• Publications
  • Influence
Collective privacy management in social networks
This paper proposes a solution that offers automated ways to share images based on an extended notion of content ownership that promotes truthfulness, and that rewards users who promote co-ownership, and shows that supporting these type of solutions is not feasible, but can be implemented through a minimal increase in overhead to end-users. Expand
Security for Web Services and Service-Oriented Architectures
Elisa Bertino and her coauthors provide a comprehensive guide to security for Web services and SOA, covering in detail all recent standards that address Web service security, including XML Encryption, XML Signature, WS-Security, and WS-SecureConversation. Expand
Privacy-preserving Digital Identity Management for Cloud Computing
This paper proposes an approach addressing digital identity management services requirements based on the use of high-level identity verification policies expressed in terms of identity attributes, zero-knolwedge proof protocols, and semantic matching techniques. Expand
Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations
This work presents a decentralised runtime monitoring architecture based on blockchain technology to promote accountability and reliability of a distributed access control system. Expand
Privacy-Aware Web Service Composition and Ranking
This paper proposes a novel privacy-preserving Web service composition and selection approach which makes it possible to verify the compliance between users' privacy requirements and providers' privacy policies and ranks the composite Web services with respect to the privacy level they offer. Expand
An Extended Ontology for Security Requirements
The amalgamation includes a careful comparison of primitive concepts in Problem Frames and Secure Tropos, but also offers a novel account for rather nebulous security concepts, such as those of vulnerability and threat. Expand
A privacy-preserving approach to policy-based content dissemination
We propose a novel scheme for selective distribution of content, encoded as documents, that preserves the privacy of the users to whom the documents are delivered and is based on an efficient andExpand
Access Control and Authorization Constraints for WS-BPEL
The RBAC-WS-BPEL and BPCL languages are developed, which provide for the specification of authorization information associated with a business process specified in WS- BPEL, while BPCL provides for the articulation of authorization constraints. Expand
Survey on Access Control for Community-Centered Collaborative Systems
This survey examines the growing literature on access control for collaborative systems centered on communities, and identifies the main challenges to be addressed in order to facilitate the adoption of collaborative access control solutions in real-life settings. Expand
Access control enforcement for conversation-based web services
The concept of k-trustworthiness is introduced that defines the conversations for which a client can provide credentials maximizing the likelihood that it will eventually hit a final state and avoids situations where the client cannot progress in the conversation due to the lack of required security requirements. Expand