If you made any changes in Pure these will be visible here soon.

Research Output 2003 2020

2020

A latitudinal study on the use of sequential and concurrency patterns in deviance mining

Genga, L., Potena, D., Chiorrini, A., Diamantini, C. & Zannone, N., 1 Jan 2020, Studies in Computational Intelligence. Appice, A., Ceci, M., Loglisci, C., Manco, G., Masciari, E. & Ras, Z. (eds.). Cham: Springer, p. 103-119 17 p. (Studies in Computational Intelligence; vol. 880).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Feature extraction
Experiments

An authorization framework for cooperative intelligent transport systems

Ravidas, S., Karkhanis, P., Dajsuren, Y. & Zannone, N., 1 Jan 2020, Emerging Technologies for Authorization and Authentication - 2nd International Workshop, ETAA 2019, Proceedings. Saracino, A. & Mori, P. (eds.). Cham: Springer, p. 16-34 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11967 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Authorization
Communication
Use Case
Framework
Leverage
2019
2 Citations (Scopus)

Access control in Internet-of-Things: a survey

Ravidas, S., Lekidis, A., Paci, F. & Zannone, N., 15 Oct 2019, In : Journal of Network and Computer Applications. 144, p. 79-101 23 p.

Research output: Contribution to journalArticleAcademicpeer-review

Access control
Internet of things
Ecosystems
Industry
7 Downloads (Pure)

A framework for the extended evaluation of ABAC policies

Morisset, C., Willemse, T. A. C. & Zannone, N., 2019, In : Cybersecurity. 2, 1, 21 p., 6.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Access control
Binary decision diagrams
Data structures
2 Downloads (Pure)

Discovering reliable evidence of data misuse by exploiting rule redundancy

Genga, L., Zannone, N. & Squicciarini, A., 1 Nov 2019, In : Computers and Security. 87, 17 p., 101577.

Research output: Contribution to journalArticleAcademicpeer-review

Association rules
redundancy
Transparency
Redundancy
Decision making

Hierarchical clustering for discrimination discovery: a top-down approach

Nasiriani, N., Squicciarini, A., Saldanha, Z., Goel, S. & Zannone, N., 1 Jun 2019, Proceedings - IEEE 2nd International Conference on Artificial Intelligence and Knowledge Engineering, AIKE 2019. Piscataway: Institute of Electrical and Electronics Engineers, p. 187-194 8 p. 8791737

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Decision making
Learning systems
Labels
Discrimination
Hierarchical clustering
6 Downloads (Pure)

Mining local process models and their correlations

Genga, L., Tax, N. & Zannone, N., 1 Jan 2019, Data-Driven Process Discovery and Analysis - 7th IFIP WG 2.6 International Symposium, SIMPDA 2017, Revised Selected Papers. van Keulen, M., Ceravolo, P. & Stoffel, K. (eds.). Cham: Springer, p. 65-88 24 p. (Lecture Notes in Business Information Processing; vol. 340).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Process Model
Mining
Process model
Demonstrate
Output
3 Downloads (Pure)

Predicting critical behaviors in business process executions: when evidence counts

Genga, L., Di Francescomarino, C., Ghidini, C. & Zannone, N., 17 Jul 2019, Business Process Management Forum - BPM Forum 2019, Proceedings: BPM Forum 2019, Vienna, Austria, September 1–6, 2019, Proceedings. Hildebrandt, T., van Dongen, B. F., RöglingeR, M. & Mendling, J. (eds.). Cham: Springer, p. 72-90 19 p. (Lecture Notes in Business Information Processing; vol. 360).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Process monitoring
Monitoring
Industry

Privacy-preserving multi-party access control

Sheikhalishahi, M., Tillem, G., Erkin, Z. & Zannone, N., 11 Nov 2019, WPES 2019 - Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society. New York: Association for Computing Machinery, Inc, p. 1-13 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Function evaluation
Cryptography
Decision making
Communication
1 Citation (Scopus)
Association rules
Regression analysis
Data mining
1 Citation (Scopus)

Unveiling systematic biases in decisional processes: an application to discrimination discovery

Genga, L., Allodi, L. & Zannone, N., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. New York: Association for Computing Machinery, Inc, p. 67-72 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Association rules
Regression analysis
Data mining

Using provenance for secure data fusion in cooperative systems

Bertolissi, C., den Hartog, J. & Zannone, N., 28 May 2019, SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. New York: Association for Computing Machinery, Inc, p. 185-194 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Data fusion
Access control
2018
5 Citations (Scopus)
1 Downloads (Pure)

A lazy approach to access control as a service (ACaaS) for IoT: An AWS case study

Ahmad, T., Morelli, U., Ranise, S. & Zannone, N., 7 Jun 2018, SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Inc, p. 235-246 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Web services
Industry
Specifications
Internet of things
4 Citations (Scopus)

Behavior analysis in the medical sector: theory and practice

Alizadeh, M., Peters, S., Etalle, S. & Zannone, N., 9 Apr 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018. New York: Association for Computing Machinery, Inc, p. 1637-1646 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Glass
4 Citations (Scopus)
31 Downloads (Pure)

Discovering anomalous frequent patterns from partially ordered event logs

Genga, L., Alizadeh, M., Potena, D., Diamantini, C. & Zannone, N., 1 Oct 2018, In : Journal of Intelligent Information Systems. 51, 2, p. 257–300 44 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Flow control
4 Citations (Scopus)

Economic incentives on DNSSEC deployment: time to move from quantity to quality

Le, T., Van Rijswijk-Deij, R., Allodi, L. & Zannone, N., 6 Jul 2018, IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018. Brussels: Institute of Electrical and Electronics Engineers, p. 1-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Incentives
Economics
Operator
Recommendations
Discount
3 Citations (Scopus)

Efficient extended ABAC evaluation

Morisset, C., Willemse, T. A. C. & Zannone, N., 7 Jun 2018, SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Inc, p. 149-160 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Binary decision diagrams
Specifications
1 Citation (Scopus)
5 Downloads (Pure)

Feature selection for anomaly detection in vehicular ad hoc networks

Le, V. H., den Hartog, J. & Zannone, N., 1 Jan 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. de Leon, A. S. S., Novais, P., Battiato, S., Sarigiannidis, P., Obaidat, M. S., Obaidat, M. S., Callegari, C., van Sinderen, M. & Lorenz, P. (eds.). Setúbal: SCITEPRESS-Science and Technology Publications, Lda., p. 481-491 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Vehicular ad hoc networks
Feature extraction
Information use
Communication
Accidents
2 Citations (Scopus)

From security-by-design to the identification of security-critical deviations in process executions

Salnitri, M., Alizadeh, M., Giovanella, D., Zannone, N. & Giorgini, P., 1 Jan 2018, Information Systems in the Big Data Era - CAiSE Forum 2018, Proceedings. Springer, p. 218-234 17 p. (Lecture Notes in Business Information Processing; vol. 317).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Deviation
Paradigm
Process Management
Security Policy
System Development
12 Citations (Scopus)

Linking data and process perspectives for conformance analysis

Alizadeh, M., Lu, X., Fahland, D., Zannone, N. & van der Aalst, W. M. P., Mar 2018, In : Computers and Security. 73, p. 172-193

Research output: Contribution to journalArticleAcademicpeer-review

Flow control
auditing
Industry
incident
Experiments
2 Citations (Scopus)

Multi-party access control: Requirements, state of the art and open challenges

Squicciarini, A. C., Rajtmajer, S. M. & Zannone, N., 7 Jun 2018, SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Inc, 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Data privacy
Data mining
14 Citations (Scopus)

Security and privacy for innovative automotive applications: a survey

Le, V. H., den Hartog, J. & Zannone, N., Nov 2018, In : Computer Communications. 132, p. 17-41 25 p.

Research output: Contribution to journalReview articleAcademicpeer-review

13 Citations (Scopus)

Survey on access control for community-centered collaborative systems

Paci, F., Squicciarini, A. & Zannone, N., 1 Jan 2018, In : ACM Computing Surveys. 51, 1, 38 p., 6.

Research output: Contribution to journalReview articleAcademicpeer-review

Collaborative Systems
Access Control
Access control
Resources
Information Sharing

Towards adaptive access control

Argento, L., Margheri, A., Paci, F., Sassone, V. & Zannone, N., 1 Jan 2018, Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Proceedings. Paraboschi, S. & Kerschbaum, F. (eds.). Cham: Springer, p. 99-109 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10980 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access Control
Access control
Adaptive Control
Behavioral Approach
Learning systems
2 Citations (Scopus)
10 Downloads (Pure)

Towards a systematic process-aware behavioral analysis for security

Genga, L. & Zannone, N., 1 Jan 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. de Leon, A. S. S., Novais, P., Battiato, S., Sarigiannidis, P., Obaidat, M. S., Obaidat, M. S., Callegari, C., van Sinderen, M. & Lorenz, P. (eds.). Setúbal: SCITEPRESS-Science and Technology Publications, Lda., p. 460-469 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Mathematical models
Engines
2017
1 Citation (Scopus)
44 Downloads (Pure)

APD tool: Mining anomalous patterns from event logs

Genga, L., Alizadeh, M., Potena, D., Diamantini, C. & Zannone, N., 2017, Proceedings of the BPM Demo Track and BPM Dissertation Award. Clarisó, R., Leopold, H., Mendling, J., van der Aalst, W., Kumar, A., Pentland, B. & Weske, M. (eds.). Sun SITE Central Europe, 5 p. (CEUR workshop proceedings; vol. 1920).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Monitoring
Industry
14 Citations (Scopus)
2 Downloads (Pure)

Formal analysis of XACML policies using SMT

Turkmen, F., den Hartog, J., Ranise, S. & Zannone, N., 1 May 2017, In : Computers and Security. 66, p. 185-203 19 p.

Research output: Contribution to journalArticleAcademicpeer-review

Access control
Markup languages
Query languages
XML
Specifications
7 Citations (Scopus)
44 Downloads (Pure)

On the use of hierarchical subtrace mining for efficient local process model mining

Tax, N., Genga, L. & Zannone, N., 6 Dec 2017, Proceedings of the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017). Ceravolo, P., van Keulen, M. & Stoffel, K. (eds.). CEUR-WS.org, p. 8-22 2. (CEUR-ws.org; vol. 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
4 Citations (Scopus)
1 Downloads (Pure)

Subgraph mining for anomalous pattern discovery in event logs

Genga, L., Potena, D., Martino, O., Alizadeh, M., Diamantini, C. & Zannone, N., 2017, New Frontiers in Mining Complex Patterns - 5th International Workshop, NFMCP 2016 Held in Conjunction with ECML-PKDD 2016, Revised Selected Papers. Springer, p. 181-197 17 p. (Lecture Notes in Computer Science; vol. 10312).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Pattern Discovery
Anomalous
Subgraph
Mining
Deviation
2016
10 Citations (Scopus)

A hybrid framework for data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., Den Hartog, J. & Zannone, N., 1 Aug 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, 23-25 May 2016, San Jose, California. Piscataway: Institute of Electrical and Electronics Engineers, p. 324-333 10 p. 7527785

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Loss prevention
Engines
Feedback
2 Citations (Scopus)

An authorization service for collaborative situation awareness

Egner, A. I., Luu, D. M., den Hartog, J. & Zannone, N., 9 Mar 2016, CODASPY '16 Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 136-138 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)
1 Downloads (Pure)

A policy framework for data fusion and derived data control

den Hartog, J. & Zannone, N., 11 Mar 2016, ABAC '16 Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. New York: Association for Computing Machinery, Inc, p. 47-57 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Data fusion
Electric fuses
Access control
Processing
2 Citations (Scopus)

A severity-based quantification of data leakages in database systems

Vavilis, S., Petkovic, M. & Zannone, N., 1 Jun 2016, In : Journal of Computer Security. 24, 3, p. 321-345 25 p.

Research output: Contribution to journalArticleAcademicpeer-review

Data structures
Leakage (fluid)
Specifications
2 Citations (Scopus)
1 Downloads (Pure)

Collaborative access decisions: why has my decision not been enforced?

den Hartog, J. I. & Zannone, N., 2016, Information Systems Security: 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings. Ray, I., Singh Gaur, M., Conti, M., Sanghi, D. & Kamakoti, V. (eds.). Dordrecht: Springer, p. 109-130 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10063 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Specifications
Feedback
Collaborative Systems
Justification
Social Networks

Combining data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., den Hartog, J. I. & Zannone, N., 2016.

Research output: Contribution to conferencePoster

6 Citations (Scopus)
1 Downloads (Pure)

Constructing probable explanations of nonconformity: a data-aware and history-based approach

Alizadeh, M., de Leoni, M. & Zannone, N., 7 Jan 2016, Proceedings - 2015 IEEE Symposium Series on Computational Intelligence, SSCI 2015. Piscataway: Institute of Electrical and Electronics Engineers, p. 1358-1365 8 p. 7376770

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cost functions
Defects
Costs
Industry
5 Citations (Scopus)
2 Downloads (Pure)

Data governance and transparency for collaborative systems

Mahmudlu, R., den Hartog, J. & Zannone, N., 2016, Data and Applications Security and Privacy. Springer, p. 199-216 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Collaborative Systems
Governance
Transparency
Requirements
Access Control
8 Citations (Scopus)
77 Downloads (Pure)

Flow-based reputation with uncertainty: evidence-based subjective logic

Skoric, B., Hoogh, de, S. J. A. & Zannone, N., Aug 2016, In : International Journal of Information Security. 15, 4, p. 381-402 22 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Algebra
Uncertainty
Statistical Models
5 Citations (Scopus)
3 Downloads (Pure)

Risk-based analysis of business process executions

Alizadeh, M. & Zannone, N., 9 Mar 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. New York: Association for Computing Machinery, Inc, p. 130-132 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Industry
2 Citations (Scopus)

Role mining with missing values

Vavilis, S., Egner, A. I., Petkovic, M. & Zannone, N., 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES), 31 August - 2 September 2016, Salzburg, Austria. Piscataway: Institute of Electrical and Electronics Engineers, p. 167-176

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

81 Downloads (Pure)

Subgraph mining for anomalous pattern discovery in event logs

Genga, L., Potena, D., Martino, O., Alizadeh, M., Diamantini, C. & Zannone, N., 2016, International Workshop on New Frontiers in Mining Complex Patterns.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Specifications
Experiments
2015
1 Citation (Scopus)
71 Downloads (Pure)

Access control with non-deterministic and probabilistic attribute retrieval

Crampton, J., Morisset, C. & Zannone, N., 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust (2015, London, UK, April 18, 2015; affiliated with ETAPS 2015). p. 1-19

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Access control
Specifications
26 Citations (Scopus)
3 Downloads (Pure)

Analysis of XACML policies with SMT

Turkmen, F., den Hartog, J. I., Ranise, S. & Zannone, N., 2015, Principles of Security and Trust (4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, 11-18 April, 2015. Proceedings). Focardi, R. & Myters, A. (eds.). Dordrecht: Springer, p. 115-134 (Lecture Notes in Computer Science; vol. 9036).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Surface mount technology
Access control
XML
Markup languages
Specifications
7 Citations (Scopus)
5 Downloads (Pure)

An anomaly analysis framework for database systems

Vavilis, S., Egner, A. I., Petkovic, M. & Zannone, N., 2015, In : Computers and Security. 53, p. 156-173 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

incident
ranking
Risk assessment
Visualization
Monitoring
50 Downloads (Pure)

Auditing with incomplete logs

Mian, U. S., Hartog, den, J. I., Etalle, S. & Zannone, N., 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust (2015, London, UK, April 18, 2015; affiliated with ETAPS 2015). p. 1-23

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Compliance
Industry
3 Citations (Scopus)

Conviviality-driven access control policy

El Kateb, D., Zannone, N., Moawad, A., Caire, P., Nain, G., Mouelhi, T. & Le Traon, Y., 22 Nov 2015, In : Requirements Engineering. 20, 4, p. 363-382 20 p.

Research output: Contribution to journalArticleAcademicpeer-review

Access control
Social sciences
Multi agent systems
36 Downloads (Pure)

Evidence-based discounting rule in subjective logic

Skoric, B., Hoogh, de, S. J. A. & Zannone, N., 2015, Proceedings of the 36th WIC Symposium on Information Theory in the Benelux (Brussels, Belgium, May 6-7, 2015). Roland, J. & Horlin, F. (eds.). Werkgemeenschap voor Informatie- en Communicatietheorie (WIC), p. 1-3

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
4 Citations (Scopus)

History-based construction of alignments for conformance checking: Formalization and implementation

Alizadeh, M., de Leoni, M. & Zannone, N., 2015, Data-driven process discovery and analysis. Ceravolo, P., Russo, B. & Accorsi, R. (eds.). Springer, Vol. 237. p. 58-78 21 p. (Lecture Notes in Business Information Processing; vol. 237).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Formalization
Alignment
Cost functions
Cost Function
Probable
13 Citations (Scopus)
3 Downloads (Pure)

On missing attributes in access control: non-deterministic and probabilistic attribute retrieval

Crampton, J., Morisset, C. & Zannone, N., 2015, 20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015, Vienna, Austria, June 1-3, 2015). New York: Association for Computing Machinery, Inc, p. 99-109

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Specifications
10 Citations (Scopus)
3 Downloads (Pure)

Pre-distribution of certificates for pseudonymous broadcast authentication in VANET

Feiri, M., Pielage, R. H. M., Petit, J., Zannone, N. & Kargl, F., 2015, IEEE 81st Vehicular Technology Conference (VTC2015-Spring, Glasgow, UK, May 11-14, 2015). Institute of Electrical and Electronics Engineers, p. 1-5

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Network management
Packet loss
Authentication
Topology
Communication