Maria Luisa Damiani

ORCID: 0000-0001-9587-308X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Data Management and Algorithms
  • Geographic Information Systems Studies
  • Human Mobility and Location-Based Analysis
  • Access Control and Trust
  • Advanced Database Systems and Queries
  • Privacy, Security, and Data Protection
  • Cryptography and Data Security
  • Semantic Web and Ontologies
  • Mobile Crowdsensing and Crowdsourcing
  • Data Mining Algorithms and Applications
  • Mobile Agent-Based Network Management
  • Multi-Agent Systems and Negotiation
  • Vehicular Ad Hoc Networks (VANETs)
  • Indoor and Outdoor Localization Technologies
  • Big Data Technologies and Applications
  • Wildlife Ecology and Conservation
  • Wildlife-Road Interactions and Conservation
  • Landslides and related hazards
  • Logic, Reasoning, and Knowledge
  • Time Series Analysis and Forecasting
  • Opportunistic and Delay-Tolerant Networks
  • Video Surveillance and Tracking Methods
  • Advanced Computational Techniques and Applications
  • earthquake and tectonic studies

University of Milan
2015-2024

Iowa State University
2023

Deakin University
2023

Purdue University West Lafayette
2007-2023

University of Stuttgart
2023

Oracle (United States)
2023

Universidade Federal do Rio Grande do Sul
2017

University of Hagen
2014

University of Pittsburgh
2014

Lewis University
2014

Securing access to data in location-based services and mobile applications requires the definition of spatially aware control systems. Even if some approaches have already been proposed either context geographic database systems or context-aware applications, a comprehensive framework, general flexible enough cope with spatial aspects real is still missing. In this paper, we make one step towards direction present GEO-RBAC, an extension RBAC model deal information. entities are used objects,...

10.1145/1063979.1063985 article EN 2005-06-01

Securing access to data in location-based services and mobile applications requires the definition of spatially aware access-control systems. Even if some approaches have already been proposed either context geographic database systems or context-aware applications, a comprehensive framework, general flexible enough deal with spatial aspects real is still missing. In this paper, we make one step toward direction present GEO-RBAC, an extension RBAC model enhanced spatial-and information....

10.1145/1210263.1210265 article EN ACM Transactions on Information and System Security 2007-02-01

Mobile devices with positioning capabilities allow users to participate in novel and exciting location-based applications. For instance, may track the whereabouts of their acquaintances location-aware social networking applications, e.g., GoogleLatitude. Furthermore, can request information about landmarks proximity. Such scenarios require report coordinates other parties, which not be fully trusted. Reporting precise locations result serious privacy violations, such as disclosure lifestyle...

10.1145/1653771.1653807 article EN 2009-11-04

Due to the proliferation of GPS-enabled devices in vehicles or with people, large amounts position data are recorded every day and management such mobility data, also called trajectories, is a very active research field. A lot effort has gone into discovering “semantics” from raw geometric trajectories by relating them spatial environment finding patterns, for example, mining techniques. question how resulting “meaningful” can be represented further queried. In this article, we propose...

10.1145/2786756 article EN ACM Transactions on Spatial Algorithms and Systems 2015-07-27

Geosocial networking applications magnify the concern for location privacy because a user's position can be disclosed to diverse untrusted parties. The Privacy Preserving Obfuscation Environment (Probe) framework supports semantic-location cloaking protect this information.

10.1109/mprv.2011.18 article EN IEEE Pervasive Computing 2011-04-01

This paper presents a privacy-preserving framework for the protection of sensitive positions in real time trajectories. We assume scenario which sensitivity user's is space-varying, and so depends on spatial context, while movement confined to road networks places. Typical users are non-anonymous members geo-social network who agree share their exact position whenever such does not fall within place, e.g. hospital. Suspending location sharing user inside place an appropriate solution because...

10.1109/mdm.2012.48 article EN 2012-07-01

In this paper we present a time-aware, density-based clustering technique for the identification of stay regions in trajectories low-sampling-rate GPS points, and its application to study animal migrations. A region is defined as portion space which generally does not designate precise geographical entity where an object significantly period time, spite relatively short periods absence. Stay can delimit example residence animals, i.e. home-range. The proposed enables extraction represented...

10.1145/2666310.2666417 article EN 2014-11-04

The widespread adoption of location-based services (LBS) raises increasing concerns for the protection personal location information. A common strategy, referred to as obfuscation, protect privacy is based on forwarding LSB provider a coarse user instead actual location. Conventional approaches, such technique, are however only geometric methods and therefore unable assure when adversary aware geographical context. This paper provides comprehensive solution this problem. Our presents novel...

10.1145/1667502.1667511 article EN 2009-11-03

As mobile computing devices are becoming increasingly dominant in enterprise and government organizations, the need for fine-grained access control these environments continues to grow. Specifically, advanced forms of can be deployed ensure authorized users sensitive resources only when trusted locations. One technique that has been proposed is augment role-based (RBAC) with spatial constraints. In such a system, an user must designated location order exercise privileges associated role....

10.1145/2093973.2094018 article EN 2011-11-01

An ambitious conservation programme to save the Iberian lynx from extinction conducted several reintroductions aiming restore its historical range. The urgency due delicate status prompted translocating captive-born and wild individuals, while preventing an early assessment of how both groups combined their space-use differed in post-release movements. To address this issue, we a comprehensive movement ecology analysis using GPS data 161 lynxes 9 populations. First, classified five phases...

10.1016/j.biocon.2024.110646 article EN cc-by-nc-nd Biological Conservation 2024-05-22

Access control is an important component of any database management system. Several access models have been proposed for conventional databases. However, these do not seem adequate geographical databases, due to the peculiarities data. Previous work on data mainly concerns raster maps (images). In this paper, we present a discretionary model maps. We assume that each map composed set features. Each feature represented in one or more by spatial objects, described means different properties:...

10.1145/1032222.1032236 article EN 2004-11-12

Geospatial data play a key role in wide spectrum of critical management applications, such as disaster and emergency management, environmental monitoring, land city planning, military operations, often requiring the coordination among diverse organizations, their repositories, users with different responsibilities. Although variety models techniques are available to manage, access share geospatial data, very little attention has been paid addressing security concerns, control, privacy...

10.1145/1503402.1503406 article EN 2008-11-04

Partial migration is a crucial mobility pattern in animal ecology. Unlike complete migrations that take place when all the individuals population migrate with clear separation of ranges, partial are often follow modalities and times vary from to animal. As result distinction between migratory nonmigratory behavior becomes less defined. In this paper, we present an interdisciplinary effort geared evaluate whether recent time-aware, density-based clustering technique, called SeqScan, relying...

10.1080/13658816.2015.1070267 article EN International Journal of Geographical Information Science 2015-07-29

The concern for location privacy in mobile applications is commonly motivated by a scenario which device communicates personal data, i.e. the holder location, to third party e.g. LBS provider, exchange some information service. We argue that this offers partial view of actual risks privacy, because reality How can be more complex. For example, and often computed party, Google Location Service. providers are position collecting huge amounts data from users diverse (e.g. Facebook Foursquare...

10.1109/mdm.2013.67 article EN 2013-06-01

In this paper we deal with the problem of querying heterogeneous trajectory data consisting spatial and textual trajectories defined over continuous temporal domains. contrast trajectories, which describe movement in space an individual, concern work individual's step-wise changing behavior, such as transportation means used activities performed a time period. Accessing large datasets temporally aligned can provide valuable information on where certain behaviors take place. present novel...

10.1109/mdm.2016.47 article EN 2016-06-01
Coming Soon ...