Anna Cinzia Squicciarini

According to our database1, Anna Cinzia Squicciarini authored at least 165 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
A Cloud Brokerage Architecture for Efficient Cloud Service Selection.
IEEE Trans. Services Computing, 2019

2018
Towards Privacy-Preserving and Practical Image-Centric Social Discovery.
IEEE Trans. Dependable Sec. Comput., 2018

Survey on Access Control for Community-Centered Collaborative Systems.
ACM Comput. Surv., 2018

Combating Crowdsourced Review Manipulators: A Neighborhood-Based Approach.
Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, 2018

Multi-Party Access Control: Requirements, State of the Art and Open Challenges.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Flexible Inference for Cyberbully Incident Detection.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018

Privacy-Aware Tag Recommendation for Image Sharing.
Proceedings of the 29th on Hypertext and Social Media, 2018

Server-Based Manipulation Attacks Against Machine Learning Models.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Toward Automated Multiparty Privacy Conflict Detection.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

CrowdEval: A Cost-Efficient Strategy to Evaluate Crowdsourced Worker's Reliability.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Combating Behavioral Deviance via User Behavior Control.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

Uncovering Scene Context for Predicting Privacy of Online Shared Images.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Positive and negative behavioral analysis in social networks.
Wiley Interdiscip. Rev. Data Min. Knowl. Discov., 2017

Toward Automated Online Photo Privacy.
TWEB, 2017

MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs.
IEEE Trans. Mob. Comput., 2017

MMBcloud-Tree: Authenticated Index for Verifiable Cloud Service Selection.
IEEE Trans. Dependable Sec. Comput., 2017

Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds.
IEEE Trans. Cloud Computing, 2017

From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

A Group-Based Personalized Model for Image Privacy Classification and Labeling.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Dynamic Contract Design for Heterogenous Workers in Crowdsourcing for Quality Control.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Real-Time Detection of Illegal File Transfers in the Cloud.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Toward Group-Based User-Attribute Policies in Azure-Like Access Control Systems.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Consensus on Social Graphs under Increasing Peer Pressure.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
Editor's Note.
IEEE Trans. Dependable Sec. Comput., 2016

A hybrid epidemic model for deindividuation and antinormative behavior in online social networks.
Social Netw. Analys. Mining, 2016

Tweet Factors Influencing Trust and Usefulness During Both Man-Made and Natural Disasters.
Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016

An Emotional Step Towards Automated Trust Detection in Crisis Social Media.
Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016

An In-Depth Study of Peer Influence on Collective Decision Making for Multi-party Access Control (Invited Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Content-Driven Detection of Cyberbullying on the Instagram Social Network.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Invited Paper: A Model of Paradoxical Privacy Behavior in Online Users.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Efficient Network Path Verification for Policy-routedQueries.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

CrowdSelect: Increasing Accuracy of Crowdsourcing Tasks through Behavior Prediction and User Selection.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Uncovering the Spatio-Temporal Dynamics of Memes in the Presence of Incomplete Information.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Constrained Social-Energy Minimization for Multi-Party Sharing in Online Social Networks.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

LAST-HDFS: Location-Aware Storage Technique for Hadoop Distributed File System.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites.
IEEE Trans. Knowl. Data Eng., 2015

Privacy-aware access control for message exchange in vehicular ad hoc networks.
Telecommunication Systems, 2015

A Large Scale Study of Web Service Vulnerabilities.
J. Internet Serv. Inf. Secur., 2015

MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection.
IACR Cryptology ePrint Archive, 2015

Uncovering Crowdsourced Manipulation of Online Reviews.
Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2015

Privacy and Access Control: How are These Two concepts Related?
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

SecLoc: Securing Location-Sensitive Storage in the Cloud.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

An evolutionary game model for the spread of non-cooperative behavior in online social networks.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Twitter Mining for Disaster Response: A Domain Adaptation Approach.
Proceedings of the 12th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2015

Determining a Discrete Set of Site-Constrained Privacy Options for Users in Social Networks Through Stackelberg Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Epidemic Behavior of Negative Users in Online Social Sites.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Toward De-Anonymizing Bitcoin by Mapping Users Location.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Towards Provenance-Based Anomaly Detection in MapReduce.
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015

Identification and characterization of cyberbullying dynamics in an online social network.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

A Hybrid Epidemic Model for Antinormative Behavior in Online Social Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Why and how to deceive: game results with sociological evidence.
Social Netw. Analys. Mining, 2014

The relativity of privacy preservation based on social tagging.
Inf. Sci., 2014

Preface.
Int. J. Cooperative Inf. Syst., 2014

Identifying hidden social circles for advanced privacy configuration.
Computers & Security, 2014

PriMa: a comprehensive approach to privacy protection in social network sites.
Annales des Télécommunications, 2014

Online abusive users analytics through visualization.
Proceedings of the 23rd International World Wide Web Conference, 2014

Policy Driven Node Selection in MapReduce.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Securing Resource Discovery in Content Hosting Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

In the wild: a large scale study of web services vulnerabilities.
Proceedings of the Symposium on Applied Computing, 2014

Mapping moods: Geo-mapped sentiment analysis during hurricane sandy.
Proceedings of the 11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2014

Enabling Privacy-Preserving Image-Centric Social Discovery.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Analyzing images' privacy for the modern web.
Proceedings of the 25th ACM Conference on Hypertext and Social Media, 2014

Situational awareness through reasoning on network incidents.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Toward Detecting Compromised MapReduce Workers through Log Analysis.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014

Identifying valuable information from twitter during natural disasters.
Proceedings of the Connecting Collections, Cultures, and Communities, 2014

2013
Agent-based accountable grid computing systems.
The Journal of Supercomputing, 2013

Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

WS-Rec: Web services recommendations using heterogeneous criteria.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

Policy-Compliant Search Query Routing for Web Service Discovery in Peer to Peer Networks.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Detecting Malicious Co-resident Virtual Machines Indulging in Load-Based Attacks.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Privacy aware service selection of composite web services invited paper.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Adaptive data protection in distributed systems.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Ensuring Distributed Accountability for Data Sharing in the Cloud.
IEEE Trans. Dependable Sec. Comput., 2012

A Flexible Approach to Multisession Trust Negotiations.
IEEE Trans. Dependable Sec. Comput., 2012

Access control for online social networks third party applications.
Computers & Security, 2012

Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

Two Species Evolutionary Game Model of User and Moderator Dynamics.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012

An Informed Model of Personal Information Release in Social Networking Sites.
Proceedings of the 2012 International Conference on Privacy, 2012

Early Detection of Policies Violations in a Social Media Site: A Bayesian Belief Network Approach.
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012

Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks.
Proceedings of the Network and System Security - 6th International Conference, 2012

Location Privacy Policy Management System.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Automatic social group organization and privacy management.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Adaptive data management for self-protecting objects in cloud computing systems.
Proceedings of the 8th International Conference on Network and Service Management, 2012

A moving zone based architecture for message dissemination in VANETs.
Proceedings of the 8th International Conference on Network and Service Management, 2012

ReasONets: a fuzzy-based approach for reasoning on network incidents.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

A Brokerage-Based Approach for Cloud Service Selection.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Adaptive Reordering and Clustering-Based Framework for Efficient XACML Policy Evaluation.
IEEE Trans. Services Computing, 2011

CoPE: Enabling collaborative privacy management in online social networks.
JASIST, 2011

Security and Privacy in Social Networks.
IEEE Internet Computing, 2011

Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor.
IEEE Security & Privacy, 2011

Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks.
IEEE Computer, 2011

Towards a Game Theoretical Model for Identity Validation in Social Network Sites.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Profile-Based Selection of Accountability Policies in Grid Computing Systems.
Proceedings of the POLICY 2011, 2011

A Privacy-Preserving Approach for Web Service Selection and Provisioning.
Proceedings of the IEEE International Conference on Web Services, 2011

A3P: adaptive policy prediction for shared images over popular content sharing sites.
Proceedings of the HT'11, 2011

Distributed Java-Based Content Protection.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

PAIM: Peer-Based Automobile Identity Management in Vehicular Ad-Hoc Network.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Privacy through web-traveler policies in social network environments.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems.
Proceedings of the 11th IEEE/ACM International Symposium on Cluster, 2011

Promoting Distributed Accountability in the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
Erratum to: Web-Traveler Policies for Images on Social Networks.
World Wide Web, 2010

Privacy policies for shared content in social network sites.
VLDB J., 2010

Multifactor Identity Verification Using Aggregated Proof of Knowledge.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2010

Group-Based Negotiations in P2P Systems.
IEEE Trans. Parallel Distrib. Syst., 2010

Learning based access control in online social networks.
Proceedings of the 19th International Conference on World Wide Web, 2010

DeCore: Detecting Content Repurposing Attacks on Clients' Systems.
Proceedings of the Security and Privacy in Communication Networks, 2010

Data protection models for service provisioning in the cloud.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

User Centric Policy Management in Online Social Networks.
Proceedings of the POLICY 2010, 2010

Biometrics-based identifiers for digital identity management.
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010

Vulnerabilities leading to denial of services attacks in grid computing systems: a survey.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

PriMa: an effective privacy protection mechanism for social networks.
Proceedings of the 5th ACM Symposium on Information, 2010

Preventing Information Leakage from Indexing in the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

Security for Web Services and Service-Oriented Architectures.
Springer, ISBN: 978-3-540-87741-7, 2010

2009
Web-Traveler Policies for Images on Social Networks.
World Wide Web, 2009

An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices.
JSW, 2009

Collective privacy management in social networks.
Proceedings of the 18th International Conference on World Wide Web, 2009

Statistics & Clustering Based Framework for Efficient XACML Policy Evaluation.
Proceedings of the POLICY 2009, 2009

The Design and Evaluation of Accountable Grid Computing System.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

An assessment of accountability policies for large-scale distributed computing systems.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Towards automatic privacy management in Web 2.0 with semantic analysis on annotations.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

2008
Verification of Receipts from M-commerce Transactions on NFC Cellular Phones.
Proceedings of the 10th IEEE International Conference on E-Commerce Technology (CEC 2008) / 5th IEEE International Conference on Enterprise Computing, 2008

VeryIDX - A Digital Identity Management System for Pervasive Computing Environments.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2008

Automatic Compliance of Privacy Policies in Federated Digital Identity Management.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Beyond User-to-User Access Control for Online Social Networks.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Trust establishment in the formation of Virtual Organizations.
Proceedings of the 24th International Conference on Data Engineering Workshops, 2008

Protecting Databases from Query Flood Attacks.
Proceedings of the 24th International Conference on Data Engineering, 2008

Privacy policies compliance across digital identity management systems.
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008

Identity-based long running negotiations.
Proceedings of the 4th Workshop on Digital Identity Management, 2008

Minimal credential disclosure in trust negotiations.
Proceedings of the 4th Workshop on Digital Identity Management, 2008

Monitoring Contract Enforcement within Virtual Organizations.
Proceedings of the Collaborative Computing: Networking, 2008

Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering.
Proceedings of the Collaborative Computing: Networking, 2008

A Unified Theory of Trust and Collaboration.
Proceedings of the Collaborative Computing: Networking, 2008

A Policy-Based Accountability Tool for Grid Computing Systems.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
PP-trust-X: A system for privacy preserving trust negotiations.
ACM Trans. Inf. Syst. Secur., 2007

Privacy preserving multi-factor authentication with biometrics.
Journal of Computer Security, 2007

Trust Negotiation in Identity Management.
IEEE Security & Privacy, 2007

Information carrying identity proof trees.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

A privacy preserving assertion based policy language for federation systems.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

Privacy Requirements in Identity Management Solutions.
Proceedings of the Human Interface and the Management of Information. Interacting in Information Environments, 2007

Access Control Strategies for Virtualized Environments in Grid Computing Systems.
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007

2006
Ws-AC: A Fine Grained Access Control System for Web Services.
World Wide Web, 2006

Achieving Privacy in Trust Negotiations with an Ontology-Based Approach.
IEEE Trans. Dependable Sec. Comput., 2006

An Adaptive Access Control Model for Web Services.
Int. J. Web Service Res., 2006

A secure framework for publishing virtual community contracts.
IJWBC, 2006

Policy Languages for Digital Identity Management in Federation Systems.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Trust Negotiations with Customizable Anonymity.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Privacy preserving multi-factor authentication with biometrics.
Proceedings of the 2006 Workshop on Digital Identity Management, 2006

A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2005
Anonymity Preserving Techniques in Trust Negotiations.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Establishing and protecting digital identity in federation systems.
Proceedings of the 2005 Workshop on Digital Identity Management, 2005

2004
Trust-X: A Peer-to-Peer Framework for Trust Establishment.
IEEE Trans. Knowl. Data Eng., 2004

A Framework for Contractual Resource Sharing in Coalitions.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

Privacy-Preserving Trust Negotiations.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

A Flexible Access Control Model for Web Services.
Proceedings of the Flexible Query Answering Systems, 6th International Conference, 2004

Trust Negotiation Systems.
Proceedings of the Current Trends in Database Technology - EDBT 2004 Workshops, 2004

A Fine-Grained Access Control Model for Web Services.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

2003
X-TNL: An XML-based Language for Trust Negotiations.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Trust-Chi: An XML Framework for Trust Negotiations.
Proceedings of the Communications and Multimedia Security, 2003


  Loading...