Search For:

Displaying 1-30 out of 30 total
Enforcing Trust Preferences in Mobile Person-to-Person Payments
Found in: 2013 International Conference on Social Computing (SocialCom)
By Barbara Carminati,Elena Ferrari,Ngoc Hong Tran
Issue Date:September 2013
pp. 429-434
The technological advancements in Internet speeds, increased computing power and smart phones have pushed the rise of new digital methods supporting mobile person-to-person (P2P) payments. Despite the growing interest in these new methods, we believe that,...
 
Policy-Compliant Search Query Routing for Web Service Discovery in Peer to Peer Networks
Found in: 2013 IEEE International Conference on Web Services (ICWS)
By Sushama Karumanchi,Anna Cinzia Squicciarini,Barbara Carminati
Issue Date:June 2013
pp. 387-394
Web services are increasingly hosted on peer to peer networks, to facilitate resource sharing and cooperation. In these settings, each peer hosts a set of services which can be invoked by other peers of the network through a service query. In a pure peer t...
 
A System for Timely and Controlled Information Sharing in Emergency Situations
Found in: IEEE Transactions on Dependable and Secure Computing
By Barbara Carminati,Elena Ferrari,Michele Guglielmi
Issue Date:May 2013
pp. 129-142
During natural disasters or emergency situations, an essential requirement for an effective emergency management is the information sharing. In this paper, we present an access control model to enforce controlled information sharing in emergency situations...
 
SHARE: Secure information sharing framework for emergency management
Found in: 2013 IEEE International Conference on Data Engineering (ICDE 2013)
By Barbara Carminati,Elena Ferrari,Michele Guglielmi
Issue Date:April 2013
pp. 1336-1339
9/11, Katrina, Fukushima and other recent emergencies demonstrate the need for effective information sharing across government agencies as well as non-governmental and private organizations to assess emergency situations, and generate proper response plans...
 
A System to Filter Unwanted Messages from OSN User Walls
Found in: IEEE Transactions on Knowledge and Data Engineering
By Marco Vanetti,Elisabetta Binaghi,Elena Ferrari,Barbara Carminati,Moreno Carullo
Issue Date:February 2013
pp. 285-297
One fundamental issue in today's Online Social Networks (OSNs) is to give users the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. Up to now, OSNs provide little support to this requirement. T...
 
Risks of Friendships on Social Networks
Found in: 2012 IEEE 12th International Conference on Data Mining (ICDM)
By Cuneyt Gurcan Akcora,Barbara Carminati,Elena Ferrari
Issue Date:December 2012
pp. 810-815
In this paper, we explore the risks of friends in social networks caused by their friendship patterns, by using real life social network data and starting from a previously defined risk model. Particularly, we observe that risks of friendships can be mined...
 
Privacy in Social Networks: How Risky is Your Social Graph?
Found in: Data Engineering, International Conference on
By Cuneyt Akcora,Barbara Carminati,Elena Ferrari
Issue Date:April 2012
pp. 9-19
Several efforts have been made for more privacy aware Online Social Networks (OSNs) to protect personal data against various privacy threats. However, despite the relevance of these proposals, we believe there is still the lack of a conceptual model on top...
 
Trust and Share: Trusted Information Sharing in Online Social Networks
Found in: Data Engineering, International Conference on
By Barbara Carminati,Elena Ferrari,Jacopo Girardi
Issue Date:April 2012
pp. 1281-1284
Trust & Share (T&S) aims at providing relationship-based access control in the Facebook realm. T&S is a third-party Facebook application, designed to support a flexible and controlled sharing of user data. It makes users able to upload resource...
 
P3D - Privacy-Preserving Path Discovery in Decentralized Online Social Networks
Found in: Computer Software and Applications Conference, Annual International
By Mingqiang Xue,Barbara Carminati,Elena Ferrari
Issue Date:July 2011
pp. 48-57
One of the key service of social networks is path discovery, in that release of a resource or delivering of a service is usually constrained by the existence of a path with given characteristics in the social network graph. One fundamental issue is that pa...
 
A Privacy-Preserving Approach for Web Service Selection and Provisioning
Found in: Web Services, IEEE International Conference on
By Anna Squicciarini,Barbara Carminati,Sushama Karumanchi
Issue Date:July 2011
pp. 33-40
The growing success of WS-related technologies has resulted in a large number of providers, which implement services of varying degree of sophistication and complexity. While on the one hand the availability of a wide array of services has created a compet...
 
Computing Reputation for Collaborative Private Networks
Found in: Computer Software and Applications Conference, Annual International
By Jordi Nin, Barbara Carminati, Elena Ferrari, Vicenç Torra
Issue Date:July 2009
pp. 246-253
The use of collaborative network services is increasing, therefore, the protection of the resources and relations shared by network participants is becoming crucial. One of the main issues in such networks is the evaluation of participant reputation, since...
 
ACStream: Enforcing Access Control over Data Streams
Found in: Data Engineering, International Conference on
By Jianneng Cao, Barbara Carminati, Elena Ferrari, Kian-Lee Tan
Issue Date:April 2009
pp. 1495-1498
In this demo proposal, we illustrate ACStream, a system built on top of Stream Base [1], to specify and enforce access control policies over data streams. ACStream supports a very flexible role-based access control model specifically designed to protect ag...
 
Message from the SSW'08 organizers
Found in: Data Engineering Workshops, 22nd International Conference on
By Bhavani Thuraisingham, Barbara Carminati
Issue Date:April 2008
pp. 445
No summary available.
   
CASTLE: A delay-constrained scheme for k<inf>s</inf>-anonymizing data streams
Found in: Data Engineering, International Conference on
By Jianneng Cao, Barbara Carminati, Elena Ferrari, Kian Lee Tan
Issue Date:April 2008
pp. 1376-1378
Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are continuous, transient and usually unbounded. Moreover, in streaming applications, th...
 
Towards Secure Execution Orders for CompositeWeb Services
Found in: Web Services, IEEE International Conference on
By Joachim Biskup, Barbara Carminati, Elena Ferrari, Frank Muller, Sandra Wortmann
Issue Date:July 2007
pp. 489-496
Recently, there has been a growing interest in web service composition and the related security issues. In this paper, we propose a framework for the decentralized execution of composite web services capable to ensure the correctness as well as the securit...
 
Security Conscious Web Service Composition with Semantic Web Support
Found in: Data Engineering Workshops, 22nd International Conference on
By Barbara Carminati, Elena Ferrari, Ryan Bishop, Patrick C. K. Hung
Issue Date:April 2007
pp. 695-704
A Web service is a software system designed to support interoperable application-to-application interactions over the Internet. Recently, there has been a growing interest in Web service composition, and some languages (e.g., WSBPEL and BPML) for modeling ...
 
Private Relationships in Social Networks
Found in: Data Engineering Workshops, 22nd International Conference on
By Barbara Carminati, Elena Ferrari, Andrea Perego
Issue Date:April 2007
pp. 163-171
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be either public or accessible only by him/herself (or, at most, by users with whom ...
 
Security Conscious Web Service Composition
Found in: Web Services, IEEE International Conference on
By Barbara Carminati, Elena Ferrari, Patrick C. K. Hung
Issue Date:September 2006
pp. 489-496
A Web service is a software system designed to support interoperable application-to-application interactions over the Internet. Web services are based on a set of XML standards, such as Web Services Description Language (WSDL), Simple Object Access Protoco...
 
Exploring Privacy Issues in Web Services Discovery Agencies
Found in: IEEE Security and Privacy
By Barbara Carminati, Elena Ferrari, Patrick C.K. Hung
Issue Date:September 2005
pp. 14-21
The increasing discussions concerning Web services privacy often neglect a key building block of the Web services architecture: discovery agencies. This overview of discovery agency privacy issues highlights the various challenges and proposes different te...
 
Selective and Authentic Third-Party Distribution of XML Documents
Found in: IEEE Transactions on Knowledge and Data Engineering
By Elisa Bertino, Barbara Carminati, Elena Ferrari, Bhavani Thuraisingham, Amar Gupta
Issue Date:October 2004
pp. 1263-1278
Third-party architectures for data publishing over the Internet today are receiving growing attention, due to their scalability properties and to the ability of efficiently managing large number of subjects and great amount of data. In a third-party archit...
 
Using RDF for Policy Specification and Enforcement
Found in: Database and Expert Systems Applications, International Workshop on
By Barbara Carminati, Elena Ferrari, Bhavani Thuraisingham
Issue Date:September 2004
pp. 163-167
Security issues for the Resource Description Framework (RDF) [RDF] are today crucial due to the key role played by RDF for the semantic web [LEE01]. However, despite its importance, RDF security is still a novel area and very little work has been done so f...
 
Towards Standardized Web Services Privacy Technologies
Found in: Web Services, IEEE International Conference on
By Patrick C. K. Hung, Elena Ferrari, Barbara Carminati
Issue Date:June 2004
pp. 174
A Web service is defined as an autonomous unit of application logic that provides either some business functionality or information to other applications through an Internet connection. Web services are based on a set of XML standards such as Universal Des...
 
Controlled information sharing for unspecified emergencies
Found in: 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)
By Barbara Carminati,Elena Ferrari,Michele Guglielmi
Issue Date:October 2013
pp. 1-8
During emergency situations a key requirement is information sharing. If emergencies are known a-priori, it is possible to specify them using emergency policies, modeling the extra sharing needs usually arising during emergencies. However, there are many s...
   
Guest Editorial SACMAT 2009 and 2010
Found in: ACM Transactions on Information and System Security (TISSEC)
By Barbara Carminati, James Joshi
Issue Date:November 2011
pp. 1-2
As wireless devices and sensors are increasingly deployed on people, researchers have begun to focus on wireless body-area networks. Applications of wireless body sensor networks include healthcare, entertainment, and personal assistance, in which sensors ...
     
A framework to enforce access control over data streams
Found in: ACM Transactions on Information and System Security (TISSEC)
By Barbara Carminati, Elena Ferrari, Elena Ferrari, Jianneng Cao, Jianneng Cao, Kian Lee Tan, Kian Lee Tan
Issue Date:July 2010
pp. 1-31
Although access control is currently a key component of any computational system, it is only recently that mechanisms to guard against unauthorized access to streaming data have started to be investigated. To cope with this lack, in this article, we propos...
     
Enforcing access control in Web-based social networks
Found in: ACM Transactions on Information and System Security (TISSEC)
By Andrea Perego, Barbara Carminati, Elena Ferrari
Issue Date:October 2009
pp. 1-38
In this article, we propose an access control mechanism for Web-based social networks, which adopts a rule-based approach for specifying access policies on the resources owned by network participants, and where authorized users are denoted in terms of the ...
     
A semantic web based framework for social network access control
Found in: Proceedings of the 14th ACM symposium on Access control models and technologies (SACMAT '09)
By Barbara Carminati, Bhavani Thuraisingham, Elena Ferrari, Murat Kantarcioglu, Raymond Heatherly
Issue Date:June 2009
pp. 1-22
The existence of on-line social networks that include person specific information creates interesting opportunities for various applications ranging from marketing to community organization. On the other hand, security and privacy concerns need to be addre...
     
Enforcing access control over data streams
Found in: Proceedings of the 12th ACM symposium on Access control models and technologies (SACMAT '07)
By Barbara Carminati, Elena Ferrari, Kian Lee Tan
Issue Date:June 2007
pp. 21-30
Access control is an important component of any computational system. However, it is only recently that mechanisms to guard against unauthorized access for streaming data have been proposed. In this paper, we study how to enforce the role-based access cont...
     
AC-XML documents: improving the performance of a web access control module
Found in: Proceedings of the tenth ACM symposium on Access control models and technologies (SACMAT '05)
By Barbara Carminati, Elena Ferrari
Issue Date:June 2005
pp. 67-76
Protecting information over the Web is today becoming a primary need. Although many access control models have been so far proposed to address the specific protection requirements of the web environment, no comparable amount of work has been done for findi...
     
A temporal key management scheme for secure broadcasting of XML documents
Found in: Proceedings of the 9th ACM conference on Computer and communications security (CCS '02)
By Barbara Carminati, Elena Ferrari, Elisa Bertino
Issue Date:November 2002
pp. 31-40
Secure broadcasting of web documents is becoming a crucial need for many web-based applications. Under the broadcast document dissemination strategy a web document source periodically broad-casts (portions of) its documents to a possibly large community of...
     
 1