• Publications
  • Influence
Process Mining Manifesto
TLDR
This manifesto hopes to serve as a guide for software developers, scientists, consultants, business managers, and end-users to increase the maturity of process mining as a new tool to improve the design, control, and support of operational business processes. Expand
A reputation-based approach for choosing reliable resources in peer-to-peer networks
TLDR
This work proposes a self-regulating system where the P2P network is used to implement a robust reputation mechanism, and a distributed polling algorithm by which resource requestors can assess the reliability of a resource offered by a participant before initiating the download. Expand
A fine-grained access control system for XML documents
TLDR
This work presents an access control model to protect information distributed on the Web that, by exploiting XML's own capabilities, allows the definition and enforcement of access restrictions directly on the structure and content of the documents. Expand
Augmented reality technologies, systems and applications
TLDR
Challenges augmented reality is facing in each of these applications to go from the laboratories to the industry, as well as the future challenges the authors can forecast are also discussed in this paper. Expand
Securing XML Documents
TLDR
This work presents an access control model to protect information distributed on the Web that, by exploiting XML's own capabilities, allows the definition and enforcement of access restrictions directly on the structure and content of XML documents. Expand
Balancing confidentiality and efficiency in untrusted relational DBMSs
TLDR
This paper presents a simple yet robust single-server solution for remote querying of encrypted databases on untrusted servers based on the use of indexing information attached to the encrypted database which can be used by the server to select the data to be returned in response to a query without the need of disclosing the database content. Expand
Choosing reputable servents in a P2P network
TLDR
An approach to P2P security where servents can keep track, and share with others, information about the reputation of their peers is proposed, based on a distributed polling algorithm by which resource requestors can assess the reliability of perspective providers before initiating the download. Expand
Location Privacy Protection Through Obfuscation-Based Techniques
TLDR
This work proposes a way to express users privacy preferences on location information in a straightforward and intuitive way and discusses a new solution, based on obfuscation techniques, which permits us to achieve, and quantitatively estimate through a metric, different degrees of location privacy. Expand
XML-GL: A Graphical Language for Querying and Restructuring XML Documents
TLDR
This paper introduces XML-GL, a graphical query language for XML documents that is inspired by G-log, a general purpose, logic-based language for querying structured and semi-structured data. Expand
Design and implementation of an access control processor for XML documents
TLDR
An Access Control System for XML is described allowing for definition and enforcement of access restrictions directly on the structure and content of XML documents, thus providing a simple and effective way for users to protect information at the same granularity level provided by the language itself. Expand
...
1
2
3
4
5
...