Elena Ferrari

According to our database1, Elena Ferrari authored at least 246 papers between 1996 and 2019.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2013, "For contributions to security and privacy for data and applications".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Access control technologies for Big Data management systems: literature review and future trends.
Cybersecurity, 2019

2018
Similarity Metrics on Social Networks.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Graphical User Interfaces for Privacy Settings.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Database Security.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Access Control Administration Policies.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Access Control.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Knowledge-based approaches for identity management in online social networks.
Wiley Interdiscip. Rev. Data Min. Knowl. Discov., 2018

Privacy in Web Service Transactions: A Tale of More than a Decade of Work.
IEEE Trans. Services Computing, 2018

Enhanced Audit Strategies for Collaborative and Accountable Data Sharing in Social Networks.
ACM Trans. Internet Techn., 2018

Risk Assessment in Social Networks Based on User Anomalous Behaviors.
IEEE Trans. Dependable Sec. Comput., 2018

Decentralized privacy preserving services for Online Social Networks.
Online Social Networks and Media, 2018

Decentralizing privacy enforcement for Internet of Things smart objects.
Computer Networks, 2018

Access Control Enforcement within MQTT-based Internet of Things Ecosystems.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Access Control in the Era of Big Data: State of the Art and Research Directions.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Hybrid-IoT: Hybrid Blockchain Architecture for Internet of Things - PoW Sub-Blockchains.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Confidential Business Process Execution on Blockchain.
Proceedings of the 2018 IEEE International Conference on Web Services, 2018

AutoBotCatcher: Blockchain-Based P2P Botnet Detection for the Internet of Things.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Blockchain as a Platform for Secure Inter-Organizational Business Processes.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

Detecting Spam Accounts on Twitter.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

Big Data Security and Privacy.
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018

2017
Enhancing MongoDB with Purpose-Based Access Control.
IEEE Trans. Dependable Sec. Comput., 2017

An extended access control mechanism exploiting data dependencies.
Int. J. Inf. Sec., 2017

Enhancing NoSQL datastores with fine-grained context-aware access control: a preliminary study on MongoDB.
IJCC, 2017

Identification Services for Online Social Networks (OSNs) Extended Abstract.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

Towards a Unifying Attribute Based Access Control Approach for NoSQL Datastores.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Learning Privacy Habits of PDS Owners.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

SAMPAC: Socially-Aware collaborative Multi-Party Access Control.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

2016
COIP - Continuous, Operable, Impartial, and Privacy-Aware Identity Validity Estimation for OSN Profiles.
TWEB, 2016

Guest Editorial: Special Section on the International Conference on Data Engineering.
IEEE Trans. Knowl. Data Eng., 2016

Detection of Unspecified Emergencies for Controlled Information Sharing.
IEEE Trans. Dependable Sec. Comput., 2016

CADIVa: cooperative and adaptive decentralized identity validation model for social networks.
Social Netw. Analys. Mining, 2016

Trustworthy and effective person-to-person payments over multi-hop MANETs.
J. Network and Computer Applications, 2016

Fine-Grained Access Control Within NoSQL Document-Oriented Datastores.
Data Science and Engineering, 2016

LAMP - Label-Based Access-Control for More Privacy in Online Social Networks.
Proceedings of the Information Security Theory and Practice, 2016

A Language and an Inference Engine for Twitter Filtering Rules.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Gossip-Based Behavioral Group Identification in Decentralized OSNs.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2016

Anomalous change detection in time-evolving OSNs.
Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop, 2016

A Risk-Benefit Driven Architecture for Personal Data Release (Invited Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

Efficient enforcement of action-aware purpose-based access control within relational database management systems.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Towards Virtual Private NoSQL datastores.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Beat the DIVa - decentralized identity validation for online social networks.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Privacy Settings Recommender for Online Social Network.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Trust and privacy correlations in social networks: A deep learning framework.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

Enhancing User Control on Personal Data Usage in Internet of Things Ecosystems.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
Privacy Aware Access Control for Big Data: A Research Roadmap.
Big Data Research, 2015

Graph Based Local Risk Estimation in Large Scale Online Social Networks.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Complementing MongoDB with Advanced Access Control Features: Concepts and Research Challenges.
Proceedings of the 23rd Italian Symposium on Advanced Database Systems, 2015

Privacy Preserving Decentralized Identity Validation for Geo-social Networks over MANET.
Proceedings of the 7th International Workshop on Hot Topics in Planet-scale mObile computing and online Social neTworking, 2015

What Happens to My Online Social Estate When I Am Gone? An Integrated Approach to Posthumous Online Data Management.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

A Privacy-Preserving Framework for Constrained Choreographed Service Composition.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015

Evolutionary Inference of Attribute-Based Access Control Policies.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2015

CARDS - Collaborative Audit and Report Data Sharing for A-Posteriori Access Control in DOSNs.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

GuardMR: Fine-grained Security Policy Enforcement for MapReduce Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

DIVa: Decentralized Identity Validation for Social Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Similarity Metrics on Social Networks.
Encyclopedia of Social Network Analysis and Mining, 2014

Privacy-Preserving Enhanced Collaborative Tagging.
IEEE Trans. Knowl. Data Eng., 2014

Enforcement of Purpose Based Access Control within Relational Database Management Systems.
IEEE Trans. Knowl. Data Eng., 2014

Enforcing Obligations within RelationalDatabase Management Systems.
IEEE Trans. Dependable Sec. Comput., 2014

Detecting anomalies in social network data consumption.
Social Netw. Analys. Mining, 2014

A framework for privacy aware data management in relational databases.
IJIPSI, 2014

SocialCloudShare: a Facebook Application for a Relationship-based Information Sharing in the Cloud.
EAI Endorsed Trans. Collaborative Computing, 2014

Special issue on secure and privacy-aware data management.
Distributed and Parallel Databases, 2014

Secure Web Service Composition with Untrusted Broker.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

Community-Based Identity Validation on Online Social Networks.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

EgoCentric: Ego Networks for Knowledge-based Short Text Classification.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

Discovering trust patterns in ego networks.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Security and Trust in Online Social Networks
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, 2013

Privacy in Social Collaboration.
Proceedings of the Handbook of Human Computation, 2013

A System to Filter Unwanted Messages from OSN User Walls.
IEEE Trans. Knowl. Data Eng., 2013

A System for Timely and Controlled Information Sharing in Emergency Situations.
IEEE Trans. Dependable Sec. Comput., 2013

User similarities on social networks.
Social Netw. Analys. Mining, 2013

Enforcing Trust Preferences in Mobile Person-to-Person Payments.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

SHARE: Secure information sharing framework for emergency management.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Controlled information sharing for unspecified emergencies.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Multi-Dimensional Conversation Analysis Across Online Social Networks.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

2012
Guest Editors' Introduction: Special Section on Data and Applications Security and Privacy.
IEEE Trans. Dependable Sec. Comput., 2012

A multi-layer framework for personalized social tag-based applications.
Data Knowl. Eng., 2012

A Multi-dimensional and Event-Based Model for Trust Computation in the Social Web.
Proceedings of the Social Informatics, 2012

Towards a Modeling and Analysis Framework for Privacy-Aware Systems.
Proceedings of the 2012 International Conference on Privacy, 2012

Policies for Composed Emergencies in Support of Disaster Management.
Proceedings of the Secure Data Management - 9th VLDB Workshop, 2012

Performance analysis of relationship-based access control in OSNs.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Risks of Friendships on Social Networks.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Trust and Share: Trusted Information Sharing in Online Social Networks.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Privacy in Social Networks: How Risky is Your Social Graph?
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Towards a framework to handle privacy since the early phases of the development: Strategies and open challenges.
Proceedings of the 6th IEEE International Conference on Digital Ecosystems and Technologies, 2012

Conceptual Framework and Architecture for Privacy Audit.
Proceedings of the Privacy Technologies and Policy - First Annual Privacy Forum, 2012

2011
CASTLE: Continuously Anonymizing Data Streams.
IEEE Trans. Dependable Sec. Comput., 2011

Semantic web-based social network access control.
Computers & Security, 2011

Secure Information Sharing on Support of Emergency Management.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Network and profile based measures for user similarities on social networks.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

A rule-based policy language for selective trust propagation in social networks.
Proceedings of the First ACM SIGMOD Workshop on Databases and Social Networks, 2011

P3D - Privacy-Preserving Path Discovery in Decentralized Online Social Networks.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Collaborative access control in on-line social networks.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Access Control in Data Management Systems
Synthesis Lectures on Data Management, Morgan & Claypool Publishers, 2010

A General Framework for Web Content Filtering.
World Wide Web, 2010

A framework to enforce access control over data streams.
ACM Trans. Inf. Syst. Secur., 2010

Content-Based Filtering in On-Line Social Networks.
Proceedings of the Privacy and Security Issues in Data Mining and Machine Learning, 2010

Combining access control and trust negotiations in an On-line Social Network.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
Database Security.
Proceedings of the Encyclopedia of Database Systems, 2009

Access Control Administration Policies.
Proceedings of the Encyclopedia of Database Systems, 2009

Access Control.
Proceedings of the Encyclopedia of Database Systems, 2009

Enforcing access control in Web-based social networks.
ACM Trans. Inf. Syst. Secur., 2009

A semantic web based framework for social network access control.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

ACStream: Enforcing Access Control over Data Streams.
Proceedings of the 25th International Conference on Data Engineering, 2009

QUATRO Plus: Quality You Can Trust?
Proceedings of the ESWC2009 Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009) Heraklion, 2009

Computing Reputation for Collaborative Private Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

The Quality Social Network: A collaborative environment for personalizing Web access.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

Enforcing relationships privacy through collaborative access control in web-based Social Networks.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

Database as a Service: Challenges and solutions for privacy and security.
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009

Compatibility-driven and adaptable service composition.
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009

2008
PinKDD'08: privacy, security, and trust in KDD post workshop report.
SIGKDD Explorations, 2008

Access control and privacy in web-based social networks.
IJWIS, 2008

A Decentralized Security Framework for Web-Based Social Networks.
IJISP, 2008

CASTLE: A delay-constrained scheme for ks-anonymizing data streams.
Proceedings of the 24th International Conference on Data Engineering, 2008

Privacy-Aware Collaborative Access Control in Web-Based Social Networks.
Proceedings of the Data and Applications Security XXII, 2008

Combining Social Networks and Semantic Web Technologies for Personalizing Web Access.
Proceedings of the Collaborative Computing: Networking, 2008

2007
PP-trust-X: A system for privacy preserving trust negotiations.
ACM Trans. Inf. Syst. Secur., 2007

PinKDD'07: privacy, security, and trust in KDD post-workshop report.
SIGKDD Explorations, 2007

A system for securing push-based distribution of XML documents.
Int. J. Inf. Sec., 2007

Enforcing access control over data streams.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Towards Secure Execution Orders for CompositeWeb Services.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Private Relationships in Social Networks.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Security Conscious Web Service Composition with Semantic Web Support.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Specifying Access Control Policies on Data Streams.
Proceedings of the Advances in Databases: Concepts, 2007

Secure Outsourcing of Geographical Data Over the Web: Techniques and Architectures.
Proceedings of the Spatial Data on the Web, Modeling and Management., 2007

Spatial Data on the Web: Issues and Challenges.
Proceedings of the Spatial Data on the Web, Modeling and Management., 2007

2006
Guest editorial: special issue on privacy preserving data management.
VLDB J., 2006

Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems.
ACM Trans. Inf. Syst. Secur., 2006

Achieving Privacy in Trust Negotiations with an Ontology-Based Approach.
IEEE Trans. Dependable Sec. Comput., 2006

A system for controlled outsourcing of personal data.
Comput. Syst. Sci. Eng., 2006

Access control for web data: models and policy languages.
Annales des Télécommunications, 2006

Rule-Based Access Control for Social Networks.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Security Conscious Web Service Composition.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Trust Negotiations with Customizable Anonymity.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Confidentiality Enforcement for XML Outsourced Data.
Proceedings of the Current Trends in Database Technology - EDBT 2006, 2006

Web and information security.
IRM Press, ISBN: 978-1-59140-588-7, 2006

2005
Guest editorial: Special issue on access control models and technologies.
ACM Trans. Inf. Syst. Secur., 2005

An approach to cooperative updates of XML documents in distributed systems.
Journal of Computer Security, 2005

Exploring Privacy Issues in Web Services Discovery Agencies.
IEEE Security & Privacy, 2005

Web Service Composition: A Security Perspective.
Proceedings of the 2005 International Workshop on Challenges in Web Information Retrieval and Integration (WIRI 2005), 2005

AC-XML documents: improving the performance of a web access control module.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

Anonymity Preserving Techniques in Trust Negotiations.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

An Integrated Approach to Rating and Filtering Web Content.
Proceedings of the Innovations in Applied Artificial Intelligence, 2005

A Constraint-Based Approach for the Authoring of Multi-Topic Multimedia Presentations.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Assuring Security Properties in Third-party Architectures.
Proceedings of the 21st International Conference on Data Engineering, 2005

Trusted Privacy Manager: A System for Privacy Enforcement.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

An Update Protocol for XML Documents in Distributed and Cooperative Systems.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

A Multi-Strategy Approach to Rating and Filtering Online Resources.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

Securing XML data in third-party distribution systems.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

2004
Information Security.
Proceedings of the Practical Handbook of Internet Computing., 2004

Trust-X: A Peer-to-Peer Framework for Trust Establishment.
IEEE Trans. Knowl. Data Eng., 2004

Selective and Authentic Third-Party Distribution of XML Documents.
IEEE Trans. Knowl. Data Eng., 2004

CiVeDi: A Customized Virtual Environment for Database Interaction.
SIGMOD Record, 2004

Report on the 9th ACM Symposium on Access Control Models and Technologies (SACMMAT'04).
SIGMOD Record, 2004

Merkle Tree Authentication in UDDI Registries.
Int. J. Web Service Res., 2004

Access control for XML documents and data.
Inf. Sec. Techn. Report, 2004

Privacy-Preserving Trust Negotiations.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

An XML-Based Approach to Document Flow Verification.
Proceedings of the Information Security, 7th International Conference, 2004

Flow policies: specification and enforcement.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Towards Standardized Web Services Privacy Technologies.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

Towards Supporting Fine-Grained Access Control for Grid Resources.
Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), 2004

Web Data Protection: Principles and Research Issues.
Proceedings of the Current Trends in Database Technology - EDBT 2004 Workshops, 2004

Security and Privacy for Web Databases and Services.
Proceedings of the Advances in Database Technology, 2004

Using RDF for Policy Specification and Enforcement.
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004

2003
A hierarchical access control model for video database systems.
ACM Trans. Inf. Syst., 2003

T-ODMG: an ODMG compliant temporal object model supporting multiple granularity management.
Inf. Syst., 2003

Management of access control policies for XML document sources.
Int. J. Inf. Sec., 2003

Content-based filtering of Web documents: the MaX system and the EUFORBIA project.
Int. J. Inf. Sec., 2003

ViRdB: integrating virtual reality and multimedia databases for customized visualization of cultural heritage.
Proceedings of the SIGGRAPH 2003 Conference on Sketches & Applications: in conjunction with the 30th annual conference on Computer graphics and interactive techniques, 2003

An infrastructure for managing secure update operations on XML data.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

X-TNL: An XML-based Language for Trust Negotiations.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

A Flexible Authentication Method for UDDI Registries.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

Signature and Access Control Policies for XML Documents.
Proceedings of the Computer Security, 2003

Author-Chi - A System for Secure Dissemination and Update of XML Documents.
Proceedings of the Databases in Networked Information Systems, 2003

A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Supporting Delegation in Secure Workflow Management Systems.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Trust-Chi: An XML Framework for Trust Negotiations.
Proceedings of the Communications and Multimedia Security, 2003

Protecting Datasources over the Web: Policies, Models, and Mechanisms.
Proceedings of the Web-Powered Databases, 2003

2002
An authorization system for digital libraries.
VLDB J., 2002

A Content-Based Authorization Model for Digital Libraries.
IEEE Trans. Knowl. Data Eng., 2002

Secure and selective dissemination of XML documents.
ACM Trans. Inf. Syst. Secur., 2002

Protection and administration of XML data sources.
Data Knowl. Eng., 2002

A System to Specify and Manage Multipolicy Access Control Models.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

An Access Control System for Digital Libraries and the Web: The MaX Prototype Demonstration.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2002

Distributed Cooperative Updates of XML Documents.
Proceedings of the Research Directions in Data and Applications Security, 2002

Web and Information Security: Workshop Summary.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

Ma X : An Access Control System for Digital Libraries and the Web.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

A temporal key management scheme for secure broadcasting of XML documents.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Correction to 'MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations'.
IEEE Trans. Knowl. Data Eng., 2001

A nested transaction model for multilevel secure database management systems.
ACM Trans. Inf. Syst. Secur., 2001

XML security.
Inf. Sec. Techn. Report, 2001

Role Based Access Control Models.
Inf. Sec. Techn. Report, 2001

XML and Data Integration.
IEEE Internet Computing, 2001

Securing XML Documents with Author-X.
IEEE Internet Computing, 2001

Special Issue: Object-oriented Databases.
Concurrency and Computation: Practice and Experience, 2001

Supporting the Search for the Optimal Location of Facilities.
Proceedings of the 9-th International Conference in Central Europe on Computer Graphics, 2001

Directions for Web and E-Commerce Applications Security.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

Saving the Multimedia Musical Heritage of Teatro alla Scala for Querying in a Web-Oriented Environment.
Proceedings of the First International Conference on WEB Delivering of Music (WEDELMUSIC '01), 2001

Navigating Through Multiple Temporal Granularity Objects.
Proceedings of the Eigth International Symposium on Temporal Representation and Reasoning, 2001

Securing XML Documents: the Author-X Project Demonstration.
Proceedings of the 2001 ACM SIGMOD international conference on Management of data, 2001

A logical framework for reasoning about access control models.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

On specifying security policies for web documents with an XML-based language.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

An Access Control Mechanism for Large Scale Data Dissemination Systems.
Proceedings of the Eleventh International Workshop on Research Issues in Data Engineering: Document Management for Data Intensive Business and Scientific Applications, 2001

A Secure Publishing Service for Digital Libraries of XML Documents.
Proceedings of the Information Security, 4th International Conference, 2001

2000
Specifying and enforcing access control policies for XML document sources.
World Wide Web, 2000

MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations.
IEEE Trans. Knowl. Data Eng., 2000

Temporal Authorization Bases: From Specification to Integration.
Journal of Computer Security, 2000

A Logic-Based Approach for Enforcing Access Control.
Journal of Computer Security, 2000

Querying Multiple Temporal Granularity Data.
Proceedings of the Seventh International Workshop on Temporal Representation and Reasoning, 2000

TRBAC: a temporal role-based access control model.
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000

XML and Object Technology.
Proceedings of the Object-Oriented Technology, 2000

Author-X: A Java-Based System for XML Data Protection.
Proceedings of the Data and Application Security, 2000

1999
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems.
ACM Trans. Inf. Syst. Secur., 1999

Secure Object Deletion and Garbage Collection in Multilevel Object Bases.
Journal of Computer Security, 1999

Modeling Spatio-Temporal Constraints for Multimedia Objects.
Data Knowl. Eng., 1999

Controlled Access and Dissemination of XML Documents.
Proceedings of the ACM CIKM'99 2nd Workshop on Web Information and Data Management (WIDM'99), 1999

A Temporal Object-Oriented Data Model with Multiple Granularities.
Proceedings of the 6th International Workshop on Temporal Representation and Reasoning, 1999

Un Meccanismo per il Controllo degli Accessi a Librerie Digitali.
Proceedings of the Atti del Settimo Convegno Nazionale Sistemi Evoluti per Basi di Dati, 1999

The Musical Archive Information System at Teatro alla Scala.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Object-Oriented Database.
Proceedings of the Object-Oriented Technology, ECOOP'99 Workshop Reader, 1999

Specifying and Computing Hierarchies of Temporal Authorizations.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

A Logical Framework for Reasoning on Data Access Control Policies.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

Specifying and computing hierarchies of temporal authorizations.
Proceedings of the 1999 Joint Conference on Declarative Programming, 1999

1998
An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning.
ACM Trans. Database Syst., 1998

Navigational Accesses in a Temporal Object Model.
IEEE Trans. Knowl. Data Eng., 1998

Temporal Synchronization Models for Multimedia Data.
IEEE Trans. Knowl. Data Eng., 1998

Exception-Based Information Flow Control in Object-Oriented Systems.
ACM Trans. Inf. Syst. Secur., 1998

Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model.
TAPOS, 1998

An Approach to Model and Query Event-Based Temporal Data.
Proceedings of the 5th Workshop on Temporal Representation and Reasoning, 1998

An Authorization Model and Its Formal Semantics.
Proceedings of the Computer Security, 1998

Extending the ODMG Object Model with Time.
Proceedings of the ECOOP'98, 1998

Data Security.
Proceedings of the COMPSAC '98, 1998

1997
T_Chimera: A Temporal Object-Oriented Data Model.
TAPOS, 1997

Decentralized Administration for a Temporal Access Control Model.
Inf. Syst., 1997

Providing flexibility in information flow control for object oriented systems.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems.
Proceedings of the Second Workshop on Role-Based Access Control, 1997

Administration Policies in a Multipolicy Autorization System.
Proceedings of the Database Securty XI: Status and Prospects, 1997

A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases.
Proceedings of the Database Securty XI: Status and Prospects, 1997

Query Processing.
Proceedings of the Multimedia Databases in Perspective, 1997

1996
A Temporal Access Control Mechanism for Database Systems.
IEEE Trans. Knowl. Data Eng., 1996

Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control.
Proceedings of the VLDB'96, 1996

On Using Materialization Strategies for a Temporal Authorization Model.
Proceedings of the Workshop on Materialized Views: Techniques and Applications, 1996

A decentralized temporal autoritzation model.
Proceedings of the Information Systems Security, 1996

A Formal Temporal Object-Oriented Data Model.
Proceedings of the Advances in Database Technology, 1996


  Loading...