Alessandro Colantonio

According to our database1, Alessandro Colantonio authored at least 20 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




How to Support Human Operator in "Uncertainty" Managing during the Ontology Learning Process.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

EXPEDITE: EXPress closED ITemset Enumeration.
Expert Syst. Appl., 2015

VISIO: A Visual Approach for Singularity Detection in Recommendation Systems.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Visual detection of singularities in review platforms.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Visual Role Mining: A Picture Is Worth a Thousand Roles.
IEEE Trans. Knowl. Data Eng., 2012

A business-driven decomposition methodology for role mining.
Computers & Security, 2012

Role engineering: from theory to practice.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

A new role mining framework to elicit business roles and to mitigate enterprise risk.
Decision Support Systems, 2011

Concise: Compressed 'n' Composable Integer Set.
Inf. Process. Lett., 2010

CONCISE: Compressed 'n' Composable Integer Set
CoRR, 2010

Taming role mining complexity in RBAC.
Computers & Security, 2010

Mining Business-Relevant RBAC States through Decomposition.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

ABBA: adaptive bicluster-based approach to impute missing values in binary matrices.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Evaluating the Risk of Adopting RBAC Roles.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

A Probabilistic Bound on the Basic Role Mining Problem and Its Applications.
Proceedings of the Emerging Challenges for Security, 2009

Mining Stable Roles in RBAC.
Proceedings of the Emerging Challenges for Security, 2009

A formal framework to elicit roles with business meaning in RBAC systems.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

An Activity-Based Model for Separation of Duty
CoRR, 2008

Leveraging Lattices to Improve Role Mining.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A cost-driven approach to role engineering.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008