Stefano Paraboschi

ORCID: 0000-0003-0399-1738
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Access Control and Trust
  • Cloud Data Security Solutions
  • Advanced Database Systems and Queries
  • Internet Traffic Analysis and Secure E-voting
  • Security and Verification in Computing
  • Service-Oriented Architecture and Web Services
  • Peer-to-Peer Network Technologies
  • Semantic Web and Ontologies
  • Distributed systems and fault tolerance
  • Data Management and Algorithms
  • Network Security and Intrusion Detection
  • Advanced Data Storage Technologies
  • Blockchain Technology Applications and Security
  • Privacy, Security, and Data Protection
  • Spam and Phishing Detection
  • Advanced Malware Detection Techniques
  • Business Process Modeling and Analysis
  • Caching and Content Delivery
  • Data Quality and Management
  • Distributed and Parallel Computing Systems
  • Digital and Cyber Forensics
  • Scientific Computing and Data Management
  • Software System Performance and Reliability

University of Bergamo
2015-2024

University of Milan
2004-2022

Santa Clara University
2022

University of Newcastle Australia
2022

Colorado State University
2022

University of Piraeus
2022

Polytechnique Montréal
2022

Institut National des Sciences Appliquées de Rennes
2022

Institut de Recherche en Informatique et Systèmes Aléatoires
2022

University of Pretoria
2022

Peer-to-peer (P2P) applications have seen an enormous success, and recently introduced P2P services reached tens of millions users. A feature that significantly contributes to the success many is user anonymity. However, anonymity opens door possible misuses abuses, exploiting network as a way spread tampered with resources, including Trojan Horses, viruses, spam. To address this problem we propose self-regulating system where used implement robust reputation mechanism. Reputation sharing...

10.1145/586110.586138 article EN 2002-11-18

Web-based applications greatly increase information availability and ease of access, which is optimal for public information. The distribution sharing via the Web that must be accessed in a selective way, such as electronic commerce transactions, require definition enforcement security controls, ensuring will accessible only to authorized entities. Different approaches have been proposed address problem protecting system. However, these typically operate at file-system level, independently...

10.1145/505586.505590 article EN ACM Transactions on Information and System Security 2002-05-01

Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as they provide an infrastructure in which desired can be located and downloaded while preserving anonymity of both requestors providers. As recent experience with P2P such Gnutella shows, opens door to possible misuses abuses by resource providers exploiting network a way spread tampered resources, including malicious programs, Trojan Horses viruses.In this paper we propose approach security...

10.1145/511446.511496 article EN 2002-05-07

The scope and character of today's computing environments are progressively shifting from traditional, one-on-one client-server interaction to the new cooperative paradigm. It then becomes primary importance provide means protecting secrecy information, while guaranteeing its availability legitimate clients. Operating on-line querying services securely on open networks is very difficult; therefore many enterprises outsource their data center operations external application service providers....

10.1145/948109.948124 article EN 2003-10-27

Data warehouses are databases devoted to analytical processing. They used support decision-making activities in most modern business settings, when complex data sets have be studied and analyzed. The technology for processing assumes that presented the form of simple marts, consisting a well-identified collection facts analysis dimensions (star schema). Despite wide diffusion warehouse concepts, we still miss methods help guide designer identifying extracting such marts out an enterprisewide...

10.1145/384189.384190 article EN ACM Transactions on Software Engineering and Methodology 2001-10-01

Although workflow management systems are most applicable when an organization follows standard business processes and routines, any of these faces the need for handling exceptions, i.e., asynchronous anomalous situations that fall outside normal control flow. In this paper we concentrate upon situtations that, although unusual, part semantics applications, should be specified monitored coherently; in real-life such exceptions affect a significant fraction cases. However, very few integrated...

10.1145/328939.328996 article EN ACM Transactions on Database Systems 1999-09-01

Peer-to-peer (P2P) applications have seen an enormous success, and recently introduced P2P services reached tens of millions users. A feature that significantly contributes to the success many is user anonymity. However, anonymity opens door possible misuses abuses, exploiting network as a way spread tampered with resources, including Trojan Horses, viruses, spam. To address this problem we propose self-regulating system where used implement robust reputation mechanism. Reputation sharing...

10.1145/586135.586138 article EN 2002-01-01

The impact of privacy requirements in the development modern applications is increasing very quickly. Many commercial and legal regulations are driving need to develop reliable solutions for protecting sensitive information whenever it stored, processed, or communicated external parties. To this purpose, encryption techniques currently used many scenarios where data protection required since they provide a layer against disclosure personal information, which safeguards companies from costs...

10.1145/1805974.1805978 article EN ACM Transactions on Information and System Security 2010-07-01

Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as they provide an infrastructure in which desired can be located and downloaded while preserving anonymity of both requestors providers. As recent experience with P2P such Gnutella shows, opens door to possible misuses abuses by resource providers exploiting network a way spread tampered-with resources, including malicious programs, Trojan Horses viruses. We propose approach security where...

10.1109/tkde.2003.1209003 article EN IEEE Transactions on Knowledge and Data Engineering 2003-07-01

Current access control models typically assume that resources are under the strict custody of a trusted party which monitors each request to verify if it is compliant with specified policy. There many scenarios where this approach becoming no longer adequate. Many clear trends in Web technology creating need for owners sensitive information manage by legitimate users using services honest but curious third parties, is, parties providing required service not authorized read actual data...

10.1145/1735886.1735891 article EN ACM Transactions on Database Systems 2010-04-01

Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as they provide an infrastructure in which desired can be located and downloaded while preserving anonymity of both requestors providers. As recent experience with P2P such Gnutella shows, opens door to possible misuses abuses by resource providers exploiting network a way spread tampered resources, including malicious programs, Trojan Horses viruses.In this paper we propose approach security...

10.1145/511495.511496 article EN 2002-01-01

In this article we present an approach to integrity maintenance, consisting of automatically generating production rules for enforcement. Constraints are expressed as particular formulas Domain Relational Calculus; they translated into a set repair actions, encoded active database system. Production may be redundant (they enforce the same constraint in different ways) and conflicting (because repairing one cause violation another constraint). Thus, it is necessary develop techniques...

10.1145/185827.185828 article EN ACM Transactions on Database Systems 1994-09-01

Abstract Peer‐to‐peer (P2P) applications are rapidly gaining acceptance among users of Internet‐based services, especially because their capability exchanging resources while preserving the anonymity both requesters and providers. However, concerns have been raised about possibility that malicious can exploit network to spread tampered‐with (e.g., programs viruses). A considerable amount research has thus focused on development trust reputation models in P2P networks. In this article, we...

10.1002/asi.20307 article EN Journal of the American Society for Information Science and Technology 2006-01-18

The scope and character of today's computing environments are progressively shifting from traditional, one-on-one client-server interaction to the new cooperative paradigm. It then becomes primary importance provide means protecting secrecy information, while guaranteeing its availability legitimate clients. Operating online querying services securely on open networks is very difficult; therefore many enterprises outsource their data center operations external application service providers....

10.1145/1053283.1053289 article EN ACM Transactions on Information and System Security 2005-02-01

Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some most challenging issues in such scenario are enforcement authorization policies support policy updates. Since common approach protecting outsourced data consists encrypting themselves, promising solving these based on combination access control with cryptography. This idea itself not new, but problem applying it an architecture...

10.1145/1314466.1314477 article EN 2007-11-02

As the use of external storage and data processing services for storing managing sensitive becomes more common, there is an increasing need novel techniques that support not only confidentiality, but also confidentiality accesses users make on such data. In this paper, we propose a technique guaranteeing content, access, pattern in outsourcing scenario. The proposed introduces shuffle index structure, which adapts traditional B+-trees. We show our solution exhibits limited performance cost,...

10.1109/icdcs.2011.37 article EN 2011-06-01

The scope and character of today's computing environments are progressively shifting from traditional, one-on-one client-server interaction to the new cooperative paradigm. It then becomes primary importance provide means protecting secrecy information, while guaranteeing its availability legitimate clients. Operating on-line querying services securely on open networks is very difficult; therefore many enterprises outsource their data center operations external application service providers....

10.1145/948121.948124 article EN 2003-01-01
Coming Soon ...