


default search action
Anna Cinzia Squicciarini
Person information
- affiliation: Pennsylvania State University, College of Information Sciences and Technology, State College, PA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j56]Younes Karimi, Anna Cinzia Squicciarini, Peter K. Forster:
A longitudinal dataset and analysis of Twitter ISIS users and propaganda. Soc. Netw. Anal. Min. 14(1): 19 (2024) - [c155]Chenxi Qiu, Sourabh Yadav, Yuede Ji, Anna Cinzia Squicciarini, Ram Dantu, Juanjuan Zhao, Cheng-Zhong Xu:
Fine-Grained Geo-Obfuscation to Protect Workers' Location Privacy in Time-Sensitive Spatial Crowdsourcing. EDBT 2024: 373-385 - [c154]Abhiroop Tippavajjula
, Primal Pappachan
, Anna Cinzia Squicciarini, Jose Such
:
ACCORD: Constraint-driven Mediation of Multi-user Conflicts in Cloud Services. WWW (Companion Volume) 2024: 1039-1042 - [i16]Chenxi Qiu, Ruiyao Liu, Primal Pappachan, Anna Cinzia Squicciarini, Xinpeng Xie:
Scalable Optimization for Locally Relevant Geo-Location Privacy. CoRR abs/2407.13725 (2024) - [i15]Feiran Jia, Tong Wu, Xin Qin, Anna Cinzia Squicciarini:
The Task Shield: Enforcing Task Alignment to Defend Against Indirect Prompt Injection in LLM Agents. CoRR abs/2412.16682 (2024) - 2023
- [c153]Hangzhi Guo
, Feiran Jia
, Jinghui Chen
, Anna Cinzia Squicciarini, Amulya Yadav
:
RoCourseNet: Robust Training of a Prediction Aware Recourse Model. CIKM 2023: 619-628 - [c152]Primal Pappachan, Chenxi Qiu, Anna Cinzia Squicciarini, Vishnu Sharma Hunsur Manjunath:
User Customizable and Robust Geo-Indistinguishability for Location Privacy. EDBT 2023: 658-670 - [c151]Primal Pappachan, Vishnu Sharma Hunsur Manjunath, Chenxi Qiu, Anna Cinzia Squicciarini, Hailey Onweller:
CORGI: An interactive framework for Customizable and Robust Location Obfuscation. ICDE 2023: 3667-3670 - [c150]Feiran Jia, Chenxi Qiu, Sarah Rajtmajer, Anna Cinzia Squicciarini:
Content Sharing Design for Social Welfare in Networked Disclosure Game. UAI 2023: 973-983 - [i14]Yingfan Zhou, Anna Cinzia Squicciarini, Sarah Rajtmajer:
Lived experiences of online harm amongst marginalized and vulnerable individuals in support-seeking communities on Reddit. CoRR abs/2311.15427 (2023) - 2022
- [j55]Prasanna Umar, Anna Cinzia Squicciarini, Christopher Griffin
, Joshua Wede:
Contagion of Offensive Behavior for Transient Interactions in Online Commenting Platforms. Int. J. Hum. Comput. Interact. 38(11): 1023-1036 (2022) - [j54]Younes Karimi
, Anna Cinzia Squicciarini, Shomir Wilson:
Automated Detection of Doxing on Twitter. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-24 (2022) - [j53]Chenxi Qiu
, Anna Cinzia Squicciarini, Ce Pang, Ning Wang, Ben Wu
:
Location Privacy Protection in Vehicle-Based Spatial Crowdsourcing via Geo-Indistinguishability. IEEE Trans. Mob. Comput. 21(7): 2436-2450 (2022) - [j52]Anna Cinzia Squicciarini, Sarah Rajtmajer
, Yang Gao
, Justin Semonsen
, Andrew Belmonte
, Pratik Agarwal
:
An Extended Ultimatum Game for Multi-Party Access Control in Social Networks. ACM Trans. Web 16(3): 13:1-13:23 (2022) - [c149]Sarah Michele Rajtmajer, Christopher Griffin, Jian Wu, Robert Fraleigh
, Laxmaan Balaji, Anna Cinzia Squicciarini, Anthony Kwasnica, David M. Pennock, Michael McLaughlin, Timothy Fritton, Nishanth Nakshatri, Arjun Manoj Menon, Sai Ajay Modukuri, Rajal Nivargi, Xin Wei, C. Lee Giles:
A Synthetic Prediction Market for Estimating Confidence in Published Work. AAAI 2022: 13218-13220 - [c148]Soumitra Mehrotra, Anna Cinzia Squicciarini, Edoardo Serra, Younes Karimi
:
COVID-19 and Haters - A User Model Perspective. DSAA 2022: 1-9 - [c147]Chenxi Qiu, Li Yan, Anna Cinzia Squicciarini, Juanjuan Zhao, Chengzhong Xu, Primal Pappachan:
TrafficAdaptor: an adaptive obfuscation strategy for vehicle location privacy against traffic flow aware attacks. SIGSPATIAL/GIS 2022: 4:1-4:10 - [c146]Chenxi Qiu, Sourabh Yadav, Anna Cinzia Squicciarini, Qing Yang, Song Fu, Juanjuan Zhao, Chengzhong Xu
:
Distributed Data-Sharing Consensus in Cooperative Perception of Autonomous Vehicles. ICDCS 2022: 1212-1222 - [c145]Chenye Zhao, Jasmine Mangat, Sujay Koujalgi, Anna Cinzia Squicciarini, Cornelia Caragea:
PrivacyAlert: A Dataset for Image Privacy Prediction. ICWSM 2022: 1352-1361 - [c144]Tingting Du, Prasanna Umar, Sarah Michele Rajtmajer, Anna Cinzia Squicciarini:
The Contribution of Verified Accounts to Self-Disclosure in COVID-Related Twitter Conversations. ICWSM 2022: 1393-1397 - [i13]Sarah Michele Rajtmajer, Christopher Griffin, Jian Wu, Robert Fraleigh, Laxmaan Balaji, Anna Cinzia Squicciarini, Anthony Kwasnica, David M. Pennock, Michael McLaughlin, Timothy Fritton, Nishanth Nakshatri, Arjun Manoj Menon, Sai Ajay Modukuri, Rajal Nivargi, Xin Wei, C. Lee Giles:
A Synthetic Prediction Market for Estimating Confidence in Published Work. CoRR abs/2201.06924 (2022) - [i12]Younes Karimi, Anna Cinzia Squicciarini, Peter K. Forster, Kira M. Leavitt:
A Longitudinal Dataset of Twitter ISIS Users. CoRR abs/2202.00878 (2022) - [i11]Younes Karimi, Anna Cinzia Squicciarini, Shomir Wilson:
Automated Detection of Doxing on Twitter. CoRR abs/2202.00879 (2022) - [i10]Hangzhi Guo, Feiran Jia, Jinghui Chen, Anna Cinzia Squicciarini, Amulya Yadav:
RoCourseNet: Distributionally Robust Training of a Prediction Aware Recourse Model. CoRR abs/2206.00700 (2022) - [i9]Primal Pappachan, Chenxi Qiu, Anna Cinzia Squicciarini, Vishnu Sharma Hunsur Manjunath:
TACO: A Tree-based Approach to Customizing Location Obfuscation based on User Policies. CoRR abs/2206.08396 (2022) - 2021
- [j51]Taylor Blose, Prasanna Umar, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer:
A study of self-disclosure during the Coronavirus pandemic. First Monday 26(7) (2021) - [j50]Benjamin V. Hanrahan, Anita Chen, Jiahua Ma, Ning F. Ma, Anna Cinzia Squicciarini, Saiph Savage:
The Expertise Involved in Deciding which HITs are Worth Doing on Amazon Mechanical Turk. Proc. ACM Hum. Comput. Interact. 5(CSCW1): 128:1-128:23 (2021) - [j49]Adam Bowers, Cong Liao, Douglas Steiert
, Dan Lin
, Anna Cinzia Squicciarini, Ali R. Hurson
:
Detecting Suspicious File Migration or Replication in the Cloud. IEEE Trans. Dependable Secur. Comput. 18(1): 296-309 (2021) - [c143]Sai Ajay Modukuri, Sarah Michele Rajtmajer, Anna Cinzia Squicciarini, Jian Wu, C. Lee Giles:
Understanding and Predicting Retractions of Published Work. SDU@AAAI 2021 - [c142]Edoardo Serra, Sujeet Ayyapureddi, Qudrat E. Alahy Ratul, Anna Cinzia Squicciarini:
A Few Shot Transfer Learning Approach Identifying Private Images With Fast User Personalization. IEEE BigData 2021: 1204-1213 - [c141]Priyadarshini Murugan, Younes Karimi
, Anna Cinzia Squicciarini, Christopher Griffin
:
Modeling Longitudinal Behavior Dynamics Among Extremist Users in Twitter Data. IEEE BigData 2021: 4906-4914 - [c140]Prasanna Umar, Chandan Akiti, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer:
Self-disclosure on Twitter During the COVID-19 Pandemic: A Network Perspective. ECML/PKDD (4) 2021: 271-286 - 2020
- [j48]Dan Lin
, Douglas Steiert, Joshua Morris
, Anna Cinzia Squicciarini, Jianping Fan
:
REMIND: Risk Estimation Mechanism for Images in Network Distribution. IEEE Trans. Inf. Forensics Secur. 15: 539-552 (2020) - [c139]Chandan Akiti, Sarah Michele Rajtmajer, Anna Cinzia Squicciarini:
Contextual representation of self-disclosure and supportiveness in short text. AffCon@AAAI 2020: 179-206 - [c138]Prasanna Umar, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer:
A Study of Self-Privacy Violations in Online Public Discourse. IEEE BigData 2020: 1041-1050 - [c137]Chenxi Qiu, Anna Cinzia Squicciarini, Zhuozhao Li
, Ce Pang, Li Yan:
Time-Efficient Geo-Obfuscation to Protect Worker Location Privacy over Road Networks in Spatial Crowdsourcing. CIKM 2020: 1275-1284 - [c136]Edoardo Serra
, Anu Shrestha, Francesca Spezzano
, Anna Cinzia Squicciarini:
DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based Systems. CODASPY 2020: 29-38 - [c135]Haoti Zhong, Cong Liao, Anna Cinzia Squicciarini, Sencun Zhu, David J. Miller:
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation. CODASPY 2020: 97-108 - [c134]Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, Prasanna Umar, Taylor Blose:
A Tipping Point? Heightened self-disclosure during the Coronavirus pandemic. CogMI 2020: 141-146 - [c133]Chandan Akiti, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer:
A Semantics-based Approach to Disclosure Classification in User-Generated Online Content. EMNLP (Findings) 2020: 3490-3499 - [c132]Anna Cinzia Squicciarini:
Multi-party Access Control - 10 Years of Successes and Lessons Learned. SACMAT 2020: 189-190 - [i8]Taylor Blose, Prasanna Umar, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer:
Privacy in Crisis: A study of self-disclosure during the Coronavirus pandemic. CoRR abs/2004.09717 (2020)
2010 – 2019
- 2019
- [j47]Laura Genga
, Nicola Zannone
, Anna Cinzia Squicciarini:
Discovering reliable evidence of data misuse by exploiting rule redundancy. Comput. Secur. 87 (2019) - [j46]Christopher Griffin
, Sarah Michele Rajtmajer, Anna Cinzia Squicciarini, Andrew Belmonte:
Consensus and Information Cascades in Game-Theoretic Imitation Dynamics with Static and Dynamic Network Topologies. SIAM J. Appl. Dyn. Syst. 18(2): 597-628 (2019) - [j45]Justin Semonsen, Christopher Griffin
, Anna Cinzia Squicciarini
, Sarah Michele Rajtmajer:
Opinion Dynamics in the Presence of Increasing Agreement Pressure. IEEE Trans. Cybern. 49(4): 1270-1278 (2019) - [j44]Dan Lin
, Anna Cinzia Squicciarini, Venkata Nagarjuna Dondapati, Smitha Sundareswaran:
A Cloud Brokerage Architecture for Efficient Cloud Service Selection. IEEE Trans. Serv. Comput. 12(1): 144-157 (2019) - [c131]Neda Nasiriani, Anna Cinzia Squicciarini, Zara Saldanha, Sanchit Goel, Nicola Zannone
:
Hierarchical Clustering for Discrimination Discovery: A Top-Down Approach. AIKE 2019: 187-194 - [c130]Chenxi Qiu, Anna Cinzia Squicciarini, Benjamin V. Hanrahan:
Incentivizing Distributive Fairness for Crowdsourcing Workers. AAMAS 2019: 404-412 - [c129]Haoti Zhong, Hao Li, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, David J. Miller:
Toward Image Privacy Classification and Spatial Attribution of Private Content. IEEE BigData 2019: 1351-1360 - [c128]Chenxi Qiu, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer:
Rating Mechanisms for Sustainability of Crowdsourcing Platforms. CIKM 2019: 2003-2012 - [c127]Christopher Griffin
, Sarah Michele Rajtmajer, Prasanna Umar, Anna Cinzia Squicciarini:
Power Law Public Goods Game for Personal Information Sharing in News Commentaries. GameSec 2019: 184-195 - [c126]Anna Cinzia Squicciarini, Chenxi Qiu:
Location Privacy Protection in Vehicle-Based Spatial Crowdsourcing Via Geo-Indistinguishability. ICDCS 2019: 1061-1071 - [c125]Joshua Morris
, Dan Lin, Anna Cinzia Squicciarini:
FriendGuard: A Friend Search Engine with Guaranteed Friend Exposure Degree. SACMAT 2019: 37-48 - [c124]Prasanna Umar, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer:
Detection and Analysis of Self-Disclosure in Online News Commentaries. WWW 2019: 3272-3278 - [i7]Christopher Griffin, Sarah Michele Rajtmajer, Anna Cinzia Squicciarini, Prasanna Umar:
Power Law Public Goods Game for Personal Information Sharing in News Comments. CoRR abs/1906.01677 (2019) - 2018
- [j43]Federica Paci
, Anna Cinzia Squicciarini
, Nicola Zannone
:
Survey on Access Control for Community-Centered Collaborative Systems. ACM Comput. Surv. 51(1): 6:1-6:38 (2018) - [j42]Xingliang Yuan
, Xinyu Wang
, Cong Wang
, Anna Cinzia Squicciarini, Kui Ren:
Towards Privacy-Preserving and Practical Image-Centric Social Discovery. IEEE Trans. Dependable Secur. Comput. 15(5): 868-882 (2018) - [c123]Ashwini Tonge, Cornelia Caragea, Anna Cinzia Squicciarini:
Uncovering Scene Context for Predicting Privacy of Online Shared Images. AAAI 2018: 8167-8168 - [c122]Chenxi Qiu, Anna Cinzia Squicciarini, Christopher Griffin, Prasanna Umar:
Combating Behavioral Deviance via User Behavior Control. AAMAS 2018: 202-210 - [c121]Chenxi Qiu, Anna Cinzia Squicciarini, Dev Rishi Khare, Barbara Carminati, James Caverlee:
CrowdEval: A Cost-Efficient Strategy to Evaluate Crowdsourced Worker's Reliability. AAMAS 2018: 1486-1494 - [c120]Haoti Zhong, Anna Cinzia Squicciarini, David J. Miller:
Toward Automated Multiparty Privacy Conflict Detection. CIKM 2018: 1811-1814 - [c119]Cong Liao, Haoti Zhong, Sencun Zhu, Anna Cinzia Squicciarini:
Server-Based Manipulation Attacks Against Machine Learning Models. CODASPY 2018: 24-34 - [c118]Ashwini Tonge, Cornelia Caragea
, Anna Cinzia Squicciarini:
Privacy-Aware Tag Recommendation for Image Sharing. HT 2018: 52-56 - [c117]Haoti Zhong, David J. Miller, Anna Cinzia Squicciarini:
Flexible Inference for Cyberbully Incident Detection. ECML/PKDD (3) 2018: 356-371 - [c116]Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, Nicola Zannone
:
Multi-Party Access Control: Requirements, State of the Art and Open Challenges. SACMAT 2018: 49 - [c115]Parisa Kaghazgaran, James Caverlee, Anna Cinzia Squicciarini:
Combating Crowdsourced Review Manipulators: A Neighborhood-Based Approach. WSDM 2018: 306-314 - [i6]Cong Liao, Haoti Zhong, Anna Cinzia Squicciarini, Sencun Zhu, David J. Miller:
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation. CoRR abs/1808.10307 (2018) - 2017
- [j41]Jingwei Li
, Dan Lin, Anna Cinzia Squicciarini
, Jin Li, Chunfu Jia:
Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds. IEEE Trans. Cloud Comput. 5(3): 499-509 (2017) - [j40]Jingwei Li
, Anna Cinzia Squicciarini
, Dan Lin, Smitha Sundareswaran, Chunfu Jia:
MMBcloud-Tree: Authenticated Index for Verifiable Cloud Service Selection. IEEE Trans. Dependable Secur. Comput. 14(2): 185-198 (2017) - [j39]Dan Lin, Jian Kang, Anna Cinzia Squicciarini
, Yingjie Wu, Sashi Gurung, Ozan K. Tonguz:
MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs. IEEE Trans. Mob. Comput. 16(5): 1357-1370 (2017) - [j38]Anna Cinzia Squicciarini
, Cornelia Caragea
, Rahul Balakavi:
Toward Automated Online Photo Privacy. ACM Trans. Web 11(1): 2:1-2:29 (2017) - [j37]Anna Cinzia Squicciarini
, Sarah Michele Rajtmajer, Christopher Griffin
:
Positive and negative behavioral analysis in social networks. WIREs Data Mining Knowl. Discov. 7(3) (2017) - [c114]Justin Semonsen, Christopher Griffin, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer:
Consensus on Social Graphs under Increasing Peer Pressure. AAMAS 2017: 1731-1732 - [c113]Anna Lisa Ferrara, Anna Cinzia Squicciarini
, Cong Liao, Truc L. Nguyen:
Toward Group-Based User-Attribute Policies in Azure-Like Access Control Systems. DBSec 2017: 349-361 - [c112]Sarah Michele Rajtmajer, Anna Cinzia Squicciarini
, Jose M. Such
, Justin Semonsen, Andrew Belmonte:
An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content. GameSec 2017: 112-130 - [c111]Chenxi Qiu, Anna Cinzia Squicciarini
, Sarah Michele Rajtmajer, James Caverlee:
Dynamic Contract Design for Heterogenous Workers in Crowdsourcing for Quality Control. ICDCS 2017: 1168-1177 - [c110]Adam Bowers, Dan Lin, Anna Cinzia Squicciarini
, Ali R. Hurson
:
Real-Time Detection of Illegal File Transfers in the Cloud. ICDCS 2017: 2597-2600 - [c109]Haoti Zhong, Anna Cinzia Squicciarini, David J. Miller, Cornelia Caragea
:
A Group-Based Personalized Model for Image Privacy Classification and Labeling. IJCAI 2017: 3952-3958 - [c108]Anna Cinzia Squicciarini, Andrea Novelli, Dan Lin, Cornelia Caragea
, Haoti Zhong:
From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing. PST 2017: 337-348 - [i5]Justin Semonsen, Christopher Griffin, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer:
Increasing Peer Pressure on any Connected Graph Leads to Consensus. CoRR abs/1702.07912 (2017) - 2016
- [j36]Cong Liao, Anna Cinzia Squicciarini
, Christopher Griffin
, Sarah Michele Rajtmajer:
A hybrid epidemic model for deindividuation and antinormative behavior in online social networks. Soc. Netw. Anal. Min. 6(1): 13:1-13:11 (2016) - [j35]Elisa Bertino, Dario Catalano, Qi Li, Alex X. Liu, Anna Cinzia Squicciarini
, Alexey V. Vinel:
Editor's Note. IEEE Trans. Dependable Secur. Comput. 13(4): 409-410 (2016) - [c107]Cong Liao, Anna Cinzia Squicciarini, Dan Lin:
LAST-HDFS: Location-Aware Storage Technique for Hadoop Distributed File System. CLOUD 2016: 662-669 - [c106]Sarah Michele Rajtmajer, Anna Cinzia Squicciarini, Christopher Griffin, Sushama Karumanchi, Alpana Tyagi:
Constrained Social-Energy Minimization for Multi-Party Sharing in Online Social Networks. AAMAS 2016: 680-688 - [c105]Chenxi Qiu, Anna Cinzia Squicciarini
, Barbara Carminati
, James Caverlee, Dev Rishi Khare:
CrowdSelect: Increasing Accuracy of Crowdsourcing Tasks through Behavior Prediction and User Selection. CIKM 2016: 539-548 - [c104]Hancheng Ge, James Caverlee, Nan Zhang, Anna Cinzia Squicciarini
:
Uncovering the Spatio-Temporal Dynamics of Memes in the Presence of Incomplete Information. CIKM 2016: 1493-1502 - [c103]Sushama Karumanchi, Jingwei Li
, Anna Cinzia Squicciarini
:
Efficient Network Path Verification for Policy-routedQueries. CODASPY 2016: 319-328 - [c102]Christopher Griffin, Sarah Michele Rajtmajer, Anna Cinzia Squicciarini:
Invited Paper: A Model of Paradoxical Privacy Behavior in Online Users. CIC 2016: 206-211 - [c101]Haoti Zhong, Hao Li, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, Christopher Griffin, David J. Miller, Cornelia Caragea:
Content-Driven Detection of Cyberbullying on the Instagram Social Network. IJCAI 2016: 3952-3958 - [c100]Alpana Tyagi, Anna Cinzia Squicciarini
, Sarah Michele Rajtmajer, Christopher Griffin
:
An In-Depth Study of Peer Influence on Collective Decision Making for Multi-party Access Control (Invited Paper). IRI 2016: 305-314 - [c99]Shane Errol Halse, Andrea H. Tapia, Anna Cinzia Squicciarini, Cornelia Caragea:
An Emotional Step Towards Automated Trust Detection in Crisis Social Media. ISCRAM 2016 - [c98]Shane Errol Halse, Andrea H. Tapia, Anna Cinzia Squicciarini, Cornelia Caragea:
Tweet Factors Influencing Trust and Usefulness During Both Man-Made and Natural Disasters. ISCRAM 2016 - [e2]Sheng Zhong, Anna Cinzia Squicciarini:
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS, Xi'an, China, May 30 - June 3, 2016. ACM 2016, ISBN 978-1-4503-4285-8 [contents] - 2015
- [j34]Sushama Karumanchi, Anna Cinzia Squicciarini:
A Large Scale Study of Web Service Vulnerabilities. J. Internet Serv. Inf. Secur. 5(1): 53-69 (2015) - [j33]Sushama Karumanchi, Anna Cinzia Squicciarini
, Dan Lin:
Privacy-aware access control for message exchange in vehicular ad hoc networks. Telecommun. Syst. 58(4): 349-361 (2015) - [j32]Anna Cinzia Squicciarini
, Dan Lin, Smitha Sundareswaran, Joshua Wede:
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites. IEEE Trans. Knowl. Data Eng. 27(1): 193-206 (2015) - [c97]Anna Cinzia Squicciarini
, Sarah Michele Rajtmajer, Y. Liu, Christopher Griffin
:
Identification and characterization of cyberbullying dynamics in an online social network. ASONAM 2015: 280-285 - [c96]Cong Liao, Anna Cinzia Squicciarini
, Christopher Griffin
, Sarah Michele Rajtmajer:
A Hybrid Epidemic Model for Antinormative Behavior in Online Social Networks. ASONAM 2015: 1563-1564 - [c95]Cong Liao, Anna Cinzia Squicciarini
:
Towards Provenance-Based Anomaly Detection in MapReduce. CCGRID 2015: 647-656 - [c94]Jules Dupont, Anna Cinzia Squicciarini
:
Toward De-Anonymizing Bitcoin by Mapping Users Location. CODASPY 2015: 139-141 - [c93]Cong Liao, Anna Cinzia Squicciarini
, Christopher Griffin
:
Epidemic Behavior of Negative Users in Online Social Sites. CODASPY 2015: 143-145 - [c92]Sarah Michele Rajtmajer, Christopher Griffin
, Anna Cinzia Squicciarini
:
Determining a Discrete Set of Site-Constrained Privacy Options for Users in Social Networks Through Stackelberg Games. GameSec 2015: 208-227 - [c91]Hongmin Li, Nicolais Guevara, Nic Herndon, Doina Caragea, Kishore Neppalli, Cornelia Caragea, Anna Cinzia Squicciarini, Andrea H. Tapia:
Twitter Mining for Disaster Response: A Domain Adaptation Approach. ISCRAM 2015 - [c90]Sarah Michele Rajtmajer, Christopher Griffin
, Derek Mikesell, Anna Cinzia Squicciarini
:
An evolutionary game model for the spread of non-cooperative behavior in online social networks. SAC 2015: 1154-1159 - [c89]Jingwei Li
, Anna Cinzia Squicciarini
, Dan Lin, Shuang Liang, Chunfu Jia:
SecLoc: Securing Location-Sensitive Storage in the Cloud. SACMAT 2015: 51-61 - [c88]Anna Cinzia Squicciarini
, Ting Yu:
Privacy and Access Control: How are These Two concepts Related? SACMAT 2015: 197-198 - [c87]Amir Fayazi, Kyumin Lee, James Caverlee, Anna Cinzia Squicciarini
:
Uncovering Crowdsourced Manipulation of Online Reviews. SIGIR 2015: 233-242 - [e1]Jaehong Park, Anna Cinzia Squicciarini:
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015. ACM 2015, ISBN 978-1-4503-3191-3 [contents] - [i4]Jingwei Li, Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia:
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection. IACR Cryptol. ePrint Arch. 2015: 379 (2015) - 2014
- [j31]Anna Cinzia Squicciarini
, Federica Paci
, Smitha Sundareswaran:
PriMa: a comprehensive approach to privacy protection in social network sites. Ann. des Télécommunications 69(1-2): 21-36 (2014) - [j30]Anna Cinzia Squicciarini
, Sushama Karumanchi, Dan Lin, Nicole DeSisto:
Identifying hidden social circles for advanced privacy configuration. Comput. Secur. 41: 40-51 (2014) - [j29]Barbara Carminati
, Lakshmish Ramaswamy, Anna Cinzia Squicciarini
, James Joshi, Calton Pu:
Preface. Int. J. Cooperative Inf. Syst. 23(2) (2014) - [j28]Baozhen Lee, Weiguo Fan
, Anna Cinzia Squicciarini
, Shilun Ge, Yun Huang:
The relativity of privacy preservation based on social tagging. Inf. Sci. 288: 87-107 (2014) - [j27]Anna Cinzia Squicciarini
, Christopher Griffin
:
Why and how to deceive: game results with sociological evidence. Soc. Netw. Anal. Min. 4(1): 161 (2014) - [c86]Brandon Truong, Cornelia Caragea
, Anna Cinzia Squicciarini
, Andrea H. Tapia:
Identifying valuable information from twitter during natural disasters. ASIST 2014: 1-4 - [c85]Eunjung Yoon, Anna Cinzia Squicciarini
:
Toward Detecting Compromised MapReduce Workers through Log Analysis. CCGRID 2014: 41-50 - [c84]Anna Cinzia Squicciarini
, Giuseppe Petracca, William G. Horne, Aurnob Nath:
Situational awareness through reasoning on network incidents. CODASPY 2014: 111-122 - [c83]Anna Cinzia Squicciarini
, Cornelia Caragea
, Rahul Balakavi:
Analyzing images' privacy for the modern web. HT 2014: 136-147 - [c82]Xingliang Yuan
, Xinyu Wang
, Cong Wang
, Anna Cinzia Squicciarini
, Kui Ren
:
Enabling Privacy-Preserving Image-Centric Social Discovery. ICDCS 2014: 198-207 - [c81]Cornelia Caragea, Anna Cinzia Squicciarini, Sam Stehle, Kishore Neppalli, Andrea H. Tapia:
Mapping moods: Geo-mapped sentiment analysis during hurricane sandy. ISCRAM 2014 - [c80]Sushama Karumanchi, Anna Cinzia Squicciarini
:
In the wild: a large scale study of web services vulnerabilities. SAC 2014: 1239-1246 - [c79]Jingwei Li
, Dan Lin, Anna Cinzia Squicciarini
, Chunfu Jia:
STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds. SecureComm (1) 2014: 36-44 - [c78]Anna Cinzia Squicciarini
, Dan Lin, Smitha Sundareswaran, Jingwei Li
:
Policy Driven Node Selection in MapReduce. SecureComm (1) 2014: 55-72 - [c77]Sushama Karumanchi, Jingwei Li
, Anna Cinzia Squicciarini
:
Securing Resource Discovery in Content Hosting Networks. SecureComm (1) 2014: 153-173 - [c76]Anna Cinzia Squicciarini
, Jules Dupont, Ruyan Chen:
Online abusive users analytics through visualization. WWW (Companion Volume) 2014: 155-158 - [i3]Sarah Michele Rajtmajer, Christopher Griffin, Derek Mikesell, Anna Cinzia Squicciarini:
A cooperate-defect model for the spread of deviant behavior in social networks. CoRR abs/1408.2770 (2014) - 2013
- [j26]Wonjun Lee, Anna Cinzia Squicciarini
, Elisa Bertino:
Agent-based accountable grid computing systems. J. Supercomput. 65(2): 903-929 (2013) - [c75]Anna Cinzia Squicciarini
, Giuseppe Petracca, Elisa Bertino:
Adaptive data protection in distributed systems. CODASPY 2013: 365-376 - [c74]Anna Cinzia Squicciarini
, Barbara Carminati
, Sushama Karumanchi:
Privacy aware service selection of composite web services invited paper. CollaborateCom 2013: 260-268 - [c73]Smitha Sundareswaran, Anna Cinzia Squicciarini:
Detecting Malicious Co-resident Virtual Machines Indulging in Load-Based Attacks. ICICS 2013: 113-124 - [c72]Sushama Karumanchi, Anna Cinzia Squicciarini
, Barbara Carminati
:
Policy-Compliant Search Query Routing for Web Service Discovery in Peer to Peer Networks. ICWS 2013: 387-394 - [c71]Anna Cinzia Squicciarini
, Barbara Carminati
, Sushama Karumanchi:
WS-Rec: Web services recommendations using heterogeneous criteria. IRI 2013: 46-53 - [c70]Sashi Gurung, Dan Lin, Anna Cinzia Squicciarini
, Elisa Bertino:
Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks. NSS 2013: 94-108 - 2012
- [j25]Mohamed Shehab
, Anna Cinzia Squicciarini
, Gail-Joon Ahn
, Irini Kokkinou:
Access control for online social networks third party applications. Comput. Secur. 31(8): 897-911 (2012) - [j24]Anna Cinzia Squicciarini
, Elisa Bertino, Alberto Trombetta
, Stefano Braghin
:
A Flexible Approach to Multisession Trust Negotiations. IEEE Trans. Dependable Secur. Comput. 9(1): 16-29 (2012) - [j23]Smitha Sundareswaran, Anna Cinzia Squicciarini
, Dan Lin:
Ensuring Distributed Accountability for Data Sharing in the Cloud. IEEE Trans. Dependable Secur. Comput. 9(4): 556-568 (2012) - [c69]Smitha Sundareswaran, Anna Cinzia Squicciarini
, Dan Lin:
A Brokerage-Based Approach for Cloud Service Selection. IEEE CLOUD 2012: 558-565 - [c68]Giuseppe Petracca, Anna Cinzia Squicciarini
, William G. Horne, Marco Casassa Mont
:
ReasONets: a fuzzy-based approach for reasoning on network incidents. CCS 2012: 1010-1012 - [c67]Anna Cinzia Squicciarini, Giuseppe Petracca, Elisa Bertino:
Adaptive data management for self-protecting objects in cloud computing systems. CNSM 2012: 140-144 - [c66]Sashi Gurung, Anna Cinzia Squicciarini, Dan Lin, Ozan K. Tonguz:
A moving zone based architecture for message dissemination in VANETs. CNSM 2012: 184-188 - [c65]Anna Cinzia Squicciarini
, Dan Lin, Sushama Karumanchi, Nicole DeSisto:
Automatic social group organization and privacy management. CollaborateCom 2012: 89-96 - [c64]Smitha Sundareswaran, Anna Cinzia Squicciarini
:
XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks. DBSec 2012: 223-238 - [c63]Arej Muhammed, Dan Lin, Anna Cinzia Squicciarini
:
Location Privacy Policy Management System. ICICS 2012: 427-434 - [c62]Sushama Karumanchi, Anna Cinzia Squicciarini
, Dan Lin:
Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks. NSS 2012: 445-461 - [c61]Anna Cinzia Squicciarini
, William McGill, Giuseppe Petracca, Shuo Huang:
Early Detection of Policies Violations in a Social Media Site: A Bayesian Belief Network Approach. POLICY 2012: 45-52 - [c60]Anna Cinzia Squicciarini
, Christopher Griffin
:
An Informed Model of Personal Information Release in Social Networking Sites. SocialCom/PASSAT 2012: 636-645 - [c59]Christopher Griffin
, Douglas Mercer, James Fan, Anna Cinzia Squicciarini
:
Two Species Evolutionary Game Model of User and Moderator Dynamics. SocialInformatics 2012: 32-39 - [c58]Christopher Griffin
, Anna Cinzia Squicciarini
:
Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results. IEEE Symposium on Security and Privacy Workshops 2012: 113-116 - [i2]Anna Cinzia Squicciarini, Christopher Griffin:
An Informed Model of Personal Information Release in Social Networking Sites. CoRR abs/1206.0981 (2012) - [i1]Christopher Griffin, Douglas Mercer, James Fan, Anna Cinzia Squicciarini:
Two Species Evolutionary Game Model of User and Moderator Dynamics. CoRR abs/1210.0268 (2012) - 2011
- [j22]Anna Cinzia Squicciarini
, S. D. Rajasekaran, Marco Casassa Mont
:
Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks. Computer 44(1): 66-73 (2011) - [j21]Anna Cinzia Squicciarini
, Federica Paci
, Elisa Bertino:
Trust establishment in the formation of Virtual Organizations. Comput. Stand. Interfaces 33(1): 13-23 (2011) - [j20]Lee M. Hively, Frederick T. Sheldon
, Anna Cinzia Squicciarini
:
Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor. IEEE Secur. Priv. 9(4): 14-23 (2011) - [j19]Gail-Joon Ahn
, Mohamed Shehab
, Anna Cinzia Squicciarini
:
Security and Privacy in Social Networks. IEEE Internet Comput. 15(3): 10-12 (2011) - [j18]Anna Cinzia Squicciarini
, Heng Xu, Xiaolong (Luke) Zhang
:
CoPE: Enabling collaborative privacy management in online social networks. J. Assoc. Inf. Sci. Technol. 62(3): 521-534 (2011) - [j17]Said Marouf, Mohamed Shehab
, Anna Cinzia Squicciarini
, Smitha Sundareswaran:
Adaptive Reordering and Clustering-Based Framework for Efficient XACML Policy Evaluation. IEEE Trans. Serv. Comput. 4(4): 300-313 (2011) - [c57]Smitha Sundareswaran, Anna Cinzia Squicciarini
, Dan Lin, Shuo Huang:
Promoting Distributed Accountability in the Cloud. IEEE CLOUD 2011: 113-120 - [c56]Wonjun Lee, Anna Cinzia Squicciarini
, Elisa Bertino:
Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems. CCGRID 2011: 534-543 - [c55]Smitha Sundareswaran, Anna Cinzia Squicciarini
:
Privacy through web-traveler policies in social network environments. CollaborateCom 2011: 466-472 - [c54]Anna Cinzia Squicciarini
, Dan Lin, Alessandro Mancarella:
PAIM: Peer-Based Automobile Identity Management in Vehicular Ad-Hoc Network. COMPSAC 2011: 263-272 - [c53]Smitha Sundareswaran, Anna Cinzia Squicciarini
, Ranjani Sundareswaran:
Distributed Java-Based Content Protection. COMPSAC 2011: 420-425 - [c52]Anna Cinzia Squicciarini
, Smitha Sundareswaran, Dan Lin, Joshua Wede:
A3P: adaptive policy prediction for shared images over popular content sharing sites. HT 2011: 261-270 - [c51]Anna Cinzia Squicciarini
, Barbara Carminati
, Sushama Karumanchi:
A Privacy-Preserving Approach for Web Service Selection and Provisioning. ICWS 2011: 33-40 - [c50]Wonjun Lee, Anna Cinzia Squicciarini
, Elisa Bertino:
Profile-Based Selection of Accountability Policies in Grid Computing Systems. POLICY 2011: 145-148 - [c49]Anna Cinzia Squicciarini
, Christopher Griffin
, Smitha Sundareswaran:
Towards a Game Theoretical Model for Identity Validation in Social Network Sites. SocialCom/PASSAT 2011: 1081-1088 - 2010
- [b1]Elisa Bertino, Lorenzo Martino, Federica Paci
, Anna Cinzia Squicciarini
:
Security for Web Services and Service-Oriented Architectures. Springer 2010, ISBN 978-3-540-87741-7, pp. I-XII, 1-226 - [j16]Anna Cinzia Squicciarini
, Federica Paci
, Elisa Bertino, Alberto Trombetta
, Stefano Braghin
:
Group-Based Negotiations in P2P Systems. IEEE Trans. Parallel Distributed Syst. 21(10): 1473-1486 (2010) - [j15]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini
, Rui Xue, Elisa Bertino:
Multifactor Identity Verification Using Aggregated Proof of Knowledge. IEEE Trans. Syst. Man Cybern. Part C 40(4): 372-383 (2010) - [j14]Anna Cinzia Squicciarini
, Mohamed Shehab
, Joshua Wede:
Privacy policies for shared content in social network sites. VLDB J. 19(6): 777-796 (2010) - [j13]Anna Cinzia Squicciarini
, Smitha Sundareswaran:
Erratum to: Web-Traveler Policies for Images on Social Networks. World Wide Web 13(3): 389 (2010) - [c48]Anna Cinzia Squicciarini
, Smitha Sundareswaran, Dan Lin:
Preventing Information Leakage from Indexing in the Cloud. IEEE CLOUD 2010: 188-195 - [c47]Anna Cinzia Squicciarini
, Federica Paci
, Smitha Sundareswaran:
PriMa: an effective privacy protection mechanism for social networks. AsiaCCS 2010: 320-323 - [c46]Wonjun Lee, Anna Cinzia Squicciarini
, Elisa Bertino:
Vulnerabilities leading to denial of services attacks in grid computing systems: a survey. CSIIRW 2010: 54 - [c45]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini
, Elisa Bertino, Xiangwei Kong, Weike Zhang:
Biometrics-based identifiers for digital identity management. IDtrust 2010: 84-96 - [c44]Mohamed Shehab
, Gorrell P. Cheek, Hakim Touati, Anna Cinzia Squicciarini
, Pau-Chen Cheng:
User Centric Policy Management in Online Social Networks. POLICY 2010: 9-13 - [c43]Dan Lin, Anna Cinzia Squicciarini
:
Data protection models for service provisioning in the cloud. SACMAT 2010: 183-192 - [c42]Smitha Sundareswaran, Anna Cinzia Squicciarini
:
DeCore: Detecting Content Repurposing Attacks on Clients' Systems. SecureComm 2010: 199-216 - [c41]Mohamed Shehab
, Gorrell P. Cheek, Hakim Touati, Anna Cinzia Squicciarini
, Pau-Chen Cheng:
Learning based access control in online social networks. WWW 2010: 1179-1180
2000 – 2009
- 2009
- [j12]Federica Paci
, Elisa Bertino, Sam Kerr, Anna Cinzia Squicciarini
, Jungha Woo
:
An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices. J. Softw. 4(7): 696-706 (2009) - [j11]Anna Cinzia Squicciarini
, Smitha Sundareswaran:
Web-Traveler Policies for Images on Social Networks. World Wide Web 12(4): 461-484 (2009) - [c40]Nitya Vyas, Anna Cinzia Squicciarini
, Chih-Cheng Chang, Danfeng Yao
:
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations. CollaborateCom 2009: 1-10 - [c39]Wonjun Lee, Anna Cinzia Squicciarini
, Elisa Bertino:
An assessment of accountability policies for large-scale distributed computing systems. CSIIRW 2009: 39 - [c38]Wonjun Lee, Anna Cinzia Squicciarini
, Elisa Bertino:
The Design and Evaluation of Accountable Grid Computing System. ICDCS 2009: 145-154 - [c37]Said Marouf, Mohamed Shehab
, Anna Cinzia Squicciarini
, Smitha Sundareswaran:
Statistics & Clustering Based Framework for Efficient XACML Policy Evaluation. POLICY 2009: 118-125 - [c36]Anna Cinzia Squicciarini
, Mohamed Shehab
, Federica Paci
:
Collective privacy management in social networks. WWW 2009: 521-530 - 2008
- [c35]Anna Cinzia Squicciarini
, Wonjun Lee, Elisa Bertino, Carol X. Song
:
A Policy-Based Accountability Tool for Grid Computing Systems. APSCC 2008: 95-100 - [c34]Fengjun Li
, Bo Luo
, Peng Liu, Anna Cinzia Squicciarini
, Dongwon Lee, Chao-Hsien Chu
:
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering. CollaborateCom 2008: 100-112 - [c33]Guoray Cai, Anna Cinzia Squicciarini
:
A Unified Theory of Trust and Collaboration. CollaborateCom 2008: 425-438 - [c32]Anna Cinzia Squicciarini
, Federica Paci
:
Monitoring Contract Enforcement within Virtual Organizations. CollaborateCom 2008: 563-577 - [c31]Elisa Bertino, Wonjun Lee, Anna Cinzia Squicciarini
, Bhavani Thuraisingham:
End-to-end accountability in grid computing systems for coalition information sharing. CSIIRW 2008: 29:1-29:3 - [c30]Federica Paci
, David Bauer, Elisa Bertino, Douglas M. Blough, Anna Cinzia Squicciarini
:
Minimal credential disclosure in trust negotiations. Digital Identity Management 2008: 89-96 - [c29]Anna Cinzia Squicciarini
, Alberto Trombetta
, Elisa Bertino, Stefano Braghin
:
Identity-based long running negotiations. Digital Identity Management 2008: 97-106 - [c28]Anna Cinzia Squicciarini
, Alexei Czeskis, Abhilasha Bhargav-Spantzel:
Privacy policies compliance across digital identity management systems. SPRINGL 2008: 72-81 - [c27]Anna Cinzia Squicciarini
, Federica Paci
, Elisa Bertino:
Trust establishment in the formation of Virtual Organizations. ICDE Workshops 2008: 454-461 - [c26]Anna Cinzia Squicciarini
, Ivan Paloscia, Elisa Bertino:
Protecting Databases from Query Flood Attacks. ICDE 2008: 1358-1360 - [c25]Mohamed Shehab
, Anna Cinzia Squicciarini, Gail-Joon Ahn
:
Beyond User-to-User Access Control for Online Social Networks. ICICS 2008: 174-189 - [c24]Anna Cinzia Squicciarini
, Marco Casassa Mont
, Abhilasha Bhargav-Spantzel, Elisa Bertino:
Automatic Compliance of Privacy Policies in Federated Digital Identity Management. POLICY 2008: 89-92 - [c23]Federica Paci
, Elisa Bertino, Sam Kerr, Aaron Lint, Anna Cinzia Squicciarini
, Jungha Woo:
VeryIDX - A Digital Identity Management System for Pervasive Computing Environments. SEUS 2008: 268-279 - [c22]Jungha Woo
, Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini
, Elisa Bertino:
Verification of Receipts from M-commerce Transactions on NFC Cellular Phones. CEC/EEE 2008: 36-43 - 2007
- [j10]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini
, Elisa Bertino:
Trust Negotiation in Identity Management. IEEE Secur. Priv. 5(2): 55-63 (2007) - [j9]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini
, Shimon K. Modi, Matthew Young, Elisa Bertino, Stephen J. Elliott:
Privacy preserving multi-factor authentication with biometrics. J. Comput. Secur. 15(5): 529-560 (2007) - [j8]Anna Cinzia Squicciarini
, Elisa Bertino, Elena Ferrari
, Federica Paci
, Bhavani Thuraisingham:
PP-trust-X: A system for privacy preserving trust negotiations. ACM Trans. Inf. Syst. Secur. 10(3): 12 (2007) - [c21]Anna Cinzia Squicciarini
, Elisa Bertino, Sebastien Goasguen:
Access Control Strategies for Virtualized Environments in Grid Computing Systems. FTDCS 2007: 48-54 - [c20]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Matthew Young, Elisa Bertino:
Privacy Requirements in Identity Management Solutions. HCI (9) 2007: 694-702 - [c19]Anna Cinzia Squicciarini
, Alberto Trombetta
, Elisa Bertino:
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations. ICDCS 2007: 57 - [c18]Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Alexei B. Czeksis:
Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies. ICICS 2007: 386-397 - [c17]Anna Cinzia Squicciarini
, Ayça Azgin Hintoglu, Elisa Bertino, Yücel Saygin:
A privacy preserving assertion based policy language for federation systems. SACMAT 2007: 51-60 - [c16]William H. Winsborough, Anna Cinzia Squicciarini
, Elisa Bertino:
Information carrying identity proof trees. WPES 2007: 76-79 - 2006
- [j7]Anna Cinzia Squicciarini, Federica Paci
, Elisa Bertino:
A secure framework for publishing virtual community contracts. Int. J. Web Based Communities 2(2): 237-255 (2006) - [j6]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini
, Elisa Bertino:
Establishing and protecting digital identity in federation systems. J. Comput. Secur. 14(3): 269-300 (2006) - [j5]Elisa Bertino, Anna Cinzia Squicciarini
, Lorenzo Martino, Federica Paci
:
An Adaptive Access Control Model for Web Services. Int. J. Web Serv. Res. 3(3): 27-60 (2006) - [j4]Anna Cinzia Squicciarini
, Elisa Bertino, Elena Ferrari
, Indrakshi Ray:
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. IEEE Trans. Dependable Secur. Comput. 3(1): 13-30 (2006) - [j3]Elisa Bertino, Anna Cinzia Squicciarini
, Ivan Paloscia, Lorenzo Martino:
Ws-AC: A Fine Grained Access Control System for Web Services. World Wide Web 9(2): 143-171 (2006) - [c15]Elisa Bertino, Anna Cinzia Squicciarini
:
A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities. CSCWD 2006: 14 - [c14]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini
, Elisa Bertino:
Privacy preserving multi-factor authentication with biometrics. Digital Identity Management 2006: 63-72 - [c13]Anna Cinzia Squicciarini
, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari
, Indrakshi Ray:
Trust Negotiations with Customizable Anonymity. IAT Workshops 2006: 69-72 - [c12]Anna Cinzia Squicciarini
, Abhilasha Bhargav-Spantzel, Alexei Czeskis, Elisa Bertino:
Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management. Privacy Enhancing Technologies 2006: 78-98 - [c11]Elisa Bertino, Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini
:
Policy Languages for Digital Identity Management in Federation Systems. POLICY 2006: 54-66 - 2005
- [c10]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini
, Elisa Bertino:
Establishing and protecting digital identity in federation systems. Digital Identity Management 2005: 11-19 - [c9]Indrakshi Ray, Elisa Bertino, Anna Cinzia Squicciarini
, Elena Ferrari
:
Anonymity Preserving Techniques in Trust Negotiations. Privacy Enhancing Technologies 2005: 93-109 - 2004
- [j2]Elisa Bertino, Elena Ferrari
, Anna Cinzia Squicciarini
:
Trust negotiations: concepts, systems, and languages. Comput. Sci. Eng. 6(4): 27-34 (2004) - [j1]Elisa Bertino, Elena Ferrari
, Anna Cinzia Squicciarini
:
Trust-X: A Peer-to-Peer Framework for Trust Establishment. IEEE Trans. Knowl. Data Eng. 16(7): 827-842 (2004) - [c8]Elisa Bertino, Anna Cinzia Squicciarini, D. Mevi:
A Fine-Grained Access Control Model for Web Services. IEEE SCC 2004: 33-40 - [c7]Anna Cinzia Squicciarini:
Trust Negotiation Systems. EDBT Workshops 2004: 90-99 - [c6]Elisa Bertino, Anna Cinzia Squicciarini:
A Flexible Access Control Model for Web Services. FQAS 2004: 13-16 - [c5]Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini:
Privacy-Preserving Trust Negotiations. Privacy Enhancing Technologies 2004: 283-301 - [c4]Babak Sadighi Firozabadi, Marek J. Sergot, Anna Cinzia Squicciarini
, Elisa Bertino:
A Framework for Contractual Resource Sharing in Coalitions. POLICY 2004: 117-126 - 2003
- [c3]Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini:
Trust-Chi: An XML Framework for Trust Negotiations. Communications and Multimedia Security 2003: 146-157 - [c2]Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini:
A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities. DBSec 2003: 176-189 - [c1]Elisa Bertino, Elena Ferrari
, Anna Cinzia Squicciarini
:
X-TNL: An XML-based Language for Trust Negotiations. POLICY 2003: 81-84
Coauthor Index
aka: Sarah Rajtmajer

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-24 18:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint