- Dipartimento di Scienze Teoriche e Applicate - sezione di Informatica
via Mazzini 5, 21100 Varese - +39 0332 218945
- Computer Science, Database Systems, Computer Security, Network Security, Information Security, Cryptography, and 23 morePrivacy, Anonymity, Wireless Communication Security, Algorithms, Combinatorics, Privacy Preserving Updates to Anonymous and Confidential Databases, Privacy Aware Access Control, Engineering, Physics, Information Technology, Artificial Intelligence, Data Mining, Elliptic Curve Cryptography, Applied Cryptography, Computational Logic, Non-Classical Logic, Conceptual Modelling, Information and Technology, Description logics, Trust and Reputation Systems, Ontology Engineering, Internet of Things, and Philosophy of Computer Scienceedit
Outsourcing data in the cloud has become nowadays very common. Since – generally speaking – cloud data storage and manage- ment providers cannot be fully trusted, mechanisms providing the con- fidentiality of the stored data are... more
Outsourcing data in the cloud has become nowadays very common. Since – generally speaking – cloud data storage and manage- ment providers cannot be fully trusted, mechanisms providing the con- fidentiality of the stored data are necessary. A possible solution is to encrypt all the data, but – of course – this poses serious problems about the effective usefulness of the stored data. In this work, we propose to apply a well-known attribute-based cryptographic scheme to cope with the problem of querying encrypted data. We have implemented the pro- posed scheme with a real-world, off-the-shelf RDBMS and we provide several experimental results showing the feasibility of our approach.
Research Interests:
Research Interests:
Research Interests:
Abstract The community of users of a large data-driven web site may directly contribute to its management by feeding corrections and new additions, thus keeping “fresh” the information provided by the site. However, several issues may... more
Abstract The community of users of a large data-driven web site may directly contribute to its management by feeding corrections and new additions, thus keeping “fresh” the information provided by the site. However, several issues may arise due to the fact that users may modify data in a more or less controlled way. Starting from a real-world scenario, we point out such issues and we present a simple and efficient framework.
Abstract Suppose that Alice, owner of a k-anonymous database, needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Suppose moreover that access to the database is strictly controlled,... more
Abstract Suppose that Alice, owner of a k-anonymous database, needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Suppose moreover that access to the database is strictly controlled, because for example data are used for experiments that need to be maintained confidential.
Abstract Trust Negotiation has shown to be a successful, policy-driven approach for automated trust establishment, through the release of digital credentials. Current real applications require new flexible approaches to trust... more
Abstract Trust Negotiation has shown to be a successful, policy-driven approach for automated trust establishment, through the release of digital credentials. Current real applications require new flexible approaches to trust negotiations, especially in light of the widespread use of mobile devices. In this paper, we present a multisession dependable approach to trust negotiations.
Abstract This paper proposes a model for short-term content adaptation whose aim is to satisfy the contingent needs of users by adjusting the information a web-application provides on the basis of a short-term user profile. The... more
Abstract This paper proposes a model for short-term content adaptation whose aim is to satisfy the contingent needs of users by adjusting the information a web-application provides on the basis of a short-term user profile. The mathematical model results in the design of an adaptive filter that profiles users by observing their queries to the application and that adjusts the answers of the application according to the inferred user needs.
Modern Critical Infrastructures (CIs)(power grids, power plants, gas and oil pipelines, etc.) are strongly interconnected at the national and international levels nowadays. The failure of one of them can originate cascading effects which... more
Modern Critical Infrastructures (CIs)(power grids, power plants, gas and oil pipelines, etc.) are strongly interconnected at the national and international levels nowadays. The failure of one of them can originate cascading effects which might have a serious and disastrous impact on others, even on geographically far infrastructures.
Industrial facilities and infrastructures such as chemical factories, oil refineries, power generation plants, and water treatment plants are nowadays highly dependent on “Industrial Control Systems (ICS)”. Such systems are typically used... more
Industrial facilities and infrastructures such as chemical factories, oil refineries, power generation plants, and water treatment plants are nowadays highly dependent on “Industrial Control Systems (ICS)”. Such systems are typically used in industries to monitor and control remote processes. The NIST guide to industrial control systems security [4] divides ICS in “Supervisory Control And Data Acquisition (SCADA)” systems,“Distributed Control Systems (DCS)” and other smaller control systems.
Research Interests: Information Systems, Data Mining, Privacy, Access Control, Standardization, and 13 morePerformance Evaluation, Model, Computer Software, Data Privacy, Natural language, Database Management, Access Control Models, Business environment, Authorisation, Role Based Access Control, Privacy Policy, Multimedia Authoring Tool, and Data Format
Research Interests:
Research Interests:
Research Interests:
Abstract XML is the standard data interchange format and XSLT is the W3C proposed standard for transforming and restructuring XML documents. It turns out that XSLT has very powerful query capabilities as well. However, due to its complex... more
Abstract XML is the standard data interchange format and XSLT is the W3C proposed standard for transforming and restructuring XML documents. It turns out that XSLT has very powerful query capabilities as well. However, due to its complex syntax and lack of formal specification, it is not a trivial task to decide whether two XSLT stylesheets yield the same result, even if for an XSLT fragment. We isolate such fragment, powerful enough for expressing several interesting queries and for manipulating XML documents and show ...
Research Interests:
Abstract Multimedia informations systems and Web-based applications such as search engines need to automatically extract and classify multimedia data such as images and textual documents. For this reason, very significant research has... more
Abstract Multimedia informations systems and Web-based applications such as search engines need to automatically extract and classify multimedia data such as images and textual documents. For this reason, very significant research has focused on similarity queries from the standpoint of the definition and creation of appropriate index structures. We provide a formal framework in which formulate powerful similarity-based queries. For this purposes a fuzzy relational algebra extending the classical relational algebra is defined ...
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Web and multimedia data are becoming very important. A fundamental characteristic of these data is imprecision. Query languages for Web and multimedia data must express imprecision in features matching, similarity queries and user... more
Web and multimedia data are becoming very important. A fundamental characteristic of these data is imprecision. Query languages for Web and multimedia data must express imprecision in features matching, similarity queries and user preferences. In addition specific operators need to be introduced to organize the answers in a user friendly style. The aim of this work is to provide a formal framework in which to formulate very powerful queries and presentations of the answers. To this end, a fuzzy based algebra is introduced. The fuzzy ...
Research Interests: Information Systems, Algebra, Algorithms, Information Retrieval, Multimedia, and 13 moreFuzzy Sets, Information Processing, Library and Information Studies, Relational Algebra, Feature matching, Evaluation methods, World Wide Web, Similarity, User preferences, Fuzzy Set, User Requirements, Multimedia Data, and Fuzzy relation
Abstract Web and multimedia data are becoming very important. A fundamental characteristic of these data is imprecision. Query languages for web and multimedia data must express imprecision in features matching, similarity queries and... more
Abstract Web and multimedia data are becoming very important. A fundamental characteristic of these data is imprecision. Query languages for web and multimedia data must express imprecision in features matching, similarity queries and user preferences. In addition specific operators need to be introduced to organize the answers in a user friendly style. The aim of this work is to provide a formal framework in which to formulate very powerful queries and presentations of the answers. To this end, a fuzzy algebra and a ...
Research Interests:
Research Interests:
Abstract In recent years, a concentration of effort to design adaptive web application has arisen: generally, each user has dif ferent information needs, depending on her/his social role, culture, etc. Especially in the field of web-based... more
Abstract In recent years, a concentration of effort to design adaptive web application has arisen: generally, each user has dif ferent information needs, depending on her/his social role, culture, etc. Especially in the field of web-based learning, it has become progressively clearer that these needs do not only depend on a long-term characterisation of the user, but also on the contingent situation the user lives. In this paper, a model for short-term content adapta tion is proposed, whose aim is to satisfy contingent needs of users by adjusting the ...
