Paolo Mori
Orcid: 0000-0002-6618-0388
According to our database1,
Paolo Mori
authored at least 148 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Using the ACE framework to enforce access and usage control with notifications of revoked access rights.
Int. J. Inf. Sec., October, 2024
Comput. Commun., 2024
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024
Proceedings of the Sixth Distributed Ledger Technology Workshop (DLT 2024), 2024
Further Insights: Balancing Privacy, Explainability, and Utility in Machine Learning-based Tabular Data Analysis.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
*-chain: A framework for automating the modeling of blockchain based supply chain tracing systems.
Future Gener. Comput. Syst., December, 2023
Online Soc. Networks Media, September, 2023
Content privacy enforcement models in decentralized online social networks: State of play, solutions, limitations, and future directions.
Comput. Commun., April, 2023
Self sovereign and blockchain based access control: Supporting attributes privacy with zero knowledge.
J. Netw. Comput. Appl., March, 2023
ACM Trans. Internet Techn., 2023
Privacy-Preserving Data Sharing for Collaborative Analytics in Multi-Modal Transportation Systems.
ERCIM News, 2023
Concurr. Comput. Pract. Exp., 2023
The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data Analysis.
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the Fifth Distributed Ledger Technology Workshop (DLT 2023), 2023
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2023
2022
IEEE Secur. Priv., 2022
Exploiting If This Then That and Usage Control obligations for Smart Home security and management.
Concurr. Comput. Pract. Exp., 2022
Proceedings of the 4th Workshop on Distributed Ledger Technology co-located with the Italian Conference on Cybersecurity 2022 (ITASEC 2022), 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications, 2022
2021
ACM Trans. Knowl. Discov. Data, 2021
Pervasive Mob. Comput., 2021
Future Gener. Comput. Syst., 2021
Proceedings of the 30th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2021
Proceedings of the ICBTA 2021: 4th International Conference on Blockchain Technology and Applications, Xi'an, China, December 17, 2021
Proceedings of the Euro-Par 2021: Parallel Processing Workshops, 2021
Lightnings over rose bouquets: an analysis of the topology of the Bitcoin Lightning Network.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021
2020
A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online Social Networks.
IEEE Trans. Dependable Secur. Comput., 2020
A cloud-edge based data security architecture for sharing and analysing cyber threat information.
Future Gener. Comput. Syst., 2020
IEEE Commun. Mag., 2020
Practical Application and Evaluation of Atomic Swaps for Blockchain-based Recommender Systems.
Proceedings of the ICBTA 2020: The 3rd International Conference on Blockchain Technology and Applications, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
IEEE Trans. Comput. Soc. Syst., 2019
Comput. Secur., 2019
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019
Proceedings of the 27th Euromicro International Conference on Parallel, 2019
Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2019
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2019
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019
2018
Softw. Qual. J., 2018
Predicting the availability of users' devices in decentralized online social networks.
Concurr. Comput. Pract. Exp., 2018
Towards a Declarative Approach to Stateful and Stateless Usage Control for Data Protection.
Proceedings of the 14th International Conference on Web Information Systems and Technologies, 2018
A Declarative Data Protection Approach: From Human-Readable Policies to Automatic Enforcement.
Proceedings of the Web Information Systems and Technologies, 2018
Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Privacy Preserving Distributed Computation of Private Attributes for Collaborative Privacy Aware Usage Control Systems.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Enhancing Usage Control for Performance: A Proposal for Systems of Systems (Research Poster).
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018
Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018
2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Evaluating the Impact of Friends in Predicting User's Availability in Online Social Networks.
Proceedings of the Personal Analytics and Privacy. An Individual and Collective Perspective, 2017
Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017
Privacy and Temporal Aware Allocation of Data in Decentralized Online Social Networks.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017
Proceedings of the Distributed Applications and Interoperable Systems, 2017
2016
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
ERCIM News, 2016
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Proceedings of the Security and Trust Management - 12th International Workshop, 2016
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the 24th Euromicro International Conference on Parallel, 2016
Proceedings of the IEEE Symposium on Computers and Communication, 2016
Proceedings of the Distributed Applications and Interoperable Systems, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Scalable Comput. Pract. Exp., 2015
1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and Security (TELERISE 2015).
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Proceedings of the Database and Expert Systems Applications, 2015
2014
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014
Proceedings of the Security and Trust Management - 10th International Workshop, 2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Improved Automatic Maturity Assessment of Wikipedia Medical Articles - (Short Paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014
My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014
Proceedings of the Accountability and Security in the Cloud, 2014
2013
Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013
2012
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
Proceedings of the Computer Safety, Reliability, and Security, 2012
Proceedings of the 20th Euromicro International Conference on Parallel, 2012
Proceedings of the 7th International Workshop on Automation of Software Test, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
2011
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011
Proceedings of the Advances in New Technologies, Interactive Interfaces and Communicability, 2011
2010
Proceedings of the Handbook of Information and Communication Security, 2010
Proceedings of the On the Move to Meaningful Internet Systems, 2010
2009
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization.
Int. J. Inf. Sec., 2009
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
Proceedings of the Grids, 2009
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009
2008
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies.
Proceedings of the Trust, 2008
Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach.
Proceedings of the Towards a Service-Based Internet, 2008
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the Foundations of Security Analysis and Design IV, 2007
Proceedings of the Computer Aided Systems Theory, 2007
2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006
Fine-grained and History-based Access Control with Trust Management for Autonomic Grid Services.
Proceedings of the 2006 International Conference on Autonomic and Autonomous Systems (ICAS 2006), 2006
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006
2005
Solving Irregular Problems through Parallel Irregular Trees.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005
Proceedings of the Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, 2005
2004
Proceedings of the Applied Parallel Computing, 2004
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004
2003
Future Gener. Comput. Syst., 2003
MPI on a Virtual Shared Memory.
Proceedings of the Parallel Computing: Software Technology, 2003
2002
Proceedings of the Applied Parallel Computing Advanced Scientific Computing, 2002
Proceedings of the Computational Science - ICCS 2002, 2002
2001
Integrating load balancing and locality in the parallelization of irregular problems.
Future Gener. Comput. Syst., 2001
Collecting Remote Data in Irregular Problems with Hierarchical Representation of the Domain.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 2001
DVSA and SHOB: Support to Shared Data Structures on Distributed Memory Architectures.
Proceedings of the Ninth Euromicro Workshop on Parallel and Distributed Processing, 2001
Proceedings of the High-Performance Computing and Networking, 9th International Conference, 2001
2000
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 2000
Evaluation of a virtual shared memory machine by the compilation of data parallel loops.
Proceedings of the Eight Euromicro Workshop on Parallel and Distributed Processing, 2000
Proceedings of the High-Performance Computing and Networking, 8th International Conference, 2000
Proceedings of the Euro-Par 2000, Parallel Processing, 6th International Euro-Par Conference, Munich, Germany, August 29, 2000
1998
Load Balancing and Locality in Hierarchical N-Body Algorithms on Distributed Memory Architectures.
Proceedings of the High-Performance Computing and Networking, 1998