Claudio Agostino Ardagna

According to our database1, Claudio Agostino Ardagna authored at least 110 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Test-Based Security Certification of Composite Services.
TWEB, 2019

Trustworthy IoT: An Evidence Collection Approach Based on Smart Contracts.
Proceedings of the 2019 IEEE International Conference on Services Computing, 2019

2018
Modeling time, probability, and configuration constraints for continuous cloud service certification.
Computers & Security, 2018

Moon Cloud: A Cloud Platform for ICT Security Governance.
Proceedings of the IEEE Global Communications Conference, 2018

A Knowledge-Based IoT Security Checker.
Proceedings of the Euro-Par 2018: Parallel Processing Workshops, 2018

Semantic Support for Model Based Big Data Analytics-as-a-Service (MBDAaaS).
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

A Fast and Incremental Development Life Cycle for Data Analytics as a Service.
Proceedings of the 2018 IEEE International Congress on Big Data, 2018

Big Data Assurance Evaluation: An SLA-Based Approach.
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018

2017
Anonymous end-to-end communications in adversarial mobile clouds.
Pervasive and Mobile Computing, 2017

Towards Transparent and Trustworthy Cloud.
IEEE Cloud Computing, 2017

Scouting Big Data Campaigns using TOREADOR Labs.
Proceedings of the Workshops of the EDBT/ICDT 2017 Joint Conference (EDBT/ICDT 2017), 2017

What Are My Users Looking for When Preparing a Big Data Campaign.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

A Model-Driven Methodology for Big Data Analytics-as-a-Service.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

Toward Model-Based Big Data-as-a-Service: The TOREADOR Approach.
Proceedings of the Advances in Databases and Information Systems, 2017

A Security Benchmark for OpenStack.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
A Configuration-Independent Score-Based Benchmark for Distributed Databases.
IEEE Trans. Services Computing, 2016

A certification framework for cloud-based services.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Big data analytics as-a-service: Issues and challenges.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

A Certification Technique for Cloud Security Adaptation.
Proceedings of the IEEE International Conference on Services Computing, 2016

A Cost-Effective Certification-Based Service Composition for the Cloud.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
From Security to Assurance in the Cloud: A Survey.
ACM Comput. Surv., 2015

Dependability certification of services: a model-based approach.
Computing, 2015

IEEE Services Visionary Track on Security and Privacy Engineering (SPE 2015).
Proceedings of the 2015 IEEE World Congress on Services, 2015

A Test-Based Incremental Security Certification Scheme for Cloud-Based Systems.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

Toward Security and Performance Certification of Open Stack.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments.
IEEE Trans. Services Computing, 2014

Trustworthy Cloud Certification: A Model-Based Approach.
Proceedings of the Data-Driven Process Discovery and Analysis, 2014

4th IEEE 2014 Services Workshop on Security and Privacy Engineering - Message from the SPE 2014 Workshop Chairs.
Proceedings of the 2014 IEEE World Congress on Services, 2014

Network and Storage Latency Attacks to Online Trading Protocols in the Cloud.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Workshops, 2014

On the Management of Cloud Non-Functional Properties: The Cloud Transparency Toolkit.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

A Certification-Based Trust Model for Autonomic Cloud Computing Systems.
Proceedings of the 2014 International Conference on Cloud and Autonomic Computing, 2014

Zero-Knowledge Evaluation of Service Performance Based on Simulation.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

E-Auctions for Multi-Cloud Service Provisioning.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

A Competitive Scalability Approach for Cloud Architectures.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

A Certification-Aware Service-Oriented Architecture.
Proceedings of the Advanced Web Services, 2014

2013
A test-based security certification scheme for web services.
TWEB, 2013

Providing Users' Anonymity in Mobile Hybrid Networks.
ACM Trans. Internet Techn., 2013

Machine-Readable Privacy Certificates for Services.
CoRR, 2013

Machine-Readable Privacy Certificates for Services.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2013 Conferences, 2013

Security Certification of Composite Services: A Test-Based Approach.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Preserving Smartphone Users' Anonymity in Cloudy Days.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Early Assessment of Service Performance Based on Simulation.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
Landmark-assisted location and tracking in outdoor mobile network.
Multimedia Tools Appl., 2012

Minimising disclosure of client information in credential-based interactions.
IJIPSI, 2012

Web Service Assurance: The Notion and the Issues.
Future Internet, 2012

Security certification-aware service discovery and selection.
Proceedings of the 2012 Fifth IEEE International Conference on Service-Oriented Computing and Applications (SOCA), 2012

A Low-Cost Security Certification Scheme for Evolving Services.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

A model-based approach to reliability certification of services.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

Protecting Privacy of User Information in Continuous Location-Based Services.
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012

Scalability Patterns for Platform-as-a-Service.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Privacy Models and Languages: Access Control and Data Handling Policies.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Privacy-Aware Access Control System: Evaluation and Decision.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Script Language Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

XML-Based Access Control Languages.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Privacy-Aware Languages.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Location Information (Privacy of).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Map-Based Location and Tracking in Multipath Outdoor Mobile Networks.
IEEE Trans. Wireless Communications, 2011

Expressive and Deployable Access Control in Open Web Service Applications.
IEEE Trans. Services Computing, 2011

An Obfuscation-Based Approach for Protecting Location Privacy.
IEEE Trans. Dependable Sec. Comput., 2011

Editorial.
Journal of Systems Architecture - Embedded Systems Design, 2011

Towards Pattern-Based Reliability Certification of Services.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2011, 2011

Defining and Matching Test-Based Certificates in Open SOA.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

Fine-Grained Modeling of Web Services for Test-Based Security Certification.
Proceedings of the IEEE International Conference on Services Computing, 2011

Policy Requirements and State of the Art.
Proceedings of the Privacy and Identity Management for Life, 2011

Advances in Access Control Policies.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project.
Journal of Computer Security, 2010

Special issue: Open Source Certification.
Comput. Syst. Sci. Eng., 2010

Access control for smarter healthcare using policy spaces.
Computers & Security, 2010

Supporting privacy preferences in credential-based interactions.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Container-Level Security Certification of Services.
Proceedings of the Business System Management and Engineering, 2010

Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

ASSERT4SOA: Toward Security Certification of Service-Oriented Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010 Workshops, 2010

Spago4Q and the QEST nD Model: An Open Source Solution for Software Performance Measurement.
Proceedings of the Open Source Software: New Horizons, 2010

Advanced Security Service cERTificate for SOA: Certified Services go Digital.
Proceedings of the ISSE 2010, 2010

Implementing Open Source Software Governance in Real Software Assurance Processes.
Proceedings of the Software Business - First International Conference, 2010

Fine-Grained Disclosure of Access Policies.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Providing Mobile Users' Anonymity in Hybrid Networks.
Proceedings of the Computer Security, 2010

Enabling Privacy-preserving Credential-based Access Control with XACML and SAML.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Landscape-aware location-privacy protection in location-based services.
Journal of Systems Architecture - Embedded Systems Design, 2009

Assurance Evaluation for OSS Adoption in a Telco Context.
Proceedings of the Open Source Ecosystems: Diverse Communities Interacting, 2009

Privacy Preservation over Untrusted Mobile Networks.
Proceedings of the Privacy in Location-Based Applications, 2009

Access Control in Location-Based Services.
Proceedings of the Privacy in Location-Based Applications, 2009

Assurance Process for Large Open Source Code Bases.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Open Source Systems Security Certification.
Springer, ISBN: 978-0-387-77323-0, 2009

2008
Privacy-enhanced Location-based Access Control.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

A privacy-aware access control system.
Journal of Computer Security, 2008

Advanced Localization of Mobile Terminal in Cellular Network.
IJCNS, 2008

Mapping Linux Security Targets to Existing Test Suites.
Proceedings of the Open Source Development, 2008

A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

Regulating Exceptions in Healthcare Using Policy Spaces.
Proceedings of the Data and Applications Security XXII, 2008

2007
Secure Authentication Process for High Sensitive Data E-Services: A Roadmap.
J. Cases on Inf. Techn., 2007

L-VCONF: A Location-Aware Infrastructure for Battlefield Videoconferences.
Proceedings of the IEEE International Conference on Virtual Environments, 2007

A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy.
Proceedings of the New Approaches for Security, 2007

FOCSE: An OWA-based Evaluation Framework for OS Adoption in Critical Environments.
Proceedings of the Open Source Development, 2007

Location Privacy Protection Through Obfuscation-Based Techniques.
Proceedings of the Data and Applications Security XXI, 2007

Anomalies Detection in Mobile Network Management Data.
Proceedings of the Advances in Databases: Concepts, 2007

Managing Privacy in LBAC Systems.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

XML Security.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

Trust Management.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
Open Source in Web-Based Applications: A Case Study on Single Sign-On.
IJITWE, 2006

A Web Service Architecture for Enforcing Access Control Policies.
Electr. Notes Theor. Comput. Sci., 2006

CAS++: An Open Source Single Sign-On Solution for Secure e-Services.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Adopting Open Source for Mission-Critical Applications: A Case Study on Single Sign-On.
Proceedings of the Open Source Systems, 2006

Enhancing User Privacy Through Data Handling Policies.
Proceedings of the Data and Applications Security XX, 2006

Supporting location-based conditions in access control policies.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Offline Expansion of XACML Policies Based on P3P Metadata.
Proceedings of the Web Engineering, 5th International Conference, 2005

Towards Privacy-Enhanced Authorization Policies and Languages.
Proceedings of the Data and Applications Security XIX, 2005

The Architecture of a Privacy-Aware Access Control Decision Component.
Proceedings of the Construction and Analysis of Safe, 2005

2004
XML-based access control languages.
Inf. Sec. Techn. Report, 2004

A comparison of modeling strategies in defining XML-based access control languages.
Comput. Syst. Sci. Eng., 2004


  Loading...