Elena Ferrari
Orcid: 0000-0002-7312-6769Affiliations:
- University of Insubria, Varese, Italy
According to our database1,
Elena Ferrari
authored at least 286 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2019, "For contributions to security and privacy of data and social network systems".
IEEE Fellow
IEEE Fellow 2013, "For contributions to security and privacy for data and applications".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on acm.org
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Technical Perspective: Graph Theory for Data Privacy: A New Approach for Complex Data Flows.
SIGMOD Rec., March, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-materialisation.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
RF-WAVEGUARD: Enhancing UAV Security Against Signal Jamming Attacks through Radio Frequency Watermarking.
Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2024
2023
Comput. Networks, September, 2023
Proceedings of the 5th IEEE International Conference on Trust, 2023
Private, Fair and Secure Collaborative Learning Framework for Human Activity Recognition.
Proceedings of the Adjunct Proceedings of the 2023 ACM International Joint Conference on Pervasive and Ubiquitous Computing & the 2023 ACM International Symposium on Wearable Computing, 2023
Proceedings of the IEEE International Conference on Edge Computing and Communications, 2023
Proceedings of the Workshops of the EDBT/ICDT 2023 Joint Conference, 2023
Proceedings of the Advanced Information Networking and Applications, 2023
2022
LifeSnaps: a 4-month multi-modal dataset capturing unobtrusive snapshots of our lives in the wild.
Dataset, July, 2022
LifeSnaps: a 4-month multi-modal dataset capturing unobtrusive snapshots of our lives in the wild.
Dataset, July, 2022
IEEE Trans. Dependable Secur. Comput., 2022
Data Sci. Eng., 2022
Comput. Secur., 2022
Proceedings of the 4th IEEE International Conference on Trust, 2022
Proceedings of the Information Security Practice and Experience, 2022
A Blockchain-based Framework in Support of Privacy Preferences Enforcement for Scientific Workflows : (Invited Paper).
Proceedings of the IEEE International Conference on Web Services, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Privacy-Aware Personal Data Storage (P-PDS): Learning how to Protect User Privacy from External Applications.
IEEE Trans. Dependable Secur. Comput., 2021
Future Gener. Comput. Syst., 2021
PAutoBotCatcher: A blockchain-based privacy-preserving botnet detector for Internet of Things.
Comput. Networks, 2021
Access Control Enforcement in IoT: state of the art and open challenges in the Zero Trust era.
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Proceedings of the IEEE International Conference on Smart Internet of Things, 2021
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020
2019
Frontiers Big Data, 2019
Access control technologies for Big Data management systems: literature review and future trends.
Cybersecur., 2019
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
Proceedings of the 2019 IEEE International Conference on Services Computing, 2019
2018
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
WIREs Data Mining Knowl. Discov., 2018
IEEE Trans. Serv. Comput., 2018
Enhanced Audit Strategies for Collaborative and Accountable Data Sharing in Social Networks.
ACM Trans. Internet Techn., 2018
IEEE Trans. Dependable Secur. Comput., 2018
Online Soc. Networks Media, 2018
Comput. Networks, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Hybrid-IoT: Hybrid Blockchain Architecture for Internet of Things - PoW Sub-Blockchains.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the 2018 IEEE International Conference on Web Services, 2018
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018
2017
IEEE Trans. Dependable Secur. Comput., 2017
Int. J. Inf. Sec., 2017
Enhancing NoSQL datastores with fine-grained context-aware access control: a preliminary study on MongoDB.
Int. J. Cloud Comput., 2017
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
2016
COIP - Continuous, Operable, Impartial, and Privacy-Aware Identity Validity Estimation for OSN Profiles.
ACM Trans. Web, 2016
Guest Editorial: Special Section on the International Conference on Data Engineering.
IEEE Trans. Knowl. Data Eng., 2016
IEEE Trans. Dependable Secur. Comput., 2016
CADIVa: cooperative and adaptive decentralized identity validation model for social networks.
Soc. Netw. Anal. Min., 2016
J. Netw. Comput. Appl., 2016
Data Sci. Eng., 2016
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2016
Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop, 2016
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016
Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016
Proceedings of the IEEE International Conference on Services Computing, 2016
2015
Efficient Enforcement of Action-Aware Purpose-Based Access Control within Relational Database Management Systems.
IEEE Trans. Knowl. Data Eng., 2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Complementing MongoDB with Advanced Access Control Features: Concepts and Research Challenges.
Proceedings of the 23rd Italian Symposium on Advanced Database Systems, 2015
Privacy Preserving Decentralized Identity Validation for Geo-social Networks over MANET.
Proceedings of the 7th International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking, 2015
What Happens to My Online Social Estate When I Am Gone? An Integrated Approach to Posthumous Online Data Management.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015
Proceedings of the 2015 IEEE International Conference on Web Services, 2015
Proceedings of the Evolutionary Multi-Criterion Optimization, 2015
CARDS - Collaborative Audit and Report Data Sharing for A-Posteriori Access Control in DOSNs.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
2014
Encyclopedia of Social Network Analysis and Mining, 2014
IEEE Trans. Knowl. Data Eng., 2014
Enforcement of Purpose Based Access Control within Relational Database Management Systems.
IEEE Trans. Knowl. Data Eng., 2014
IEEE Trans. Dependable Secur. Comput., 2014
Int. J. Inf. Priv. Secur. Integr., 2014
SocialCloudShare: a Facebook Application for a Relationship-based Information Sharing in the Cloud.
EAI Endorsed Trans. Collab. Comput., 2014
Distributed Parallel Databases, 2014
Proceedings of the 2014 IEEE International Conference on Web Services, 2014
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014
2013
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02339-2, 2013
Proceedings of the Handbook of Human Computation, 2013
IEEE Trans. Knowl. Data Eng., 2013
IEEE Trans. Dependable Secur. Comput., 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013
2012
Guest Editors' Introduction: Special Section on Data and Applications Security and Privacy.
IEEE Trans. Dependable Secur. Comput., 2012
Data Knowl. Eng., 2012
Proceedings of the Social Informatics, 2012
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the Secure Data Management - 9th VLDB Workshop, 2012
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012
Proceedings of the 12th IEEE International Conference on Data Mining, 2012
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012
Towards a framework to handle privacy since the early phases of the development: Strategies and open challenges.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012
2011
IEEE Trans. Dependable Secur. Comput., 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011
Proceedings of the First ACM SIGMOD Workshop on Databases and Social Networks, 2011
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
2010
Synthesis Lectures on Data Management, Morgan & Claypool Publishers, ISBN: 978-3-031-01836-7, 2010
ACM Trans. Inf. Syst. Secur., 2010
Proceedings of the Privacy and Security Issues in Data Mining and Machine Learning, 2010
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
2009
Proceedings of the Encyclopedia of Database Systems, 2009
ACM Trans. Inf. Syst. Secur., 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the 25th International Conference on Data Engineering, 2009
Proceedings of the ESWC2009 Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009) Heraklion, 2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
The Quality Social Network: A collaborative environment for personalizing Web access.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
Enforcing relationships privacy through collaborative access control in web-based Social Networks.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009
2008
SIGKDD Explor., 2008
Int. J. Web Inf. Syst., 2008
Int. J. Inf. Secur. Priv., 2008
Proceedings of the 24th International Conference on Data Engineering, 2008
Proceedings of the Data and Applications Security XXII, 2008
Combining Social Networks and Semantic Web Technologies for Personalizing Web Access.
Proceedings of the Collaborative Computing: Networking, 2008
2007
ACM Trans. Inf. Syst. Secur., 2007
SIGKDD Explor., 2007
Int. J. Inf. Sec., 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007
Proceedings of the Advances in Databases: Concepts, 2007
Proceedings of the Spatial Data on the Web, Modeling and Management., 2007
Proceedings of the Spatial Data on the Web, Modeling and Management., 2007
2006
Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems.
ACM Trans. Inf. Syst. Secur., 2006
IEEE Trans. Dependable Secur. Comput., 2006
A system for controlled outsourcing of personal data.
Comput. Syst. Sci. Eng., 2006
Ann. des Télécommunications, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006
Proceedings of the Current Trends in Database Technology - EDBT 2006, 2006
Web and information security.
IRM Press, ISBN: 978-1-59140-588-7, 2006
2005
ACM Trans. Inf. Syst. Secur., 2005
J. Comput. Secur., 2005
Proceedings of the 2005 International Workshop on Challenges in Web Information Retrieval and Integration (WIRI 2005), 2005
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005
Proceedings of the Innovations in Applied Artificial Intelligence, 2005
A Constraint-Based Approach for the Authoring of Multi-Topic Multimedia Presentations.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005
Proceedings of the 21st International Conference on Data Engineering, 2005
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005
2004
Proceedings of the Practical Handbook of Internet Computing., 2004
IEEE Trans. Knowl. Data Eng., 2004
IEEE Trans. Knowl. Data Eng., 2004
Report on the 9th ACM Symposium on Access Control Models and Technologies (SACMMAT'04).
SIGMOD Rec., 2004
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004
Proceedings of the Current Trends in Database Technology - EDBT 2004 Workshops, 2004
Proceedings of the Advances in Database Technology, 2004
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004
2003
ACM Trans. Inf. Syst., 2003
ACM Trans. Inf. Syst. Secur., 2003
T-ODMG: an ODMG compliant temporal object model supporting multiple granularity management.
Inf. Syst., 2003
Int. J. Inf. Sec., 2003
Int. J. Inf. Sec., 2003
ViRdB: integrating virtual reality and multimedia databases for customized visualization of cultural heritage.
Proceedings of the SIGGRAPH 2003 Conference on Sketches & Applications: in conjunction with the 30th annual conference on Computer graphics and interactive techniques, 2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003
A Flexible Authentication Method for UDDI Registries.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003
Proceedings of the Computer Security, 2003
Proceedings of the Databases in Networked Information Systems, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
Proceedings of the Communications and Multimedia Security, 2003
Protecting Datasources over the Web: Policies, Models, and Mechanisms.
Proceedings of the Web-Powered Databases, 2003
2002
IEEE Trans. Knowl. Data Eng., 2002
ACM Trans. Inf. Syst. Secur., 2002
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002
An Access Control System for Digital Libraries and the Web: The MaX Prototype Demonstration.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2002
Distributed Cooperative Updates of XML Documents.
Proceedings of the Research Directions in Data and Applications Security, 2002
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
Correction to 'MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations'.
IEEE Trans. Knowl. Data Eng., 2001
ACM Trans. Inf. Syst. Secur., 2001
ACM Trans. Inf. Syst. Secur., 2001
Proceedings of the 9-th International Conference in Central Europe on Computer Graphics, 2001
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001
Saving the Multimedia Musical Heritage of Teatro alla Scala for Querying in a Web-Oriented Environment.
Proceedings of the First International Conference on WEB Delivering of Music (WEDELMUSIC '01), 2001
Proceedings of the Eigth International Symposium on Temporal Representation and Reasoning, 2001
Proceedings of the 2001 ACM SIGMOD international conference on Management of data, 2001
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Proceedings of the Eleventh International Workshop on Research Issues in Data Engineering: Document Management for Data Intensive Business and Scientific Applications, 2001
Proceedings of the Information Security, 4th International Conference, 2001
2000
World Wide Web, 2000
MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations.
IEEE Trans. Knowl. Data Eng., 2000
J. Comput. Secur., 2000
Proceedings of the Seventh International Workshop on Temporal Representation and Reasoning, 2000
Proceedings of the Data and Application Security, 2000
1999
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems.
ACM Trans. Inf. Syst. Secur., 1999
J. Comput. Secur., 1999
Proceedings of the ACM CIKM'99 2nd Workshop on Web Information and Data Management (WIDM'99), 1999
Proceedings of the 6th International Workshop on Temporal Representation and Reasoning, 1999
Un Meccanismo per il Controllo degli Accessi a Librerie Digitali.
Proceedings of the Atti del Settimo Convegno Nazionale Sistemi Evoluti per Basi di Dati, 1999
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999
Specifying and computing hierarchies of temporal authorizations.
Proceedings of the 1999 Joint Conference on Declarative Programming, 1999
1998
ACM Trans. Database Syst., 1998
IEEE Trans. Knowl. Data Eng., 1998
ACM Trans. Inf. Syst. Secur., 1998
Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model.
Theory Pract. Object Syst., 1998
Proceedings of the 5th Workshop on Temporal Representation and Reasoning, 1998
Proceedings of the Computer Security, 1998
1997
T_Chimera: A Temporal Object-Oriented Data Model.
Theory Pract. Object Syst., 1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems.
Proceedings of the Second Workshop on Role-Based Access Control, 1997
Administration Policies in a Multipolicy Autorization System.
Proceedings of the Database Securty XI: Status and Prospects, 1997
A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases.
Proceedings of the Database Securty XI: Status and Prospects, 1997
1996
IEEE Trans. Knowl. Data Eng., 1996
Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control.
Proceedings of the VLDB'96, 1996
On Using Materialization Strategies for a Temporal Authorization Model.
Proceedings of the Workshop on Materialized Views: Techniques and Applications, 1996
A decentralized temporal autoritzation model.
Proceedings of the Information Systems Security, 1996
Proceedings of the Advances in Database Technology, 1996