Claudio A. Ardagna

Orcid: 0000-0001-7426-4795

Affiliations:
  • University of Milan, Department of Computer Science, Italy


According to our database1, Claudio A. Ardagna authored at least 157 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Certifying Accuracy, Privacy, and Robustness of ML-Based Malware Detection.
SN Comput. Sci., August, 2024

Revisiting Trust Management in the Data Economy: A Road Map.
IEEE Internet Comput., 2024

Data Pipelines Assessment: The Role of Data Engine Deployment Models.
Proceedings of the 32nd Symposium of Advanced Database Systems, 2024

A Methodology for Web Cache Deception Vulnerability Discovery.
Proceedings of the 14th International Conference on Cloud Computing and Services Science, 2024

MUSA: A Platform for Data-Intensive Services in Edge-Cloud Continuum.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Big Data Assurance: An Approach Based on Service-Level Agreements.
Big Data, June, 2023

On the Robustness of Random Forest Against Untargeted Data Poisoning: An Ensemble-Based Approach.
IEEE Trans. Sustain. Comput., 2023

Multi-Dimensional Certification of Modern Distributed Systems.
IEEE Trans. Serv. Comput., 2023

Rethinking Certification for Trustworthy Machine-Learning-Based Applications.
IEEE Internet Comput., 2023

An assurance process for Big Data trustworthiness.
Future Gener. Comput. Syst., 2023

A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis.
ACM Comput. Surv., 2023

Managing ML-Based Application Non-Functional Behavior: A Multi-Model Approach.
CoRR, 2023

Towards Certification of Machine Learning-Based Distributed Systems.
CoRR, 2023

Explainable Data Poison Attacks on Human Emotion Evaluation Systems Based on EEG Signals.
IEEE Access, 2023

Lightweight Behavior-Based Malware Detection.
Proceedings of the Management of Digital EcoSystems - 15th International Conference, 2023

Continuous Certification of Non-functional Properties Across System Changes.
Proceedings of the Service-Oriented Computing - 21st International Conference, 2023

Transparency-based reconnaissance for APT attacks.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Non-Functional Certification of Modern Distributed Systems: A Research Manifesto.
Proceedings of the IEEE International Conference on Software Services Engineering, 2023

2022
A Security Certification Scheme for Information-Centric Networks.
IEEE Trans. Netw. Serv. Manag., 2022

New data poison attacks on machine learning classifiers for mobile exfiltration.
CoRR, 2022

On the Robustness of Ensemble-Based Machine Learning Against Data Poisoning.
CoRR, 2022

A 5G-IoT enabled Big Data infrastructure for data-driven agronomy.
Proceedings of the IEEE Globecom 2022 Workshops, 2022

Bridging the Gap Between Certification and Software Development.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Model-Based Big Data Analytics-as-a-Service: Take Big Data to the Next Level.
IEEE Trans. Serv. Comput., 2021

Certification-Based Cloud Adaptation.
IEEE Trans. Serv. Comput., 2021

From Trustworthy Data to Trustworthy IoT: A Data Collection Methodology Based on Blockchain.
ACM Trans. Cyber Phys. Syst., 2021

Editorial: Special issue on trusted Cloud-Edges computations.
Future Gener. Comput. Syst., 2021

A trust assurance technique for Internet of things based on human behavior compliance.
Concurr. Comput. Pract. Exp., 2021

Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists.
Comput. Electr. Eng., 2021

Dynamic and Scalable Enforcement of Access Control Policies for Big Data.
Proceedings of the MEDES '21: Proceedings of the 13th International Conference on Management of Digital EcoSystems, Virtual Event, Tunisia, November 1, 2021

An Assurance-Based Risk Management Framework for Distributed Systems.
Proceedings of the 2021 IEEE International Conference on Web Services, 2021

A Distributed Trust Layer for Edge Infrastructure.
Proceedings of the Sixth International Conference on Fog and Mobile Edge Computing, 2021

Towards an Assurance Framework for Edge and IoT Systems.
Proceedings of the IEEE International Conference on Edge Computing, 2021


Security Certification Scheme for Content-centric Networks.
Proceedings of the IEEE International Conference on Services Computing, 2021

2020
A Semi-Automatic and Trustworthy Scheme for Continuous Cloud Service Certification.
IEEE Trans. Serv. Comput., 2020

Cost-effective deployment of certified cloud composite services.
J. Parallel Distributed Comput., 2020

Special issue on Trusted Cloud-Edges Computations.
Future Gener. Comput. Syst., 2020

Requirements and Challenges for Secure and Trustworthy UAS Collaboration.
Proceedings of the Second IEEE International Conference on Trust, 2020

Certified Machine-Learning Models.
Proceedings of the SOFSEM 2020: Theory and Practice of Computer Science, 2020

A Methodology for Non-Functional Property Evaluation of Machine Learning Models.
Proceedings of the MEDES '20: 12th International Conference on Management of Digital EcoSystems, 2020

An Assurance Framework and Process for Hybrid Systems.
Proceedings of the E-Business and Telecommunications, 2020

Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

A Blockchain-based Trustworthy Certification Process for Composite Services.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020

2019
Test-Based Security Certification of Composite Services.
ACM Trans. Web, 2019

A Continuous Certification Methodology for DevOps.
Proceedings of the 11th International Conference on Management of Digital EcoSystems, 2019

A Methodology for Cross-Platform, Event-Driven Big Data Analytics-as-a-Service.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Trustworthy IoT: An Evidence Collection Approach Based on Smart Contracts.
Proceedings of the 2019 IEEE International Conference on Services Computing, 2019

2018
Modeling time, probability, and configuration constraints for continuous cloud service certification.
Comput. Secur., 2018

Moon Cloud: A Cloud Platform for ICT Security Governance.
Proceedings of the IEEE Global Communications Conference, 2018

A Knowledge-Based IoT Security Checker.
Proceedings of the Euro-Par 2018: Parallel Processing Workshops, 2018

Semantic Support for Model Based Big Data Analytics-as-a-Service (MBDAaaS).
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

A Fast and Incremental Development Life Cycle for Data Analytics as a Service.
Proceedings of the 2018 IEEE International Congress on Big Data, 2018

Big Data Assurance Evaluation: An SLA-Based Approach.
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018

A Case for IoT Security Assurance.
Proceedings of the Internet of Everything - Technology, Communications and Computing, 2018

2017
Anonymous end-to-end communications in adversarial mobile clouds.
Pervasive Mob. Comput., 2017

Towards Transparent and Trustworthy Cloud.
IEEE Cloud Comput., 2017

Scouting Big Data Campaigns using TOREADOR Labs.
Proceedings of the Workshops of the EDBT/ICDT 2017 Joint Conference (EDBT/ICDT 2017), 2017

What Are My Users Looking for When Preparing a Big Data Campaign.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

A Model-Driven Methodology for Big Data Analytics-as-a-Service.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

Toward Model-Based Big Data-as-a-Service: The TOREADOR Approach.
Proceedings of the Advances in Databases and Information Systems, 2017

A Security Benchmark for OpenStack.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
A Configuration-Independent Score-Based Benchmark for Distributed Databases.
IEEE Trans. Serv. Comput., 2016

A certification framework for cloud-based services.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Big data analytics as-a-service: Issues and challenges.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

A Certification Technique for Cloud Security Adaptation.
Proceedings of the IEEE International Conference on Services Computing, 2016

A Cost-Effective Certification-Based Service Composition for the Cloud.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
From Security to Assurance in the Cloud: A Survey.
ACM Comput. Surv., 2015

Dependability certification of services: a model-based approach.
Computing, 2015

IEEE Services Visionary Track on Security and Privacy Engineering (SPE 2015).
Proceedings of the 2015 IEEE World Congress on Services, 2015

A Test-Based Incremental Security Certification Scheme for Cloud-Based Systems.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

Toward Security and Performance Certification of Open Stack.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments.
IEEE Trans. Serv. Comput., 2014

Trustworthy Cloud Certification: A Model-Based Approach.
Proceedings of the Data-Driven Process Discovery and Analysis, 2014

4th IEEE 2014 Services Workshop on Security and Privacy Engineering - Message from the SPE 2014 Workshop Chairs.
Proceedings of the 2014 IEEE World Congress on Services, 2014

Network and Storage Latency Attacks to Online Trading Protocols in the Cloud.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Workshops, 2014

On the Management of Cloud Non-Functional Properties: The Cloud Transparency Toolkit.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

A Certification-Based Trust Model for Autonomic Cloud Computing Systems.
Proceedings of the 2014 International Conference on Cloud and Autonomic Computing, 2014

Zero-Knowledge Evaluation of Service Performance Based on Simulation.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

E-Auctions for Multi-Cloud Service Provisioning.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

A Competitive Scalability Approach for Cloud Architectures.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

A Certification-Aware Service-Oriented Architecture.
Proceedings of the Advanced Web Services, 2014

2013
A test-based security certification scheme for web services.
ACM Trans. Web, 2013

Providing Users' Anonymity in Mobile Hybrid Networks.
ACM Trans. Internet Techn., 2013

Machine-Readable Privacy Certificates for Services.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013

Security Certification of Composite Services: A Test-Based Approach.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Preserving Smartphone Users' Anonymity in Cloudy Days.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Early Assessment of Service Performance Based on Simulation.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
Landmark-assisted location and tracking in outdoor mobile network.
Multim. Tools Appl., 2012

Minimising disclosure of client information in credential-based interactions.
Int. J. Inf. Priv. Secur. Integr., 2012

Web Service Assurance: The Notion and the Issues.
Future Internet, 2012

Security certification-aware service discovery and selection.
Proceedings of the 2012 Fifth IEEE International Conference on Service-Oriented Computing and Applications (SOCA), 2012

A Low-Cost Security Certification Scheme for Evolving Services.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

A model-based approach to reliability certification of services.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

Protecting Privacy of User Information in Continuous Location-Based Services.
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012

Scalability Patterns for Platform-as-a-Service.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Privacy Models and Languages: Access Control and Data Handling Policies.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Privacy-Aware Access Control System: Evaluation and Decision.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Script Language Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

XML-Based Access Control Languages.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Privacy-Aware Languages.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Location Information (Privacy of).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Map-Based Location and Tracking in Multipath Outdoor Mobile Networks.
IEEE Trans. Wirel. Commun., 2011

Expressive and Deployable Access Control in Open Web Service Applications.
IEEE Trans. Serv. Comput., 2011

An Obfuscation-Based Approach for Protecting Location Privacy.
IEEE Trans. Dependable Secur. Comput., 2011

Editorial.
J. Syst. Archit., 2011

Towards Pattern-Based Reliability Certification of Services.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2011, 2011

Defining and Matching Test-Based Certificates in Open SOA.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

Fine-Grained Modeling of Web Services for Test-Based Security Certification.
Proceedings of the IEEE International Conference on Services Computing, 2011

Policy Requirements and State of the Art.
Proceedings of the Privacy and Identity Management for Life, 2011

Advances in Access Control Policies.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project.
J. Comput. Secur., 2010

Special issue: Open Source Certification.
Comput. Syst. Sci. Eng., 2010

Access control for smarter healthcare using policy spaces.
Comput. Secur., 2010

Supporting privacy preferences in credential-based interactions.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Container-Level Security Certification of Services.
Proceedings of the Business System Management and Engineering, 2010

Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

ASSERT4SOA: Toward Security Certification of Service-Oriented Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010 Workshops, 2010

Spago4Q and the QEST <i>n</i>D Model: An Open Source Solution for Software Performance Measurement.
Proceedings of the Open Source Software: New Horizons, 2010

Advanced Security Service cERTificate for SOA: Certified Services go Digital.
Proceedings of the ISSE 2010, 2010

Implementing Open Source Software Governance in Real Software Assurance Processes.
Proceedings of the Software Business - First International Conference, 2010

Fine-Grained Disclosure of Access Policies.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Providing Mobile Users' Anonymity in Hybrid Networks.
Proceedings of the Computer Security, 2010

Enabling Privacy-preserving Credential-based Access Control with XACML and SAML.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Landscape-aware location-privacy protection in location-based services.
J. Syst. Archit., 2009

Assurance Evaluation for OSS Adoption in a Telco Context.
Proceedings of the Open Source Ecosystems: Diverse Communities Interacting, 2009

Privacy Preservation over Untrusted Mobile Networks.
Proceedings of the Privacy in Location-Based Applications, 2009

Access Control in Location-Based Services.
Proceedings of the Privacy in Location-Based Applications, 2009

Assurance Process for Large Open Source Code Bases.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Open Source Systems Security Certification.
Springer, ISBN: 978-0-387-77323-0, 2009

2008
Privacy-enhanced Location-based Access Control.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Privacy and security in distributed and pervasive systems.
PhD thesis, 2008

A privacy-aware access control system.
J. Comput. Secur., 2008

Advanced Localization of Mobile Terminal in Cellular Network.
Int. J. Commun. Netw. Syst. Sci., 2008

Mapping Linux Security Targets to Existing Test Suites.
Proceedings of the Open Source Development, 2008

A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

Regulating Exceptions in Healthcare Using Policy Spaces.
Proceedings of the Data and Applications Security XXII, 2008

2007
Secure Authentication Process for High Sensitive Data E-Services: A Roadmap.
J. Cases Inf. Technol., 2007

L-VCONF: A Location-Aware Infrastructure for Battlefield Videoconferences.
Proceedings of the IEEE International Conference on Virtual Environments, 2007

A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy.
Proceedings of the New Approaches for Security, 2007

FOCSE: An OWA-based Evaluation Framework for OS Adoption in Critical Environments.
Proceedings of the Open Source Development, 2007

Location Privacy Protection Through Obfuscation-Based Techniques.
Proceedings of the Data and Applications Security XXI, 2007

Anomalies Detection in Mobile Network Management Data.
Proceedings of the Advances in Databases: Concepts, 2007

Managing Privacy in LBAC Systems.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

XML Security.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

Trust Management.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
Open Source in Web-Based Applications: A Case Study on Single Sign-On.
Int. J. Inf. Technol. Web Eng., 2006

CAS++: An Open Source Single Sign-On Solution for Secure e-Services.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Adopting Open Source for Mission-Critical Applications: A Case Study on Single Sign-On.
Proceedings of the Open Source Systems, 2006

Enhancing User Privacy Through Data Handling Policies.
Proceedings of the Data and Applications Security XX, 2006

Supporting location-based conditions in access control policies.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Offline Expansion of XACML Policies Based on P3P Metadata.
Proceedings of the Web Engineering, 5th International Conference, 2005

Towards Privacy-Enhanced Authorization Policies and Languages.
Proceedings of the Data and Applications Security XIX, 2005

The Architecture of a Privacy-Aware Access Control Decision Component.
Proceedings of the Construction and Analysis of Safe, 2005

2004
XML-based access control languages.
Inf. Secur. Tech. Rep., 2004

A Web Service Architecture for Enforcing Access Control Policies.
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004

A comparison of modeling strategies in defining XML-based access control languages.
Comput. Syst. Sci. Eng., 2004


  Loading...