Search For:

Displaying 1-40 out of 40 total
ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS
Found in: Mobile Data Management, IEEE International Conference on
By Sergio Mascetti, Claudio Bettini, X. Sean Wang, Dario Freni, Sushil Jajodia
Issue Date:May 2009
pp. 172-181
One of the privacy threats recognized in the use of LBS is represented by an adversary having information about the presence of individuals in certain locations, and using this information together with an (anonymous) LBS request to re-identify the issuer ...
 
Privacy-Aware Proximity Based Services
Found in: Mobile Data Management, IEEE International Conference on
By Sergio Mascetti, Claudio Bettini, Dario Freni, X. Sean Wang, Sushil Jajodia
Issue Date:May 2009
pp. 31-40
Proximity based services are location based services (LBS) in which
 
Anonymity in Location-Based Services: Towards a General Framework
Found in: Mobile Data Management, IEEE International Conference on
By Claudio Bettini, Sergio Mascetti, X. Sean Wang, Sushil Jajodia
Issue Date:May 2007
pp. 69-76
No summary available.
 
A Practical Location Privacy Attack in Proximity Services
Found in: 2013 14th IEEE International Conference on Mobile Data Management (MDM)
By Sergio Mascetti,Letizia Bertolaja,Claudio Bettini
Issue Date:June 2013
pp. 87-96
The aim of proximity services is to raise alerts based on the distance between moving objects. While distance can be easily computed from the objects' geographical locations, privacy concerns in revealing these locations exist, especially when proximity am...
 
A Platform for Privacy-Preserving Geo-social Recommendation of Points of Interest
Found in: 2013 14th IEEE International Conference on Mobile Data Management (MDM)
By Daniele Riboni,Claudio Bettini
Issue Date:June 2013
pp. 347-349
Different recommender systems suggest points of interest (POIs) based on data shared through geo-social networks (GSN). These systems are a very useful resource for mobile users, and an important business opportunity for advertisers. However, GSN data (e.g...
 
Private context-aware recommendation of points of interest: An initial investigation
Found in: Pervasive Computing and Communications Workshops, IEEE International Conference on
By Daniele Riboni,Claudio Bettini
Issue Date:March 2012
pp. 584-589
Several context-aware mobile recommender systems have been recently proposed to suggest points of interest (POIs). Ideally, a user of these systems should not be allowed to know the preferred POIs of another user, since they reveal sensitive information li...
 
JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks
Found in: IEEE Transactions on Dependable and Secure Computing
By Daniele Riboni,Linda Pareschi,Claudio Bettini
Issue Date:May 2012
pp. 387-400
Web queries, credit card transactions, and medical records are examples of transaction data flowing in corporate data stores, and often revealing associations between individuals and sensitive information. The serial release of these data to partner instit...
 
Challenges for Mobile Data Management in the Era of Cloud and Social Computing
Found in: Mobile Data Management, IEEE International Conference on
By Chatschik Bisdikian,Bernhard Mitschang,Dino Pedreschi,Vincent S. Tseng,Claudio Bettini
Issue Date:June 2011
pp. 6
No summary available.
 
Integrating Identity, Location, and Absence Privacy in Context-Aware Retrieval of Points of Interest
Found in: Mobile Data Management, IEEE International Conference on
By Daniele Riboni,Linda Pareschi,Claudio Bettini
Issue Date:June 2011
pp. 135-140
The retrieval of close-by points of interest (POIs) is becoming a popular location-based service (LBS), often integrated with navigational services and geo-social networks. However, the access to POI services is prone to potentially serious privacy issues,...
 
Welcome from the technical program chairs
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Jadwiga Indulska, Claudio Bettini, Roy Campbell, Cecilia Mascolo
Issue Date:March 2011
pp. x
A warm welcome to the Ninth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2011). We are very excited to introduce you to the technical program of our conference that this year includes 27 papers representing high-qu...
   
Location-Related Privacy in Geo-Social Networks
Found in: IEEE Internet Computing
By Carmen Ruiz Vicente, Dario Freni, Claudio Bettini, Christian S. Jensen
Issue Date:May 2011
pp. 20-27
<p>Geo-social networks (GeoSNs) provide context-aware services that help associate location with users and content. The proliferation of GeoSNs indicates that they're rapidly attracting users. GeoSNs currently offer different types of services, inclu...
 
Pcube: A System to Evaluate and Test Privacy-Preserving Proximity Services
Found in: Mobile Data Management, IEEE International Conference on
By Dario Freni, Sergio Mascetti, Claudio Bettini, Marco Cozzi
Issue Date:May 2010
pp. 273-275
Proximity services are a particular class of location-based services (LBS) in which a subscriber is alerted when other participants (called buddies) are nearby. Existing works in the field of privacy preservation in LBS propose techniques specifically desi...
 
Preserving Anonymity of Recurrent Location-Based Queries
Found in: Temporal Representation and Reasoning, International Syposium on
By Daniele Riboni, Linda Pareschi, Claudio Bettini, Sushil Jajodia
Issue Date:July 2009
pp. 62-69
The anonymization of location based queries through the generalization of spatio-temporal information has been proposed as a privacy preserving technique. We show that the presence of multiple concurrent requests, the repetition of similar requests by the ...
 
Composition and Generalization of Context Data for Privacy Preservation
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Linda Pareschi, Daniele Riboni, Alessandra Agostini, Claudio Bettini
Issue Date:March 2008
pp. 429-433
This paper presents preliminary results on anonymization and obfuscation techniques to preserve users' privacy in context-aware service provisioning. The techniques are based on generalizing request parameters as well as the context data provided to the ap...
 
Protecting Users' Anonymity in Pervasive Computing Environments
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Linda Pareschi, Daniele Riboni, Claudio Bettini
Issue Date:March 2008
pp. 11-19
The large scale adoption of adaptive services in pervasive and mobile computing is likely to be conditioned to the availability of reliable privacy-preserving technologies. Unfortunately, the research in this field can still be considered in its infancy. T...
 
A Comparison of Spatial Generalization Algorithms for LBS Privacy Preservation
Found in: Mobile Data Management, IEEE International Conference on
By Sergio Mascetti, Claudio Bettini
Issue Date:May 2007
pp. 258-262
No summary available.
 
Context-aware Web Services for Distributed Retrieval of Points of Interest
Found in: Internet and Web Applications and Services, International Conference on
By Claudio Bettini, Daniele Riboni
Issue Date:May 2007
pp. 36
Due to the widespread availability of accurate localization technologies, navigation systems are more and more present on mobile devices. These applications usually provide facilities for managing and searching points of interest. However, currently availa...
 
Anonymity and Diversity in LBS: A Preliminary Investigation
Found in: Pervasive Computing and Communications Workshops, IEEE International Conference on
By Claudio Bettini, Sushil Jajodia, Linda Pareschi
Issue Date:March 2007
pp. 577-580
This paper presents a preliminary investigation on the notions of anonymity and diversity in the context of location based services, with the goal of identifying relevant parameters to be included in privacy preserving user preferences.
 
A Performance Evaluation of Ontology-Based Context Reasoning
Found in: Pervasive Computing and Communications Workshops, IEEE International Conference on
By Alessandra Agostini, Claudio Bettini, Daniele Riboni
Issue Date:March 2007
pp. 3-8
The CARE middleware aims at supporting context-aware adaptation of Internet services in a mobile computing environment. The CARE hybrid reasoning mechanism is based on a loose interaction between ontological reasoning and efficient reasoning in a restricte...
 
k-Anonymity in Databases with Timestamped Data
Found in: Temporal Representation and Reasoning, International Syposium on
By Sergio Mascetti, Claudio Bettini, X. Sean Wang, Sushil Jajodia
Issue Date:June 2006
pp. 177-186
In this paper we extend the notion of k-anonymity in the context of databases with timestamped information in order to naturally define k-anonymous views of temporal data. We also investigate the problem of obtaining these views. We show that known general...
 
Experience Report: Ontological Reasoning for Context-aware Internet Services
Found in: Pervasive Computing and Communications Workshops, IEEE International Conference on
By Alessandra Agostini, Claudio Bettini, Daniele Riboni
Issue Date:March 2006
pp. 8-12
This paper reports our experience with representing and reasoning with context information within the CARE middleware. CARE was developed to support context-aware service adaptation for mobile users. Expressiveness and computational issues are discussed an...
 
Loosely Coupling Ontological Reasoning with an Efficient Middleware for Context-awareness
Found in: Mobile and Ubiquitous Systems, Annual International Conference on
By Alessandra Agostini, Claudio Bettini, Daniele Riboni
Issue Date:July 2005
pp. 175-182
<p>Context-awareness in mobile and ubiquitous computing requires the acquisition, representation and processing of information which goes beyond the device features, network status, and user location, to include semantically rich data, like user inte...
 
An Efficient Algorithm for Minimizing Time Granularity Periodical Representations
Found in: Temporal Representation and Reasoning, International Syposium on
By Claudio Bettini, Sergio Mascetti
Issue Date:June 2005
pp. 20-25
This paper addresses the technical problem of efficiently reducing the periodic representation of a time granularity to its minimal form. The minimization algorithm presented in the paper has an immediate practical application: it allows users to intuitive...
 
A Distributed Architecture for Management and Retrieval of Extended Points of Interest
Found in: Distributed Computing Systems Workshops, International Conference on
By Claudio Bettini, Nicolò Cesa-Bianchi, Daniele Riboni
Issue Date:June 2005
pp. 266-272
This paper presents a distributed architecture for the management and retrieval of particular objects called POIsmarts. POIsmarts can be considered as the convergence between virtual points of interest (web bookmarks) and physical points of interest (gps b...
 
Mapping Calendar Expressions into Periodical Granularities
Found in: Temporal Representation and Reasoning, International Syposium on
By Claudio Bettini, Sergio Mascetti, X. Sean Wang
Issue Date:July 2004
pp. 96-102
An effort has been devoted in the recent years to study and formalize the concept of time granularity and to design applications and services using the formalization. Among other proposals, a calendar algebra has been defined to facilitate the specificatio...
 
Free Schedules for Free Agents in Workflow Systems
Found in: Temporal Representation and Reasoning, International Syposium on
By Claudio Bettini, X. Sean Wang, Sushil Jajodia
Issue Date:July 2000
pp. 31
This paper investigates workflow systems in which the enactment and completion of activities have to satisfy a set of quantitative temporal constraints. Autonomous agents usually perform different activities, and the scheduling of activities by the enactme...
 
Symbolic Representation of User-Defined Time Granularities
Found in: Temporal Representation and Reasoning, International Syposium on
By Claudio Bettini, Roberto de Sibi
Issue Date:May 1999
pp. 17
In the recent literature on time representation, an effort has been made to characterize the notion of time granularity and the relationships between granularities, in order to have a common framework for their specification, and to allow the interoperabil...
 
Discovering Frequent Event Patterns with Multiple Granularities in Time Sequences
Found in: IEEE Transactions on Knowledge and Data Engineering
By Claudio Bettini, X. Sean Wang, Sushil Jajodia, Jia-Ling Lin
Issue Date:March 1998
pp. 222-237
<p><b>Abstract</b>—An important usage of time sequences is to discover temporal patterns. The discovery process usually starts with a user-specified skeleton, called an <it>event structure</it>, which consists of a number of v...
 
Temporal Semantic Assumptions and Their Use in Databases
Found in: IEEE Transactions on Knowledge and Data Engineering
By Claudio Bettini, X. Sean Wang, Sushil Jajodia
Issue Date:March 1998
pp. 277-296
<p><b>Abstract</b>—Data explicitly stored in a temporal database are often associated with certain semantic assumptions. Each assumption can be viewed as a way of deriving implicit information from explicitly stored data. Rather than leav...
 
A Temporal Access Control Mechanism for Database Systems
Found in: IEEE Transactions on Knowledge and Data Engineering
By Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
Issue Date:February 1996
pp. 67-80
<p><b>Abstract</b>—This paper presents a discretionary access control model in which authorizations contain temporal intervals of validity. An authorization is automatically revoked when the associated temporal interval expires. The propo...
 
Differentially-private release of check-in data for venue recommendation
Found in: 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom)
By Daniele Riboni,Claudio Bettini
Issue Date:March 2014
pp. 190-198
Recommender systems suggesting venues offer very useful services to people on the move and a great business opportunity for advertisers. These systems suggest venues by matching the current context of the user with the venue features, and consider the popu...
   
Web services for time granularity reasoning
Found in: Temporal Representation and Reasoning, International Syposium on
By Claudio Bettini
Issue Date:July 2003
pp. 2
We first briefly illustrate the concept of time granularity and review the emerging approaches for modeling and reasoning with it. We then advocate the need for a set of web services that distributed applications can use to define and manipulate time granu...
 
Location privacy attacks based on distance and density information
Found in: Proceedings of the 20th International Conference on Advances in Geographic Information Systems (SIGSPATIAL '12)
By Claudio Bettini, Letizia Bertolaja, Sergio Mascetti
Issue Date:November 2012
pp. 514-517
Proximity services alert users about the presence of other users or moving objects based on their distance. Distance preserving transformations are among the techniques that may be used to avoid revealing the actual position of users while still effectivel...
     
Preserving location and absence privacy in geo-social networks
Found in: Proceedings of the 19th ACM international conference on Information and knowledge management (CIKM '10)
By Carmen Ruiz Vicente, Christian S. Jensen, Claudio Bettini, Dario Freni, Sergio Mascetti
Issue Date:October 2010
pp. 309-318
Online social networks often involve very large numbers of users who share very large volumes of content. This content is increasingly being tagged with geo-spatial and temporal coordinates that may then be used in services. For example, a service may retr...
     
Demo: ontology-based context-aware delivery of extended points of interest
Found in: Proceedings of the 6th international conference on Mobile data management (MEM '05)
By Alessandra Agostini, Claudio Bettini, Daniele Riboni
Issue Date:May 2005
pp. 322-323
Context-awareness in mobile and ubiquitous computing requires the acquisition, representation and processing of context information which is not limited to the device features, network status, or user location but includes semantically rich data like user ...
     
Testing complex temporal relationships involving multiple granularities and its application to data mining (extended abstract)
Found in: Proceedings of the fifteenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems (PODS '96)
By Claudio Bettini, Sushil Jajodia, X. Sean Wang
Issue Date:June 1996
pp. 68-78
The goal of the Garlic [1] project is to build a multimedia information system capable of integrating data that resides in different database systems as well as in a variety of non-database data servers. This integration must be enabled while maintaining t...
     
Semantic assumptions and query evaluation in temporal databases
Found in: Proceedings of the 1995 ACM SIGMOD international conference on Management of data (SIGMOD '95)
By Claudio Bettini, Elisa Bertino, Sushil Jajodia, X. Sean Wang
Issue Date:May 1995
pp. 219-230
When querying a temporal database, a user often makes certain semantic assumptions on stored temporal data. This paper formalizes and studies two types of semantic assumptions: point-based and interval-based. The point-based assumptions include those assum...
     
A temporal authorization model
Found in: Proceedings of the 2nd ACM Conference on Computer and communications security (CCS '94)
By Claudio Bettini, Elisa Bertino, Pierangela Samarati
Issue Date:November 1994
pp. 126-135
This paper presents a discretionary access control model in which authorizations contain temporal information. This information can be used to specify temporal intervals of validity for authorizations and temporal dependencies among authorizations. A forma...
     
An access control model supporting periodicity constraints and temporal reasoning
Found in: ACM Transactions on Database Systems (TODS)
By Claudio Bettini, Elena Ferrari, Elisa Bertino, Pierangela Samarati
Issue Date:March 1988
pp. 231-285
Access control models, such as the ones supported by commercial DBMSs, are not yet able to fully meet many application needs. An important requirement derives from the temporal dimension that permissions have in many real-world situations. Permissions are...
     
Logical design for temporal databases with multiple granularities
Found in: ACM Transactions on Database Systems (TODS)
By Alexander Brodsky, Claudio Bettini, Sushil Jajodia, X. Sean Wang
Issue Date:March 1988
pp. 115-170
The purpose of good database logical design is to eliminate data redundancy and isertion and deletion anomalies. In order to achieve this objective for temporal databases, the notions of temporal types, which formalize time granularities, and temporal func...
     
 1