- Access Control and Trust
- Cloud Data Security Solutions
- Privacy-Preserving Technologies in Data
- Service-Oriented Architecture and Web Services
- Security and Verification in Computing
- Software System Performance and Reliability
- Cryptography and Data Security
- Privacy, Security, and Data Protection
- Cloud Computing and Resource Management
- Internet Traffic Analysis and Secure E-voting
- Advanced Software Engineering Methodologies
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
- Information and Cyber Security
- IoT and Edge/Fog Computing
- Big Data and Business Intelligence
- Business Process Modeling and Analysis
- Scientific Computing and Data Management
- Data Quality and Management
- Mobile Crowdsensing and Crowdsourcing
- Software Testing and Debugging Techniques
- Adversarial Robustness in Machine Learning
- Safety Systems Engineering in Autonomy
- Indoor and Outdoor Localization Technologies
University of Milan
2016-2025
Los Alamitos Medical Center
2021-2023
Zhejiang University of Technology
2023
Hong Kong Polytechnic University
2012-2022
Karlstad University
2012-2022
University of Plymouth
2012-2022
University of Zurich
2022
Technical University of Denmark
2022
Systems Technology (United States)
2022
Chalmers University of Technology
2022
The pervasive diffusion of mobile communication devices and the technical improvements location techniques are fostering development new applications that use physical position users to offer location-based services for business, social, or informational purposes. In such a context, privacy concerns increasing call sophisticated solutions able guarantee different levels users. this paper, we address problem present solution based on obfuscation operators that, when used individually in...
Location-based Access Control (LBAC) techniques allow taking users' physical location into account when determining their access privileges. In this paper, we present an approach to LBAC aimed at integrating location-based conditions along with a generic control model, so that requestor can be granted or denied by checking her as well credentials. Our model includes novel way of the limitations technology used ascertain requester. Namely, describe how verification encapsulated service,...
The protection of privacy is an increasing concern in our networked society because the growing amount personal information that being collected by a number commercial and public services. Emerging scenarios user–service interactions i
Big Data domain is one of the most promising ICT sectors with substantial expectations both on side market growing and design shift in area data storage managment analytics. However, today, level complexity achieved lack standardisation management architectures represent a huge barrier towards adoption execution analytics especially for those organizations SMEs not including sufficient amount competences knowledge. The full potential Analytics (BDA) can be unleashed only through definition...
Technical enhancements of mobile technologies are paving the way to definition high-quality and accurate geolocation solutions based on data collected managed by GSM/3G networks. We present a technique that provides mobility prediction both at network service level, does not require any change existing infrastructure, is entirely performed side, making it more robust than other positioning systems with respect location spoofing terminal-based security threats. Our approach novel database...
Traditional assurance solutions for software-based systems rely on static verification techniques and assume continuous availability of trusted third parties. With the advent cloud computing, these become ineffective since services/applications are flexible, dynamic, change at runtime, high rates. Although several approaches have been defined, requires a step-change moving current to fully embrace peculiarities. In this paper, we provide rigorous adaptive technique based certification,...
The Big Data revolution promises to build a data-driven ecosystem where better decisions are supported by enhanced analytics and data management.However, major hurdles still need be overcome on the road that leads commoditization wide adoption of Analytics (BDA).Big complexity is first factor hampering full potential BDA.The opacity variety technologies computations, in fact, make BDA failure prone resource-intensive process, which requires trial-and-error approach.This problem even...
We conduct more and of our daily interactions over electronic media. The EC-funded project PRIME (Privacy Identity Management for Europe) envisions that individuals will be able to interact in this information society a secure safe way while retaining control their privacy. p roject had set out prove existing privacy-enhancing technologies allow the construction user-controlled identity management system comes surprisingly close vision. This paper describes two key elements systems:...
The Big Data revolution has promised to build a data-driven ecosystem where better decisions are supported by enhanced analytics and data management. However, critical issues still need be solved in the road that leads commodization of Analytics, such as management complexity protection security privacy. In this paper, we focus on first issue propose methodology based Model Driven Engineering (MDE) aims substantially lower amount competences needed pipeline support automation analytics....
Traditional access control solutions, based on preliminary identification and authentication of the requester, are not adequate for context open web service systems, where servers generally do have prior knowledge requesters. The research community has acknowledged such a paradigm shift several investigations been carried out new approaches to regulate in dynamic settings. Typically logic, approaches, while appealing their expressiveness, result applicable practice, simplicity, efficiency,...
The widespread diffusion of the Internet as platform for accessing distributed services makes available a huge amount personal data, and corresponding concern demand from users, well legislation, solutions providing users with form control on their data. Responding to this requirement raises emerging need supporting proper information security governance, allowing enterprises managing user enforce restrictions acquisition its processing secondary use. While research community has...