If you made any changes in Pure these will be visible here soon.

Research Output 2003 2020

Filter
Conference contribution
2020

An authorization framework for cooperative intelligent transport systems

Ravidas, S., Karkhanis, P., Dajsuren, Y. & Zannone, N., 1 Jan 2020, Emerging Technologies for Authorization and Authentication - 2nd International Workshop, ETAA 2019, Proceedings. Saracino, A. & Mori, P. (eds.). Cham: Springer, p. 16-34 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11967 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Authorization
Communication
Use Case
Framework
Leverage
2019

Hierarchical clustering for discrimination discovery: a top-down approach

Nasiriani, N., Squicciarini, A., Saldanha, Z., Goel, S. & Zannone, N., 1 Jun 2019, Proceedings - IEEE 2nd International Conference on Artificial Intelligence and Knowledge Engineering, AIKE 2019. Piscataway: Institute of Electrical and Electronics Engineers, p. 187-194 8 p. 8791737

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Decision making
Learning systems
Labels
Discrimination
Hierarchical clustering
6 Downloads (Pure)

Mining local process models and their correlations

Genga, L., Tax, N. & Zannone, N., 1 Jan 2019, Data-Driven Process Discovery and Analysis - 7th IFIP WG 2.6 International Symposium, SIMPDA 2017, Revised Selected Papers. van Keulen, M., Ceravolo, P. & Stoffel, K. (eds.). Cham: Springer, p. 65-88 24 p. (Lecture Notes in Business Information Processing; vol. 340).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Process Model
Mining
Process model
Demonstrate
Output
3 Downloads (Pure)

Predicting critical behaviors in business process executions: when evidence counts

Genga, L., Di Francescomarino, C., Ghidini, C. & Zannone, N., 17 Jul 2019, Business Process Management Forum - BPM Forum 2019, Proceedings: BPM Forum 2019, Vienna, Austria, September 1–6, 2019, Proceedings. Hildebrandt, T., van Dongen, B. F., RöglingeR, M. & Mendling, J. (eds.). Cham: Springer, p. 72-90 19 p. (Lecture Notes in Business Information Processing; vol. 360).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Process monitoring
Monitoring
Industry

Privacy-preserving multi-party access control

Sheikhalishahi, M., Tillem, G., Erkin, Z. & Zannone, N., 11 Nov 2019, WPES 2019 - Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society. New York: Association for Computing Machinery, Inc, p. 1-13 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Function evaluation
Cryptography
Decision making
Communication
1 Citation (Scopus)

Unveiling systematic biases in decisional processes: an application to discrimination discovery

Genga, L., Allodi, L. & Zannone, N., 2 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. New York: Association for Computing Machinery, Inc, p. 67-72 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Association rules
Regression analysis
Data mining

Using provenance for secure data fusion in cooperative systems

Bertolissi, C., den Hartog, J. & Zannone, N., 28 May 2019, SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. New York: Association for Computing Machinery, Inc, p. 185-194 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Data fusion
Access control
2018
5 Citations (Scopus)
1 Downloads (Pure)

A lazy approach to access control as a service (ACaaS) for IoT: An AWS case study

Ahmad, T., Morelli, U., Ranise, S. & Zannone, N., 7 Jun 2018, SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Inc, p. 235-246 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Web services
Industry
Specifications
Internet of things
4 Citations (Scopus)

Behavior analysis in the medical sector: theory and practice

Alizadeh, M., Peters, S., Etalle, S. & Zannone, N., 9 Apr 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018. New York: Association for Computing Machinery, Inc, p. 1637-1646 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Glass
4 Citations (Scopus)

Economic incentives on DNSSEC deployment: time to move from quantity to quality

Le, T., Van Rijswijk-Deij, R., Allodi, L. & Zannone, N., 6 Jul 2018, IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS 2018. Brussels: Institute of Electrical and Electronics Engineers, p. 1-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Incentives
Economics
Operator
Recommendations
Discount
3 Citations (Scopus)

Efficient extended ABAC evaluation

Morisset, C., Willemse, T. A. C. & Zannone, N., 7 Jun 2018, SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Inc, p. 149-160 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Binary decision diagrams
Specifications
1 Citation (Scopus)
5 Downloads (Pure)

Feature selection for anomaly detection in vehicular ad hoc networks

Le, V. H., den Hartog, J. & Zannone, N., 1 Jan 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. de Leon, A. S. S., Novais, P., Battiato, S., Sarigiannidis, P., Obaidat, M. S., Obaidat, M. S., Callegari, C., van Sinderen, M. & Lorenz, P. (eds.). Setúbal: SCITEPRESS-Science and Technology Publications, Lda., p. 481-491 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Vehicular ad hoc networks
Feature extraction
Information use
Communication
Accidents
2 Citations (Scopus)

From security-by-design to the identification of security-critical deviations in process executions

Salnitri, M., Alizadeh, M., Giovanella, D., Zannone, N. & Giorgini, P., 1 Jan 2018, Information Systems in the Big Data Era - CAiSE Forum 2018, Proceedings. Springer, p. 218-234 17 p. (Lecture Notes in Business Information Processing; vol. 317).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Deviation
Paradigm
Process Management
Security Policy
System Development
2 Citations (Scopus)

Multi-party access control: Requirements, state of the art and open challenges

Squicciarini, A. C., Rajtmajer, S. M. & Zannone, N., 7 Jun 2018, SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Inc, 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Data privacy
Data mining

Towards adaptive access control

Argento, L., Margheri, A., Paci, F., Sassone, V. & Zannone, N., 1 Jan 2018, Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Proceedings. Paraboschi, S. & Kerschbaum, F. (eds.). Cham: Springer, p. 99-109 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10980 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access Control
Access control
Adaptive Control
Behavioral Approach
Learning systems
2 Citations (Scopus)
10 Downloads (Pure)

Towards a systematic process-aware behavioral analysis for security

Genga, L. & Zannone, N., 1 Jan 2018, Proceedings of the 15th International Joint Conference on e-Business and Telecommunications. de Leon, A. S. S., Novais, P., Battiato, S., Sarigiannidis, P., Obaidat, M. S., Obaidat, M. S., Callegari, C., van Sinderen, M. & Lorenz, P. (eds.). Setúbal: SCITEPRESS-Science and Technology Publications, Lda., p. 460-469 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Mathematical models
Engines
2017
1 Citation (Scopus)
44 Downloads (Pure)

APD tool: Mining anomalous patterns from event logs

Genga, L., Alizadeh, M., Potena, D., Diamantini, C. & Zannone, N., 2017, Proceedings of the BPM Demo Track and BPM Dissertation Award. Clarisó, R., Leopold, H., Mendling, J., van der Aalst, W., Kumar, A., Pentland, B. & Weske, M. (eds.). Sun SITE Central Europe, 5 p. (CEUR workshop proceedings; vol. 1920).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Monitoring
Industry
7 Citations (Scopus)
44 Downloads (Pure)

On the use of hierarchical subtrace mining for efficient local process model mining

Tax, N., Genga, L. & Zannone, N., 6 Dec 2017, Proceedings of the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017). Ceravolo, P., van Keulen, M. & Stoffel, K. (eds.). CEUR-WS.org, p. 8-22 2. (CEUR-ws.org; vol. 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
4 Citations (Scopus)
1 Downloads (Pure)

Subgraph mining for anomalous pattern discovery in event logs

Genga, L., Potena, D., Martino, O., Alizadeh, M., Diamantini, C. & Zannone, N., 2017, New Frontiers in Mining Complex Patterns - 5th International Workshop, NFMCP 2016 Held in Conjunction with ECML-PKDD 2016, Revised Selected Papers. Springer, p. 181-197 17 p. (Lecture Notes in Computer Science; vol. 10312).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Pattern Discovery
Anomalous
Subgraph
Mining
Deviation
2016
10 Citations (Scopus)

A hybrid framework for data loss prevention and detection

Costante, E., Fauri, D., Etalle, S., Den Hartog, J. & Zannone, N., 1 Aug 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016, 23-25 May 2016, San Jose, California. Piscataway: Institute of Electrical and Electronics Engineers, p. 324-333 10 p. 7527785

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Loss prevention
Engines
Feedback
2 Citations (Scopus)

An authorization service for collaborative situation awareness

Egner, A. I., Luu, D. M., den Hartog, J. & Zannone, N., 9 Mar 2016, CODASPY '16 Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 136-138 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

6 Citations (Scopus)
1 Downloads (Pure)

A policy framework for data fusion and derived data control

den Hartog, J. & Zannone, N., 11 Mar 2016, ABAC '16 Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. New York: Association for Computing Machinery, Inc, p. 47-57 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Data fusion
Electric fuses
Access control
Processing
2 Citations (Scopus)
1 Downloads (Pure)

Collaborative access decisions: why has my decision not been enforced?

den Hartog, J. I. & Zannone, N., 2016, Information Systems Security: 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings. Ray, I., Singh Gaur, M., Conti, M., Sanghi, D. & Kamakoti, V. (eds.). Dordrecht: Springer, p. 109-130 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10063 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Specifications
Feedback
Collaborative Systems
Justification
Social Networks
6 Citations (Scopus)
1 Downloads (Pure)

Constructing probable explanations of nonconformity: a data-aware and history-based approach

Alizadeh, M., de Leoni, M. & Zannone, N., 7 Jan 2016, Proceedings - 2015 IEEE Symposium Series on Computational Intelligence, SSCI 2015. Piscataway: Institute of Electrical and Electronics Engineers, p. 1358-1365 8 p. 7376770

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cost functions
Defects
Costs
Industry
5 Citations (Scopus)
2 Downloads (Pure)

Data governance and transparency for collaborative systems

Mahmudlu, R., den Hartog, J. & Zannone, N., 2016, Data and Applications Security and Privacy. Springer, p. 199-216 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Collaborative Systems
Governance
Transparency
Requirements
Access Control
5 Citations (Scopus)
3 Downloads (Pure)

Risk-based analysis of business process executions

Alizadeh, M. & Zannone, N., 9 Mar 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. New York: Association for Computing Machinery, Inc, p. 130-132 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Industry
2 Citations (Scopus)

Role mining with missing values

Vavilis, S., Egner, A. I., Petkovic, M. & Zannone, N., 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES), 31 August - 2 September 2016, Salzburg, Austria. Piscataway: Institute of Electrical and Electronics Engineers, p. 167-176

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

81 Downloads (Pure)

Subgraph mining for anomalous pattern discovery in event logs

Genga, L., Potena, D., Martino, O., Alizadeh, M., Diamantini, C. & Zannone, N., 2016, International Workshop on New Frontiers in Mining Complex Patterns.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Specifications
Experiments
2015
1 Citation (Scopus)
71 Downloads (Pure)

Access control with non-deterministic and probabilistic attribute retrieval

Crampton, J., Morisset, C. & Zannone, N., 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust (2015, London, UK, April 18, 2015; affiliated with ETAPS 2015). p. 1-19

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Access control
Specifications
26 Citations (Scopus)
3 Downloads (Pure)

Analysis of XACML policies with SMT

Turkmen, F., den Hartog, J. I., Ranise, S. & Zannone, N., 2015, Principles of Security and Trust (4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, 11-18 April, 2015. Proceedings). Focardi, R. & Myters, A. (eds.). Dordrecht: Springer, p. 115-134 (Lecture Notes in Computer Science; vol. 9036).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Surface mount technology
Access control
XML
Markup languages
Specifications
50 Downloads (Pure)

Auditing with incomplete logs

Mian, U. S., Hartog, den, J. I., Etalle, S. & Zannone, N., 2015, Proceedings of the 3rd Workshop on Hot Issues in Security Principles and Trust (2015, London, UK, April 18, 2015; affiliated with ETAPS 2015). p. 1-23

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Compliance
Industry
36 Downloads (Pure)

Evidence-based discounting rule in subjective logic

Skoric, B., Hoogh, de, S. J. A. & Zannone, N., 2015, Proceedings of the 36th WIC Symposium on Information Theory in the Benelux (Brussels, Belgium, May 6-7, 2015). Roland, J. & Horlin, F. (eds.). Werkgemeenschap voor Informatie- en Communicatietheorie (WIC), p. 1-3

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
4 Citations (Scopus)

History-based construction of alignments for conformance checking: Formalization and implementation

Alizadeh, M., de Leoni, M. & Zannone, N., 2015, Data-driven process discovery and analysis. Ceravolo, P., Russo, B. & Accorsi, R. (eds.). Springer, Vol. 237. p. 58-78 21 p. (Lecture Notes in Business Information Processing; vol. 237).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Formalization
Alignment
Cost functions
Cost Function
Probable
13 Citations (Scopus)
3 Downloads (Pure)

On missing attributes in access control: non-deterministic and probabilistic attribute retrieval

Crampton, J., Morisset, C. & Zannone, N., 2015, 20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015, Vienna, Austria, June 1-3, 2015). New York: Association for Computing Machinery, Inc, p. 99-109

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Specifications
10 Citations (Scopus)
3 Downloads (Pure)

Pre-distribution of certificates for pseudonymous broadcast authentication in VANET

Feiri, M., Pielage, R. H. M., Petit, J., Zannone, N. & Kargl, F., 2015, IEEE 81st Vehicular Technology Conference (VTC2015-Spring, Glasgow, UK, May 11-14, 2015). Institute of Electrical and Electronics Engineers, p. 1-5

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Network management
Packet loss
Authentication
Topology
Communication
9 Citations (Scopus)
3 Downloads (Pure)

Preventing information inference in access control

Paci, F. & Zannone, N., 2015, 20th ACM Symposium on Access Control Models and Technologies (SACMAT 2015, Vienna, Austria, June 1-3, 2015). New York: Association for Computing Machinery, Inc, p. 87-97

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Data privacy
Data structures
Cloud computing
Innovation
2014
5 Citations (Scopus)
2 Downloads (Pure)

Are on-line personae really unlinkable?

Veeningen, M. G., Piepoli, A. & Zannone, N., 2014, Data Privacy Management and Autonomous Spontaneous Security (8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers). Garcia-Alfaro, J., Lioudakis, G., Cuppens-Boulahia, N., Foley, S. & Fitzgerald, W. M. (eds.). Berlin: Springer, p. 369-379 (Lecture Notes in Computer Science; vol. 8247).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Experiments
12 Citations (Scopus)
98 Downloads (Pure)

CollAC: Collaborative access control

Damen, S., Hartog, den, J. I. & Zannone, N., 2014, 2014 International Conference on Collaboration Technologies and Systems (CTS 2014, Minneapolis MN, USA, May 19-23, 2014). Institute of Electrical and Electronics Engineers, p. 142-149

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Access control
Decision making
7 Citations (Scopus)
2 Downloads (Pure)

Data leakage quantification

Vavilis, S., Petkovic, M. & Zannone, N., 2014, Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014). Atluri, V. & Pernul, G. (eds.). Springer, p. 98-113 (Lecture Notes in Computer Science; vol. 8566).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Leakage (fluid)
Data structures
5 Citations (Scopus)
41 Downloads (Pure)

History-based construction of log-process alignments for conformance checking : discovering what really went wrong

Alizadeh, M., Leoni, de, M. & Zannone, N., 2014, 4th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2014, Milan, Italy, November 19-21, 2014). Accorsi, R., Ceravolo, P. & Russo, B. (eds.). CEUR-WS.org, p. 1-15 (CEUR Workshop Proceedings; vol. 1293).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
Cost functions
11 Citations (Scopus)
6 Downloads (Pure)

Privacy implications of privacy settings and tagging in Facebook

Damen, S. & Zannone, N., 2014, Secure Data Management (10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013. Proceedings). Jonker, W. & Petkovic, M. (eds.). Berlin: Springer, p. 121-138 (Lecture Notes in Computer Science; vol. 8425).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Visibility
Communication
6 Citations (Scopus)
2 Downloads (Pure)

Reduction of access control decisions

Morisset, C. & Zannone, N., 2014, 19th ACM Symposium on Access Control Models and Technologies (SACMAT 2014, London ON, Canada, June 25-27, 2014). New York NY: Association for Computing Machinery, Inc, p. 53-62

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Decision making
Chemical analysis
2013
20 Citations (Scopus)
2 Downloads (Pure)

Controlling break-the-glass through alignment

Adriansyah, A., Dongen, van, B. F. & Zannone, N., 2013, Proceedings of the 5th ASE/IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2013, Washington DC, USA, September 8-14, 2013). Piscataway: Institute of Electrical and Electronics Engineers, p. 606-611

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Glass
Specifications
9 Citations (Scopus)
2 Downloads (Pure)

Database anomalous activities: Detection and quantification

Costante, E., Vavilis, S., Etalle, S., Petkovic, M. & Zannone, N., 2013, SECRYPT 2013 (Proceedings of the 10th International Conference on Security and Cryptography, Reykjavik, Iceland, July 29-31, 2013). SCITEPRESS-Science and Technology Publications, Lda., p. 603-608

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Monitoring
4 Citations (Scopus)
2 Downloads (Pure)

Data reliability in home healthcare services

Vavilis, S., Zannone, N. & Petkovic, M., 2013, Proceedings of the 26th International Symposium on Computer-Based Medical Systems (CBMS'13, Porto, Portugal, June 20-22, 2013). Piscataway: Institute of Electrical and Electronics Engineers, p. 377-380

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)
2 Downloads (Pure)

Formal modelling of (de)pseudonymisation : a case study in health care privacy

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2013, Security and Trust Management (8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012. Revised selected papers). Jøsang, A., Samarati, P. & Petrocchi, M. (eds.). Berlin: Springer, p. 145-160 (Lecture Notes in Computer Science; vol. 7783).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Health care
Health
2 Citations (Scopus)
2 Downloads (Pure)

PERSONA : a personalized data protection framework

Egea, M., Paci, F., Petrocchi, M. & Zannone, N., 2013, Trust Management VII (7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings). Fernández-Gago, C., Martinelli, F., Pearson, S. & Agudo, I. (eds.). Berlin: Springer, p. 272-280 (IFIP Advances in Information and Communication Technology; vol. 401).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Data privacy
Medicine
1 Citation (Scopus)
3 Downloads (Pure)

Policy administration in tag-based authorization

Etalle, S., Hinrichs, T. L., Lee, A. J., Trivellato, D. & Zannone, N., 2013, Foundations and Practice of Security (5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers). Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Miri, A. & Tawbi, N. (eds.). Berlin: Springer, p. 162-179 (Lecture Notes in Computer Science; vol. 7743).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

authorization
administrative policy
logic
writer
lack
25 Citations (Scopus)
2 Downloads (Pure)

Privacy-aware web service composition and ranking

Costante, E., Paci, F. & Zannone, N., 2013, Proceedings of the 20th International Conference on Web Services (ICWS 2013, Santa Clara CA, USA, June 27-July 2, 2013). IEEE Computer Society, p. 131-138

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Web services
Chemical analysis
Quality of service
Throughput
Internet
2 Citations (Scopus)
4 Downloads (Pure)

Symbolic privacy analysis through linkability and detectability

Veeningen, M. G., Weger, de, B. M. M. & Zannone, N., 2013, Trust Management VII (7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings). Fernández-Gago, C., Martinelli, F., Pearson, S. & Agudo, I. (eds.). Berlin: Springer, p. 1-16 (IFIP Advances in Information and Communication Technology; vol. 401).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Network protocols
Formal methods