Marco Casassa Mont

Orcid: 0009-0004-7611-6947

Affiliations:
  • Hewlett Packard Enterprise Labs, Bristol, UK


According to our database1, Marco Casassa Mont authored at least 64 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Multi-Agent Reinforcement Learning for Maritime Operational Technology Cyber Security.
Proceedings of the Conference on Applied Machine Learning in Information Security, 2023

2022
Leveraging Patient Information Sharing Using Blockchain-Based Distributed Networks.
IEEE Access, 2022

2021
An ontology-based compliance audit framework for medical data sharing across europe.
Int. Arab J. Inf. Technol., 2021

2017
SHIELD: Securing Against Intruders and Other Threats Through an NFV-Enabled Environment.
Proceedings of the Guide to Security in SDN and NFV, 2017

2015
Towards safer information sharing in the cloud.
Int. J. Inf. Sec., 2015

2014
A toolkit for automating compliance in cloud computing services.
Int. J. Cloud Comput., 2014

End-to-end policy based encryption techniques for multi-party data management.
Comput. Stand. Interfaces, 2014

Semantic Generation of Clouds Privacy Policies.
Proceedings of the Cloud Computing and Services Sciences, 2014

A SWRL Bridge to XACML for Clouds Privacy Compliant Policies.
Proceedings of the CLOSER 2014, 2014

2012
Automating Compliance for Cloud Computing Services.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

Security and Privacy Governance in Cloud Computing via SLAs and a Policy Orchestration Service.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

ReasONets: a fuzzy-based approach for reasoning on network incidents.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Privacy-Aware Identity Lifecycle Management.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Privacy Models and Languages: Obligation Policies.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Human-Computer Interaction.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks.
Computer, 2011

Sticky Policies: An Approach for Managing Privacy across Multiple Parties.
Computer, 2011

Economic Methods and Decision Making by Security Professionals.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

Economic Methods and Decision Making by Security Professionals.
Proceedings of the Economics of Information Security and Privacy III [papers from the Tenth Workshop on Economics and Information Security, 2011

Enhancing Accountability in the Cloud via Sticky Policies.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

Risk Assessment and Decision Support for Security Policies and Related Enterprise Operational Processes.
Proceedings of the POLICY 2011, 2011

End-to-End Policy-Based Encryption and Management of Data in the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
Assurance for federated identity management.
J. Comput. Secur., 2010

Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation.
Proceedings of the Trust, 2010

EnCoRe: Towards a Holistic Approach to Privacy.
Proceedings of the SECRYPT 2010, 2010

A Conceptual Model for Privacy Policies with Consent and Revocation Requirements.
Proceedings of the Privacy and Identity Management for Life, 2010

Privacy Aware Access Controls for Medical Data Disclosure on European Healthgrids.
Proceedings of the Healthgrid Applications and Core Technologies, 2010

2009
Using Modelling and Simulation for Policy Decision Support in Identity Management.
Proceedings of the POLICY 2009, 2009

Modelling and Enforcing Privacy for Medical Data Disclosure across Europe.
Proceedings of the Medical Informatics in a United and Healthy Europe - Proceedings of MIE 2009, The XXIInd International Congress of the European Federation for Medical Informatics, Sarajevo, Bosnia and Herzegovina, August 30, 2009

Ontology-Based Privacy Compliance on European Healthgrid Domains.
Proceedings of the Healthgrid Research, Innovation and Business Case - Proceedings of HealthGrid 2009, Berlin, Germany, 29 June, 2009

Using security metrics coupled with predictive modeling and simulation to assess security processes.
Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, 2009

Privacy compliance in european healthgrid domains: An ontology-based approach.
Proceedings of the Twenty-Second IEEE International Symposium on Computer-Based Medical Systems, 2009

2008
Privacy policy enforcement in enterprises with identity management solutions.
J. Comput. Secur., 2008

Securing Information Transfer in Distributed Computing Environments.
IEEE Secur. Priv., 2008

Automatic Compliance of Privacy Policies in Federated Digital Identity Management.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

2007
Panel Discussion: Managing Digital Identities - Challenges and Opportunities.
Proceedings of the Trust, 2007

On Device-Based Identity Management in Enterprises.
Proceedings of the Trust, 2007

On Parametric Obligation Policies: Enabling Privacy-Aware Information Lifecycle Management in Enterprises.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

On identity assurance in the presence of federated identity management systems.
Proceedings of the 2007 Workshop on Digital Identity Management, 2007

2006
A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

Towards Scalable Management of Privacy Obligations in Enterprises.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006

A Customizable Reputation-based Privacy Assurance System using Active Feedback.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

How ordinary internet users can have a chance to influence privacy policies.
Proceedings of the 4th Nordic Conference on Human-Computer Interaction 2006, Oslo, 2006

Provision of Trusted Identity Management Using Trust Credentials.
Proceedings of the Trust Management, 4th International Conference, 2006

On Privacy-aware Information Lifecycle Management in Enterprises: Setting the Context.
Proceedings of the ISSE 2006, 2006

2005
Handling privacy obligations in enterprises: important aspects and technical approaches.
Comput. Syst. Sci. Eng., 2005

Position paper: Rule Language Requirement for Privacy-Enabled Identity Management.
Proceedings of the W3C Workshop on Rule Languages for Interoperability, 2005

Privacy Enforcement for IT Governance in Enterprises: Doing It for Real.
Proceedings of the Trust, 2005

An Adaptive Privacy Management System for Data Repositories.
Proceedings of the Trust, 2005

Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms.
Proceedings of the Trust Management, Third International Conference, 2005

2004
Dealing with Privacy Obligations: Important Aspects and Technical Approaches.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Dealing with Privacy Obligations in Enterprises.
Proceedings of the ISSE 2004, 2004

2003
The HP time vault service: exploiting IBE for timed release of confidential information.
Proceedings of the Twelfth International World Wide Web Conference, 2003

Towards Accountable Management of Privacy and Identity Information.
Proceedings of the Computer Security, 2003

Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for Privacy in Health Care.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Negotiated Revealing of Traders? Credentials in e-Marketplaces: Dealing with Trust and Privacy Issues.
Proceedings of the Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS'02), 2002

Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information.
Proceedings of the Infrastructure Security, International Conference, 2002

Reducing Risks of Widespread Faults and Attacks for Commercial Software Applications: Towards Diversity of Software Components.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

Trust Services: A Framework for Service-Based Solutions.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2000
POWER prototype: towards integrated policy-based management.
Proceedings of the Networked Planet: Management Beyond 2000, 2000


  Loading...