Skip to main content
Alberto Trombetta
  • Dipartimento di Scienze Teoriche e Applicate - sezione di Informatica
    via Mazzini 5, 21100 Varese
  • +39 0332 218945
Download (.pdf)
Outsourcing data in the cloud has become nowadays very common. Since – generally speaking – cloud data storage and manage- ment providers cannot be fully trusted, mechanisms providing the con- fidentiality of the stored data are... more
Outsourcing data in the cloud has become nowadays very common. Since – generally speaking – cloud data storage and manage- ment providers cannot be fully trusted, mechanisms providing the con- fidentiality of the stored data are necessary. A possible solution is to encrypt all the data, but – of course – this poses serious problems about the effective usefulness of the stored data. In this work, we propose to apply a well-known attribute-based cryptographic scheme to cope with the problem of querying encrypted data. We have implemented the pro- posed scheme with a real-world, off-the-shelf RDBMS and we provide several experimental results showing the feasibility of our approach.
Research Interests:
Download (.pdf)
Research Interests:
Download (.pdf)
Research Interests:
Download (.pdf)
Abstract The community of users of a large data-driven web site may directly contribute to its management by feeding corrections and new additions, thus keeping “fresh” the information provided by the site. However, several issues may... more
Abstract The community of users of a large data-driven web site may directly contribute to its management by feeding corrections and new additions, thus keeping “fresh” the information provided by the site. However, several issues may arise due to the fact that users may modify data in a more or less controlled way. Starting from a real-world scenario, we point out such issues and we present a simple and efficient framework.
Abstract Suppose that Alice, owner of a k-anonymous database, needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Suppose moreover that access to the database is strictly controlled,... more
Abstract Suppose that Alice, owner of a k-anonymous database, needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Suppose moreover that access to the database is strictly controlled, because for example data are used for experiments that need to be maintained confidential.
Download (.pdf)
Abstract The aim of this work is to present a complex, web-based virtual museum application, integrating several tools for flexible management of heterogeneous and highly structured knowledge. All the used tools are compliant to W3C's... more
Abstract The aim of this work is to present a complex, web-based virtual museum application, integrating several tools for flexible management of heterogeneous and highly structured knowledge. All the used tools are compliant to W3C's standards. In particular, the complex network of associations and relations among concepts and objects (as typically found in a virtual museum environment) has been faithfully represented adopting W3C's Semantic Web standards.
Abstract Trust Negotiation has shown to be a successful, policy-driven approach for automated trust establishment, through the release of digital credentials. Current real applications require new flexible approaches to trust... more
Abstract Trust Negotiation has shown to be a successful, policy-driven approach for automated trust establishment, through the release of digital credentials. Current real applications require new flexible approaches to trust negotiations, especially in light of the widespread use of mobile devices. In this paper, we present a multisession dependable approach to trust negotiations.
Abstract This paper proposes a model for short-term content adaptation whose aim is to satisfy the contingent needs of users by adjusting the information a web-application provides on the basis of a short-term user profile. The... more
Abstract This paper proposes a model for short-term content adaptation whose aim is to satisfy the contingent needs of users by adjusting the information a web-application provides on the basis of a short-term user profile. The mathematical model results in the design of an adaptive filter that profiles users by observing their queries to the application and that adjusts the answers of the application according to the inferred user needs.
Download (.pdf)
Modern Critical Infrastructures (CIs)(power grids, power plants, gas and oil pipelines, etc.) are strongly interconnected at the national and international levels nowadays. The failure of one of them can originate cascading effects which... more
Modern Critical Infrastructures (CIs)(power grids, power plants, gas and oil pipelines, etc.) are strongly interconnected at the national and international levels nowadays. The failure of one of them can originate cascading effects which might have a serious and disastrous impact on others, even on geographically far infrastructures.
Download (.pdf)
Abstract. The increased interest around business processes management and modeling techniques has brought many organizations to make significant investments in business process modeling projects. One of the most recent proposal for a new... more
Abstract. The increased interest around business processes management and modeling techniques has brought many organizations to make significant investments in business process modeling projects. One of the most recent proposal for a new business process modeling technique is the Business Process Modeling Notation (BPMN). Often, the modeled business processes involve sensible information whose disclosure is usually regulated by privacy policies.
Download (.pdf)
Abstract. The aim of this work is to present a complex, web-based virtual museum application, integrating several tools for flexible management of heterogeneous and highly structured knowledge. All the used tools are compliant to W3C's... more
Abstract. The aim of this work is to present a complex, web-based virtual museum application, integrating several tools for flexible management of heterogeneous and highly structured knowledge. All the used tools are compliant to W3C's standards. In particular, the complex network of associations and relations among concepts and objects (as typically found in a virtual museum environment) has been faithfully represented adopting W3C's Semantic Web standards.
Download (.pdf)
Abstract Information spreading is a important topic in the area of Online Social Networks (OSNs). Typically, information flows in a careless way among directly connected members of the OSN (" friends"). In this way, it is possible that... more
Abstract Information spreading is a important topic in the area of Online Social Networks (OSNs). Typically, information flows in a careless way among directly connected members of the OSN (" friends"). In this way, it is possible that sensitive information is unintentionally leaked to not entitled or un-trusted members. A well-known approach for the management of trust relationships is represented by trust negotiations.
Download (.pdf)
Abstract Providing functionalities that allow online social network users to manage in a secure and private way the publication of their information and/or resources is a relevant and far from trivial topic that has been under scrutiny... more
Abstract Providing functionalities that allow online social network users to manage in a secure and private way the publication of their information and/or resources is a relevant and far from trivial topic that has been under scrutiny from various research communities. In this work, we provide a framework that allows users to define highly expressive access policies to their resources in a way that the enforcement does not require the intervention of a (trusted or not) third party.
Download (.pdf)
Industrial facilities and infrastructures such as chemical factories, oil refineries, power generation plants, and water treatment plants are nowadays highly dependent on “Industrial Control Systems (ICS)”. Such systems are typically used... more
Industrial facilities and infrastructures such as chemical factories, oil refineries, power generation plants, and water treatment plants are nowadays highly dependent on “Industrial Control Systems (ICS)”. Such systems are typically used in industries to monitor and control remote processes. The NIST guide to industrial control systems security [4] divides ICS in “Supervisory Control And Data Acquisition (SCADA)” systems,“Distributed Control Systems (DCS)” and other smaller control systems.
Download (.pdf)
Abstract. Ontologies are a well-affirmed way of representing complex structured information and they provide a sound conceptual foundation to Semantic Web technologies. On the other hand, a huge amount of information available on the web... more
Abstract. Ontologies are a well-affirmed way of representing complex structured information and they provide a sound conceptual foundation to Semantic Web technologies. On the other hand, a huge amount of information available on the web is stored in legacy relational databases. The issues raised by the collaboration between such worlds are well known and addressed by consolidated mapping languages.
Download (.pdf)
Research Interests:
Download (.pdf)
Download (.pdf)
The introduction of the Semantic Web vision and the shift toward machine understandable Web resources has unearthed the importance of automatic semantic reconciliation. Consequently, new tools for automating the process were proposed. In... more
The introduction of the Semantic Web vision and the shift toward machine understandable Web resources has unearthed the importance of automatic semantic reconciliation. Consequently, new tools for automating the process were proposed. In this work we present a formal model of semantic reconciliation and analyze in a systematic manner the properties of the process outcome, primarily the inherent uncertainty of the matching process and how it reflects on the resulting mappings. An important feature of this research is the identification and analysis of factors that impact the effectiveness of algorithms for automatic semantic reconciliation, leading, it is hoped, to the design of better algorithms by reducing the uncertainty of existing algorithms. Against this background we empirically study the aptitude of two algorithms to correctly match concepts. This research is both timely and practical in light of recent attempts to develop and utilize methods for automatic semantic reconciliation.
Download (.pdf)
Download (.pdf)
Download (.pdf)
Download (.pdf)
Download (.pdf)
Download (.pdf)
Abstract XML is the standard data interchange format and XSLT is the W3C proposed standard for transforming and restructuring XML documents. It turns out that XSLT has very powerful query capabilities as well. However, due to its complex... more
Abstract XML is the standard data interchange format and XSLT is the W3C proposed standard for transforming and restructuring XML documents. It turns out that XSLT has very powerful query capabilities as well. However, due to its complex syntax and lack of formal specification, it is not a trivial task to decide whether two XSLT stylesheets yield the same result, even if for an XSLT fragment. We isolate such fragment, powerful enough for expressing several interesting queries and for manipulating XML documents and show ...
This chapter presents a fuzzy-based algebra, called SAMEW, to query multimedia objects. SAMEW allows for dealing within a common frameworkwith several aspects relevant to similarity query processing as well as with the inherent... more
This chapter presents a fuzzy-based algebra, called SAMEW, to query multimedia objects. SAMEW allows for dealing within a common frameworkwith several aspects relevant to similarity query processing as well as with the inherent imprecision that characterizes data, user requests and query results. Non-Boolean, namely fuzzy and similarity, predicates are used to rank tuples according to specific criteria. Complex multi-predicate queries can be formed by means of logical connectives, whose semantics is parameterized in order to ...
Abstract Multimedia informations systems and Web-based applications such as search engines need to automatically extract and classify multimedia data such as images and textual documents. For this reason, very significant research has... more
Abstract Multimedia informations systems and Web-based applications such as search engines need to automatically extract and classify multimedia data such as images and textual documents. For this reason, very significant research has focused on similarity queries from the standpoint of the definition and creation of appropriate index structures. We provide a formal framework in which formulate powerful similarity-based queries. For this purposes a fuzzy relational algebra extending the classical relational algebra is defined ...
Download (.pdf)
Download (.pdf)
Download (.pdf)
Download (.pdf)
Download (.pdf)
Download (.pdf)
Download (.pdf)
Abstract The security of Industrial Critical Infrastructures is become a prominent problem with the advent of modern ICT technologies used to improve the performances and the features of the SCADA systems. In this paper we present an... more
Abstract The security of Industrial Critical Infrastructures is become a prominent problem with the advent of modern ICT technologies used to improve the performances and the features of the SCADA systems. In this paper we present an innovative approach to the design of Intrusion Detection Systems. The aim is to be able to detect complex attacks to SCADA systems, by monitoring its state evolution. By complex attack, we mean attacks composed of a set of commands that, while licit when considered in isolation on a single-packet basis, ...
Web and multimedia data are becoming very important. A fundamental characteristic of these data is imprecision. Query languages for Web and multimedia data must express imprecision in features matching, similarity queries and user... more
Web and multimedia data are becoming very important. A fundamental characteristic of these data is imprecision. Query languages for Web and multimedia data must express imprecision in features matching, similarity queries and user preferences. In addition specific operators need to be introduced to organize the answers in a user friendly style. The aim of this work is to provide a formal framework in which to formulate very powerful queries and presentations of the answers. To this end, a fuzzy based algebra is introduced. The fuzzy ...
Abstract Web and multimedia data are becoming very important. A fundamental characteristic of these data is imprecision. Query languages for web and multimedia data must express imprecision in features matching, similarity queries and... more
Abstract Web and multimedia data are becoming very important. A fundamental characteristic of these data is imprecision. Query languages for web and multimedia data must express imprecision in features matching, similarity queries and user preferences. In addition specific operators need to be introduced to organize the answers in a user friendly style. The aim of this work is to provide a formal framework in which to formulate very powerful queries and presentations of the answers. To this end, a fuzzy algebra and a ...
Download (.pdf)
Download (.pdf)
Abstract Alice, owner of a k-anonymous database, needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Suppose that Bob is not allowed to access to the database because of data... more
Abstract Alice, owner of a k-anonymous database, needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Suppose that Bob is not allowed to access to the database because of data confidentiality and that Alice is not allowed to read Bob's tuple due to Bob's privacy concern. Under these assumptions, this paper proposes two protocols to check whether the database inserted with a tuple is still k-anonymous, without letting Alice and Bob know the contents of the tuple and the database ...
Download (.pdf)
Abstract In recent years, a concentration of effort to design adaptive web application has arisen: generally, each user has dif ferent information needs, depending on her/his social role, culture, etc. Especially in the field of web-based... more
Abstract In recent years, a concentration of effort to design adaptive web application has arisen: generally, each user has dif ferent information needs, depending on her/his social role, culture, etc. Especially in the field of web-based learning, it has become progressively clearer that these needs do not only depend on a long-term characterisation of the user, but also on the contingent situation the user lives. In this paper, a model for short-term content adapta tion is proposed, whose aim is to satisfy contingent needs of users by adjusting the ...
Download (.pdf)
Download (.pdf)
Download (.pdf)
Download (.pdf)
Download (.pdf)

And 6 more