Barbara Carminati

According to our database1, Barbara Carminati
  • authored at least 109 papers between 2001 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
An extended access control mechanism exploiting data dependencies.
Int. J. Inf. Sec., 2017

Learning Privacy Habits of PDS Owners.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

SAMPAC: Socially-Aware collaborative Multi-Party Access Control.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

2016
COIP - Continuous, Operable, Impartial, and Privacy-Aware Identity Validity Estimation for OSN Profiles.
TWEB, 2016

Detection of Unspecified Emergencies for Controlled Information Sharing.
IEEE Trans. Dependable Sec. Comput., 2016

CADIVa: cooperative and adaptive decentralized identity validation model for social networks.
Social Netw. Analys. Mining, 2016

Trustworthy and effective person-to-person payments over multi-hop MANETs.
J. Network and Computer Applications, 2016

LAMP - Label-Based Access-Control for More Privacy in Online Social Networks.
Proceedings of the Information Security Theory and Practice, 2016

A Language and an Inference Engine for Twitter Filtering Rules.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Gossip-Based Behavioral Group Identification in Decentralized OSNs.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2016

Anomalous change detection in time-evolving OSNs.
Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop, 2016

A Risk-Benefit Driven Architecture for Personal Data Release (Invited Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

Beat the DIVa - decentralized identity validation for online social networks.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Privacy Settings Recommender for Online Social Network.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

CrowdSelect: Increasing Accuracy of Crowdsourcing Tasks through Behavior Prediction and User Selection.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Enhancing User Control on Personal Data Usage in Internet of Things Ecosystems.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
Graph Based Local Risk Estimation in Large Scale Online Social Networks.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Privacy Preserving Decentralized Identity Validation for Geo-social Networks over MANET.
Proceedings of the 7th International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking, 2015

What Happens to My Online Social Estate When I Am Gone? An Integrated Approach to Posthumous Online Data Management.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

A Privacy-Preserving Framework for Constrained Choreographed Service Composition.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015

Evolutionary Inference of Attribute-Based Access Control Policies.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2015

CARDS - Collaborative Audit and Report Data Sharing for A-Posteriori Access Control in DOSNs.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

DIVa: Decentralized Identity Validation for Social Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Detecting anomalies in social network data consumption.
Social Netw. Analys. Mining, 2014

Editorial: Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012).
MONET, 2014

Preface.
Int. J. Cooperative Inf. Syst., 2014

SocialCloudShare: a Facebook Application for a Relationship-based Information Sharing in the Cloud.
EAI Endorsed Trans. Collaborative Computing, 2014

Editorial.
Computers & Security, 2014

Secure Web Service Composition with Untrusted Broker.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

Community-Based Identity Validation on Online Social Networks.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Relationship-based information sharing in cloud-based decentralized social networks.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
Security and Trust in Online Social Networks
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, 2013

A System to Filter Unwanted Messages from OSN User Walls.
IEEE Trans. Knowl. Data Eng., 2013

A System for Timely and Controlled Information Sharing in Emergency Situations.
IEEE Trans. Dependable Sec. Comput., 2013

User similarities on social networks.
Social Netw. Analys. Mining, 2013

Enforcing Trust Preferences in Mobile Person-to-Person Payments.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

WS-Rec: Web services recommendations using heterogeneous criteria.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

Policy-Compliant Search Query Routing for Web Service Discovery in Peer to Peer Networks.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

SHARE: Secure information sharing framework for emergency management.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Controlled information sharing for unspecified emergencies.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Privacy aware service selection of composite web services invited paper.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
A multi-layer framework for personalized social tag-based applications.
Data Knowl. Eng., 2012

Risks of Friendships on Social Networks
CoRR, 2012

A Multi-dimensional and Event-Based Model for Trust Computation in the Social Web.
Proceedings of the Social Informatics, 2012

Policies for Composed Emergencies in Support of Disaster Management.
Proceedings of the Secure Data Management - 9th VLDB Workshop, 2012

Performance analysis of relationship-based access control in OSNs.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Risks of Friendships on Social Networks.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Trust and Share: Trusted Information Sharing in Online Social Networks.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Privacy in Social Networks: How Risky is Your Social Graph?
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Preface.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

2011
Guest Editorial SACMAT 2009 and 2010.
ACM Trans. Inf. Syst. Secur., 2011

CASTLE: Continuously Anonymizing Data Streams.
IEEE Trans. Dependable Sec. Comput., 2011

Introduction to secure Semantic Web.
Computer Standards & Interfaces, 2011

Semantic web-based social network access control.
Computers & Security, 2011

Secure Information Sharing on Support of Emergency Management.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Network and profile based measures for user similarities on social networks.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

A Privacy-Preserving Approach for Web Service Selection and Provisioning.
Proceedings of the IEEE International Conference on Web Services, 2011

P3D - Privacy-Preserving Path Discovery in Decentralized Online Social Networks.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Collaborative access control in on-line social networks.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
A framework to enforce access control over data streams.
ACM Trans. Inf. Syst. Secur., 2010

Content-Based Filtering in On-Line Social Networks.
Proceedings of the Privacy and Security Issues in Data Mining and Machine Learning, 2010

2009
Secure Data Outsourcing.
Proceedings of the Encyclopedia of Database Systems, 2009

Merkle Trees.
Proceedings of the Encyclopedia of Database Systems, 2009

Digital Signatures.
Proceedings of the Encyclopedia of Database Systems, 2009

Blind Signatures.
Proceedings of the Encyclopedia of Database Systems, 2009

Enforcing access control in Web-based social networks.
ACM Trans. Inf. Syst. Secur., 2009

A semantic web based framework for social network access control.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

ACStream: Enforcing Access Control over Data Streams.
Proceedings of the 25th International Conference on Data Engineering, 2009

Computing Reputation for Collaborative Private Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

The Quality Social Network: A collaborative environment for personalizing Web access.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

Enforcing relationships privacy through collaborative access control in web-based Social Networks.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

Compatibility-driven and adaptable service composition.
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009

2008
Access control and privacy in web-based social networks.
IJWIS, 2008

A Decentralized Security Framework for Web-Based Social Networks.
IJISP, 2008

Message from the SSW'08 organizers.
Proceedings of the 24th International Conference on Data Engineering Workshops, 2008

CASTLE: A delay-constrained scheme for ks-anonymizing data streams.
Proceedings of the 24th International Conference on Data Engineering, 2008

Privacy-Aware Collaborative Access Control in Web-Based Social Networks.
Proceedings of the Data and Applications Security XXII, 2008

Combining Social Networks and Semantic Web Technologies for Personalizing Web Access.
Proceedings of the Collaborative Computing: Networking, 2008

2007
Enforcing access control over data streams.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Towards Secure Execution Orders for CompositeWeb Services.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Private Relationships in Social Networks.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Security Conscious Web Service Composition with Semantic Web Support.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Specifying Access Control Policies on Data Streams.
Proceedings of the Advances in Databases: Concepts, 2007

2006
A system for controlled outsourcing of personal data.
Comput. Syst. Sci. Eng., 2006

Access control for web data: models and policy languages.
Annales des Télécommunications, 2006

Rule-Based Access Control for Social Networks.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Security Conscious Web Service Composition.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Confidentiality Enforcement for XML Outsourced Data.
Proceedings of the Current Trends in Database Technology - EDBT 2006, 2006

2005
Exploring Privacy Issues in Web Services Discovery Agencies.
IEEE Security & Privacy, 2005

Web Service Composition: A Security Perspective.
Proceedings of the 2005 International Workshop on Challenges in Web Information Retrieval and Integration (WIRI 2005), 2005

AC-XML documents: improving the performance of a web access control module.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

Assuring Security Properties in Third-party Architectures.
Proceedings of the 21st International Conference on Data Engineering, 2005

Trusted Privacy Manager: A System for Privacy Enforcement.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

Securing XML data in third-party distribution systems.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

2004
Selective and Authentic Third-Party Distribution of XML Documents.
IEEE Trans. Knowl. Data Eng., 2004

Merkle Tree Authentication in UDDI Registries.
Int. J. Web Service Res., 2004

Access control for XML documents and data.
Inf. Sec. Techn. Report, 2004

Towards Standardized Web Services Privacy Technologies.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

Using RDF for Policy Specification and Enforcement.
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004

2003
Management of access control policies for XML document sources.
Int. J. Inf. Sec., 2003

A Flexible Authentication Method for UDDI Registries.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

Author-Chi - A System for Secure Dissemination and Update of XML Documents.
Proceedings of the Databases in Networked Information Systems, 2003

2002
Secure Publishing of XML Documents.
Proceedings of the XML-Based Data Management and Multimedia Engineering, 2002

Secure Publishing of XML Documents.
Proceedings of the EDBT 2002 Ph.D. Workshop, Prague, Czech Republic, March 28, Proceedings, 2002

A temporal key management scheme for secure broadcasting of XML documents.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
XML security.
Inf. Sec. Techn. Report, 2001

A Secure Publishing Service for Digital Libraries of XML Documents.
Proceedings of the Information Security, 4th International Conference, 2001


  Loading...