Share This Author
Process Mining Manifesto
- Wil M.P. van der Aalst, A. Adriansyah, M. Wynn
- Computer ScienceBusiness Process Management Workshops
This manifesto hopes to serve as a guide for software developers, scientists, consultants, business managers, and end-users to increase the maturity of process mining as a new tool to improve the design, control, and support of operational business processes.
A reputation-based approach for choosing reliable resources in peer-to-peer networks
- E. Damiani, S. Vimercati, S. Paraboschi, P. Samarati, F. Violante
- Computer ScienceCCS '02
- 18 November 2002
This work proposes a self-regulating system where the P2P network is used to implement a robust reputation mechanism, and a distributed polling algorithm by which resource requestors can assess the reliability of a resource offered by a participant before initiating the download.
A fine-grained access control system for XML documents
This work presents an access control model to protect information distributed on the Web that, by exploiting XML's own capabilities, allows the definition and enforcement of access restrictions directly on the structure and content of the documents.
Augmented reality technologies, systems and applications
- Julie Carmigniani, B. Furht, M. Anisetti, P. Ceravolo, E. Damiani, M. Ivkovic
- Computer ScienceMultimedia Tools and Applications
Challenges augmented reality is facing in each of these applications to go from the laboratories to the industry, as well as the future challenges the authors can forecast are also discussed in this paper.
Choosing reputable servents in a P2P network
- Fabrizio Cornelli, E. Damiani, S. Vimercati, S. Paraboschi, P. Samarati
- Computer ScienceWWW '02
- 7 May 2002
An approach to P2P security where servents can keep track, and share with others, information about the reputation of their peers is proposed, based on a distributed polling algorithm by which resource requestors can assess the reliability of perspective providers before initiating the download.
Securing XML Documents
This work presents an access control model to protect information distributed on the Web that, by exploiting XML's own capabilities, allows the definition and enforcement of access restrictions directly on the structure and content of XML documents.
Balancing confidentiality and efficiency in untrusted relational DBMSs
- E. Damiani, S. Vimercati, S. Jajodia, S. Paraboschi, P. Samarati
- Computer ScienceCCS '03
- 27 October 2003
This paper presents a simple yet robust single-server solution for remote querying of encrypted databases on untrusted servers based on the use of indexing information attached to the encrypted database which can be used by the server to select the data to be returned in response to a query without the need of disclosing the database content.
XML-GL: A Graphical Language for Querying and Restructuring XML Documents
Location Privacy Protection Through Obfuscation-Based Techniques
This work proposes a way to express users privacy preferences on location information in a straightforward and intuitive way and discusses a new solution, based on obfuscation techniques, which permits us to achieve, and quantitatively estimate through a metric, different degrees of location privacy.