Elena Ferrari

Orcid: 0000-0002-7312-6769

Affiliations:
  • University of Insubria, Varese, Italy


According to our database1, Elena Ferrari authored at least 287 papers between 1996 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2019, "For contributions to security and privacy of data and social network systems".

IEEE Fellow

IEEE Fellow 2013, "For contributions to security and privacy for data and applications".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Technical Perspective: Graph Theory for Data Privacy: A New Approach for Complex Data Flows.
SIGMOD Rec., March, 2024

Protecting Privacy in Knowledge Graphs With Personalized Anonymization.
IEEE Trans. Dependable Secur. Comput., 2024

Access Control Integration in Sparkplug-Based Industrial Internet of Things Systems: Requirements and Open Challenges.
Proceedings of the 20th International Conference on Web Information Systems and Technologies, 2024

Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-materialisation.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

RF-WAVEGUARD: Enhancing UAV Security Against Signal Jamming Attacks through Radio Frequency Watermarking.
Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2024

2023
MalCon: A blockchain-based malware containment framework for Internet of Things.
Comput. Networks, September, 2023

Trustworthy AI and Data Lineage.
IEEE Internet Comput., 2023

Message from the General Chairs and PC Chairs TPS-ISA 2023.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Private, Fair and Secure Collaborative Learning Framework for Human Activity Recognition.
Proceedings of the Adjunct Proceedings of the 2023 ACM International Joint Conference on Pervasive and Ubiquitous Computing & the 2023 ACM International Symposium on Wearable Computing, 2023

ConPrEF: A Context-based Privacy Enforcement Framework for Edge Computing.
Proceedings of the IEEE International Conference on Edge Computing and Communications, 2023

Privacy-preserving Decentralized Learning of Knowledge Graph Embeddings.
Proceedings of the Workshops of the EDBT/ICDT 2023 Joint Conference, 2023

Early-Stage Ransomware Detection Based on Pre-attack Internal API Calls.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
LifeSnaps: a 4-month multi-modal dataset capturing unobtrusive snapshots of our lives in the wild.
Dataset, July, 2022

LifeSnaps: a 4-month multi-modal dataset capturing unobtrusive snapshots of our lives in the wild.
Dataset, July, 2022

Blockchain-Based Privacy Enforcement in the IoT Domain.
IEEE Trans. Dependable Secur. Comput., 2022

A Risk Estimation Mechanism for Android Apps based on Hybrid Analysis.
Data Sci. Eng., 2022

Efficient ABAC based information sharing within MQTT environments under emergencies.
Comput. Secur., 2022

Privacy and Security Issues for Human Digital Twins.
Proceedings of the 4th IEEE International Conference on Trust, 2022

PriApp-Install: Learning User Privacy Preferences on Mobile Apps' Installation.
Proceedings of the Information Security Practice and Experience, 2022

A Blockchain-based Framework in Support of Privacy Preferences Enforcement for Scientific Workflows : (Invited Paper).
Proceedings of the IEEE International Conference on Web Services, 2022

MalRec: A Blockchain-based Malware Recovery Framework for Internet of Things.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Privacy-Aware Personal Data Storage (P-PDS): Learning how to Protect User Privacy from External Applications.
IEEE Trans. Dependable Secur. Comput., 2021

Regulating data sharing across MQTT environments.
J. Netw. Comput. Appl., 2021

Evaluating the effects of access control policies within NoSQL systems.
Future Gener. Comput. Syst., 2021

PAutoBotCatcher: A blockchain-based privacy-preserving botnet detector for Internet of Things.
Comput. Networks, 2021

Access Control Enforcement in IoT: state of the art and open challenges in the Zero Trust era.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

A Risk Assessment Mechanism for Android Apps.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2021

Privacy-Preserving Sequential Publishing of Knowledge Graphs.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

LiMNet: Early-Stage Detection of IoT Botnets with Lightweight Memory Networks.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
A deep learning model for Twitter spam detection.
Online Soc. Networks Media, 2020

Digital Trust: Trust Management in Cyberspace.
IEEE Internet Comput., 2020

Requirements and Challenges for Secure and Trustworthy UAS Collaboration.
Proceedings of the Second IEEE International Conference on Trust, 2020

Mammoth: Monitoring the ABAC Monitor of MQTT-based Internet of Things ecosystems.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

Cluster-Based Anonymization of Knowledge Graphs.
Proceedings of the Applied Cryptography and Network Security, 2020

Blockchain-based controlled information sharing in inter-organizational workflows.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020

A Blockchain-based Trustworthy Certification Process for Composite Services.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020

2019
Research Challenges at the Intersection of Big Data, Security and Privacy.
Frontiers Big Data, 2019

Access control technologies for Big Data management systems: literature review and future trends.
Cybersecur., 2019

Confidential Discovery of IoT Devices through Blockchain.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

Adapting Users' Privacy Preferences in Smart Environments.
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

Cluster-Based Anonymization of Directed Graphs.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Helping Users Managing Context-Based Privacy Preferences.
Proceedings of the 2019 IEEE International Conference on Services Computing, 2019

2018
Similarity Metrics on Social Networks.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Graphical User Interfaces for Privacy Settings.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Database Security.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Access Control Administration Policies.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Access Control.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Knowledge-based approaches for identity management in online social networks.
WIREs Data Mining Knowl. Discov., 2018

Privacy in Web Service Transactions: A Tale of More than a Decade of Work.
IEEE Trans. Serv. Comput., 2018

Enhanced Audit Strategies for Collaborative and Accountable Data Sharing in Social Networks.
ACM Trans. Internet Techn., 2018

Risk Assessment in Social Networks Based on User Anomalous Behaviors.
IEEE Trans. Dependable Secur. Comput., 2018

Decentralized privacy preserving services for Online Social Networks.
Online Soc. Networks Media, 2018

Decentralizing privacy enforcement for Internet of Things smart objects.
Comput. Networks, 2018

Access Control Enforcement within MQTT-based Internet of Things Ecosystems.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Access Control in the Era of Big Data: State of the Art and Research Directions.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Hybrid-IoT: Hybrid Blockchain Architecture for Internet of Things - PoW Sub-Blockchains.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Confidential Business Process Execution on Blockchain.
Proceedings of the 2018 IEEE International Conference on Web Services, 2018

AutoBotCatcher: Blockchain-Based P2P Botnet Detection for the Internet of Things.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Blockchain as a Platform for Secure Inter-Organizational Business Processes.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Detecting Spam Accounts on Twitter.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

Big Data Security and Privacy.
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018

2017
Enhancing MongoDB with Purpose-Based Access Control.
IEEE Trans. Dependable Secur. Comput., 2017

An extended access control mechanism exploiting data dependencies.
Int. J. Inf. Sec., 2017

Enhancing NoSQL datastores with fine-grained context-aware access control: a preliminary study on MongoDB.
Int. J. Cloud Comput., 2017

Identification Services for Online Social Networks (OSNs) Extended Abstract.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

Towards a Unifying Attribute Based Access Control Approach for NoSQL Datastores.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Learning Privacy Habits of PDS Owners.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

SAMPAC: Socially-Aware collaborative Multi-Party Access Control.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
COIP - Continuous, Operable, Impartial, and Privacy-Aware Identity Validity Estimation for OSN Profiles.
ACM Trans. Web, 2016

Guest Editorial: Special Section on the International Conference on Data Engineering.
IEEE Trans. Knowl. Data Eng., 2016

Detection of Unspecified Emergencies for Controlled Information Sharing.
IEEE Trans. Dependable Secur. Comput., 2016

CADIVa: cooperative and adaptive decentralized identity validation model for social networks.
Soc. Netw. Anal. Min., 2016

Trustworthy and effective person-to-person payments over multi-hop MANETs.
J. Netw. Comput. Appl., 2016

Fine-Grained Access Control Within NoSQL Document-Oriented Datastores.
Data Sci. Eng., 2016

LAMP - Label-Based Access-Control for More Privacy in Online Social Networks.
Proceedings of the Information Security Theory and Practice, 2016

A Language and an Inference Engine for Twitter Filtering Rules.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Gossip-Based Behavioral Group Identification in Decentralized OSNs.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2016

Anomalous change detection in time-evolving OSNs.
Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop, 2016

A Risk-Benefit Driven Architecture for Personal Data Release (Invited Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

Towards Virtual Private NoSQL datastores.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Beat the DIVa - decentralized identity validation for online social networks.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Privacy Settings Recommender for Online Social Network.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Trust and privacy correlations in social networks: A deep learning framework.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

Enhancing User Control on Personal Data Usage in Internet of Things Ecosystems.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
Efficient Enforcement of Action-Aware Purpose-Based Access Control within Relational Database Management Systems.
IEEE Trans. Knowl. Data Eng., 2015

Privacy Aware Access Control for Big Data: A Research Roadmap.
Big Data Res., 2015

Graph Based Local Risk Estimation in Large Scale Online Social Networks.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Complementing MongoDB with Advanced Access Control Features: Concepts and Research Challenges.
Proceedings of the 23rd Italian Symposium on Advanced Database Systems, 2015

Privacy Preserving Decentralized Identity Validation for Geo-social Networks over MANET.
Proceedings of the 7th International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking, 2015

What Happens to My Online Social Estate When I Am Gone? An Integrated Approach to Posthumous Online Data Management.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

A Privacy-Preserving Framework for Constrained Choreographed Service Composition.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015

Evolutionary Inference of Attribute-Based Access Control Policies.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2015

CARDS - Collaborative Audit and Report Data Sharing for A-Posteriori Access Control in DOSNs.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

GuardMR: Fine-grained Security Policy Enforcement for MapReduce Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

DIVa: Decentralized Identity Validation for Social Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Similarity Metrics on Social Networks.
Encyclopedia of Social Network Analysis and Mining, 2014

Privacy-Preserving Enhanced Collaborative Tagging.
IEEE Trans. Knowl. Data Eng., 2014

Enforcement of Purpose Based Access Control within Relational Database Management Systems.
IEEE Trans. Knowl. Data Eng., 2014

Enforcing Obligations within RelationalDatabase Management Systems.
IEEE Trans. Dependable Secur. Comput., 2014

Detecting anomalies in social network data consumption.
Soc. Netw. Anal. Min., 2014

A framework for privacy aware data management in relational databases.
Int. J. Inf. Priv. Secur. Integr., 2014

SocialCloudShare: a Facebook Application for a Relationship-based Information Sharing in the Cloud.
EAI Endorsed Trans. Collab. Comput., 2014

Special issue on secure and privacy-aware data management.
Distributed Parallel Databases, 2014

Secure Web Service Composition with Untrusted Broker.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

Community-Based Identity Validation on Online Social Networks.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

EgoCentric: Ego Networks for Knowledge-based Short Text Classification.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

Discovering trust patterns in ego networks.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Security and Trust in Online Social Networks
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02339-2, 2013

Privacy in Social Collaboration.
Proceedings of the Handbook of Human Computation, 2013

A System to Filter Unwanted Messages from OSN User Walls.
IEEE Trans. Knowl. Data Eng., 2013

A System for Timely and Controlled Information Sharing in Emergency Situations.
IEEE Trans. Dependable Secur. Comput., 2013

User similarities on social networks.
Soc. Netw. Anal. Min., 2013

Enforcing Trust Preferences in Mobile Person-to-Person Payments.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

SHARE: Secure information sharing framework for emergency management.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Controlled information sharing for unspecified emergencies.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Multi-Dimensional Conversation Analysis Across Online Social Networks.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

2012
Guest Editors' Introduction: Special Section on Data and Applications Security and Privacy.
IEEE Trans. Dependable Secur. Comput., 2012

A multi-layer framework for personalized social tag-based applications.
Data Knowl. Eng., 2012

A Multi-dimensional and Event-Based Model for Trust Computation in the Social Web.
Proceedings of the Social Informatics, 2012

Towards a Modeling and Analysis Framework for Privacy-Aware Systems.
Proceedings of the 2012 International Conference on Privacy, 2012

Policies for Composed Emergencies in Support of Disaster Management.
Proceedings of the Secure Data Management - 9th VLDB Workshop, 2012

Performance analysis of relationship-based access control in OSNs.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Risks of Friendships on Social Networks.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Trust and Share: Trusted Information Sharing in Online Social Networks.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Privacy in Social Networks: How Risky is Your Social Graph?
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Towards a framework to handle privacy since the early phases of the development: Strategies and open challenges.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

Conceptual Framework and Architecture for Privacy Audit.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012

2011
CASTLE: Continuously Anonymizing Data Streams.
IEEE Trans. Dependable Secur. Comput., 2011

Semantic web-based social network access control.
Comput. Secur., 2011

Secure Information Sharing on Support of Emergency Management.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Network and profile based measures for user similarities on social networks.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

A rule-based policy language for selective trust propagation in social networks.
Proceedings of the First ACM SIGMOD Workshop on Databases and Social Networks, 2011

P3D - Privacy-Preserving Path Discovery in Decentralized Online Social Networks.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Collaborative access control in on-line social networks.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Access Control in Data Management Systems
Synthesis Lectures on Data Management, Morgan & Claypool Publishers, ISBN: 978-3-031-01836-7, 2010

A General Framework for Web Content Filtering.
World Wide Web, 2010

A framework to enforce access control over data streams.
ACM Trans. Inf. Syst. Secur., 2010

Content-Based Filtering in On-Line Social Networks.
Proceedings of the Privacy and Security Issues in Data Mining and Machine Learning, 2010

Combining access control and trust negotiations in an On-line Social Network.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
Database Security.
Proceedings of the Encyclopedia of Database Systems, 2009

Access Control Administration Policies.
Proceedings of the Encyclopedia of Database Systems, 2009

Access Control.
Proceedings of the Encyclopedia of Database Systems, 2009

Enforcing access control in Web-based social networks.
ACM Trans. Inf. Syst. Secur., 2009

A semantic web based framework for social network access control.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

ACStream: Enforcing Access Control over Data Streams.
Proceedings of the 25th International Conference on Data Engineering, 2009

QUATRO Plus: Quality You Can Trust?
Proceedings of the ESWC2009 Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009) Heraklion, 2009

Computing Reputation for Collaborative Private Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

The Quality Social Network: A collaborative environment for personalizing Web access.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

Enforcing relationships privacy through collaborative access control in web-based Social Networks.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

Database as a Service: Challenges and solutions for privacy and security.
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009

Compatibility-driven and adaptable service composition.
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009

2008
PinKDD'08: privacy, security, and trust in KDD post workshop report.
SIGKDD Explor., 2008

Access control and privacy in web-based social networks.
Int. J. Web Inf. Syst., 2008

A Decentralized Security Framework for Web-Based Social Networks.
Int. J. Inf. Secur. Priv., 2008

CASTLE: A delay-constrained scheme for ks-anonymizing data streams.
Proceedings of the 24th International Conference on Data Engineering, 2008

Privacy-Aware Collaborative Access Control in Web-Based Social Networks.
Proceedings of the Data and Applications Security XXII, 2008

Combining Social Networks and Semantic Web Technologies for Personalizing Web Access.
Proceedings of the Collaborative Computing: Networking, 2008

2007
PP-trust-X: A system for privacy preserving trust negotiations.
ACM Trans. Inf. Syst. Secur., 2007

PinKDD'07: privacy, security, and trust in KDD post-workshop report.
SIGKDD Explor., 2007

A system for securing push-based distribution of XML documents.
Int. J. Inf. Sec., 2007

Enforcing access control over data streams.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Towards Secure Execution Orders for CompositeWeb Services.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Private Relationships in Social Networks.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Security Conscious Web Service Composition with Semantic Web Support.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Specifying Access Control Policies on Data Streams.
Proceedings of the Advances in Databases: Concepts, 2007

Secure Outsourcing of Geographical Data Over the Web: Techniques and Architectures.
Proceedings of the Spatial Data on the Web, Modeling and Management., 2007

Spatial Data on the Web: Issues and Challenges.
Proceedings of the Spatial Data on the Web, Modeling and Management., 2007

2006
Guest editorial: special issue on privacy preserving data management.
VLDB J., 2006

Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems.
ACM Trans. Inf. Syst. Secur., 2006

Achieving Privacy in Trust Negotiations with an Ontology-Based Approach.
IEEE Trans. Dependable Secur. Comput., 2006

A system for controlled outsourcing of personal data.
Comput. Syst. Sci. Eng., 2006

Access control for web data: models and policy languages.
Ann. des Télécommunications, 2006

Rule-Based Access Control for Social Networks.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Security Conscious Web Service Composition.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Trust Negotiations with Customizable Anonymity.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Confidentiality Enforcement for XML Outsourced Data.
Proceedings of the Current Trends in Database Technology - EDBT 2006, 2006

Web and information security.
IRM Press, ISBN: 978-1-59140-588-7, 2006

2005
Guest editorial: Special issue on access control models and technologies.
ACM Trans. Inf. Syst. Secur., 2005

An approach to cooperative updates of XML documents in distributed systems.
J. Comput. Secur., 2005

Exploring Privacy Issues in Web Services Discovery Agencies.
IEEE Secur. Priv., 2005

Web Service Composition: A Security Perspective.
Proceedings of the 2005 International Workshop on Challenges in Web Information Retrieval and Integration (WIRI 2005), 2005

AC-XML documents: improving the performance of a web access control module.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

Anonymity Preserving Techniques in Trust Negotiations.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

An Integrated Approach to Rating and Filtering Web Content.
Proceedings of the Innovations in Applied Artificial Intelligence, 2005

A Constraint-Based Approach for the Authoring of Multi-Topic Multimedia Presentations.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Assuring Security Properties in Third-party Architectures.
Proceedings of the 21st International Conference on Data Engineering, 2005

Trusted Privacy Manager: A System for Privacy Enforcement.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

An Update Protocol for XML Documents in Distributed and Cooperative Systems.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

A Multi-Strategy Approach to Rating and Filtering Online Resources.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

Securing XML data in third-party distribution systems.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

2004
Information Security.
Proceedings of the Practical Handbook of Internet Computing., 2004

Trust-X: A Peer-to-Peer Framework for Trust Establishment.
IEEE Trans. Knowl. Data Eng., 2004

Selective and Authentic Third-Party Distribution of XML Documents.
IEEE Trans. Knowl. Data Eng., 2004

CiVeDi: A Customized Virtual Environment for Database Interaction.
SIGMOD Rec., 2004

Report on the 9th ACM Symposium on Access Control Models and Technologies (SACMMAT'04).
SIGMOD Rec., 2004

Merkle Tree Authentication in UDDI Registries.
Int. J. Web Serv. Res., 2004

Access control for XML documents and data.
Inf. Secur. Tech. Rep., 2004

Trust negotiations: concepts, systems, and languages.
Comput. Sci. Eng., 2004

Privacy-Preserving Trust Negotiations.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

An XML-Based Approach to Document Flow Verification.
Proceedings of the Information Security, 7th International Conference, 2004

Flow policies: specification and enforcement.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Towards Standardized Web Services Privacy Technologies.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

Towards Supporting Fine-Grained Access Control for Grid Resources.
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004

Web Data Protection: Principles and Research Issues.
Proceedings of the Current Trends in Database Technology - EDBT 2004 Workshops, 2004

Security and Privacy for Web Databases and Services.
Proceedings of the Advances in Database Technology, 2004

Using RDF for Policy Specification and Enforcement.
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004

2003
A hierarchical access control model for video database systems.
ACM Trans. Inf. Syst., 2003

A logical framework for reasoning about access control models.
ACM Trans. Inf. Syst. Secur., 2003

T-ODMG: an ODMG compliant temporal object model supporting multiple granularity management.
Inf. Syst., 2003

Management of access control policies for XML document sources.
Int. J. Inf. Sec., 2003

Content-based filtering of Web documents: the MaX system and the EUFORBIA project.
Int. J. Inf. Sec., 2003

ViRdB: integrating virtual reality and multimedia databases for customized visualization of cultural heritage.
Proceedings of the SIGGRAPH 2003 Conference on Sketches & Applications: in conjunction with the 30th annual conference on Computer graphics and interactive techniques, 2003

An infrastructure for managing secure update operations on XML data.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

X-TNL: An XML-based Language for Trust Negotiations.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

A Flexible Authentication Method for UDDI Registries.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

Signature and Access Control Policies for XML Documents.
Proceedings of the Computer Security, 2003

Author-Chi - A System for Secure Dissemination and Update of XML Documents.
Proceedings of the Databases in Networked Information Systems, 2003

A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Supporting Delegation in Secure Workflow Management Systems.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Trust-Chi: An XML Framework for Trust Negotiations.
Proceedings of the Communications and Multimedia Security, 2003

Protecting Datasources over the Web: Policies, Models, and Mechanisms.
Proceedings of the Web-Powered Databases, 2003

2002
An authorization system for digital libraries.
VLDB J., 2002

A Content-Based Authorization Model for Digital Libraries.
IEEE Trans. Knowl. Data Eng., 2002

Secure and selective dissemination of XML documents.
ACM Trans. Inf. Syst. Secur., 2002

Protection and administration of XML data sources.
Data Knowl. Eng., 2002

A System to Specify and Manage Multipolicy Access Control Models.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

An Access Control System for Digital Libraries and the Web: The MaX Prototype Demonstration.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2002

Distributed Cooperative Updates of XML Documents.
Proceedings of the Research Directions in Data and Applications Security, 2002

Web and Information Security: Workshop Summary.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

Ma X : An Access Control System for Digital Libraries and the Web.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

A temporal key management scheme for secure broadcasting of XML documents.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Correction to 'MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations'.
IEEE Trans. Knowl. Data Eng., 2001

A nested transaction model for multilevel secure database management systems.
ACM Trans. Inf. Syst. Secur., 2001

TRBAC: A temporal role-based access control model.
ACM Trans. Inf. Syst. Secur., 2001

XML security.
Inf. Secur. Tech. Rep., 2001

Role Based Access Control Models.
Inf. Secur. Tech. Rep., 2001

XML and Data Integration.
IEEE Internet Comput., 2001

Securing XML Documents with Author-X.
IEEE Internet Comput., 2001

Special Issue: Object-oriented Databases.
Concurr. Comput. Pract. Exp., 2001

Supporting the Search for the Optimal Location of Facilities.
Proceedings of the 9-th International Conference in Central Europe on Computer Graphics, 2001

Directions for Web and E-Commerce Applications Security.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

Saving the Multimedia Musical Heritage of Teatro alla Scala for Querying in a Web-Oriented Environment.
Proceedings of the First International Conference on WEB Delivering of Music (WEDELMUSIC '01), 2001

Navigating Through Multiple Temporal Granularity Objects.
Proceedings of the Eigth International Symposium on Temporal Representation and Reasoning, 2001

Securing XML Documents: the Author-X Project Demonstration.
Proceedings of the 2001 ACM SIGMOD international conference on Management of data, 2001

On specifying security policies for web documents with an XML-based language.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

An Access Control Mechanism for Large Scale Data Dissemination Systems.
Proceedings of the Eleventh International Workshop on Research Issues in Data Engineering: Document Management for Data Intensive Business and Scientific Applications, 2001

A Secure Publishing Service for Digital Libraries of XML Documents.
Proceedings of the Information Security, 4th International Conference, 2001

2000
Specifying and enforcing access control policies for XML document sources.
World Wide Web, 2000

MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations.
IEEE Trans. Knowl. Data Eng., 2000

Temporal Authorization Bases: From Specification to Integration.
J. Comput. Secur., 2000

A Logic-Based Approach for Enforcing Access Control.
J. Comput. Secur., 2000

Querying Multiple Temporal Granularity Data.
Proceedings of the Seventh International Workshop on Temporal Representation and Reasoning, 2000

XML and Object Technology.
Proceedings of the Object-Oriented Technology, 2000

Author-X: A Java-Based System for XML Data Protection.
Proceedings of the Data and Application Security, 2000

1999
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems.
ACM Trans. Inf. Syst. Secur., 1999

Secure Object Deletion and Garbage Collection in Multilevel Object Bases.
J. Comput. Secur., 1999

Modeling Spatio-Temporal Constraints for Multimedia Objects.
Data Knowl. Eng., 1999

Controlled Access and Dissemination of XML Documents.
Proceedings of the ACM CIKM'99 2nd Workshop on Web Information and Data Management (WIDM'99), 1999

A Temporal Object-Oriented Data Model with Multiple Granularities.
Proceedings of the 6th International Workshop on Temporal Representation and Reasoning, 1999

Un Meccanismo per il Controllo degli Accessi a Librerie Digitali.
Proceedings of the Atti del Settimo Convegno Nazionale Sistemi Evoluti per Basi di Dati, 1999

The Musical Archive Information System at Teatro alla Scala.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Object-Oriented Database.
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999

A Logical Framework for Reasoning on Data Access Control Policies.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

Specifying and computing hierarchies of temporal authorizations.
Proceedings of the 1999 Joint Conference on Declarative Programming, 1999

1998
An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning.
ACM Trans. Database Syst., 1998

Navigational Accesses in a Temporal Object Model.
IEEE Trans. Knowl. Data Eng., 1998

Temporal Synchronization Models for Multimedia Data.
IEEE Trans. Knowl. Data Eng., 1998

Exception-Based Information Flow Control in Object-Oriented Systems.
ACM Trans. Inf. Syst. Secur., 1998

Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model.
Theory Pract. Object Syst., 1998

An Approach to Model and Query Event-Based Temporal Data.
Proceedings of the 5th Workshop on Temporal Representation and Reasoning, 1998

An Authorization Model and Its Formal Semantics.
Proceedings of the Computer Security, 1998

Extending the ODMG Object Model with Time.
Proceedings of the ECOOP'98, 1998

Data Security.
Proceedings of the COMPSAC '98, 1998

1997
T_Chimera: A Temporal Object-Oriented Data Model.
Theory Pract. Object Syst., 1997

Decentralized Administration for a Temporal Access Control Model.
Inf. Syst., 1997

Providing flexibility in information flow control for object oriented systems.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems.
Proceedings of the Second Workshop on Role-Based Access Control, 1997

Administration Policies in a Multipolicy Autorization System.
Proceedings of the Database Securty XI: Status and Prospects, 1997

A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases.
Proceedings of the Database Securty XI: Status and Prospects, 1997

Query Processing.
Proceedings of the Multimedia Databases in Perspective, 1997

1996
A Temporal Access Control Mechanism for Database Systems.
IEEE Trans. Knowl. Data Eng., 1996

Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control.
Proceedings of the VLDB'96, 1996

On Using Materialization Strategies for a Temporal Authorization Model.
Proceedings of the Workshop on Materialized Views: Techniques and Applications, 1996

A decentralized temporal autoritzation model.
Proceedings of the Information Systems Security, 1996

A Formal Temporal Object-Oriented Data Model.
Proceedings of the Advances in Database Technology, 1996


  Loading...