- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Access Control and Trust
- Cloud Data Security Solutions
- Advanced Database Systems and Queries
- Internet Traffic Analysis and Secure E-voting
- Security and Verification in Computing
- Service-Oriented Architecture and Web Services
- Peer-to-Peer Network Technologies
- Semantic Web and Ontologies
- Distributed systems and fault tolerance
- Data Management and Algorithms
- Network Security and Intrusion Detection
- Advanced Data Storage Technologies
- Blockchain Technology Applications and Security
- Privacy, Security, and Data Protection
- Spam and Phishing Detection
- Advanced Malware Detection Techniques
- Business Process Modeling and Analysis
- Caching and Content Delivery
- Data Quality and Management
- Distributed and Parallel Computing Systems
- Digital and Cyber Forensics
- Scientific Computing and Data Management
- Software System Performance and Reliability
University of Bergamo
2015-2024
University of Milan
2004-2022
Santa Clara University
2022
University of Newcastle Australia
2022
Colorado State University
2022
University of Piraeus
2022
Polytechnique Montréal
2022
Institut National des Sciences Appliquées de Rennes
2022
Institut de Recherche en Informatique et Systèmes Aléatoires
2022
University of Pretoria
2022
Peer-to-peer (P2P) applications have seen an enormous success, and recently introduced P2P services reached tens of millions users. A feature that significantly contributes to the success many is user anonymity. However, anonymity opens door possible misuses abuses, exploiting network as a way spread tampered with resources, including Trojan Horses, viruses, spam. To address this problem we propose self-regulating system where used implement robust reputation mechanism. Reputation sharing...
Web-based applications greatly increase information availability and ease of access, which is optimal for public information. The distribution sharing via the Web that must be accessed in a selective way, such as electronic commerce transactions, require definition enforcement security controls, ensuring will accessible only to authorized entities. Different approaches have been proposed address problem protecting system. However, these typically operate at file-system level, independently...
Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as they provide an infrastructure in which desired can be located and downloaded while preserving anonymity of both requestors providers. As recent experience with P2P such Gnutella shows, opens door to possible misuses abuses by resource providers exploiting network a way spread tampered resources, including malicious programs, Trojan Horses viruses.In this paper we propose approach security...
The scope and character of today's computing environments are progressively shifting from traditional, one-on-one client-server interaction to the new cooperative paradigm. It then becomes primary importance provide means protecting secrecy information, while guaranteeing its availability legitimate clients. Operating on-line querying services securely on open networks is very difficult; therefore many enterprises outsource their data center operations external application service providers....
Data warehouses are databases devoted to analytical processing. They used support decision-making activities in most modern business settings, when complex data sets have be studied and analyzed. The technology for processing assumes that presented the form of simple marts, consisting a well-identified collection facts analysis dimensions (star schema). Despite wide diffusion warehouse concepts, we still miss methods help guide designer identifying extracting such marts out an enterprisewide...
Although workflow management systems are most applicable when an organization follows standard business processes and routines, any of these faces the need for handling exceptions, i.e., asynchronous anomalous situations that fall outside normal control flow. In this paper we concentrate upon situtations that, although unusual, part semantics applications, should be specified monitored coherently; in real-life such exceptions affect a significant fraction cases. However, very few integrated...
Peer-to-peer (P2P) applications have seen an enormous success, and recently introduced P2P services reached tens of millions users. A feature that significantly contributes to the success many is user anonymity. However, anonymity opens door possible misuses abuses, exploiting network as a way spread tampered with resources, including Trojan Horses, viruses, spam. To address this problem we propose self-regulating system where used implement robust reputation mechanism. Reputation sharing...
The impact of privacy requirements in the development modern applications is increasing very quickly. Many commercial and legal regulations are driving need to develop reliable solutions for protecting sensitive information whenever it stored, processed, or communicated external parties. To this purpose, encryption techniques currently used many scenarios where data protection required since they provide a layer against disclosure personal information, which safeguards companies from costs...
Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as they provide an infrastructure in which desired can be located and downloaded while preserving anonymity of both requestors providers. As recent experience with P2P such Gnutella shows, opens door to possible misuses abuses by resource providers exploiting network a way spread tampered-with resources, including malicious programs, Trojan Horses viruses. We propose approach security where...
Current access control models typically assume that resources are under the strict custody of a trusted party which monitors each request to verify if it is compliant with specified policy. There many scenarios where this approach becoming no longer adequate. Many clear trends in Web technology creating need for owners sensitive information manage by legitimate users using services honest but curious third parties, is, parties providing required service not authorized read actual data...
Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as they provide an infrastructure in which desired can be located and downloaded while preserving anonymity of both requestors providers. As recent experience with P2P such Gnutella shows, opens door to possible misuses abuses by resource providers exploiting network a way spread tampered resources, including malicious programs, Trojan Horses viruses.In this paper we propose approach security...
In this article we present an approach to integrity maintenance, consisting of automatically generating production rules for enforcement. Constraints are expressed as particular formulas Domain Relational Calculus; they translated into a set repair actions, encoded active database system. Production may be redundant (they enforce the same constraint in different ways) and conflicting (because repairing one cause violation another constraint). Thus, it is necessary develop techniques...
Abstract Peer‐to‐peer (P2P) applications are rapidly gaining acceptance among users of Internet‐based services, especially because their capability exchanging resources while preserving the anonymity both requesters and providers. However, concerns have been raised about possibility that malicious can exploit network to spread tampered‐with (e.g., programs viruses). A considerable amount research has thus focused on development trust reputation models in P2P networks. In this article, we...
The scope and character of today's computing environments are progressively shifting from traditional, one-on-one client-server interaction to the new cooperative paradigm. It then becomes primary importance provide means protecting secrecy information, while guaranteeing its availability legitimate clients. Operating online querying services securely on open networks is very difficult; therefore many enterprises outsource their data center operations external application service providers....
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some most challenging issues in such scenario are enforcement authorization policies support policy updates. Since common approach protecting outsourced data consists encrypting themselves, promising solving these based on combination access control with cryptography. This idea itself not new, but problem applying it an architecture...
As the use of external storage and data processing services for storing managing sensitive becomes more common, there is an increasing need novel techniques that support not only confidentiality, but also confidentiality accesses users make on such data. In this paper, we propose a technique guaranteeing content, access, pattern in outsourcing scenario. The proposed introduces shuffle index structure, which adapts traditional B+-trees. We show our solution exhibits limited performance cost,...
The scope and character of today's computing environments are progressively shifting from traditional, one-on-one client-server interaction to the new cooperative paradigm. It then becomes primary importance provide means protecting secrecy information, while guaranteeing its availability legitimate clients. Operating on-line querying services securely on open networks is very difficult; therefore many enterprises outsource their data center operations external application service providers....