Jean-Christophe R. Pazzaglia

Learn More
We describe a pragmatic approach to the creation of local ontologies for databases which must be integrated into multi-agent systems. Our approach avoids the introduction of an extra language, solely for modelling the required ontological information, by showing how to extend the expressiveness of a typical OODBMS data deenition language. In this paper, we(More)
Dynamic and self-organizing systems like those found in ubiquitous computing or semantic Web based scenarios raise numerous challenges regarding trust and privacy. Service discovery is a basic feature of SOA deployment in such systems, given that entities need to locate services they can describe but that they do not necessarily know. PKI based solutions to(More)
The exponential growth of resources on the web, and the wide deployment of devices for multimodal access to the Internet, lead to new problems in information management. In this context, and as part of the European project Vision, we have built an interactive telematic handbook of the culture and the territory of Sardinia. A team of cultural experts browsed(More)
The pervasive computing paradigm assumes an essentially dynamic model of interaction between devices that also motivates the need to discover the services offered by previously unknown parties at an early phase of these interactions. Whereas this assumption is at the heart of many pervasive computing protocols and systems, the necessity of securing service(More)
Service Oriented Architectures (SOA) introduce a loosely coupled interaction model which requires discovering services that enable an efficient interconnection between different application systems or software components. Although service discovery has been thoroughly studied in the past, its security has been vastly ignored. After introducing some security(More)
After introducing some security issues of service this paper classifies the various threats to service discovery. For each threat we propose a retort. We describe two solutions (centralized and decentralized) to protect users privacy and ensure access control to sensitive discovery data: a centralized one, relying on a classical policy based approach, and a(More)