Author image not provided
 Alberto Trombetta

 homepage
 alberto.trombettaatuninsubria.it

  Affiliation history
Bibliometrics: publication history
Average citations per article6.47
Citation Count220
Publication count34
Publication years1997-2017
Available for download9
Average downloads per article699.78
Downloads (cumulative)6,298
Downloads (12 Months)231
Downloads (6 Weeks)27
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


34 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 34
Result page: 1 2

Sort by:

1 published by ACM
August 2017 ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 36,   Downloads (Overall): 36

Full text available: PDFPDF
With the ever-growing production of data coming from multiple, scattered, highly dynamical sources (like those found in IoT scenarios), it is compelling to (i) provide a seamless way to outsource the management and sharing of data (as provided by cloud services); (ii) assure an high security and privacy level to ...
Keywords: Attribute-based Cryptography, Secure Cloud Data sharing, Finegrained Access Policy

2
June 2014 SCC '14: Proceedings of the 2014 IEEE International Conference on Services Computing
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

The composition of services, as envisioned in the Internet of Things and Web of Things paradigms, is a most relevant component. To be effective, services composition should choose among the discovered services the most suitable ones and this a non-trivial task given the (typically) very large number of available services. ...
Keywords: reputation, service composition, Internet of Things

3 published by ACM
October 2013 IDEAS '13: Proceedings of the 17th International Database Engineering & Applications Symposium
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 7,   Downloads (Overall): 56

Full text available: PDFPDF
The management of legal domains is gaining great importance in the context of data management. In fact, the geographical distribution of data as implied -- for example -- by cloud-based services requires that the legal restrictions and obligations are to be taken into account whenever data circulates across different legal ...
Keywords: legal rules, access control, legal domains, data management, privacy

4
January 2012 IEEE Transactions on Dependable and Secure Computing: Volume 9 Issue 1, January 2012
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 2

Trust Negotiation has shown to be a successful, policy-driven approach for automated trust establishment, through the release of digital credentials. Current real applications require new flexible approaches to trust negotiations, especially in light of the widespread use of mobile devices. In this paper, we present a multisession dependable approach to ...
Keywords: Security and management, dependability, trust negotiations, access control.

5
January 2012 Computer Standards & Interfaces: Volume 34 Issue 1, January, 2012
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 28

The Business Process Model and Notation (BPMN) is the de-facto standard for representing in a very expressive graphical way the processes occurring in virtually every kind of organization one can think of, from cuisine recipes to the Nobel Prize assignment process, incident management, e-mail voting systems, travel booking procedures, to ...
Keywords: BPMN, Business processes, Modeling techniques

6
July 2011 IEEE Transactions on Dependable and Secure Computing: Volume 8 Issue 4, July 2011
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 2

Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, because for example data are used for certain experiments that need to be maintained confidential. Clearly, ...
Keywords: Privacy, anonymity, data management, secure computation.

7 published by ACM
June 2011 DBSocial '11: Databases and Social Networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 20,   Downloads (Overall): 433

Full text available: PDFPDF
Information spreading is a important topic in the area of Online Social Networks (OSNs). Typically, information flows in a careless way among directly connected members of the OSN ("friends"). In this way, it is possible that sensitive information is unintentionally leaked to not entitled or un-trusted members. A well-known approach ...
Keywords: social networks, access control, trust management

8
October 2010 COLLABORATECOM '10: Proceedings of the 2010 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1


9
October 2010 IEEE Transactions on Parallel and Distributed Systems: Volume 21 Issue 10, October 2010
Publisher: IEEE Press
Bibliometrics:
Citation Count: 3

In P2P systems, groups are typically formed to share resources and/or to carry on joint tasks. In distributed environments formed by a large number of peers conventional authentication techniques are inadequate for the group joining process, and more advanced ones are needed. Complex transactions among peers may require more elaborate ...
Keywords: peer-to-peer, Trust negotiation, Trust negotiation, peer-to-peer, JXTA., JXTA.

10
September 2010 CRITIS'10: Proceedings of the 5th international conference on Critical Information Infrastructures Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Traditional cyber-security countermeasures are inadequate for protecting modern Industrial Critical Infrastructures. In this paper we present an innovative filtering technique for industrial protocols based on the state analysis of the system being monitored. Since we focus our attention on the system behavior rather than on modeling the behavior of the ...
Keywords: firewall, SCADA systems, security, critical infrastructures

11 published by ACM
July 2010 ACM Transactions on Information and System Security (TISSEC): Volume 13 Issue 3, July 2010
Publisher: ACM
Bibliometrics:
Citation Count: 31
Downloads (6 Weeks): 12,   Downloads (12 Months): 90,   Downloads (Overall): 2,005

Full text available: PDFPDF
In this article, we introduce a comprehensive framework supporting a privacy-aware access control mechanism, that is, a mechanism tailored to enforce access control to data containing personally identifiable information and, as such, privacy sensitive. The key component of the framework is a family of models (P-RBAC) that extend the well-known ...
Keywords: Role-based access control, model, Privacy, purpose

12
April 2010 AINA '10: Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 10

The security of Industrial Critical Infrastructures is become a prominent problem with the advent of modern ICT technologies used to improve the performances and the features of the SCADA systems. In this paper we present an innovative approach to the design of Intrusion Detection Systems. The aim is to be ...
Keywords: Security, Intrusion Detection, SCADA, Modbus, DNP3, Critical Infrastructure

13
April 2010 AINA '10: Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Cognitive Radio (CR) is a novel wireless technology communication that allows for adaptive configuration of the reception parameters of a terminal, based on the information collected from the environment. CR techniques may be applied to the resolution of emergency crisis to improve the spectrum utilization and the resilience of the ...
Keywords: cognitive radio, spectrum management, trust negotiation, access control policy

14
September 2009 CRITIS'09: Proceedings of the 4th international conference on Critical information infrastructures security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 7

We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere with the correct behavior of the system. The proposed IDS ...
Keywords: SCADA systems, security, critical infrastructures, IDS

15
August 2009 Critical Information Infrastructure Security: Third International Workshop, CRITIS 2008, Rome, Italy, October13-15, 2008. Revised Papers
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 6

Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and Network technologies into such complex critical systems. Of particular interest are the set of vulnerabilities ...
Keywords: Malware, SCADA Systems, Critical infrastructures, Security

16
July 2009 CEC '09: Proceedings of the 2009 IEEE Conference on Commerce and Enterprise Computing
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

The ever increasing number of adoptions from companies and the growing interest upon BPMN entails the need of having one more structured underlying conceptual model. In the past different proposals to equip BPMN with a conceptual model have been defined, but the solution currently adopted remains unclear and too complex. ...
Keywords: BPM metamodels and standards, BPMN, XML serialization, BP modeling

17 published by ACM
October 2008 DIM '08: Proceedings of the 4th ACM workshop on Digital identity management
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 4,   Downloads (Overall): 252

Full text available: PDFPDF
Identity based negotiations are convenient protocols to closely control users' personal data, that empower users to negotiate the trust of unknown counterparts by carefully governing the disclosure of their identities. Such type of negotiations presents, however, unique challenges, mainly caused by the way identity attributes are distributed and managed. In ...
Keywords: distributed authorization, trust negotiations

18 published by ACM
May 2008 SESS '08: Proceedings of the fourth international workshop on Software engineering for secure systems
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 1,   Downloads (12 Months): 26,   Downloads (Overall): 985

Full text available: PDFPDF
Security and privacy issues in healthcare data management play a fundamental role in the widespread adoption of medical information systems. As a consequence, it is very important to define the right means for expressing and managing policies in order to comply with privacy-related standards and regulations. In this work, we ...
Keywords: conceptual models, hospital information system, software engineering applications, privacy policies

19
April 2008 ICDE '08: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Alice, owner of a k-anonymous database, needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Suppose that Bob is not allowed to access to the database because of data confidentiality and that Alice is not allowed to read Bob's tuple due to ...

20
November 2007 SEA '07: Proceedings of the 11th IASTED International Conference on Software Engineering and Applications
Publisher: ACTA Press
Bibliometrics:
Citation Count: 4

Nowadays privacy is a key issue and enterprises have adopted various strategies to protect customers privacy and to make public their privacy policies. This paper presents a conceptual model for the definition and enforcement of privacy policies. The model is described by means of UML and it provides a clear ...
Keywords: conceptual models, software engineering applications, UML, privacy policies



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us