• Publications
  • Influence
A Brokerage-Based Approach for Cloud Service Selection
TLDR
A novel brokerage-based architecture in the Cloud is proposed, where the Cloud brokers is responsible for the service selection and a unique indexing technique for managing the information of a large number of Cloud service providers is designed. Expand
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
TLDR
This paper proposes two approaches for generating a backdoor that is hardly perceptible yet effective in poisoning the model, and demonstrates that such attacks can be effective and achieve a high attack success rate at a small cost of model accuracy loss with a small injection rate. Expand
Trust-X: A Peer-to-Peer Framework for Trust Establishment
TLDR
A comprehensive XML-based framework for trust negotiations, specifically conceived for a peer-to-peer environment, and presents a number of innovative features, such as the support for protection of sensitive policies, the use of trust tickets to speed up the negotiation, and the support of different strategies to carry on a negotiation. Expand
Collective privacy management in social networks
TLDR
This paper proposes a solution that offers automated ways to share images based on an extended notion of content ownership that promotes truthfulness, and that rewards users who promote co-ownership, and shows that supporting these type of solutions is not feasible, but can be implemented through a minimal increase in overhead to end-users. Expand
MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs
TLDR
This work proposes a novel approach that introduces moving object modeling and indexing techniques from the theory of large moving object databases into the design of VANET routing protocols and demonstrates the superiority of this approach compared with both clustering and non-clustering based routing protocols. Expand
Content-Driven Detection of Cyberbullying on the Instagram Social Network
TLDR
This work investigates use of posted images and captions for improved detection of bullying in response to shared content, and identifies the importance of these advanced features in assisting detection of cyberbullying in posted comments. Expand
CoPE: Enabling collaborative privacy management in online social networks
TLDR
The results demonstrate that regardless of whether Facebook users are worried about their privacy, they like the idea of collaborative privacy management and believe that a tool such as CoPE would be useful to manage their personal information shared within a social network. Expand
Security for Web Services and Service-Oriented Architectures
TLDR
Elisa Bertino and her coauthors provide a comprehensive guide to security for Web services and SOA, covering in detail all recent standards that address Web service security, including XML Encryption, XML Signature, WS-Security, and WS-SecureConversation. Expand
Trust Negotiation in Identity Management
TLDR
The authors show how federated identity management systems can better protect users' information when integrated with trust negotiation and serve as the basic context for determining suitable solutions to this issue. Expand
Privacy policies for shared content in social network sites
TLDR
This paper proposes a solution that offers automated ways to share images based on an extended notion of content ownership and describes a simple mechanism that promotes truthfulness and that rewards users who promote co-ownership, and implements the approach in the context of Facebook. Expand
...
1
2
3
4
5
...