Publications

Journals

  • D. Albertini, B. Carminati, E. Ferrari, An extended access control mechanism exploiting data dependencies. Int. J. Inf. Sec. 16(1): 75-89 (2017)
  • L. Bahri, B. Carminati, E. Ferrari.COIP – Continuous, Operable, Impartial, and Privacy-Aware Identity Validity Estimation for OSN Profiles. TWEB 10(4): 23:1-23:41 (2016)
  • B. Carminati, E. Ferrari, N. Hong Tran. Trustworthy and effective person-to-person payments over multi-hop MANETs. J. Network and Computer Applications 60: 1-18 (2016)
  • A. Soliman, L. Bahri, S. Girdzijauskas,B. Carminati, E. Ferrari. CADIVa: cooperative and adaptive decentralized identity validation model for social networks. Social Netw. Analys. Mining 6(1): 36:1-36:22 (2016)
  • B. Carminati, E. Ferrari, M. Guglielmi. Detection of Unspecified Emergencies for Controlled Information Sharing. IEEE Trans. Dependable Sec. Comput. 13(6): 630-643 (2016)
  • C. Akcora, B. Carminati, E. Ferrari. User Similarities on Social Networks. Social Network Analysis and Mining (SNAM), 3(3):475-495, 2013.
  • B. Carminati, E. Ferrari, N. Hong Tran. SMARTPAY: A Lightweight Protocol to Enforce Trust Preferences in Mobile Person-to-Person Payments, Science Journal, 2(4): 2013.
  • M. Vanetti, E. Binaghi, E. Ferrari, B. Carminati, M. Carullo.  A System to Filter Unwanted Messages from OSN User Walls. IEEE Transactions on Knowledge and Data Engineering (TKDE), 25(2): 285-297, 2013.
  • B. Carminati, E. Ferrari, A. Perego. A Multi-layer Framework for Personalized Social Tag-based Applications, Data & Knowledge Engineering, to appear.
  • M. Vanetti, E. Binaghi, E. Ferrari, B. Carminati, M. Carullo.  A System to Filter Unwanted Messages from OSN User Walls. In IEEE Transactions on Knowledge and Data Engineering (TKDE), to appear.
  • B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu,  B. Thuraisinghaim. Semantic Web-Based Social Network Access Control. Computers and Security Journal, 30(2-3): 108-115, 2011.
  • J. Cao, B. Carminati, E. Ferrari, K.L. Tan. CASTLE: Continuously Anonymizing Data Streams. IEEE Transactions on Dependable and Secure Computing (TDSC), 8(3): 337-352 (2011).
  • B. Carminati, E. Ferrari, and A. Perego. Enforcing Access Control in Web-based Social Networks. ACM Transactions on Information & System Security (TISSEC), 13(1): (2009).
  • B. Carminati, E. Ferrari, K.L. Tan, and J. Cao. A Framework to Enforce Access Control over Data Streams. ACM Transactions on Information & System Security (TISSEC),  13(3): (2010).
  • B. Carminati, E. Ferrari. Access control and Privacy in Web-based Social Networks. Journal of Web Information Systems, Vol. 4 No. 4, 2008 pp. 395-415.
  • B. Carminati, E. Ferrari, and A. Perego. A Decentralized Security Framework for Web-based Social Networks. International Journal of Information Security and Privacy, 2008.
  • B.Carminati, E.Ferrari, E.Bertino. A Comprehensive Framework for Secure Outsourcing of XML. Data Journal of Information Assurance and Security (JIAS), 3 (2008) 289-303, Dynamic Publishers, Inc.
  • B.Carminati, E. Ferrari. A System for Controlled Outsourcing of Personal Data. Computer Systems Science and Engineering , vol. 21, 2006.
  • B.Carminati, E. Ferrari, B. Thuraisingham. Access Control for Web Data: Models and Policy Languages. Annals of Telecommunications, 61(3-4):245-266, 2006.
  • B.Carminati, E.Ferrari, P.C.K. Hung. Exploring Privacy Issues in Web Services Discovery Agencies. IEEE Security & Privacy Magazine. 3(5):14-21, 2005.
  • E.Bertino, B.Carminati, E.Ferrari. Merkle Tree Authentication in UDDI Registries. International Journal of Web Services Research, 1(2):37-57, 2004, Idea Group Inc.
  • E.Bertino, B.Carminati, E.Ferrari, B. Thuraisingham, A. Gupta. Selective and Authentic Third-Party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering (TKDE), 16(10):1263-1278, 2004.
  • E.Bertino, B.Carminati, E.Ferrari. Access Control for XML documents and data. Information Security. Technical Report, 9(3):19-34, 2004, Elsevier Science.
  • B. Carminati, E.Ferrari. Management of Access Control Policies for XML Document Sources. International Journal of Information Security, 1(4):236-260, 2003, Springer.
  • E.Bertino, B.Carminati, E.Ferrari. XML Security. Information Security Technical Report, 6(2):44-58, 2001, Elsevier Science.

Conferences

  • P. Ilia, B.Carminati,  E. Ferrari, P. Fragopoulou, S. Ioannidis.
    SAMPAC: Socially-Aware collaborative Multi-Party Access Control. CODASPY 2017: 71-82
  • Chenxi Qiu, Anna Cinzia Squicciarini, Barbara Carminati, James Caverlee, Dev Rishi Khare:
    CrowdSelect: Increasing Accuracy of Crowdsourcing Tasks through Behavior Prediction and User Selection. CIKM 2016: 539-548
  • B. Carminati, P. Colombo, E. Ferrari, G. Sagirlar Enhancing User Control on Personal Data Usage in Internet of Things Ecosystems. SCC 2016: 291-298
  • L. Bahri, A. Soliman, J. Squillaci, B. Carminati, E. Ferrari, and S. Girdzijauskas. Beat the DIVa – Decentralized Identity Validation for Online Social Networks. In Proc. of the  32nd IEEE International Conference on Data Engineering (demo track), ICDE 2016.
  • Qiu, C., Squicciarini, A. C., Carminati, B., Caverlee, J., & Khare, D. R. (2016, October). Crowdselect: Increasing accuracy of crowdsourcing tasks through behavior prediction and user selection. In Proceedings of the 25th ACM International on Conference on Information and Knowledge Management  (CIKM 2016) (pp. 539-548). ACM.
  • A. Bartoli, B. Carminati, E. Ferrari, and E. Medvet. A Language and an Inference Engine for Twitter Filtering Rules.  In Proc. of the IEEE/WIC/ACM International Conference on Web Intelligence (WI’16), to appear.
  • B. Carminati, P. Colombo, E. Ferrari, and G. Sagirlar. Enhancing User Control on Personal Data Usage in Internet of Things Ecosystems. In Proc of the 13th IEEE International Conference on Services Computing (SCC 2016), to appear.
  • N. Laleh, B. Carminati, E. Ferrari. Anomalous Change Detection in Time-evolving OSNs. In Proc. of the 15th IFIP Annual Mediterranean Ad Hoc Networking Workshop, June 2016.
  • N. Laleh, B. Carminati, and E. Ferrari. Graph Based Local Risk Estimation in Large Scale Online Social Networks. In Proc. of the IEEE International Conference in Social Computing and Networking (SocialCom2015), 2015.
  • L. Bahri, B. Carminati, E. Ferrari. CARDS – Collaborative Audit and Report Data Sharing for A-posteriori Access Control in DOSNs. In Proc. of the 1st IEEE International Conference on Collaboration and Internet Computing ( CIC 2015), to appear.
  • L. Bahri, B. Carminati, E. Ferrari. What Happens to My Online Social Estate When I Am Gone? An Integrated Approach to Posthumous Online Data Management. In Proc. of the 16th IEEE International Conference on Information Reuse and Integration (IRI 2015), to appear.
  • A. Soliman, L. Bahri, B. Carminati, E. Ferrari and S. Girdzijauskas. DIVa: Decentralized Identity Validation for Social Networks. Proc. of the IEEE/ACM Conference on Advances in Social Network Analysis and Mining (ASONAM 2015), to appear.
  • B. Carminati, E. Ferrari, N.H. Tran. Secure Web Service Composition with Untrusted Broker. In Proc. of the 21th IEEE International Conference on Web Services (ICWS), June 2014.
  • E. Medvet, A. Bartoli, B. Carminati, E. Ferrari, Evolutionary Inference of Attribute-based Access Control Policies, 8th International Conference on Evolutionary Multi-Criterion Optimization (EMO), March 2015.
  • L. Bahri, B. Carminati, E. Ferrari. Community-based Identity Validation on Online Social Networks. In Proc. of  the 34th International Conference on Distributed Computing Systems (ICDCS), June 2014.
  • B. Carminati, E. Ferrari, N.H. Tran Secure Web Service Composition with Untrusted Broker. In Proc. of  the 21th IEEE International Conference on Web Services (ICWS), June 2014.
  • B. Carminati, E. Ferrari, N. Tran.  Enforcing Trust Preferences in Mobile Person-to-Person Payments. In Proc. of the In Proc. of the 5th IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2013), September 2013.
  • B. Carminati, E.  Ferrari, M. Guglielmi. SHARE: Secure information sHaring frAmework for emeRgency managemEnt. In Proc. of the 29th IEEE  International Conference on Data Engineering (ICDE 2013), Brisbane, Australia, April 2013 (demo paper).
  • C.G. Akcora, B. Carminati, E. Ferrari. Risks of Friendships on Social Networks.  In Proc. of the  IEEE International Conference on Data Mining (ICDM 2012), Brussels, Belgium, December 2012.
  • B. Carminati, E. Ferrari, M. Guglielmi. Policies for Composed Emergencies in Support of Disaster Management.  In Proc. of the VLDB Workshop on Secure Data Management (SDM 2012), August 2012.
  • B. Carminati, E. Ferrari, M. Viviani. A Multi-dimensional and Event-based Model for Trust Computation in the Social Web.  In Proc. of the 4th International Conference on Social Informatics (SocInfo 2012), Lausanne, Switzerland, December 2012.
  • C. Akcora, B. Carminati, E. Ferrari. Privacy in Social Networks: How Risky is Your Social Graph?. 28th International Conference on Data Engineering (ICDE 2012), Washington, April 2012.
  • B. Carminati, E. Ferrari, J.Girardi. Trust &Share: Trusted Information Sharing in Online Social Networks. Demo paper at 28th International Conference on Data Engineering (ICDE 2012), Washington, April 2012.
  • B. Carminati, E. Ferrari, M. Guglielmi.  Secure Information Sharing on Support of Emergency Management. IEEE PASSAT, October 2011
  • C. Akcora, B. Carminati, E. Ferrari.  Network and Profile-based Measures for User Similarites on Social Networks. In Proc. of the 12th IEEE International Conference on Information Reuse and Integration (IRI 2011), August 2011.
  • M.  Xue, B. Carminati,   E.  Ferrari.  P3D – Privacy-preserving Path Discovery in Decentralized Social Networks.  In Proc. of the 35th  IEEE International Computer Software and Applications Conference (COMPSAC 2011), April 2011.
  • Anna Cinzia Squicciarini, Barbara Carminati, Sushama Karumanchi: A Privacy-Preserving Approach for Web Service Selection and Provisioning. IEEE International Conference on Web Services, ICWS 2011, Washington, DC, USA, July 4-9, 2011.
  • B. Carminati,   E.  Ferrari, S.  Morasca,   D. Taibi. A Probability-based Approach to Modeling the Risk of Unauthorized Propagation of Information in On-line Social Networks. In Proc. of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY 2011), February 2011.
  • M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, E. Ferrari. Content-based Filtering in On-line Social Networks. In Proc. of PSDML 2010 – ECML/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning, Barcellona, Spain, LNAI, Springer Verlag, October.
  • B. Carminati, C.H. Chi , E. Ferrari, L. Yu. Compatibility-driven and Adaptable Service Composition. In Proc. of the 2009 IEEE Asia-Pacific Service Computing Conference (APSCC 2009), Singapore, December 2009.
  • B. Carminati, E. Ferrari. Enforcing Relationships Privacy through Collaborative Access Control in Web-based Social Networks. In Proc. of the 5th International Conference on Collaborative Computing (CollaborateCom 2009), Washington D.C., November 2009 (invited paper).
  • B. Carminati, E. Ferrari, A. Perego. The Quality Social Network: A Collaborative Environment for Personalizing Web Access. In Proc. of the First International Workshop On Collaborative Social Networks (CollaborateSN 2009), Washington D.C., November 2009 (invited paper).
  • B. Carminati, E. Ferrari, R. Heatherly, M. Kantargioglu, B. Thuraisingham. A Semantic Web Based Framework for Social Network Access Control. In Proc. of the 14th ACM Symposium on Access Control Technologies (SACMAT’09), Stresa, Italy, June 2009.
  • J. Nin, B. Carminati, E. Ferrari, V. Torra. Computing Reputation for Collaborative Private Networks. In Proc. of the 33rd IEEE Computer Software and Applications Conference (COMPSAC 2009), Seattle, USA, July 2009.
  • J. Cao, B.Carminati, E.Ferrari, K.L. Tan. ACStream: Enforcing Access Control Over Data Streams. In Proc. of the 25th International Conference on Data Engineering (ICDE 2009), Shangai, China, April 2009, (demo paper).
  • B. Carminati, E. Ferrari, A. Perego. Combining Social Networks and Semantic Web Technologies for Personalizing Web Access. In Proc. of the 4th International Conference on Collaborative Computing (CollaborateCom 2008), Orlando, FL, November 2008 (invited paper).
  • B. Carminati, E. Ferrari. Privacy-aware Collaborative Access Control in Web-based Social Networks. In Proc. of the 22nd IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC 2008), London, UK, July 2008.
  • B. Carminati, E. Ferrari. Trust-based Information Sharing in Collaborative Communities: Issues and Challenges. In Proc. of the Conference on Future of Trust in Computing, Berlin, Germany, June 2008, (invited paper).
  • J. Cao, B.Carminati, E.Ferrari, K.L. Tan. CASTLE: A Delta-constrained Scheme for k-anonymizing Data Streams. In Proc. of the 24th International Conference on Data Engineering (ICDE 2008), Cancun, Mexico, April 2008, (poster paper).
  • J. Biskup, B. Carminati, E. Ferrari, F. Mueller, S. Wortmann. Towards Secure Execution Orders for Composite Web Services. In Proc. of the International Conference on Web Services (ICWS’07), Salt Lake City, USA, July. IEEE Press.
  • B. Carminati, E. Ferrari, R. Bishop, P.C.K. Hung. Security Conscious Web Service Composition with Semantic Web Support. In Proc. of the First ICDE Workshop on Security Technologies for Next Generation Collaborative Business Applications (SECOBAP’07) , Istanbul, Turkey, April 2007. IEEE Press.
  • B. Carminati, E. Ferrari, A. Perego. Private Relationships in Social Networks. In Proc. of the ICDE’07 International Workshop on Privacy Data Management , Istanbul, Turkey, April 2007. IEEE Press.
  • B. Carminati, E. Ferrari, K.L. Tan. Enforcing Access Control Over Data Streams. In Proc. of the 12th ACM Symposium on Access Control Models and Techologies (SACMAT’07) , Sophia Antipolis, France, June 2007. ACM Press.
  • B. Carminati, E. Ferrari, K.L. Tan. Specifying Access Control Policies on Data Streams. In Proc. of the 12th International Conference on Database Systems for Advanced Applications (DASFAA’06) , Bangkok, Tailand, April 2007. LNCS, Springer.
  • B. Carminati, E. Ferrari, A. Perego. Rule-based Access Control for Social Networks. In Proc. of the IFIP WG 2.12 and 2.14 Semantic Web Workshop , Montpellier, France, November 2006. LNCS, Springer.
  • B. Carminati, E. Ferrari, P.C.K. Hung. Security Conscious Web Service Composition. In Proc. of the IEEE International Conference on Web Services (ICWS 2006), Chicago, USA, September 2006.
  • B. Carminati, E. Ferrari. Confidentiality Enforcement for XML Outsourced Data. In Proc. of the Second International EDBT Workshop on Database Technologies for Handling XML Information on the Web , Munich, Germany, March 2006.
  • B.Carminati, E. Ferrari. AC-XML Documents: Improving the Performance of a Web Access Control Module. In Proc. of the 10th ACM Symposium on Access Control Models and Technologies (SACMAT’05), Stockholm, Sweden, 2005, ACM Press.
  • B.Carminati, E.Ferrari. Trusted Privacy Manager: A System for Enforcing Privacy on Outsourced Data. In Proc. of ICDE’05 International Workshop on Privacy Data Management, Tokyo, Japan, 2005, IEEE Society Press.
  • B.Carminati, E. Ferrari, E. Bertino. Securing XML Data in Third-Party Distribution Systems. In Proc. of theFourteenth ACM Conference on Information and Knowledge Management (CIKM’05), Bremen, Germany, 2005, ACM Press.
  • B.Carminati, E.Ferrari, P.C.K Hung. Web Services Composition: A Security Perspective. In Proc. of ICDE’05 International Workshop on Challanges in Web Information Retrieval and Integration, Tokyo, Japan, 2005, IEEE Society Press.
  • B.Carminati, E.Ferrari, E.Bertino. Secure Third-party Distribution of XML Data. In Proc. of theInternational Conference on Data Engineering (ICDE’05), Tokyo, Japan, 2005, IEEE Society Press, (poster paper).
  • W. Castelnovo, B. Carminati, E.Ferrari, M. Simonetta. Organizational Heterogeneity in Networked Government. In Proc. of the eChallenges e-2005 Conference, Ljubljana, Slovenia, 2005.
  • B.Carminati, E.Ferrari, B. Thuraisingham. Using RDF for Policy Specification and Enforcement. In Proc. of the International Workshop on Web Semantics – WebS 2004 , Zaragoza, Spain, 2004, IEEE Society Press.
  • P.C.K Hung, E. Ferrari, B. Carminati. Towards Standardized Web Services Privacy Technologies. In Proc. of the IEEE International Conference on Web Services (ICWS’04), San Diego, CA, USA, 2004, IEEE Society Press.
  • E. Bertino, B. Carminati, E. Ferrari. A Flexible Authentication Method for UDDI Registries. In Proc. of theFirst International Conference on Web Services (ICWS’03), Las Vegas, Nevada, USA, 2003, IEEE Society Press.
  • E.Bertino, B.Carminati, E.Ferrari, G.Mella. Author-X: A System for Secure Dissemination and Update of XML Documents. In Proc. of 3rd International Workshop on Databases in Networked Information Systems (DNIS’03), Aizu, Japan, 2003, LNCS, Springer (invited paper).
  • E. Bertino, B. Carminati, E. Ferrari. A Temporal Key Management Scheme for Broadcasting XML Documents. In Proc. of the 9th ACM Conference on Computer and Communications Security (CCS’02), Washington, USA, 2002, ACM Press.
  • E. Bertino, B. Carminati, E. Ferrari. A Secure Publishing Service for Digital Libraries of XML Documents. In Proc. of Information Security Conference (ISC01), Lecture Notes in Computer Science, 2200:347-362, Malaga, Spain, 2001, LNCS Springer.

Books

Chapters in books

  • B. Carminati, E. Ferrari. Privacy-aware Access Control in Social Networks: Issues and Solutions. Jordi Nin and Javier Herranz editori, Privacy and Anonymity in Information Management Systems, 181-195, Springer, 2010.
  • B. Carminati, E. Ferrari. Privacy protection of personal data in Social Networks. Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques, Chapman & Hall/CRC Data Mining and Knowledge Discovery Series.B. Carminati, E. Ferrari, and A. Perego. Security and Privacy in Social Networks. In: Encyclopedia of Information Science and Technology, 2nd Edition. IGI Publishing, vol. VII, pp. 3369-3376, 2008.
  • B. Carminati. Merkle Trees. In Encyclopedia of Database Systems, Springer, 1714-1715, 2009.
  • B. Carminati. Blind Signatures. In Encyclopedia of Database Systems, 251-252, Springer, 2009.
  • B. Carminati. Digital Signatures. In Encyclopedia of Database Systems, Springer, 830-835, 2009.B. Carminati. Secure Data Outsourcing. In Encyclopedia of Database Systems, 2523-2528, Springer, 2009.
  • B. Carminati, E. Ferrari. Secure Outsourcing of Geographical Data Over the Web: Techniques and Architectures. In Spatial Data on the Web. Modeling and Management. Springer, pp. 215234, 2007.
  • B.Carminati, E.Ferrari, P.C.K. Hung. Secure Web Service Composition: Issues and Architecture. Chapter in P. Periorellis editor book “Securing Web Services: Practical Usage of Standards and Specifications”,IDEA Group Publishing, 2007.
  • B.Bertino, B.Carminati, E.Ferrari. Authentication techniques for UDDI Registries. Chapter in L. Zhang editor book, IDEA Group Publishing, 2007.
  • B.Carminati, E.Ferrari. Privacy Preserving Third-Party Architectures. Chapter in J.P. Thomas and M. Essaaidi editors book “Information Assurance and Computer Security, Volume 6 NATO Security through Science Series: Information and Communication Security”,IOS Press, 2006.
  • B.Carminati, E.Ferrari, P.C.K. Hung. Privacy Issues in Web Services Architecture (WSA). Chapter in G.Yee editor book “Privacy Protection for E-Services”,IDEA Group Publishing, 2006.
  • E.Bertino, B.Carminati, and E.Ferrari. Secure Data Dissemination. Chapter in book “Information Security Policies and Actions in Modern Integrated Systems”, Idea Group Inc.

disclaimer

The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author’s copyright. These works may not be reposted without the explicit permission of the copyright holder.