Paolo Mori

According to our database1, Paolo Mori
  • authored at least 88 papers between 1998 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A survey on privacy in decentralized online social networks.
Computer Science Review, 2018

Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

2017
Stateful Data Usage Control for Android Mobile Devices.
Int. J. Inf. Sec., 2017

Distributed Access Control Through Blockchain Technology.
ERCIM News, 2017

Implementing Usage Control in Internet of Things: A Smart Home Use Case.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Improving MQTT by Inclusion of Usage Control.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Evaluating the Impact of Friends in Predicting User's Availability in Online Social Networks.
Proceedings of the Personal Analytics and Privacy. An Individual and Collective Perspective, 2017

Concurrent History-based Usage Control Policies.
Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development, 2017

Privacy and Temporal Aware Allocation of Data in Decentralized Online Social Networks.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Introducing Usage Control in MQTT.
Proceedings of the Computer Security, 2017

Blockchain Based Access Control.
Proceedings of the Distributed Applications and Interoperable Systems, 2017

2016
Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions.
JoWUA, 2016

Usage Control on Cloud systems.
Future Generation Comp. Syst., 2016

Data Usage Control: Introducing a New Framework for Cloud and Mobile Environments.
ERCIM News, 2016

Distributed Coverage of Ego Networks in F2F Online Social Networks.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Enforcement of U-XACML History-Based Usage Control Policy.
Proceedings of the Security and Trust Management - 12th International Workshop, 2016

Enhancing Android permission through usage control: a BYOD use-case.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Towards a Usage Control Based Video Surveillance Framework.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

Logical key hierarchy for groups management in Distributed Online Social Network.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Privacy-Preserving Data Allocation in Decentralized Online Social Networks.
Proceedings of the Distributed Applications and Interoperable Systems, 2016

Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
A Tool for Managing the X1.V1 Platform on the Cloud.
Scalable Computing: Practice and Experience, 2015

1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and Security (TELERISE 2015).
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

A Privacy-Aware Framework for Decentralized Online Social Networks.
Proceedings of the Database and Expert Systems Applications, 2015

2014
Preserving Data Privacy in e-Health.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Testing of PolPA-based usage control systems.
Software Quality Journal, 2014

Stateful Usage Control for Android Mobile Devices.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Architecture, Workflows, and Prototype for Stateful Data Usage Control in Cloud.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Improved Automatic Maturity Assessment of Wikipedia Medical Articles - (Short Paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2014 Conferences, 2014

Usage Control in Cloud Federations.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

A Secure Cloud Manager for the X1.V1 Platform.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

Maturity Assessment of Wikipedia Medical Articles.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

An Expertise-Driven Authoring Tool for E-Health Data Policies.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data.
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

Definition of Data Sharing Agreements - The Case of Spanish Data Protection Law.
Proceedings of the Accountability and Security in the Cloud, 2014

2013
Usage control in SIP-based multimedia delivery.
Computers & Security, 2013

Integration of Quantitative Methods for Risk Evaluation within Usage Control Policies.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

A prototype for solving conflicts in XACML-based e-Health policies.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

2012
A Prototype for Enforcing Usage Control Policies Based on XACML.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

On Securing Communications among Federated Health Information Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2012

Continuous Authorizations in SIP with Usage Control.
Proceedings of the 20th Euromicro International Conference on Parallel, 2012

Testing of PolPA authorization systems.
Proceedings of the 7th International Workshop on Automation of Software Test, 2012

Usage control in cloud systems.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Prioritized Execution of Privacy Policies.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2011
Controlled data sharing in E-health.
Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust, 2011

A Distributed Authorization System with Mobile Usage Control Policies.
Proceedings of the Computer Aided Systems Theory - EUROCAST 2011, 2011

Federation and Security Aspects for the Management of the EHR in Italy.
Proceedings of the Advances in New Technologies, Interactive Interfaces and Communicability, 2011

2010
Access and Usage Control in Grid Systems.
Proceedings of the Handbook of Information and Communication Security, 2010

On usage control for GRID systems.
Future Generation Comp. Syst., 2010

Parental Control for Mobile Devices.
ERCIM News, 2010

Usage control in computer security: A survey.
Computer Science Review, 2010

Runtime monitoring for next generation Java ME platform.
Computers & Security, 2010

Usage Control, Risk and Trust.
Proceedings of the Trust, 2010

Enforcing UCON Policies on the Enterprise Service Bus.
Proceedings of the On the Move to Meaningful Internet Systems, 2010

2009
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization.
Int. J. Inf. Sec., 2009

Security and Trust Management for Virtual Organisations: GridTrust Approach.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

A Proposal on Enhancing XACML with Continuous Usage Control Features.
Proceedings of the Grids, 2009

On Usage Control for GRID Services.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

2008
Enhancing Java ME Security Support with Resource Usage Monitoring.
ERCIM News, 2008

Controlling Usage in Business Process Workflows through Fine-Grained Security Policies.
Proceedings of the Trust, 2008

Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach.
Proceedings of the Towards a Service-Based Internet, 2008

A Runtime Monitoring Environment for Mobile Java.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

Enhancing Java ME Security Support with Resource Usage Monitoring.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

2007
A model for usage control in GRID systems.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Fine Grained Access Control with Trust and Reputation Management for Globus.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Enhancing Java Security with History Based Access Control.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

Extending the Globus Architecture with Role-Based Trust Management.
Proceedings of the Computer Aided Systems Theory, 2007

2006
A Fine-Grained and X.509-Based Access Control System for Globus.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006

Fine-grained and History-based Access Control with Trust Management for Autonomic Grid Services.
Proceedings of the 2006 International Conference on Autonomic and Autonomous Systems (ICAS 2006), 2006

Policy Driven Virtual Machine Monitor for Protected Grids.
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006

2005
Solving Irregular Problems through Parallel Irregular Trees.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005

Towards Continuous Usage Control on Grid Computational Services.
Proceedings of the Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, 2005

2004
Parallel Hierarchical Radiosity: The PIT Approach.
Proceedings of the Applied Parallel Computing, 2004

Improving Grid Services Security with Fine Grain Policies.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

2003
Computational science in high schools: defining curricula and environments.
Future Generation Comp. Syst., 2003

MPI on a Virtual Shared Memory.
Proceedings of the Parallel Computing: Software Technology, 2003

2002
PIT: A Library for the Parallelization of Irregular Problems.
Proceedings of the Applied Parallel Computing Advanced Scientific Computing, 2002

Computational Science in High School Curricula: The ORESPICS Approach.
Proceedings of the Computational Science - ICCS 2002, 2002

2001
Integrating load balancing and locality in the parallelization of irregular problems.
Future Generation Comp. Syst., 2001

Collecting Remote Data in Irregular Problems with Hierarchical Representation of the Domain.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 2001

DVSA and SHOB: Support to Shared Data Structures on Distributed Memory Architectures.
Proceedings of the Ninth Euromicro Workshop on Parallel and Distributed Processing, 2001

Two Layers Distributed Shared Memory.
Proceedings of the High-Performance Computing and Networking, 9th International Conference, 2001

2000
Adaptive Multigrid Methods in MPI.
Proceedings of the Recent Advances in Parallel Virtual Machine and Message Passing Interface, 2000

Evaluation of a virtual shared memory machine by the compilation of data parallel loops.
Proceedings of the Eight Euromicro Workshop on Parallel and Distributed Processing, 2000

Parallelization of Irregular Problems Based on Hierarchical Domain Representation.
Proceedings of the High-Performance Computing and Networking, 8th International Conference, 2000

A Hierarchical Approach to Irregular Problems (Research Note).
Proceedings of the Euro-Par 2000, Parallel Processing, 6th International Euro-Par Conference, Munich, Germany, August 29, 2000

1998
Load Balancing and Locality in Hierarchical N-Body Algorithms on Distributed Memory Architectures.
Proceedings of the High-Performance Computing and Networking, 1998


  Loading...