Michele Bezzi

Orcid: 0000-0003-2084-0675

According to our database1, Michele Bezzi authored at least 44 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Known Vulnerabilities of Open Source Projects: Where Are the Fixes?
IEEE Secur. Priv., 2024

Large Language Models and Security.
IEEE Secur. Priv., 2024

2021
Model-Based Big Data Analytics-as-a-Service: Take Big Data to the Next Level.
IEEE Trans. Serv. Comput., 2021

Commit2Vec: Learning Distributed Representations of Code Changes.
SN Comput. Sci., 2021

Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists.
Comput. Electr. Eng., 2021

2019
A manually-curated dataset of fixes to vulnerabilities of open-source software.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

2018
A Practical Approach to the Automatic Classification of Security-Relevant Commits.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

2017
Risk-Based Privacy-Aware Access Control for Threat Detection Systems.
Trans. Large Scale Data Knowl. Centered Syst., 2017

A Model-Driven Methodology for Big Data Analytics-as-a-Service.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

2016
Differential Privacy Based Access Control.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016

Trust and Risk-Based Access Control for Privacy Preserving Threat Detection Systems.
Proceedings of the Future Data and Security Engineering - Third International Conference, 2016

2015
Risk-Based Privacy-Aware Information Disclosure.
Int. J. Secur. Softw. Eng., 2015

Security Certification for Service-Based Business Ecosystems.
Comput. J., 2015

Balancing Trust and Risk in Access Control.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2015 Conferences, 2015

A Privacy Preserving Framework for Mobile and Cloud.
Proceedings of the 2nd ACM International Conference on Mobile Software Engineering and Systems, 2015

2014
A Quantitative Analysis of Common Criteria Certification Practice.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

From Research Results to Strategy: A Mapping Exercise.
Proceedings of the ISSE 2014, 2014

Risk-Aware Information Disclosure.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

A Certification-Aware Service-Oriented Architecture.
Proceedings of the Advanced Web Services, 2014

2013
Bringing Common Criteria Certification to Web Services.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Sticky policies for mobile devices.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Machine-Readable Privacy Certificates for Services.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013

2012
Modeling and preventing inferences from sensitive value distributions in data release.
J. Comput. Secur., 2012

Towards a Trustworthy Service Marketplace for the Future Internet.
Proceedings of the Future Internet, 2012

Service Levels, Security, and Trust.
Proceedings of the Handbook of Service Description - USDL and Its Methods, 2012

2011
Data Usage Control in the Future Internet Cloud.
Proceedings of the Future Internet, 2011

Ensuring trust in service consumption through security certification.
Proceedings of the International Workshop on Quality Assurance for Service-Based Applications, 2011

Data Privacy.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
An information theoretic approach for privacy metrics.
Trans. Data Priv., 2010

How Synaptic Release Probability Shapes Neuronal Transmission: Information-Theoretic Analysis in a Cerebellar Granule Cell.
Neural Comput., 2010

Protecting Privacy of Sensitive Value Distributions in Data Release.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Privacy-aware policy matching.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Expressing privacy metrics as one-symbol information.
Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010

2009
Sharing Data for Public Security.
Proceedings of the Privacy and Identity Management for Life, 2009

Data disclosure risk evaluation.
Proceedings of the CRiSIS 2009, 2009

2008
The Anonymity vs. Utility Dilemma.
Proceedings of the ISSE 2008, 2008

2007
Towards understanding and modelling office daily life
CoRR, 2007

Quantifying the information transmitted in a single stimulus.
Biosyst., 2007

Analyzing and Modelling Office Activities.
Proceedings of the 16th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2007), 2007

An entropy based method for measuring anonymity.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

2005
Modeling Synaptic Transmission and Quantifying Information Transfer in the Granular Layer of the Cerebellum.
Proceedings of the Computational Intelligence and Bioinspired Systems, 2005

2004
An integrate-and-fire model of a cerebellar granule cell.
Neurocomputing, 2004

2002
Measuring Information Spatial Densities.
Neural Comput., 2002

Redundancy and Synergy Arising from Pairwise Correlations in Neuronal Ensembles.
J. Comput. Neurosci., 2002


  Loading...