Marco Casassa Mont
Orcid: 0009-0004-7611-6947Affiliations:
- Hewlett Packard Enterprise Labs, Bristol, UK
According to our database1,
Marco Casassa Mont
authored at least 64 papers
between 2000 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on labs.hpe.com
On csauthors.net:
Bibliography
2023
Multi-Agent Reinforcement Learning for Maritime Operational Technology Cyber Security.
Proceedings of the Conference on Applied Machine Learning in Information Security, 2023
2022
IEEE Access, 2022
2021
Int. Arab J. Inf. Technol., 2021
2017
SHIELD: Securing Against Intruders and Other Threats Through an NFV-Enabled Environment.
Proceedings of the Guide to Security in SDN and NFV, 2017
2015
2014
Int. J. Cloud Comput., 2014
Comput. Stand. Interfaces, 2014
Proceedings of the Cloud Computing and Services Sciences, 2014
Proceedings of the CLOSER 2014, 2014
2012
Automating Compliance for Cloud Computing Services.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012
Security and Privacy Governance in Cloud Computing via SLAs and a Policy Orchestration Service.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011
Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks.
Computer, 2011
Computer, 2011
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011
Proceedings of the Economics of Information Security and Privacy III [papers from the Tenth Workshop on Economics and Information Security, 2011
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011
Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011
Risk Assessment and Decision Support for Security Policies and Related Enterprise Operational Processes.
Proceedings of the POLICY 2011, 2011
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
2010
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation.
Proceedings of the Trust, 2010
EnCoRe: Towards a Holistic Approach to Privacy.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Privacy and Identity Management for Life, 2010
Proceedings of the Healthgrid Applications and Core Technologies, 2010
2009
Proceedings of the POLICY 2009, 2009
Proceedings of the Medical Informatics in a United and Healthy Europe - Proceedings of MIE 2009, The XXIInd International Congress of the European Federation for Medical Informatics, Sarajevo, Bosnia and Herzegovina, August 30, 2009
Proceedings of the Healthgrid Research, Innovation and Business Case - Proceedings of HealthGrid 2009, Berlin, Germany, 29 June, 2009
Using security metrics coupled with predictive modeling and simulation to assess security processes.
Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, 2009
Proceedings of the Twenty-Second IEEE International Symposium on Computer-Based Medical Systems, 2009
2008
J. Comput. Secur., 2008
IEEE Secur. Priv., 2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
2007
Proceedings of the Trust, 2007
On Parametric Obligation Policies: Enabling Privacy-Aware Information Lifecycle Management in Enterprises.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of the 2007 Workshop on Digital Identity Management, 2007
2006
A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises.
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments.
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the 4th Nordic Conference on Human-Computer Interaction 2006, Oslo, 2006
Proceedings of the Trust Management, 4th International Conference, 2006
On Privacy-aware Information Lifecycle Management in Enterprises: Setting the Context.
Proceedings of the ISSE 2006, 2006
2005
Handling privacy obligations in enterprises: important aspects and technical approaches.
Comput. Syst. Sci. Eng., 2005
Proceedings of the W3C Workshop on Rule Languages for Interoperability, 2005
Proceedings of the Trust, 2005
Proceedings of the Trust, 2005
Proceedings of the Trust Management, Third International Conference, 2005
2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
2003
The HP time vault service: exploiting IBE for timed release of confidential information.
Proceedings of the Twelfth International World Wide Web Conference, 2003
Proceedings of the Computer Security, 2003
Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for Privacy in Health Care.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003
2002
Negotiated Revealing of Traders? Credentials in e-Marketplaces: Dealing with Trust and Privacy Issues.
Proceedings of the Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS'02), 2002
Proceedings of the Infrastructure Security, International Conference, 2002
Reducing Risks of Widespread Faults and Attacks for Commercial Software Applications: Towards Diversity of Software Components.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
2000
Proceedings of the Networked Planet: Management Beyond 2000, 2000