Search For:

Displaying 1-16 out of 16 total
Trust negotiations for collaborative environments: Principles, concepts and systems
Found in: Collaborative Technologies and Systems, International Symposium on
By Anna Cinzia Squicciarini
Issue Date:May 2009
pp. xxii-xxiv
This tutorial will present an overview of the trust negotiation paradigm, an innovative authorization approach that has been widely investigated in the recent years. We will present the basic concepts related to trust negotiation, and provide an overview o...
   
Policy-Compliant Search Query Routing for Web Service Discovery in Peer to Peer Networks
Found in: 2013 IEEE International Conference on Web Services (ICWS)
By Sushama Karumanchi,Anna Cinzia Squicciarini,Barbara Carminati
Issue Date:June 2013
pp. 387-394
Web services are increasingly hosted on peer to peer networks, to facilitate resource sharing and cooperation. In these settings, each peer hosts a set of services which can be invoked by other peers of the network through a service query. In a pure peer t...
 
Early Detection of Policies Violations in a Social Media Site: A Bayesian Belief Network Approach
Found in: 2012 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY
By Anna Cinzia Squicciarini,William McGill,Giuseppe Petracca,Shuo Huang
Issue Date:July 2012
pp. 45-52
One of the main goals of all online social communities is to promote a stable, or perhaps, growing membership built around topics of like interest. Yet, communities are not impermeable to the potentially damaging effects resulting from those few participan...
 
Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor
Found in: IEEE Security and Privacy
By Lee Hively,Frederick Sheldon,Anna Cinzia Squicciarini
Issue Date:July 2011
pp. 14-23
The cybersecurity landscape consists of an ad hoc patchwork of solutions. Optimal cybersecurity is difficult for various reasons: complexity, immense data and processing requirements, resource-agnostic cloud computing, practical time-space-energy constrain...
 
A Policy-Based Accountability Tool for Grid Computing Systems
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Anna Cinzia Squicciarini, Wonjun Lee, Elisa Bertino, Carol X. Song
Issue Date:December 2008
pp. 95-100
The dynamic and multi-organizational nature of Grid systems requires effective and efficient accountability systems to scale for accommodating large number of users and resources. The availability of detailed and complete accountability data
 
Verification of Receipts from M-commerce Transactions on NFC Cellular Phones
Found in: E-Commerce Technology and Enterprise Computing, E-Commerce and E-Services, IEEE Conference and Fifth IEEE Conference
By Jungha Woo, Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino
Issue Date:July 2008
pp. 36-43
A main challenge in mobile commerce is to make it possible for users to manage their transaction histories from both online e-commerce transactions and in-person transactions. Such histories are typically useful to build credit or to establish trust based ...
 
Protecting Databases from Query Flood Attacks
Found in: Data Engineering, International Conference on
By Anna Cinzia Squicciarini, Ivan Paloscia, Elisa Bertino
Issue Date:April 2008
pp. 1358-1360
A typical Denial of Service attack against a DBMS may occur through a query flood, that is, a large number of queries and/or updates sent by a malicious subject or several colluding malicious subjects to a target database with the intention to hinder other...
 
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations
Found in: Distributed Computing Systems, International Conference on
By Anna Cinzia Squicciarini, Alberto Trombetta, Elisa Bertino
Issue Date:June 2007
pp. 57
Trust negotiation supports authentication and access control across multiple security domains by allowing parties to use non-forgeable digital credentials to establish trust. By their nature trust negotiation systems are used in environments that are not a...
 
Access Control Strategies for Virtualized Environments in Grid Computing Systems
Found in: Future Trends of Distributed Computing Systems, IEEE International Workshop
By Anna Cinzia Squicciarini, Elisa Bertino, Sebastien Goasguen
Issue Date:March 2007
pp. 48-54
The development of adequate security solutions and in particular of authentication and authorization techniques for grid computing systems is a challenging task. Challenges arise from the heterogeneity of users, the presence of multiple security administra...
 
Trust Negotiations with Customizable Anonymity
Found in: Web Intelligence and Intelligent Agent Technology, International Conference on
By Anna Cinzia Squicciarini, Abhilasha Barghav-Spantzel, Elisa Bertino, Elena Ferrari, Indrakshi Ray
Issue Date:December 2006
pp. 69-72
Trust negotiation makes it possible for two parties to carry on secure transactions by first establishing trust through a bilateral, iterative process of requesting and disclosing digital credentials and policies. Credentials, exchanged during trust negoti...
 
Trust-X: A Peer-to-Peer Framework for Trust Establishment
Found in: IEEE Transactions on Knowledge and Data Engineering
By Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini
Issue Date:July 2004
pp. 827-842
<p><b>Abstract</b>—In this paper, we present <tmath>{\rm{Trust}}{\hbox{-}}{\cal{X}}</tmath>, a comprehensive XML-based [12] framework for trust negotiations, specifically conceived for a peer-to-peer environment. Trust negotia...
 
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Found in: IEEE Transactions on Knowledge and Data Engineering
By Anna Cinzia Squicciarini,Dan Lin,Smitha Sundareswaran,Joshua Wede
Issue Date:May 2014
pp. 1
With the increasing volume of images users share through social sites, maintaining privacy has become a major problem, as demonstrated by a recent wave of publicized incidents where users inadvertently shared personal information. In light of these inciden...
 
A Vision for Scalable Trustworthy Computing
Found in: IEEE Security and Privacy
By Lee Hively, Frederick Sheldon, Anna Cinzia Squicciarini
Publication Date: August 2010
pp. N/A
The cybersecurity landscape consists of an ad hoc patchwork of solutions [1]. Optimal cybersecurity is considered &#x201C;hard,&#x201D; for various reasons: complexity, immense data and processing requirements, resource-agnostic cloud computing, pr...
 
ReasONets: a fuzzy-based approach for reasoning on network incidents
Found in: Proceedings of the 2012 ACM conference on Computer and communications security (CCS '12)
By Anna Cinzia Squicciarini, Giuseppe Petracca, Marco Casassa-Mont, William Horne
Issue Date:October 2012
pp. 1010-1012
We provide an approach for real-time analysis of ongoing events in a controlled network. We propose ReasONets, i.e. Reasoning on Networks, a distributed and lightweight system, able to process and reason about anomalies and incidents observed in closed net...
     
A3P: adaptive policy prediction for shared images over popular content sharing sites
Found in: Proceedings of the 22nd ACM conference on Hypertext and hypermedia (HT '11)
By Anna Cinzia Squicciarini, Dan Lin, Josh Wede, Smitha Sundareswaran
Issue Date:June 2011
pp. 261-270
More and more people go online today and share their personal images using popular web services like Picasa. While enjoying the convenience brought by advanced technology, people also become aware of the privacy issues of data being shared. Recent studies ...
     
Collective privacy management in social networks
Found in: Proceedings of the 18th international conference on World wide web (WWW '09)
By Anna Cinzia Squicciarini, Federica Paci, Mohamed Shehab
Issue Date:April 2009
pp. 66-66
Social Networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of people participating. Social networks enable a form of self expression for users, and help them to socialize and share content with other users. In s...
     
 1