Search For:

Displaying 1-22 out of 22 total
Adaptive Reordering and Clustering-Based Framework for Efficient XACML Policy Evaluation
Found in: IEEE Transactions on Services Computing
By Said Marouf,Mohamed Shehab,Anna Squicciarini,Smitha Sundareswaran
Issue Date:October 2011
pp. 300-313
The adoption of XACML as the standard for specifying access control policies for various applications, especially web services is vastly increasing. This calls for high performance XACML policy evaluation engines. A policy evaluation engine can easily beco...
 
The importance of confidence & trust in complex collaborative systems
Found in: Collaborative Technologies and Systems, International Symposium on
By Jeff A. Hughes, Wayne Lutters, Anna Squicciarini, Vance Saunders
Issue Date:May 2009
pp. xxix-xxx
The security and protection of intellectual property and highly valuable data/information/knowledge is a primary concern for companies, organizations and individuals as we all do business in today's virtual, global economy. From information vital to our na...
   
Two Species Evolutionary Game Model of User and Moderator Dynamics
Found in: 2012 International Conference on Social Informatics (SocialInformatics)
By Christopher Griffin,Douglas Mercer,James Fan,Anna Squicciarini
Issue Date:December 2012
pp. 32-39
We construct a two species evolutionary game model of an online society consisting of ordinary users and behavior enforcers (moderators). Among themselves, moderators play a coordination game choosing between being ``positive'' or ''negative'' (or harsh) w...
 
A Brokerage-Based Approach for Cloud Service Selection
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Smitha Sundareswaran,Anna Squicciarini,Dan Lin
Issue Date:June 2012
pp. 558-565
great opportunities for consumers to find the best service and best pricing, which however raises new challenges on how to select the best service out of the huge pool. It is time-consuming for consumers to collect the necessary information and analyze all...
 
Distributed Java-Based Content Protection
Found in: Computer Software and Applications Conference, Annual International
By Smitha Sundareswaran,Anna Squicciarini,Ranjani Sundareswaran
Issue Date:July 2011
pp. 420-425
The increasingly sensitive nature of data shared over the Web calls for a new approach to cross-domain content protection. Towards addressing this need, in this paper we introduce a novel Java-based architecture for distributed content protection Java - ba...
 
PAIM: Peer-Based Automobile Identity Management in Vehicular Ad-Hoc Network
Found in: Computer Software and Applications Conference, Annual International
By Anna Squicciarini,Dan Lin,Alessandro Mancarella
Issue Date:July 2011
pp. 263-272
The emerging Vehicular Ad-hoc Network (VANET) technology will enable many exciting applications such as vehicular safety assistance and mobile entertainment. One of the key challenges toward successful roll-out of VANET applications is to provide security ...
 
A Privacy-Preserving Approach for Web Service Selection and Provisioning
Found in: Web Services, IEEE International Conference on
By Anna Squicciarini,Barbara Carminati,Sushama Karumanchi
Issue Date:July 2011
pp. 33-40
The growing success of WS-related technologies has resulted in a large number of providers, which implement services of varying degree of sophistication and complexity. While on the one hand the availability of a wide array of services has created a compet...
 
Promoting Distributed Accountability in the Cloud
Found in: Cloud Computing, IEEE International Conference on
By Smitha Sundareswaran,Anna Squicciarini,Dan Lin,Shuo Huang
Issue Date:July 2011
pp. 113-120
Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data is usually processed remotely in unknown machines that users do not own or operate. Wh...
 
Security and Privacy in Social Networks
Found in: IEEE Internet Computing
By Gail-Joon Ahn, Mohamed Shehab, Anna Squicciarini
Issue Date:May 2011
pp. 10-12
<p>Over the past several years, social networking sites have arisen to facilitate social interactions on the Internet while revolutionizing how online users interact with others. Most social networking sites offer the basic features of online interac...
 
Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks
Found in: Computer
By Anna Squicciarini, Sathya Dev Rajasekaran, Marco Casassa Mont
Issue Date:January 2011
pp. 66-73
An analytic methodology involving modeling and simulation could help decision makers determine how their employees' use of social networks impacts their organization, identify how to mitigate potential risks, and evaluate the financial and organizational i...
 
Preventing Information Leakage from Indexing in the Cloud
Found in: Cloud Computing, IEEE International Conference on
By Anna Squicciarini, Smitha Sundareswaran, Dan Lin
Issue Date:July 2010
pp. 188-195
Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. While cloud computing is expanding rapidly and used by many individuals and organizations internationally, data protection issues in the cloud h...
 
Statistics & Clustering Based Framework for Efficient XACML Policy Evaluation
Found in: Policies for Distributed Systems and Networks, IEEE International Workshop on
By Said Marouf, Mohamed Shehab, Anna Squicciarini, Smitha Sundareswaran
Issue Date:July 2009
pp. 118-125
The adoption of XACML as the standard for specifying access control policies for various applications, especially web services is vastly increasing. A policy evaluation engine can easily become a bottleneck when enforcing large policies. In this paper we p...
 
The Design and Evaluation of Accountable Grid Computing System
Found in: Distributed Computing Systems, International Conference on
By Wonjun Lee, Anna Squicciarini, Elisa Bertino
Issue Date:June 2009
pp. 145-154
Accountability is an important aspect of any computer system. It assures that every action executed in the system can be traced back to some entity. Accountability is even more crucial for assuring the safety and security in grid systems, given the very la...
 
Automatic Compliance of Privacy Policies in Federated Digital Identity Management
Found in: Policies for Distributed Systems and Networks, IEEE International Workshop on
By Anna Squicciarini, Marco Casassa Mont, Abhilasha Bhargav-Spantzel, Elisa Bertino
Issue Date:June 2008
pp. 89-92
Privacy in the digital world is an important problem which is becoming even more pressing as new collaborative applications are developed. The lack of privacy preserving mechanisms is particularly problematic in federated identity management contexts. In s...
 
Trust establishment in the formation of Virtual Organizations
Found in: Data Engineering Workshops, 22nd International Conference on
By Anna Squicciarini, Federica Paci, Elisa Bertino
Issue Date:April 2008
pp. 454-461
Virtual Organizations (VO) represent a new collaboration paradigm in which the participating entities pool resources, services, and information to achieve a common goal. VOs are often created on demand and dynamically evolve over time. One organization ide...
 
Trust Negotiations: Concepts, Systems, and Languages
Found in: Computing in Science and Engineering
By Elisa Bertino, Elena Ferrari, Anna Squicciarini
Issue Date:July 2004
pp. 27-34
Trust negotiation is a promising approach for establishing trust in open systems like the Internet, where sensitive interactions may often occur among entities with no prior knowledge of each other. In this article, the authors present a model for trust ne...
 
A Framework for Contractual Resource Sharing in Coalitions
Found in: Policies for Distributed Systems and Networks, IEEE International Workshop on
By Babak Sadighi Firozabadi, Marek Sergot, Anna Squicciarini, Elisa Bertino
Issue Date:June 2004
pp. 117
We develop a framework for specifying and reasoning about policies for sharing resources in coalitions, focussing here on a particular, common type of contract in which coalition members agree to make available some total amount of specified resource over ...
 
Vulnerabilities leading to denial of services attacks in grid computing systems: a survey
Found in: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '10)
By Anna Squicciarini, Elisa Bertino, Wonjun Lee
Issue Date:April 2010
pp. 1-3
Grid is designed with no security in mind at first. The complexity and scalability of grid architecture make easy for intruders to attack the system in several ways. In this paper, we discuss several possible or known vulnerabilities existing in each layer...
     
PriMa: an effective privacy protection mechanism for social networks
Found in: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10)
By Anna Squicciarini, Federica Paci, Smitha Sundareswaran
Issue Date:April 2010
pp. 320-323
In this paper, we propose PriMa (<u>Pri</u>vacy <u>Ma</u>nager), a privacy protection mechanism which supports semi-automated generation of access rules for users' profile information. PriMa access rules are tailored by the users' p...
     
Biometrics-based identifiers for digital identity management
Found in: Proceedings of the 9th Symposium on Identity and Trust on the Internet (IDTRUST '10)
By Abhilasha Bhargav-Spantzel, Anna Squicciarini, Elisa Bertino, Weike Zhang, Xiangwei Kong
Issue Date:April 2010
pp. 84-96
We present algorithms to reliably generate biometric identifiers from a user's biometric image which in turn is used for identity verification possibly in conjunction with cryptographic keys. The biometric identifier generation algorithms employ image hash...
     
Minimal credential disclosure in trust negotiations
Found in: Proceedings of the 4th ACM workshop on Digital identity management (DIM '08)
By Anna Squicciarini, David Bauer, Douglas M. Blough, Elisa Bertino, Federica Paci
Issue Date:October 2008
pp. 53-62
The secure release of identity attributes is a key enabler for electronic business interactions. Integrity and confidentiality of identity attributes are two key requirements in such context. Users should also have the maximum control possible over the rel...
     
Privacy preserving multi-factor authentication with biometrics
Found in: Proceedings of the second ACM workshop on Digital identity management (DIM '06)
By Abhilasham Bhargav-Spantzel, Anna Squicciarini, Elisa Bertino
Issue Date:November 2006
pp. 63-72
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several challenges, related to privacy, reliability, security of the biometric data....
     
 1