Paolo Mori

Orcid: 0000-0002-6618-0388

According to our database1, Paolo Mori authored at least 143 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
*-chain: A framework for automating the modeling of blockchain based supply chain tracing systems.
Future Gener. Comput. Syst., December, 2023

A multi-layer trust framework for Self Sovereign Identity on blockchain.
Online Soc. Networks Media, September, 2023

Content privacy enforcement models in decentralized online social networks: State of play, solutions, limitations, and future directions.
Comput. Commun., April, 2023

Self sovereign and blockchain based access control: Supporting attributes privacy with zero knowledge.
J. Netw. Comput. Appl., March, 2023

L2DART: A Trust Management System Integrating Blockchain and Off-Chain Computation.
ACM Trans. Internet Techn., 2023

Privacy-Preserving Data Sharing for Collaborative Analytics in Multi-Modal Transportation Systems.
ERCIM News, 2023

Cyber threat intelligence for critical infrastructure security.
Concurr. Comput. Pract. Exp., 2023

The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data Analysis.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Non Fungible Mutable Tokens: dynamic assets traceability for the Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

AlgoID: A Blockchain Reliant Self-Sovereign Identity Framework on Algorand.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Privacy-Preserving Object Recognition with Explainability in Smart Systems.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Modeling Carne PRI supply chain with the *-Chain Platform.
Proceedings of the Fifth Distributed Ledger Technology Workshop (DLT 2023), 2023

A cross-chain rating system: bridging EVM-based blockchains with Chainbridge.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2023

2022
Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project.
IEEE Secur. Priv., 2022

Exploiting If This Then That and Usage Control obligations for Smart Home security and management.
Concurr. Comput. Pract. Exp., 2022

Olive Oil as Case Study for the *-Chain Platform.
Proceedings of the 4th Workshop on Distributed Ledger Technology co-located with the Italian Conference on Cybersecurity 2022 (ITASEC 2022), 2022

Selective Disclosure in Self-Sovereign Identity based on Hashed Values.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Privacy vs Accuracy Trade-Off in Privacy Aware Face Recognition in Smart Systems.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Self-Sovereign Identity for Privacy-Preserving Shipping Verification System.
Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications, 2022

2021
Predicting Influential Users in Online Social Network Groups.
ACM Trans. Knowl. Discov. Data, 2021

Editorial for Special Issue on Block Chain Technology and its Applications.
Pervasive Mob. Comput., 2021

Rewarding reviews with tokens: An Ethereum-based approach.
Future Gener. Comput. Syst., 2021

DART: Towards a role-based trust management system on blockchain.
Proceedings of the 30th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2021

Measuring EOS.IO DApp Resource Allocation and Costs through a Benchmark Application.
Proceedings of the ICBTA 2021: 4th International Conference on Blockchain Technology and Applications, Xi'an, China, December 17, 2021

Towards a Graphical DSL for Tracing Supply Chains on Blockchain.
Proceedings of the Euro-Par 2021: Parallel Processing Workshops, 2021

Lightnings over rose bouquets: an analysis of the topology of the Bitcoin Lightning Network.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

*.chain: automatic coding of smart contracts and user interfaces for supply chains.
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021

2020
A Logical Key Hierarchy Based Approach to Preserve Content Privacy in Decentralized Online Social Networks.
IEEE Trans. Dependable Secur. Comput., 2020

Blockchain 3.0 applications survey.
J. Parallel Distributed Comput., 2020

Session-dependent Usage Control for Big Data.
J. Internet Serv. Inf. Secur., 2020

A cloud-edge based data security architecture for sharing and analysing cyber threat information.
Future Gener. Comput. Syst., 2020

Pushing Forward Security in Network Slicing by Leveraging Continuous Usage Control.
IEEE Commun. Mag., 2020

Practical Application and Evaluation of Atomic Swaps for Blockchain-based Recommender Systems.
Proceedings of the ICBTA 2020: The 3rd International Conference on Blockchain Technology and Applications, 2020

Improving security in industry 4.0 by extending OPC-UA with usage control.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
An Analysis of the Internal Organization of Facebook Groups.
IEEE Trans. Comput. Soc. Syst., 2019

A blockchain based approach for the definition of auditable Access Control systems.
Comput. Secur., 2019

Managing QoS in Smart Buildings Through Software Defined Network and Usage Control.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Obligation Management in Usage Control Systems.
Proceedings of the 27th Euromicro International Conference on Parallel, 2019

Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

Using IFTTT to Express and Enforce UCON Obligations.
Proceedings of the Information Security Practice and Experience, 2019

Enhancing Security in ETSI Open Source MANO with Usage Control Capability.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Exploiting Blockchain Technology for Attribute Management in Access Control Systems.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2019

A Smart Contract Based Recommender System.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2019

A Distributed Usage Control Framework for Industrial Internet of Things.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
A tour of secure software engineering solutions for connected vehicles.
Softw. Qual. J., 2018

Discovering Homophily in Online Social Networks.
Mob. Networks Appl., 2018

A survey on privacy in decentralized online social networks.
Comput. Sci. Rev., 2018

Predicting the availability of users' devices in decentralized online social networks.
Concurr. Comput. Pract. Exp., 2018

Towards a Declarative Approach to Stateful and Stateless Usage Control for Data Protection.
Proceedings of the 14th International Conference on Web Information Systems and Technologies, 2018

A Declarative Data Protection Approach: From Human-Readable Policies to Automatic Enforcement.
Proceedings of the Web Information Systems and Technologies, 2018

Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of Things.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Privacy Preserving Distributed Computation of Private Attributes for Collaborative Privacy Aware Usage Control Systems.
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

Blockchain Based Access Control Services.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Enhancing Usage Control for Performance: A Proposal for Systems of Systems (Research Poster).
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018

Enhancing Usage Control for Performance: An Architecture for Systems of Systems.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

2017
Stateful Data Usage Control for Android Mobile Devices.
Int. J. Inf. Sec., 2017

Distributed Access Control Through Blockchain Technology.
ERCIM News, 2017

Implementing Usage Control in Internet of Things: A Smart Home Use Case.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Improving MQTT by Inclusion of Usage Control.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Evaluating the Impact of Friends in Predicting User's Availability in Online Social Networks.
Proceedings of the Personal Analytics and Privacy. An Individual and Collective Perspective, 2017

Concurrent History-based Usage Control Policies.
Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017

Privacy and Temporal Aware Allocation of Data in Decentralized Online Social Networks.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Introducing Usage Control in MQTT.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

Blockchain Based Access Control.
Proceedings of the Distributed Applications and Interoperable Systems, 2017

2016
Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Usage Control on Cloud systems.
Future Gener. Comput. Syst., 2016

Data Usage Control: Introducing a New Framework for Cloud and Mobile Environments.
ERCIM News, 2016

Distributed Coverage of Ego Networks in F2F Online Social Networks.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Enforcement of U-XACML History-Based Usage Control Policy.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Enhancing Android permission through usage control: a BYOD use-case.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Towards a Usage Control Based Video Surveillance Framework.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

Logical key hierarchy for groups management in Distributed Online Social Network.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Privacy-Preserving Data Allocation in Decentralized Online Social Networks.
Proceedings of the Distributed Applications and Interoperable Systems, 2016

Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
A Tool for Managing the X1.V1 Platform on the Cloud.
Scalable Comput. Pract. Exp., 2015

1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and Security (TELERISE 2015).
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

A Privacy-Aware Framework for Decentralized Online Social Networks.
Proceedings of the Database and Expert Systems Applications, 2015

2014
Preserving Data Privacy in e-Health.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Testing of PolPA-based usage control systems.
Softw. Qual. J., 2014

Stateful Usage Control for Android Mobile Devices.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Architecture, Workflows, and Prototype for Stateful Data Usage Control in Cloud.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Improved Automatic Maturity Assessment of Wikipedia Medical Articles - (Short Paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014

Usage Control in Cloud Federations.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

A Secure Cloud Manager for the X1.V1 Platform.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

Maturity Assessment of Wikipedia Medical Articles.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

An Expertise-Driven Authoring Tool for E-Health Data Policies.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

Definition of Data Sharing Agreements - The Case of Spanish Data Protection Law.
Proceedings of the Accountability and Security in the Cloud, 2014

2013
Usage control in SIP-based multimedia delivery.
Comput. Secur., 2013

Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

A prototype for solving conflicts in XACML-based e-Health policies.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

2012
A Prototype for Enforcing Usage Control Policies Based on XACML.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

On Securing Communications among Federated Health Information Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2012

Continuous Authorizations in SIP with Usage Control.
Proceedings of the 20th Euromicro International Conference on Parallel, 2012

Testing of PolPA authorization systems.
Proceedings of the 7th International Workshop on Automation of Software Test, 2012

Usage control in cloud systems.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Prioritized Execution of Privacy Policies.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2011
Controlled data sharing in E-health.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

A Distributed Authorization System with Mobile Usage Control Policies.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011

Federation and Security Aspects for the Management of the EHR in Italy.
Proceedings of the Advances in New Technologies, Interactive Interfaces and Communicability, 2011

2010
Access and Usage Control in Grid Systems.
Proceedings of the Handbook of Information and Communication Security, 2010

On usage control for GRID systems.
Future Gener. Comput. Syst., 2010

Parental Control for Mobile Devices.
ERCIM News, 2010

Usage control in computer security: A survey.
Comput. Sci. Rev., 2010

Runtime monitoring for next generation Java ME platform.
Comput. Secur., 2010

Usage Control, Risk and Trust.
Proceedings of the Trust, 2010

Enforcing UCON Policies on the Enterprise Service Bus.
Proceedings of the On the Move to Meaningful Internet Systems, 2010

2009
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization.
Int. J. Inf. Sec., 2009

Security and Trust Management for Virtual Organisations: GridTrust Approach.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

A Proposal on Enhancing XACML with Continuous Usage Control Features.
Proceedings of the Grids, 2009

On Usage Control for GRID Services.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

2008
Enhancing Java ME Security Support with Resource Usage Monitoring.
ERCIM News, 2008

Controlling Usage in Business Process Workflows through Fine-Grained Security Policies.
Proceedings of the Trust, 2008

Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach.
Proceedings of the Towards a Service-Based Internet, 2008

A Runtime Monitoring Environment for Mobile Java.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

Enhancing Java ME Security Support with Resource Usage Monitoring.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

2007
A model for usage control in GRID systems.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Fine Grained Access Control with Trust and Reputation Management for Globus.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Enhancing Java Security with History Based Access Control.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

Extending the Globus Architecture with Role-Based Trust Management.
Proceedings of the Computer Aided Systems Theory, 2007

2006
A Fine-Grained and X.509-Based Access Control System for Globus.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006

Fine-grained and History-based Access Control with Trust Management for Autonomic Grid Services.
Proceedings of the 2006 International Conference on Autonomic and Autonomous Systems (ICAS 2006), 2006

Policy Driven Virtual Machine Monitor for Protected Grids.
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006

2005
Solving Irregular Problems through Parallel Irregular Trees.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

Towards Continuous Usage Control on Grid Computational Services.
Proceedings of the Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, 2005

2004
Parallel Hierarchical Radiosity: The PIT Approach.
Proceedings of the Applied Parallel Computing, 2004

Improving Grid Services Security with Fine Grain Policies.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

2003
Solving irregular problems on parallel architectures.
PhD thesis, 2003

Computational science in high schools: defining curricula and environments.
Future Gener. Comput. Syst., 2003

MPI on a Virtual Shared Memory.
Proceedings of the Parallel Computing: Software Technology, 2003

2002
PIT: A Library for the Parallelization of Irregular Problems.
Proceedings of the Applied Parallel Computing Advanced Scientific Computing, 2002

Computational Science in High School Curricula: The ORESPICS Approach.
Proceedings of the Computational Science - ICCS 2002, 2002

2001
Integrating load balancing and locality in the parallelization of irregular problems.
Future Gener. Comput. Syst., 2001

Collecting Remote Data in Irregular Problems with Hierarchical Representation of the Domain.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 2001

DVSA and SHOB: Support to Shared Data Structures on Distributed Memory Architectures.
Proceedings of the Ninth Euromicro Workshop on Parallel and Distributed Processing, 2001

Two Layers Distributed Shared Memory.
Proceedings of the High-Performance Computing and Networking, 9th International Conference, 2001

2000
Adaptive Multigrid Methods in MPI.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 2000

Evaluation of a virtual shared memory machine by the compilation of data parallel loops.
Proceedings of the Eight Euromicro Workshop on Parallel and Distributed Processing, 2000

Parallelization of Irregular Problems Based on Hierarchical Domain Representation.
Proceedings of the High-Performance Computing and Networking, 8th International Conference, 2000

A Hierarchical Approach to Irregular Problems (Research Note).
Proceedings of the Euro-Par 2000, Parallel Processing, 6th International Euro-Par Conference, Munich, Germany, August 29, 2000

1998
Load Balancing and Locality in Hierarchical N-Body Algorithms on Distributed Memory Architectures.
Proceedings of the High-Performance Computing and Networking, 1998


  Loading...