Giuseppe D'Acquisto

According to our database1, Giuseppe D'Acquisto authored at least 34 papers between 1998 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
On conflicts between ethical and logical principles in artificial intelligence.
AI Soc., 2020

Privacy Through Data Recolouring.
Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020

2019
A Conceptual Framework for Assessing Anonymization-Utility Trade-Offs Based on Principal Component Analysis.
CoRR, 2019

2018
Negligence and sanctions in information security investments in a cloud environment.
Electron. Mark., 2018

Hiding Alice in Wonderland: A Case for the Use of Signal Processing Techniques in Differential Privacy.
Proceedings of the Privacy Technologies and Policy - 6th Annual Privacy Forum, 2018

2017
Pan-European personal data breaches: Mapping of current practices and recommendations to facilitate cooperation among Data Protection Authorities.
Comput. Law Secur. Rev., 2017

Mr X vs. Mr Y: The Emergence of Externalities in Differential Privacy.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017

2016
Protecting suppliers' private information: the case of stock levels and the impact of correlated items.
CoRR, 2016

2015
Differential Privacy: An Estimation Theory-Based Method for Choosing Epsilon.
CoRR, 2015

Option contracts for a privacy-aware market.
CoRR, 2015

Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics.
CoRR, 2015

Option pricing in a privacy-aware market.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Influence of Search Neutrality on the Economics of Advertisement-Financed Content.
ACM Trans. Internet Techn., 2014

Differential privacy for counting queries: can Bayes estimation help uncover the true value?
CoRR, 2014

2013
Solution Space Size in Credit Risk Simulation.
Proceedings of the 15th International Conference on Computer Modelling and Simulation, 2013

Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach.
Proceedings of the Network and System Security - 7th International Conference, 2013

Information Security Investments: When Being Idle Equals Negligence.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2013

A comparison of sanctioning approaches for security breaches.
Proceedings of the Second International Conference on Future Generation Communication Technologies (FGCT 2013), 2013

When free riding is the best choice: The case of network charges for content providers.
Proceedings of the 9th International Conference on Network and Service Management, 2013

2012
Personal data disclosure and data breaches: the customer's viewpoint
CoRR, 2012

Simulation of Correlated Financial Defaults through Smoothed Cross-Entropy.
Proceedings of the 14th International Conference on Computer Modelling and Simulation, 2012

Damage Sharing May Not Be Enough: An Analysis of an Ex-ante Regulation Policy for Data Breaches.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation.
Proceedings of the Information Security and Privacy Research, 2012

Impact on retail prices of non-neutral wholesale prices for content providers.
Proceedings of the 8th Euro-NF Conference on Next Generation Internet NGI 2012, 2012

How Much Can Content Providers Afford to Pay for Network Charges?
Proceedings of the Sixth UKSim/AMSS European Symposium on Computer Modeling and Simulation, 2012

2010
The value of location in keyword auctions.
Electron. Commer. Res. Appl., 2010

2009
An Innovative Pricing Method for Telecommunication Services Pricing through American Options.
J. Networks, 2009

2008
Performance of the Vickrey auction for digital goods under various bid distributions.
Perform. Evaluation, 2008

A Normal Copula Model for the Economic Risk Analysis of Correlated Failures in Communications Networks.
J. Univers. Comput. Sci., 2008

2005
Cross-entropy-based adaptive optimization of simulation parameters for Markovian-driven service systems.
Simul. Model. Pract. Theory, 2005

Service Curve Estimation by Measurement: An Input Output Analysis of a Softswitch Model.
Proceedings of the Quality of Service in Multiservice IP Networks, 2005

2002
Computational costs of fast stochastic simulation techniques for Markovian fluid models in multiservice networks.
Simul. Pract. Theory, 2002

Polynomial biasing importance sampling for markov fluid models.
Eur. Trans. Telecommun., 2002

1998
Real Time Resource Allocation in an ATM Network.
Proceedings of the MASCOTS 1998, 1998


  Loading...