Marco Rosa

Orcid: 0000-0002-4614-6932

According to our database1, Marco Rosa authored at least 33 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Mix&Slice for Efficient Access Revocation on Outsourced Data.
IEEE Trans. Dependable Secur. Comput., 2024

2023
The Hitchhiker's Guide to Malicious Third-Party Dependencies.
Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2023

2021
SEApp: Bringing Mandatory Access Control to Android Apps.
Proceedings of the 30th USENIX Security Symposium, 2021

Optimizing Leak Detection in Open-source Platforms with Machine Learning Techniques.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

I Told You Tomorrow: Practical Time-Locked Secrets using Smart Contracts.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Securing Resources in Decentralized Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2020

A Parser to Support the Definition of Access Control Policies and Rules Using Natural Languages.
J. Medical Syst., 2020

Blockchain structures to guarantee logging integrity of a digital platform to support community-dwelling older adults.
Clust. Comput., 2020

Declarative Access Control for Aggregations of Multiple Ownership Data.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

On Results of Data Aggregation Operations.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020

2019
Access Control for Social Care Platforms Using Fast Healthcare Interoperability Resources.
Proceedings of the New Knowledge in Information Systems and Technologies - Volume 3, 2019

Logging Integrity with Blockchain Structures.
Proceedings of the New Knowledge in Information Systems and Technologies - Volume 3, 2019

Multi-Provider Secure Processing of Sensors Data.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Dynamic Allocation for Resource Protection in Decentralized Cloud Storage.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

A Platform of Services to Support Community-Dwelling Older Adults Integrating FHIR and Complex Security Mechanisms.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

A Fast Healthcare Interoperability Resources (FHIR) Implementation Integrating Complex Security Mechanisms.
Proceedings of the CENTERIS 2019 - International Conference on ENTERprise Information Systems / ProjMAN 2019 - International Conference on Project MANagement / HCist 2019, 2019

2018
Bringing Access Control Tree to Big Data.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2018

Protecting Resources and Regulating Access in Cloud-Based Object Storage.
Proceedings of the From Database to Cyber Security, 2018

2017
Distributed Shuffle Index in the Cloud: Implementation and Evaluation.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

EncSwift and key management: An integrated approach in an industrial setting.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Distributed shuffle index: Analysis and implementation in an industrial testbed.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Improving Android security by widening the role of Mandatory Access Control.
Tiny Trans. Comput. Sci., 2016

Access Control Management for Secure Cloud Storage.
Proceedings of the Security and Privacy in Communication Networks, 2016

Mix&Slice: Efficient Access Revocation in the Cloud.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Managing Data Sharing in OpenStack Swift with Over-Encryption.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

2013
Robustness of social and web graphs to node removal.
Soc. Netw. Anal. Min., 2013

2012
Four degrees of separation.
Proceedings of the Web Science 2012, 2012

Arc-Community Detection via Triangular Random Walks.
Proceedings of the Eighth Latin American Web Congress, 2012

2011
HyperANF: approximating the neighbourhood function of very large graphs on a budget.
Proceedings of the 20th International Conference on World Wide Web, 2011

Layered label propagation: a multiresolution coordinate-free ordering for compressing social networks.
Proceedings of the 20th International Conference on World Wide Web, 2011

Robustness of Social Networks: Comparative Results Based on Distance Distributions.
Proceedings of the Social Informatics - Third International Conference, SocInfo 2011, 2011

IDEA: Intrinsic Dimension Estimation Algorithm.
Proceedings of the Image Analysis and Processing - ICIAP 2011, 2011

2010
O-IPCAC and its Application to EEG Classification.
Proceedings of the First Workshop on Applications of Pattern Analysis, 2010


  Loading...