockchain-based privacy-preserving botnet detector for Internet of Things.
Comput. Networks, 2021

A Risk Assessment Mechanism for Android Apps.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2021

Privacy-Preserving Sequential Publishing of Knowledge Graphs.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

LiMNet: Early-Stage Detection of IoT Botnets with Lightweight Memory Networks.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
A deep learning model for Twitter spam detection.
Online Soc. Networks Media, 2020

Requirements and Challenges for Secure and Trustworthy UAS Collaboration.
Proceedings of the Second IEEE International Conference on Trust, 2020

Cluster-Based Anonymization of Knowledge Graphs.
Proceedings of the Applied Cryptography and Network Security, 2020

Blockchain-based controlled information sharing in inter-organizational workflows.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020

A Blockchain-based Trustworthy Certification Process for Composite Services.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020

2019
Confidential Discovery of IoT Devices through Blockchain.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

Adapting Users' Privacy Preferences in Smart Environments.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

Cluster-Based Anonymization of Directed Graphs.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Helping Users Managing Context-Based Privacy Preferences.
Proceedings of the 2019 IEEE International Conference on Services Computing, 2019

2018
Secure Data Outsourcing.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Merkle Trees.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Digital Signatures.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Blind Signatures.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Knowledge-based approaches for identity management in online social networks.
WIREs Data Mining Knowl. Discov., 2018

Privacy in Web Service Transactions: A Tale of More than a Decade of Work.
IEEE Trans. Serv. Comput., 2018

Editorial.
IEEE Trans. Serv. Comput., 2018

Enhanced Audit Strategies for Collaborative and Accountable Data Sharing in Social Networks.
ACM Trans. Internet Techn., 2018

Risk Assessment in Social Networks Based on User Anomalous Behaviors.
IEEE Trans. Dependable Secur. Comput., 2018

Decentralized privacy preserving services for Online Social Networks.
Online Soc. Networks Media, 2018

Decentralizing privacy enforcement for Internet of Things smart objects.
Comput. Networks, 2018

Hybrid-IoT: Hybrid Blockchain Architecture for Internet of Things - PoW Sub-Blockchains.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Confidential Business Process Execution on Blockchain.
Proceedings of the 2018 IEEE International Conference on Web Services, 2018

AutoBotCatcher: Blockchain-Based P2P Botnet Detection for the Internet of Things.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Blockchain as a Platform for Secure Inter-Organizational Business Processes.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

CrowdEval: A Cost-Efficient Strategy to Evaluate Crowdsourced Worker's Reliability.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Detecting Spam Accounts on Twitter.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
An extended access control mechanism exploiting data dependencies.
Int. J. Inf. Sec., 2017

Learning Privacy Habits of PDS Owners.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

SAMPAC: Socially-Aware collaborative Multi-Party Access Control.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
COIP - Continuous, Operable, Impartial, and Privacy-Aware Identity Validity Estimation for OSN Profiles.
ACM Trans. Web, 2016

Detection of Unspecified Emergencies for Controlled Information Sharing.
IEEE Trans. Dependable Secur. Comput., 2016

CADIVa: cooperative and adaptive decentralized identity validation model for social networks.
Soc. Netw. Anal. Min., 2016

Trustworthy and effective person-to-person payments over multi-hop MANETs.
J. Netw. Comput. Appl., 2016

LAMP - Label-Based Access-Control for More Privacy in Online Social Networks.
Proceedings of the Information Security Theory and Practice, 2016

A Language and an Inference Engine for Twitter Filtering Rules.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Gossip-Based Behavioral Group Identification in Decentralized OSNs.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2016

Anomalous change detection in time-evolving OSNs.
Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop, 2016

A Risk-Benefit Driven Architecture for Personal Data Release (Invited Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

Beat the DIVa - decentralized identity validation for online social networks.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Privacy Settings Recommender for Online Social Network.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

CrowdSelect: Increasing Accuracy of Crowdsourcing Tasks through Behavior Prediction and User Selection.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Enhancing User Control on Personal Data Usage in Internet of Things Ecosystems.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
Graph Based Local Risk Estimation in Large Scale Online Social Networks.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Privacy Preserving Decentralized Identity Validation for Geo-social Networks over MANET.
Proceedings of the 7th International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking, 2015

What Happens to My Online Social Estate When I Am Gone? An Integrated Approach to Posthumous Online Data Management.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

A Privacy-Preserving Framework for Constrained Choreographed Service Composition.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015

Evolutionary Inference of Attribute-Based Access Control Policies.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2015

CARDS - Collaborative Audit and Report Data Sharing for A-Posteriori Access Control in DOSNs.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

DIVa: Decentralized Identity Validation for Social Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Detecting anomalies in social network data consumption.
Soc. Netw. Anal. Min., 2014

Editorial: Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012).
Mob. Networks Appl., 2014

Preface.
Int. J. Cooperative Inf. Syst., 2014

SocialCloudShare: a Facebook Application for a Relationship-based Information Sharing in the Cloud.
EAI Endorsed Trans. Collab. Comput., 2014

Editorial.
Comput. Secur., 2014

Secure Web Service Composition with Untrusted Broker.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

Community-Based Identity Validation on Online Social Networks.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Relationship-based information sharing in cloud-based decentralized social networks.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Security and Trust in Online Social Networks
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02339-2, 2013

A System to Filter Unwanted Messages from OSN User Walls.
IEEE Trans. Knowl. Data Eng., 2013

A System for Timely and Controlled Information Sharing in Emergency Situations.
IEEE Trans. Dependable Secur. Comput., 2013

User similarities on social networks.
Soc. Netw. Anal. Min., 2013

Enforcing Trust Preferences in Mobile Person-to-Person Payments.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

WS-Rec: Web services recommendations using heterogeneous criteria.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

Policy-Compliant Search Query Routing for Web Service Discovery in Peer to Peer Networks.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

SHARE: Secure information sharing framework for emergency management.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Controlled information sharing for unspecified emergencies.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Privacy aware service selection of composite web services invited paper.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
A multi-layer framework for personalized social tag-based applications.
Data Knowl. Eng., 2012

A Multi-dimensional and Event-Based Model for Trust Computation in the Social Web.
Proceedings of the Social Informatics, 2012

Policies for Composed Emergencies in Support of Disaster Management.
Proceedings of the Secure Data Management - 9th VLDB Workshop, 2012

Performance analysis of relationship-based access control in OSNs.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Risks of Friendships on Social Networks.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Trust and Share: Trusted Information Sharing in Online Social Networks.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Privacy in Social Networks: How Risky is Your Social Graph?
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Preface.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

2011
Guest Editorial SACMAT 2009 and 2010.
ACM Trans. Inf. Syst. Secur., 2011

CASTLE: Continuously Anonymizing Data Streams.
IEEE Trans. Dependable Secur. Comput., 2011

Introduction to secure Semantic Web.
Comput. Stand. Interfaces, 2011

Semantic web-based social network access control.
Comput. Secur., 2011

Secure Information Sharing on Support of Emergency Management.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Network and profile based measures for user similarities on social networks.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

A Privacy-Preserving Approach for Web Service Selection and Provisioning.
Proceedings of the IEEE International Conference on Web Services, 2011

P3D - Privacy-Preserving Path Discovery in Decentralized Online Social Networks.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Collaborative access control in on-line social networks.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
A framework to enforce access control over data streams.
ACM Trans. Inf. Syst. Secur., 2010

Content-Based Filtering in On-Line Social Networks.
Proceedings of the Privacy and Security Issues in Data Mining and Machine Learning, 2010

2009
Secure Data Outsourcing.
Proceedings of the Encyclopedia of Database Systems, 2009

Merkle Trees.
Proceedings of the Encyclopedia of Database Systems, 2009

Digital Signatures.
Proceedings of the Encyclopedia of Database Systems, 2009

Blind Signatures.
Proceedings of the Encyclopedia of Database Systems, 2009

Enforcing access control in Web-based social networks.
ACM Trans. Inf. Syst. Secur., 2009

A semantic web based framework for social network access control.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

ACStream: Enforcing Access Control over Data Streams.
Proceedings of the 25th International Conference on Data Engineering, 2009

Computing Reputation for Collaborative Private Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

The Quality Social Network: A collaborative environment for personalizing Web access.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

Enforcing relationships privacy through collaborative access control in web-based Social Networks.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

Compatibility-driven and adaptable service composition.
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009

2008
Access control and privacy in web-based social networks.
Int. J. Web Inf. Syst., 2008

A Decentralized Security Framework for Web-Based Social Networks.
Int. J. Inf. Secur. Priv., 2008

Message from the SSW'08 organizers.
Proceedings of the 24th International Conference on Data Engineering Workshops, 2008

CASTLE: A delay-constrained scheme for ks-anonymizing data streams.
Proceedings of the 24th International Conference on Data Engineering, 2008

Privacy-Aware Collaborative Access Control in Web-Based Social Networks.
Proceedings of the Data and Applications Security XXII, 2008

Combining Social Networks and Semantic Web Technologies for Personalizing Web Access.
Proceedings of the Collaborative Computing: Networking, 2008

2007
Enforcing access control over data streams.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Towards Secure Execution Orders for CompositeWeb Services.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Private Relationships in Social Networks.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Security Conscious Web Service Composition with Semantic Web Support.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Specifying Access Control Policies on Data Streams.
Proceedings of the Advances in Databases: Concepts, 2007

Secure Outsourcing of Geographical Data Over the Web: Techniques and Architectures.
Proceedings of the Spatial Data on the Web, Modeling and Management., 2007

2006
A system for controlled outsourcing of personal data.
Comput. Syst. Sci. Eng., 2006

Access control for web data: models and policy languages.
Ann. des Télécommunications, 2006

Rule-Based Access Control for Social Networks.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Security Conscious Web Service Composition.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Confidentiality Enforcement for XML Outsourced Data.
Proceedings of the Current Trends in Database Technology - EDBT 2006, 2006

2005
Exploring Privacy Issues in Web Services Discovery Agencies.
IEEE Secur. Priv., 2005

Web Service Composition: A Security Perspective.
Proceedings of the 2005 International Workshop on Challenges in Web Information Retrieval and Integration (WIRI 2005), 2005

AC-XML documents: improving the performance of a web access control module.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

Assuring Security Properties in Third-party Architectures.
Proceedings of the 21st International Conference on Data Engineering, 2005

Trusted Privacy Manager: A System for Privacy Enforcement.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

Securing XML data in third-party distribution systems.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

2004
Secure and selective dissemination of XML documents.
PhD thesis, 2004

Selective and Authentic Third-Party Distribution of XML Documents.
IEEE Trans. Knowl. Data Eng., 2004

Merkle Tree Authentication in UDDI Registries.
Int. J. Web Serv. Res., 2004

Access control for XML documents and data.
Inf. Secur. Tech. Rep., 2004

Towards Standardized Web Services Privacy Technologies.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

Using RDF for Policy Specification and Enforcement.
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004

2003
Management of access control policies for XML document sources.
Int. J. Inf. Sec., 2003

A Flexible Authentication Method for UDDI Registries.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

Author-Chi - A System for Secure Dissemination and Update of XML Documents.
Proceedings of the Databases in Networked Information Systems, 2003

2002
Secure Publishing of XML Documents.
Proceedings of the XML-Based Data Management and Multimedia Engineering, 2002

A temporal key management scheme for secure broadcasting of XML documents.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
XML security.
Inf. Secur. Tech. Rep., 2001

A Secure Publishing Service for Digital Libraries of XML Documents.
Proceedings of the Information Security, 4th International Conference, 2001


  Loading...