Alberto Trombetta

According to our database1, Alberto Trombetta authored at least 57 papers between 1997 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Semantic based events signaling for AAL systems.
J. Ambient Intelligence and Humanized Computing, 2018

Strengthening the Cybersecurity of Manufacturing Companies: A Semantic Approach Compliant with the NIST Framework.
ERCIM News, 2018

An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Secure Queries on Encrypted Multi-writer Tables.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Secure and Efficient Data Sharing with Atribute-based Proxy Re-encryption Scheme.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014

Discovering non-constant Conditional Functional Dependencies with Built-in Predicates.
Proceedings of the Database and Expert Systems Applications, 2014

Multidimensional Reputation Network for Service Composition in the Internet of Things.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

Distributed access control policies for spectrum sharing.
Security and Communication Networks, 2013

A Framework for Trust-Based Multidisciplinary Team Recommendation.
Proceedings of the User Modeling, Adaptation, and Personalization, 2013

Querying data across different legal domains.
Proceedings of the 17th International Database Engineering & Applications Symposium, 2013

Data Quality Evaluation of Scientific Datasets - A Case Study in a Policy Support Context.
Proceedings of the DATA 2013 - Proceedings of the 2nd International Conference on Data Technologies and Applications, Reykjavík, Iceland, 29, 2013

A Flexible Approach to Multisession Trust Negotiations.
IEEE Trans. Dependable Sec. Comput., 2012

BPMN: An introduction to the standard.
Computer Standards & Interfaces, 2012

A Method and Guidelines for the Cooperation of Ontologies and Relational Databases in Semantic Web Applications.
Proceedings of the 2nd International Workshop on Semantic Digital Archives, 2012

A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems.
IEEE Trans. Industrial Informatics, 2011

Privacy-Preserving Updates to Anonymous and Confidential Databases.
IEEE Trans. Dependable Sec. Comput., 2011

Secure and Policy-Private Resource Sharing in an Online Social Network.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

A rule-based policy language for selective trust propagation in social networks.
Proceedings of the First ACM SIGMOD Workshop on Databases and Social Networks, 2011

Group-Based Negotiations in P2P Systems.
IEEE Trans. Parallel Distrib. Syst., 2010

Privacy-aware role-based access control.
ACM Trans. Inf. Syst. Secur., 2010

Advanced trust negotiations in critical infrastructures.
IJCIS, 2010

Distributed Intrusion Detection System for SCADA Protocols.
Proceedings of the Critical Infrastructure Protection IV, 2010

State-Based Firewall for Industrial Protocols with Critical-State Prediction Monitor.
Proceedings of the Critical Information Infrastructures Security, 2010

Combining access control and trust negotiations in an On-line Social Network.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Modbus/DNP3 State-Based Intrusion Detection System.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Adaptive and Distributed Access Control in Cognitive Radio Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

An experimental investigation of malware attacks on SCADA systems.
IJCIP, 2009

Modeling and Validating BPMN Diagrams.
Proceedings of the 2009 IEEE Conference on Commerce and Enterprise Computing, 2009

Design and Implementation of a Secure Modbus Protocol.
Proceedings of the Critical Infrastructure Protection III, 2009

State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept.
Proceedings of the Critical Information Infrastructures Security, 2009

Building a Domain Ontology from Glossaries: A General Methodology.
Proceedings of the 5th Workshop on Semantic Web Applications and Perspectives (SWAP2008), 2008

Integrating Privacy Policies into Business Processes.
Proceedings of the Security in Information Systems, 2008

Introducing privacy in a hospital information system.
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008

Privately Updating Suppression and Generalization based k-Anonymous Databases.
Proceedings of the 24th International Conference on Data Engineering, 2008

Identity-based long running negotiations.
Proceedings of the 4th Workshop on Digital Identity Management, 2008

Scada Malware, a Proof of Concept.
Proceedings of the Critical Information Infrastructure Security, 2008

Privacy-aware role based access control.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

Equivalences and optimizations in an expressive XSLT subset.
Acta Inf., 2006

Private Updates to Anonymous Databases.
Proceedings of the 22nd International Conference on Data Engineering, 2006

A framework for modeling and evaluating automatic semantic reconciliation.
VLDB J., 2005

A model for short-term content adaptation.
Proceedings of the 14th international conference on World Wide Web, 2005

Representation and management of ontologies in cultural heritage domain.
Proceedings of the SWAP 2005, 2005

Short-Term Content Adaptation in Web-based Learning Systems.
Proceedings of the IASTED International Conference on Web Technologies, 2005

Equivalences and Optimizations in an Expressive XSLT Fragment.
Proceedings of the 8th International Database Engineering and Applications Symposium (IDEAS 2004), 2004

A similarity based relational algebra for Web and multimedia data.
Inf. Process. Manage., 2003

Evaluating Matching Algorithms: the Monotonicity Principle.
Proceedings of IJCAI-03 Workshop on Information Integration on the Web (IIWeb-03), 2003

A Model for Schema Integration in Heterogeneous Databases.
Proceedings of the 7th International Database Engineering and Applications Symposium (IDEAS 2003), 2003

Imprecision Based Queries Over Materialized and Virtual Integrated Views.
Proceedings of the ICEIS 2003, 2003

Workflow Architecture for Interactive Video Management Systems.
Distributed and Parallel Databases, 2002

An Imprecision-based Language for the Web.
J. Vis. Lang. Comput., 2001

Fuzzy and Presentation Algebras for Web and Multimedia Data.
Proceedings of the 2000 International Database Engineering and Applications Symposium, 2000

Imprecision and User Preferences in Multimedia Queries: A Generic Algebraic Approach.
Proceedings of the Foundations of Information and Knowledge Systems, 2000

Similarity Search through Fuzzy Relational Algebra.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

An Extraction Language for the Web.
Proceedings of the CIKM'98 First Workshop on Web Information and Data Management (WIDM'98), 1998

Optimal Comparison Strategies in Ulam's Searching Game with Two Errors.
Theor. Comput. Sci., 1997