Learn More
In this paper we discuss the problem of engineering privacy requirements for business intelligence applications, i.e., of eliciting, modeling, testing, and auditing privacy requirements imposed by the source data owner on the business intelligence applications that use these data to compute reports for analysts. We describe the peculiar challenges of this(More)
Processes in healthcare and socio-assistive domains typically span multiple institutions and require cooperation and information exchange among multiple IT systems. In most cases this cooperation today is handled " manually " via document exchange (by email, post, or fax) and in a point-to-point fashion. One of the reasons that makes it difficult to(More)
Planning effective and well targeted actions to manage and improve the local and national healthcare services requires institutions to understand and analyse the real needs of the population based on reliable and timely statistical analysis on citizens' health state. This is particularly important in developing countries in which healthcare facilities lack(More)
Defining access control policies in a data integration scenario is a challenging task. In such a scenario typically each source specifies its local access control policy and cannot anticipate data inferences that can arise when data is integrated at the mediator level. Inferences, e.g., using functional dependencies, can allow malicious users to obtain, at(More)