Claudio A. Ardagna

ORCID: 0000-0001-7426-4795
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Access Control and Trust
  • Cloud Data Security Solutions
  • Privacy-Preserving Technologies in Data
  • Service-Oriented Architecture and Web Services
  • Security and Verification in Computing
  • Software System Performance and Reliability
  • Cryptography and Data Security
  • Privacy, Security, and Data Protection
  • Cloud Computing and Resource Management
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Software Engineering Methodologies
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Blockchain Technology Applications and Security
  • Information and Cyber Security
  • IoT and Edge/Fog Computing
  • Big Data and Business Intelligence
  • Business Process Modeling and Analysis
  • Scientific Computing and Data Management
  • Data Quality and Management
  • Mobile Crowdsensing and Crowdsourcing
  • Software Testing and Debugging Techniques
  • Adversarial Robustness in Machine Learning
  • Safety Systems Engineering in Autonomy
  • Indoor and Outdoor Localization Technologies

University of Milan
2016-2025

Los Alamitos Medical Center
2021-2023

Zhejiang University of Technology
2023

Hong Kong Polytechnic University
2012-2022

Karlstad University
2012-2022

University of Plymouth
2012-2022

University of Zurich
2022

Technical University of Denmark
2022

Systems Technology (United States)
2022

Chalmers University of Technology
2022

The pervasive diffusion of mobile communication devices and the technical improvements location techniques are fostering development new applications that use physical position users to offer location-based services for business, social, or informational purposes. In such a context, privacy concerns increasing call sophisticated solutions able guarantee different levels users. this paper, we address problem present solution based on obfuscation operators that, when used individually in...

10.1109/tdsc.2009.25 article EN IEEE Transactions on Dependable and Secure Computing 2009-06-25

Location-based Access Control (LBAC) techniques allow taking users' physical location into account when determining their access privileges. In this paper, we present an approach to LBAC aimed at integrating location-based conditions along with a generic control model, so that requestor can be granted or denied by checking her as well credentials. Our model includes novel way of the limitations technology used ascertain requester. Namely, describe how verification encapsulated service,...

10.1145/1128817.1128850 article EN 2006-03-21

The protection of privacy is an increasing concern in our networked society because the growing amount personal information that being collected by a number commercial and public services. Emerging scenarios user–service interactions i

10.3233/jcs-2008-0328 article EN Journal of Computer Security 2008-07-16

Big Data domain is one of the most promising ICT sectors with substantial expectations both on side market growing and design shift in area data storage managment analytics. However, today, level complexity achieved lack standardisation management architectures represent a huge barrier towards adoption execution analytics especially for those organizations SMEs not including sufficient amount competences knowledge. The full potential Analytics (BDA) can be unleashed only through definition...

10.1109/bigdata.2016.7841029 article EN 2021 IEEE International Conference on Big Data (Big Data) 2016-12-01

Technical enhancements of mobile technologies are paving the way to definition high-quality and accurate geolocation solutions based on data collected managed by GSM/3G networks. We present a technique that provides mobility prediction both at network service level, does not require any change existing infrastructure, is entirely performed side, making it more robust than other positioning systems with respect location spoofing terminal-based security threats. Our approach novel database...

10.1109/twc.2011.011811.100025 article EN IEEE Transactions on Wireless Communications 2011-01-21

Traditional assurance solutions for software-based systems rely on static verification techniques and assume continuous availability of trusted third parties. With the advent cloud computing, these become ineffective since services/applications are flexible, dynamic, change at runtime, high rates. Although several approaches have been defined, requires a step-change moving current to fully embrace peculiarities. In this paper, we provide rigorous adaptive technique based certification,...

10.1109/tsc.2017.2657505 article EN IEEE Transactions on Services Computing 2017-01-24

The Big Data revolution promises to build a data-driven ecosystem where better decisions are supported by enhanced analytics and data management.However, major hurdles still need be overcome on the road that leads commoditization wide adoption of Analytics (BDA).Big complexity is first factor hampering full potential BDA.The opacity variety technologies computations, in fact, make BDA failure prone resource-intensive process, which requires trial-and-error approach.This problem even...

10.1109/tsc.2018.2816941 article EN publisher-specific-oa IEEE Transactions on Services Computing 2018-03-19

We conduct more and of our daily interactions over electronic media. The EC-funded project PRIME (Privacy Identity Management for Europe) envisions that individuals will be able to interact in this information society a secure safe way while retaining control their privacy. p roject had set out prove existing privacy-enhancing technologies allow the construction user-controlled identity management system comes surprisingly close vision. This paper describes two key elements systems:...

10.3233/jcs-2010-0367 article EN Journal of Computer Security 2010-01-01

The Big Data revolution has promised to build a data-driven ecosystem where better decisions are supported by enhanced analytics and data management. However, critical issues still need be solved in the road that leads commodization of Analytics, such as management complexity protection security privacy. In this paper, we focus on first issue propose methodology based Model Driven Engineering (MDE) aims substantially lower amount competences needed pipeline support automation analytics....

10.1109/bigdatacongress.2017.23 article EN 2017-06-01

Traditional access control solutions, based on preliminary identification and authentication of the requester, are not adequate for context open web service systems, where servers generally do have prior knowledge requesters. The research community has acknowledged such a paradigm shift several investigations been carried out new approaches to regulate in dynamic settings. Typically logic, approaches, while appealing their expressiveness, result applicable practice, simplicity, efficiency,...

10.1109/tsc.2010.29 article EN IEEE Transactions on Services Computing 2010-05-27

The widespread diffusion of the Internet as platform for accessing distributed services makes available a huge amount personal data, and corresponding concern demand from users, well legislation, solutions providing users with form control on their data. Responding to this requirement raises emerging need supporting proper information security governance, allowing enterprises managing user enforce restrictions acquisition its processing secondary use. While research community has...

10.1145/1655168.1655178 article EN 2009-11-13
Coming Soon ...