{"id":97,"date":"2011-09-21T21:34:04","date_gmt":"2011-09-21T21:34:04","guid":{"rendered":"http:\/\/dawsec.dicom.uninsubria.it\/barbara.carminati\/?page_id=97"},"modified":"2022-07-18T16:35:00","modified_gmt":"2022-07-18T14:35:00","slug":"publications-3","status":"publish","type":"page","link":"https:\/\/dawsec.dicom.uninsubria.it\/barbara.carminati\/?page_id=97","title":{"rendered":"Publications"},"content":{"rendered":"<h2 style=\"text-align: justify;\"><a name=\"journals\"><\/a> Journals<\/h2>\n<ul>\n<li>F. Daidone, B. Carminati and E. Ferrari, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9528990\">Blockchain-based Privacy Enforcement in the IoT domain<\/a>,&#8221; in IEEE Transactions on Dependable and Secure Computing, 2021.<\/li>\n<li>Lekssays, A., Landa, L., Carminati, B., Ferrari, E. <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S138912862100445X\">PAutoBotCatcher: A blockchain-based privacy-preserving botnet detector for Internet of Things<\/a>, Computer Networks journal, 2021.<\/li>\n<li>Alom, Z., Carminati, B., &amp; Ferrari, E. (2020). <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S2468696420300203\">A deep learning model for Twitter spam detection<\/a>.\u00a0<em>Online Social Networks and Media<\/em>,\u00a0<em>18<\/em>, 100079.<\/li>\n<li><\/li>\n<li>Singh, B. C.; Carminati, B.; Ferrari, E.,\u00a0 <a href=\"https:\/\/dl.acm.org\/doi\/10.1109\/TDSC.2019.2903802\">Privacy-aware Personal Data Storage (P-PDS): Learning how to Protect User Privacy from External Applications<\/a>,\u00a0 IEEE Transactions On Dependable And Secure Computing, 2019.<\/li>\n<li>G. Sagirlar, B. Carminati, E. Ferrari. <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128618305322\">Decentralizing privacy enforcement for Internet of Things smart objects<\/a>, Computer Networks, Volume 143, 2018, Pages 112-125, ISSN 1389-1286.<\/li>\n<li>L. Bahri, B. Carminati, E. Ferrari. <a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/widm.1260#\">Knowledge-based Approaches for Digital Identity in Social Networks<\/a>. WIREs Data Mining and Knowledge Discovery, Volume<span class=\"val\">8<\/span>, Issue<span class=\"val\">5,\u00a0<\/span>September\/October 2018.<\/li>\n<li>L. Bahri,\u00a0B. Carminati,\u00a0E. Ferrari.\u00a0<a href=\"https:\/\/ieeexplore.ieee.org\/document\/7937912\/?reload=true\">Privacy in Web Service Transactions: A Tale of More than a Decade of Work<\/a>.\u00a0IEEE Transactions on Services Computing, 11(2):\u00a0448-465, 2018.<\/li>\n<li>L. Bahri, B. Carminati, E. Ferrari, A. Bianco.<a href=\"https:\/\/dl.acm.org\/citation.cfm?id=3134439&amp;dl=ACM&amp;coll=DL\" target=\"_blank\" rel=\"noopener\">\u00a0Enhanced Audit Strategies for Collaborative and Accountable Data Sharing in Social Networks<\/a>. ACM Transactions on Internet Technologies, 18(4):1-19, 2018.<\/li>\n<li>L. Bahri, B. Carminati, E. Ferrari,\u00a0 <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128618305322\">Decentralized privacy preserving services for Online Social Networks<\/a>, in Online Social Networks and Media 6, 18-25, Elsevier, June 2018.<\/li>\n<li>L. Bahri, B. Carminati and E. Ferrari, <a href=\"https:\/\/ieeexplore.ieee.org\/document\/7937912\">Privacy in Web Service Transactions: A Tale of More than a Decade of Work<\/a>, in <em>IEEE Transactions on Services Computing<\/em>, vol. 11, no. 2, pp. 448-465, March-April 1 2018.<\/li>\n<li style=\"text-align: justify;\">D. Albertini, <span class=\"this-person\">B. Carminati<\/span>, E. Ferrari, <span class=\"title\"><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10207-016-0322-4\">An extended access control mechanism exploiting data dependencies,<\/a> <\/span>International\u00a0 Journal\u00a0 of Information Security, 16(1): pp 75-89, 2017.<\/li>\n<li style=\"text-align: justify;\">L. Bahri, <span class=\"this-person\">B. Carminati<\/span>, E. Ferrari<a href=\"http:\/\/dblp.uni-trier.de\/pers\/hd\/f\/Ferrari:Elena\">.<\/a><span class=\"title\"> COIP &#8211; <a href=\"https:\/\/dl.acm.org\/citation.cfm?id=3014338\">Continuous, Operable, Impartial, and Privacy-Aware Identity Validity Estimation for OSN Profiles<\/a>, in ACM Transactions on the Web (TWEB), <\/span>10(4):, 23:1-23:41, 2016.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, N. Hong Tran. <span class=\"title\"><a href=\"https:\/\/dl.acm.org\/citation.cfm?id=2894718\">Trustworthy and effective person-to-person payments over multi-hop MANETs<\/a>.<\/span> J. Network and Computer Applications 60: 1-18 (2016)<\/li>\n<li style=\"text-align: justify;\">A. Soliman, L. Bahri, S. Girdzijauskas,B. Carminati, E. Ferrari. <span class=\"title\"><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s13278-016-0343-z\">CADIVa: cooperative and adaptive decentralized identity validation model for social networks<\/a>.<\/span> Social Network\u00a0 Analysis and\u00a0 Mining journal 6(1): 36:1-36:22 (2016)<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, M. Guglielmi. <a href=\"https:\/\/www.computer.org\/csdl\/trans\/tq\/preprint\/07097688.pdf\" target=\"_blank\" rel=\"noopener\"> Detection of Unspecified Emergencies for Controlled Information Sharing<\/a>. IEEE Transaction\u00a0 Dependable and Secure Computing 13(6): 630-643 (2016)<\/li>\n<li style=\"text-align: justify;\">C. Akcora, B. Carminati, E. Ferrari.\u00a0<a href=\"http:\/\/link.springer.com\/article\/10.1007%2Fs13278-012-0090-8\" target=\"_blank\" rel=\"noopener\">User Similarities on Social Networks<\/a>.\u00a0Social Network Analysis and Mining journal, 3(3):475-495, 2013.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, N. Hong Tran. SMARTPAY:\u00a0<a href=\"http:\/\/ojs.scienceengineering.org\/index.php\/science\/article\/view\/98\" target=\"_blank\" rel=\"noopener\">A Lightweight Protocol to Enforce Trust Preferences in Mobile Person-to-Person Payments<\/a>, Science Journal, 2(4): 2013.<\/li>\n<li style=\"text-align: justify;\">M. Vanetti,\u00a0E. Binaghi, E. Ferrari, B. Carminati, M. Carullo.\u00a0\u00a0<a href=\"http:\/\/www.computer.org\/csdl\/trans\/tk\/2013\/02\/ttk2013020285-abs.html\" target=\"_blank\" rel=\"noopener\">A System to Filter Unwanted Messages from OSN User Walls<\/a><em><strong>.<\/strong><\/em> IEEE Transactions on Knowledge and Data Engineering (TKDE), 25(2): 285-297, 2013.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, A. Perego. A Multi-layer Framework for Personalized Social Tag-based Applications, Data &amp; Knowledge Engineering, to appear.<\/li>\n<li style=\"text-align: justify;\">M. Vanetti,\u00a0E. Binaghi, E. Ferrari, B. Carminati, M. Carullo.\u00a0\u00a0A System to Filter Unwanted Messages from OSN User Walls<em><strong>.<\/strong><\/em> In IEEE Transactions on Knowledge and Data Engineering (TKDE), to appear.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu,\u00a0 B. Thuraisinghaim. Semantic Web-Based Social Network Access Control. Computers and Security Journal, 30(2-3): 108-115, 2011.<\/li>\n<li style=\"text-align: justify;\">J. Cao, B. Carminati, E. Ferrari, K.L. Tan. CASTLE: Continuously Anonymizing Data Streams. IEEE Transactions on Dependable and Secure Computing (TDSC), 8(3): 337-352 (2011).<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, and A. Perego. Enforcing Access Control in Web-based Social Networks. ACM Transactions on Information &amp; System Security (TISSEC),\u00a013(1): (2009).<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, K.L. Tan, and J. Cao. A Framework to Enforce Access Control over Data Streams. ACM Transactions on Information &amp; System Security (TISSEC), \u00a013(3): (2010).<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari. Access control and Privacy in Web-based Social Networks. Journal of Web Information Systems, Vol. 4 No. 4, 2008 pp. 395-415.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, and A. Perego. A Decentralized Security Framework for Web-based Social Networks. International Journal of Information Security and Privacy, 2008.<\/li>\n<li style=\"text-align: justify;\">B.Carminati, E.Ferrari, E.Bertino. A Comprehensive Framework for Secure Outsourcing of XML. Data Journal of Information Assurance and Security (JIAS),\u00a03 (2008) 289-303, Dynamic Publishers, Inc.<\/li>\n<li style=\"text-align: justify;\">B.Carminati, E. Ferrari. A System for Controlled Outsourcing of Personal Data. Computer Systems Science and Engineering , vol. 21, 2006.<\/li>\n<li style=\"text-align: justify;\">B.Carminati, E. Ferrari, B. Thuraisingham. Access Control for Web Data: Models and Policy Languages. Annals of Telecommunications, 61(3-4):245-266, 2006.<\/li>\n<li style=\"text-align: justify;\">B.Carminati, E.Ferrari, P.C.K. Hung. Exploring Privacy Issues in Web Services Discovery Agencies. IEEE Security &amp; Privacy Magazine. 3(5):14-21, 2005.<\/li>\n<li style=\"text-align: justify;\">E.Bertino, B.Carminati, E.Ferrari. Merkle Tree Authentication in UDDI Registries. International Journal of Web Services Research, 1(2):37-57, 2004, Idea Group Inc.<\/li>\n<li style=\"text-align: justify;\">E.Bertino, B.Carminati, E.Ferrari, B. Thuraisingham, A. Gupta. Selective and Authentic Third-Party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering (TKDE), 16(10):1263-1278, 2004.<\/li>\n<li style=\"text-align: justify;\">E.Bertino, B.Carminati, E.Ferrari. Access Control for XML documents and data. Information Security. Technical Report, 9(3):19-34, 2004, Elsevier Science.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E.Ferrari. Management of Access Control Policies for XML Document Sources. International Journal of Information Security, 1(4):236-260, 2003, Springer.<\/li>\n<li style=\"text-align: justify;\">E.Bertino, B.Carminati, E.Ferrari. XML Security. Information Security Technical Report, 6(2):44-58, 2001, Elsevier Science.<\/li>\n<\/ul>\n<h2 style=\"text-align: justify;\"><a name=\"conf\"><\/a>Conferences<\/h2>\n<ul>\n<li>Giaretta, L., Lekssays, A., Carminati, B., Ferrari, E., &amp; Girdzijauskas, \u0160. LiMNet: Early-Stage Detection of IoT Botnets with Lightweight Memory Networks. In 2021 <em>European Symposium on Research in Computer Security<\/em>(ESORICS)(pp. 605-625). Springer.<\/li>\n<li>Son, H. X., Carminati, B., &amp; Ferrari, E.. A Risk Assessment Mechanism for Android Apps. In <em>2021 IEEE International Conference on Smart Internet of Things (SmartIoT)<\/em>(pp. 237-244).<\/li>\n<li>Hoang, A. T., Carminati, B., &amp; Ferrari, E. Privacy-Preserving Sequential Publishing of Knowledge Graphs. In <i>2021 IEEE 37th International Conference on Data Engineering (ICDE)<\/i>. IEEE.<\/li>\n<li>Ardagna, C. A., Anisetti, M., Carminati, B., Damiani, E., Ferrari, E., &amp; Rondanini, C.. A Blockchain-based Trustworthy Certification Process for Composite Services. In <i>2020 IEEE International Conference on Services Computing (SCC)<\/i>\u00a0(pp. 422-429). IEEE.<\/li>\n<li>Rondanini, C., Carminati, B., Daidone, F., &amp; Ferrari, E.\u00a0 Blockchain-based controlled information sharing in inter-organizational workflows. In <i>2020 IEEE International Conference on Services Computing (SCC)<\/i>\u00a0(pp. 378-385). IEEE.<\/li>\n<li>Anisetti, M., Ardagna, C. A., Carminati, B., Ferrari, E., &amp; Perner, C. L. (2020). Requirements and challenges for secure and trustworthy UAS collaboration. In <i>2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)<\/i>\u00a0(pp. 89-98). IEEE.<\/li>\n<li>Hoang, A. T., Carminati, B., &amp; Ferrari, E. Cluster-based anonymization of knowledge graphs. In 2020 <i>International Conference on Applied Cryptography and Network Security<\/i> (pp. 104-123). Springer, Cham.<\/li>\n<li>Hoang, A. T., Carminati, B., &amp; Ferrari, E. . Cluster-based anonymization of directed graphs. In <i>2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC)<\/i>\u00a0(pp. 91-100). IEEE.<\/li>\n<li>Rondanini, C., Carminati, B., &amp; Ferrari, E. Confidential discovery of IoT devices through blockchain. In <i>2019 IEEE International Congress on Internet of Things (ICIOT)<\/i>\u00a0(pp. 1-8). IEEE.<\/li>\n<li>Alom Z., Carminati B., Ferrari E.\u00a0 Helping Users Managing Context-based Privacy Preferences. In 2019 IEEE International Conference on Services Computing (SCC), Milan, Italy, 8-13 July, 2019, IEEE Computer Society.<\/li>\n<li>Alom Z., Carminati B., Ferrari E. Adapting Users\u2019 Privacy Preferences in Smart Environments. In 2019 IEEE International Conference on Internet of Things (ICIOT), Milan, Italy, 8-13 July, 2019, IEEE Computer Society.<\/li>\n<li><\/li>\n<li>C. Qiu, A. Squicciarini, D. R. Khare, B. Carminati, J. Caverlee.<a href=\"https:\/\/dl.acm.org\/citation.cfm?id=3237922\"> CrowdEval: A Cost-Efficient Strategy to Evaluate Crowdsourced Worker&#8217;s Reliability<\/a>. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS &#8217;18), Richland, SC, 1486-1494, 2018.<\/li>\n<li>G. Sagirlar, B. Carminati, E. Ferrari,\u00a0 J. Sheehan, E. Ragnoli.\u00a0Hybrid-IoT: Hybrid Blockchain Architecture for Internet of Things \u2013 PoW Sub-blockchains. <a href=\"http:\/\/cse.stfx.ca\/~blockchain2018\/index.php\">2018 IEEE Conference on Blockchains.<\/a><\/li>\n<li>B. Carminati, C. Rondanini, E. Ferrari.\u00a0 Confidential Business Process Execution on Blockchain, <a href=\"http:\/\/conferences.computer.org\/icws\/2018\/\">2018 IEEE International Conference on Web Services (ICWS), San Francisco, USA, July 2018<\/a>.<\/li>\n<li style=\"text-align: justify;\">P. Ilia, <span class=\"this-person\">B.Carminati<\/span>,\u00a0 E. Ferrari, P. Fragopoulou, S. Ioannidis. <span class=\"title\">SAMPAC: Socially-Aware collaborative Multi-Party Access Control.<\/span> <a href=\"http:\/\/dblp.uni-trier.de\/db\/conf\/codaspy\/codaspy2017.html#IliaCFFI17\">CODASPY 2017<\/a>: 71-82<\/li>\n<li style=\"text-align: justify;\">\n<div class=\"data\"><a href=\"http:\/\/dblp.uni-trier.de\/pers\/hd\/q\/Qiu:Chenxi\">Chenxi Qiu<\/a>, <a href=\"http:\/\/dblp.uni-trier.de\/pers\/hd\/s\/Squicciarini:Anna_Cinzia\">Anna Cinzia Squicciarini<\/a>, <span class=\"this-person\">Barbara Carminati<\/span>, <a href=\"http:\/\/dblp.uni-trier.de\/pers\/hd\/c\/Caverlee:James\">James Caverlee<\/a>, <a href=\"http:\/\/dblp.uni-trier.de\/pers\/hd\/k\/Khare:Dev_Rishi\">Dev Rishi Khare<\/a>:<br \/>\n<span class=\"title\">CrowdSelect: Increasing Accuracy of Crowdsourcing Tasks through Behavior Prediction and User Selection.<\/span> <a href=\"http:\/\/dblp.uni-trier.de\/db\/conf\/cikm\/cikm2016.html#QiuSCCK16\">CIKM 2016<\/a>: 539-548<\/div>\n<\/li>\n<li style=\"text-align: justify;\">\n<div class=\"data\"><span class=\"this-person\">B. Carminati<\/span>, P. Colombo, E. Ferrari, G. Sagirlar <span class=\"title\">Enhancing User Control on Personal Data Usage in Internet of Things Ecosystems.<\/span> <a href=\"http:\/\/dblp.uni-trier.de\/db\/conf\/IEEEscc\/scc2016.html#CarminatiCFS16\">SCC 2016<\/a>: 291-298<\/div>\n<\/li>\n<li style=\"text-align: justify;\">L. Bahri, A. Soliman, J. Squillaci, B. Carminati, E. Ferrari, and S. Girdzijauskas. Beat the DIVa \u2013 Decentralized Identity Validation for Online Social Networks. In Proc. of the \u00a0<a href=\"http:\/\/icde2016.fi\/dev_3\/pre_program.php\" target=\"_blank\" rel=\"noopener\">32nd IEEE International Conference on Data Engineering (<\/a>demo track), ICDE 2016.<\/li>\n<li style=\"text-align: justify;\">Qiu, C., Squicciarini, A. C., Carminati, B., Caverlee, J., &amp; Khare, D. R. (2016, October). Crowdselect: Increasing accuracy of crowdsourcing tasks through behavior prediction and user selection. In <i>Proceedings of the 25th ACM International on Conference on Information and Knowledge Management<\/i>\u00a0 (<a title=\"CIKM 2016\" href=\"http:\/\/www.cikm2016.org\/\" target=\"_blank\" rel=\"noopener\">CIKM 2016<\/a>) (pp. 539-548). ACM.<\/li>\n<li style=\"text-align: justify;\">A. Bartoli, B. Carminati, E. Ferrari, and E. Medvet. A Language and an Inference Engine for Twitter Filtering Rules. \u00a0In Proc. of the <a href=\"https:\/\/wibih.unomaha.edu\/wi\" target=\"_blank\" rel=\"noopener\">IEEE\/WIC\/ACM International Conference on Web Intelligence<\/a> (WI\u201916), to appear.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, P. Colombo, E. Ferrari, and G. Sagirlar. Enhancing User Control on Personal Data Usage in Internet of Things Ecosystems. In Proc of the<a href=\"http:\/\/thescc.org\/2016\/news.html\" target=\"_blank\" rel=\"noopener\"> 13th IEEE International Conference on Services Computing<\/a> (SCC 2016), to appear.<\/li>\n<li style=\"text-align: justify;\">N. Laleh, B. Carminati, E. Ferrari.\u00a0Anomalous Change Detection in Time-evolving OSNs. In Proc. of the <a href=\"http:\/\/craax.upc.edu\/medhocnet2016\" target=\"_blank\" rel=\"noopener\">15th IFIP Annual Mediterranean Ad Hoc Networking Workshop<\/a>, June 2016.<\/li>\n<li style=\"text-align: justify;\">N. Laleh, B. Carminati, and E. Ferrari. <a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/login.jsp?tp=&amp;arnumber=7463778&amp;url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D7463778\" target=\"_blank\" rel=\"noopener\">Graph Based Local Risk Estimation in Large Scale Online Social Networks<\/a>. In Proc. of the IEEE International Conference in Social Computing and Networking (SocialCom2015), 2015.<\/li>\n<li style=\"text-align: justify;\">L. Bahri, B. Carminati, E. Ferrari. CARDS \u2013 Collaborative Audit and Report Data Sharing for A-posteriori Access Control in DOSNs. In Proc. of the 1st IEEE International Conference on Collaboration and Internet Computing (<a href=\"http:\/\/www.ieee-cic.org\/\" target=\"_blank\" rel=\"noopener\"> CIC 2015<\/a>), to appear.<\/li>\n<li style=\"text-align: justify;\">L. Bahri, B. Carminati, E. Ferrari. What Happens to My Online Social Estate When I Am Gone? An Integrated Approach to Posthumous Online Data Management. In Proc. of the 16th IEEE International Conference on Information Reuse and Integration (IRI 2015), to appear.<\/li>\n<li style=\"text-align: justify;\">A. Soliman, L. Bahri, B. Carminati, E. Ferrari and S. Girdzijauskas. DIVa: Decentralized Identity Validation for Social Networks. Proc. of the IEEE\/ACM Conference on Advances in Social Network Analysis and Mining (ASONAM 2015), to appear.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, N.H. Tran. <a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/login.jsp?tp=&amp;arnumber=6928891&amp;url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel7%2F6923037%2F6928859%2F06928891.pdf%3Farnumber%3D6928891\" target=\"_blank\" rel=\"noopener\">Secure Web Service Composition with Untrusted Broker<\/a>. In Proc. of the 21th IEEE International Conference on Web Services (ICWS), June 2014.<\/li>\n<li style=\"text-align: justify;\">E. Medvet, A. Bartoli, B. Carminati, E. Ferrari,\u00a0<a href=\"http:\/\/machinelearning.inginf.units.it\/publications\/international-conference-publications\/evolutionaryinferenceofattribute-basedaccesscontrolpolicies\" target=\"_blank\" rel=\"noopener\">Evolutionary Inference of Attribute-based Access Control Policies<\/a>,\u00a08th International Conference on Evolutionary Multi-Criterion Optimization (EMO), March 2015.<\/li>\n<li style=\"text-align: justify;\">L. Bahri, B. Carminati, E. Ferrari.\u00a0Community-based Identity Validation on Online Social Networks.\u00a0In Proc. of \u00a0the <a href=\"http:\/\/lsd.ls.fi.upm.es\/icdcs2014\" target=\"_blank\" rel=\"noopener\">34th International Conference on Distributed Computing Systems<\/a> (<a href=\"http:\/\/lsd.ls.fi.upm.es\/icdcs2014\" target=\"_blank\" rel=\"noopener\">I<\/a>CDCS), June 2014.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, N.H. Tran Secure Web Service Composition with Untrusted Broker. In Proc. of \u00a0the <a href=\"http:\/\/conferences.computer.org\/icws\/2014\/\" target=\"_blank\" rel=\"noopener\">21th IEEE International Conference on Web Services<\/a> (ICWS), June\u00a02014.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, N. Tran. \u00a0<a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/login.jsp?tp=&amp;arnumber=6693364&amp;url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel7%2F6693161%2F6693296%2F06693364.pdf%3Farnumber%3D6693364\" target=\"_blank\" rel=\"noopener\">Enforcing Trust Preferences in Mobile Person-to-Person Payments<\/a>. In Proc. of the\u00a0In Proc. of the 5th IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2013), September 2013.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E.\u00a0 Ferrari, M. Guglielmi. SHARE: Secure information sHaring frAmework for emeRgency managemEnt. In Proc. of the 29th IEEE\u00a0 International Conference on Data Engineering (ICDE 2013),\u00a0Brisbane, Australia, April 2013\u00a0(demo paper).<\/li>\n<li style=\"text-align: justify;\">C.G. Akcora, B. Carminati, E. Ferrari.\u00a0Risks of Friendships on Social Networks. \u00a0In Proc. of the \u00a0IEEE International Conference on Data Mining (<a href=\"http:\/\/icdm2012.ua.ac.be\/\" target=\"_blank\" rel=\"noopener\">ICDM 2012<\/a>), Brussels, Belgium, December 2012.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, M. Guglielmi.\u00a0Policies for Composed Emergencies in Support of Disaster Management. \u00a0In Proc. of the\u00a0VLDB Workshop on Secure Data Management (SDM 2012), August 2012.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, M. Viviani.\u00a0A Multi-dimensional and Event-based Model for Trust Computation in the Social Web. \u00a0In Proc. of the 4th International Conference on Social Informatics\u00a0(<a href=\"http:\/\/www.socinfo2012.com\/\" target=\"_blank\" rel=\"noopener\">SocInfo 2012<\/a>), Lausanne,\u00a0Switzerland, December 2012.<\/li>\n<li style=\"text-align: justify;\">C. Akcora, B. Carminati, E. Ferrari. Privacy in Social Networks: How Risky is Your Social Graph?. 28th International Conference on Data Engineering (ICDE 2012), Washington, April 2012.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, J.Girardi. Trust &amp;Share: Trusted Information Sharing in Online Social Networks. Demo paper at 28th International Conference on Data Engineering (ICDE 2012), Washington, April 2012.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, M. Guglielmi. \u00a0Secure Information Sharing on Support of Emergency Management.\u00a0IEEE PASSAT, October 2011<\/li>\n<li style=\"text-align: justify;\">C. Akcora, B. Carminati, E. Ferrari. \u00a0Network and Profile-based Measures for User Similarites on Social Networks. In Proc. of the 12th IEEE International Conference on Information Reuse and Integration (IRI 2011), August 2011.<\/li>\n<li style=\"text-align: justify;\">M.\u00a0 Xue, B. Carminati,\u00a0\u00a0 E.\u00a0 Ferrari.\u00a0 P3D \u2013 Privacy-preserving Path Discovery in Decentralized Social Networks.\u00a0\u00a0In Proc. of the 35th\u00a0 IEEE International Computer Software and Applications Conference (COMPSAC 2011), April 2011.<\/li>\n<li style=\"text-align: justify;\">Anna Cinzia Squicciarini, Barbara Carminati, Sushama Karumanchi: A Privacy-Preserving Approach for Web Service Selection and Provisioning. IEEE International Conference on Web Services, ICWS 2011, Washington, DC, USA, July 4-9, 2011.<\/li>\n<li style=\"text-align: justify;\">B. Carminati,\u00a0\u00a0 E.\u00a0 Ferrari, S. \u00a0Morasca,\u00a0\u00a0\u00a0D. Taibi. A Probability-based Approach to Modeling the Risk of Unauthorized Propagation of Information in On-line Social Networks. In Proc. of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY 2011), February 2011.<\/li>\n<li style=\"text-align: justify;\">M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, E. Ferrari. Content-based Filtering in On-line Social Networks. In Proc. of PSDML 2010 \u2013 ECML\/PKDD Workshop on Privacy and Security Issues in Data Mining and Machine Learning, Barcellona, Spain, LNAI, Springer Verlag, October.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, C.H. Chi , E. Ferrari, L. Yu. Compatibility-driven and Adaptable Service Composition. In Proc. of the\u00a02009 IEEE Asia-Pacific Service Computing Conference (APSCC 2009), Singapore, December 2009.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari. Enforcing Relationships Privacy through Collaborative Access Control in Web-based Social Networks. In Proc. of the\u00a05th International Conference on Collaborative Computing (CollaborateCom 2009), Washington D.C., November 2009 (invited paper).<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, A. Perego. The Quality Social Network: A Collaborative Environment for Personalizing Web Access. In Proc. of the\u00a0First International Workshop On Collaborative Social Networks (CollaborateSN 2009), Washington D.C., November 2009 (invited paper).<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, R. Heatherly, M. Kantargioglu, B. Thuraisingham. A Semantic Web Based Framework for Social Network Access Control. In Proc. of the\u00a014th ACM Symposium on Access Control Technologies (SACMAT\u201909), Stresa, Italy, June 2009.<\/li>\n<li style=\"text-align: justify;\">J. Nin, B. Carminati, E. Ferrari, V. Torra. Computing Reputation for Collaborative Private Networks. In Proc. of the\u00a033rd IEEE Computer Software and Applications Conference (COMPSAC 2009), Seattle, USA, July 2009.<\/li>\n<li style=\"text-align: justify;\">J. Cao, B.Carminati, E.Ferrari, K.L. Tan. ACStream: Enforcing Access Control Over Data Streams. In Proc. of the\u00a025th International Conference on Data Engineering (ICDE 2009), Shangai, China, April 2009, (demo paper).<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, A. Perego. Combining Social Networks and Semantic Web Technologies for Personalizing Web Access. In Proc. of the\u00a04th International Conference on Collaborative Computing (CollaborateCom 2008), Orlando, FL, November 2008 (invited paper).<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari. Privacy-aware Collaborative Access Control in Web-based Social Networks. In Proc. of the\u00a022nd IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC 2008), London, UK, July 2008.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari. Trust-based Information Sharing in Collaborative Communities: Issues and Challenges. In Proc. of the\u00a0Conference on Future of Trust in Computing, Berlin, Germany, June 2008, (invited paper).<\/li>\n<li style=\"text-align: justify;\">J. Cao, B.Carminati, E.Ferrari, K.L. Tan. CASTLE: A Delta-constrained Scheme for k-anonymizing Data Streams. In Proc. of the\u00a024th International Conference on Data Engineering (ICDE 2008), Cancun, Mexico, April 2008, (poster paper).<\/li>\n<li style=\"text-align: justify;\">J. Biskup, B. Carminati, E. Ferrari, F. Mueller, S. Wortmann. Towards Secure Execution Orders for Composite Web Services. In Proc. of the\u00a0International Conference on Web Services (ICWS\u201907), Salt Lake City, USA, July. IEEE Press.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, R. Bishop, P.C.K. Hung. Security Conscious Web Service Composition with Semantic Web Support. In Proc. of the\u00a0First ICDE Workshop on Security Technologies for Next Generation Collaborative Business Applications (SECOBAP\u201907)\u00a0, Istanbul, Turkey, April 2007. IEEE Press.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, A. Perego. Private Relationships in Social Networks. In Proc. of the\u00a0ICDE\u201907 International Workshop on Privacy Data Management\u00a0, Istanbul, Turkey, April 2007. IEEE Press.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, K.L. Tan. Enforcing Access Control Over Data Streams. In Proc. of the\u00a012th ACM Symposium on Access Control Models and Techologies (SACMAT\u201907)\u00a0, Sophia Antipolis, France, June 2007. ACM Press.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, K.L. Tan. Specifying Access Control Policies on Data Streams. In Proc. of the\u00a012th International Conference on Database Systems for Advanced Applications (DASFAA\u201906)\u00a0, Bangkok, Tailand, April 2007. LNCS, Springer.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, A. Perego. Rule-based Access Control for Social Networks. In Proc. of the\u00a0IFIP WG 2.12 and 2.14 Semantic Web Workshop\u00a0, Montpellier, France, November 2006. LNCS, Springer.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari, P.C.K. Hung. Security Conscious Web Service Composition. In Proc. of the\u00a0IEEE International Conference on Web Services (ICWS 2006), Chicago, USA, September 2006.<\/li>\n<li style=\"text-align: justify;\">B. Carminati, E. Ferrari. Confidentiality Enforcement for XML Outsourced Data. In Proc. of the\u00a0Second International EDBT Workshop on Database Technologies for Handling XML Information on the Web\u00a0, Munich, Germany, March 2006.<\/li>\n<li style=\"text-align: justify;\">B.Carminati, E. Ferrari. AC-XML Documents: Improving the Performance of a Web Access Control Module. In Proc. of the\u00a010th ACM Symposium on Access Control Models and Technologies (SACMAT\u201905), Stockholm, Sweden, 2005, ACM Press.<\/li>\n<li style=\"text-align: justify;\">B.Carminati, E.Ferrari. Trusted Privacy Manager: A System for Enforcing Privacy on Outsourced Data. In Proc. of\u00a0ICDE\u201905 International Workshop on Privacy Data Management, Tokyo, Japan, 2005, IEEE Society Press.<\/li>\n<li style=\"text-align: justify;\">B.Carminati, E. Ferrari, E. Bertino. Securing XML Data in Third-Party Distribution Systems. In Proc. of theFourteenth ACM Conference on Information and Knowledge Management (CIKM\u201905), Bremen, Germany, 2005, ACM Press.<\/li>\n<li style=\"text-align: justify;\">B.Carminati, E.Ferrari, P.C.K Hung. Web Services Composition: A Security Perspective. In Proc. of\u00a0ICDE\u201905 International Workshop on Challanges in Web Information Retrieval and Integration, Tokyo, Japan, 2005, IEEE Society Press.<\/li>\n<li style=\"text-align: justify;\">B.Carminati, E.Ferrari, E.Bertino. Secure Third-party Distribution of XML Data. In Proc. of theInternational Conference on Data Engineering (ICDE\u201905), Tokyo, Japan, 2005, IEEE Society Press, (poster paper).<\/li>\n<li style=\"text-align: justify;\">W. Castelnovo, B. Carminati, E.Ferrari, M. Simonetta. Organizational Heterogeneity in Networked Government. In Proc. of the\u00a0eChallenges e-2005 Conference, Ljubljana, Slovenia, 2005.<\/li>\n<li style=\"text-align: justify;\">B.Carminati, E.Ferrari, B. Thuraisingham. Using RDF for Policy Specification and Enforcement. In Proc. of the\u00a0International Workshop on Web Semantics \u2013 WebS 2004\u00a0, Zaragoza, Spain, 2004, IEEE Society Press.<\/li>\n<li style=\"text-align: justify;\">P.C.K Hung, E. Ferrari, B. Carminati. Towards Standardized Web Services Privacy Technologies. In Proc. of the\u00a0IEEE International Conference on Web Services (ICWS\u201904), San Diego, CA, USA, 2004, IEEE Society Press.<\/li>\n<li style=\"text-align: justify;\">E. Bertino, B. Carminati, E. Ferrari. A Flexible Authentication Method for UDDI Registries. In Proc. of theFirst International Conference on Web Services (ICWS\u201903), Las Vegas, Nevada, USA, 2003, IEEE Society Press.<\/li>\n<li style=\"text-align: justify;\">E.Bertino, B.Carminati, E.Ferrari, G.Mella. Author-X: A System for Secure Dissemination and Update of XML Documents. In Proc. of 3rd International Workshop on Databases in Networked Information Systems (DNIS\u201903), Aizu, Japan, 2003, LNCS, Springer (invited paper).<\/li>\n<li style=\"text-align: justify;\">E. Bertino, B. Carminati, E. Ferrari. A Temporal Key Management Scheme for Broadcasting XML Documents. In Proc. of the\u00a09th ACM Conference on Computer and Communications Security (CCS\u201902), Washington, USA, 2002, ACM Press.<\/li>\n<li style=\"text-align: justify;\">E. Bertino, B. Carminati, E. Ferrari. A Secure Publishing Service for Digital Libraries of XML Documents. In Proc. of Information Security Conference (ISC01), Lecture Notes in Computer Science, 2200:347-362, Malaga, Spain, 2001, LNCS Springer.<\/li>\n<\/ul>\n<h2 style=\"text-align: justify;\"><span style=\"color: #444444; line-height: 33px;\">Books<\/span><\/h2>\n<ul>\n<li>B. Carminati, E. Ferrari, M. Viviani.\u00a0<a href=\"http:\/\/www.morganclaypool.com\/doi\/abs\/10.2200\/S00549ED1V01Y201311SPT008\" target=\"_blank\" rel=\"noopener\">Security and Trust in Online Social Networks<\/a>, Synthesis Lectures on Information Security, Privacy and Trust, Morgan &amp; Claypool, 2013.<\/li>\n<li>B. Carminati, A. Maddalena e M.Mesiti. <a href=\"http:\/\/www.libreriauniversitaria.it\/sistema-gestione-dati-esercizi-carminati\/libro\/9788825173338\" target=\"_blank\" rel=\"noopener\">Sistemi di Gestione Dati: Esercizi<\/a>, CittaStudi Edizioni, Utet Libreria, De Agostini Scuola, 2008.<\/li>\n<\/ul>\n<h2 style=\"text-align: justify;\"><a name=\"chap\"><\/a>Chapters in books<\/h2>\n<ul style=\"text-align: justify;\">\n<li>Carminati B., Ferrari E., Kantarcioglu M., Thuraisingham B. (2010). Privacy protection of per- sonal data in Social Networks. Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques, Francesco Bonchi e Elena Ferrari editors. Chapman &amp; Hall\/CRC Data Mining and Knowledge Discovery Series, ISBN: 9781439803653.<\/li>\n<li>B. Carminati, E. Ferrari. Privacy-aware Access Control in Social Networks: Issues and Solutions. Jordi Nin and Javier Herranz editori, Privacy and Anonymity in Information Management Systems,\u00a0181-195, Springer, 2010.<\/li>\n<li>B. Carminati, E. Ferrari. Privacy protection of personal data in Social Networks. Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques, Chapman &amp; Hall\/CRC Data Mining and Knowledge Discovery Series.<\/li>\n<li>B. Carminati, E. Ferrari, and A. Perego. Security and Privacy in Social Networks. In: Encyclopedia of Information Science and Technology, 2nd Edition. IGI Publishing, vol. VII, pp. 3369-3376, 2008.<\/li>\n<li>B. Carminati. Merkle Trees. In Encyclopedia of Database Systems, Springer, 1714-1715, 2009.<\/li>\n<li>B. Carminati. Blind Signatures. In Encyclopedia of Database Systems, 251-252, Springer, 2009.<\/li>\n<li>B. Carminati. Digital Signatures. In Encyclopedia of Database Systems, Springer, 830-835, 2009.B. Carminati. Secure Data Outsourcing. In Encyclopedia of Database Systems, 2523-2528, Springer, 2009.<\/li>\n<li>B. Carminati, E. Ferrari. Secure Outsourcing of Geographical Data Over the Web: Techniques and Architectures. In Spatial Data on the Web. Modeling and Management. Springer, pp. 215234, 2007.<\/li>\n<li>B.Carminati, E.Ferrari, P.C.K. Hung. Secure Web Service Composition: Issues and Architecture. Chapter in P. Periorellis editor book &#8220;Securing Web Services: Practical Usage of Standards and Specifications&#8221;,IDEA Group Publishing, 2007.<\/li>\n<li>B.Bertino, B.Carminati, E.Ferrari. Authentication techniques for UDDI Registries. Chapter in L. Zhang editor book, IDEA Group Publishing, 2007.<\/li>\n<li>B.Carminati, E.Ferrari. Privacy Preserving Third-Party Architectures. Chapter in J.P. Thomas and M. Essaaidi editors book &#8220;Information Assurance and Computer Security, Volume 6 NATO Security through Science Series: Information and Communication Security&#8221;,IOS Press, 2006.<\/li>\n<li>B.Carminati, E.Ferrari, P.C.K. Hung. Privacy Issues in Web Services Architecture (WSA). Chapter in G.Yee editor book &#8220;Privacy Protection for E-Services&#8221;,IDEA Group Publishing, 2006.<\/li>\n<li style=\"text-align: justify;\">E. Bertino, B.Carminati, and E.Ferrari. Secure Data Dissemination. Chapter in book &#8220;Information Security Policies and Actions in Modern Integrated Systems&#8221;, Idea Group Inc.<\/li>\n<\/ul>\n<h2 style=\"text-align: justify;\">disclaimer<\/h2>\n<address style=\"text-align: justify;\"><span style=\"color: #808080;\">The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author&#8217;s copyright. These works may not be reposted without the explicit permission of the copyright holder.<\/span><\/address>\n","protected":false},"excerpt":{"rendered":"<p>Journals F. Daidone, B. Carminati and E. Ferrari, &#8220;Blockchain-based Privacy Enforcement in the IoT domain,&#8221; in IEEE Transactions on Dependable and Secure Computing, 2021. Lekssays, A., Landa, L., Carminati, B., Ferrari, E. PAutoBotCatcher: A blockchain-based privacy-preserving botnet detector for Internet of Things, Computer Networks journal, 2021. Alom, Z., Carminati, B., &amp; Ferrari, E. (2020). A [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-97","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/dawsec.dicom.uninsubria.it\/barbara.carminati\/index.php?rest_route=\/wp\/v2\/pages\/97","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dawsec.dicom.uninsubria.it\/barbara.carminati\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dawsec.dicom.uninsubria.it\/barbara.carminati\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dawsec.dicom.uninsubria.it\/barbara.carminati\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dawsec.dicom.uninsubria.it\/barbara.carminati\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=97"}],"version-history":[{"count":70,"href":"https:\/\/dawsec.dicom.uninsubria.it\/barbara.carminati\/index.php?rest_route=\/wp\/v2\/pages\/97\/revisions"}],"predecessor-version":[{"id":373,"href":"https:\/\/dawsec.dicom.uninsubria.it\/barbara.carminati\/index.php?rest_route=\/wp\/v2\/pages\/97\/revisions\/373"}],"wp:attachment":[{"href":"https:\/\/dawsec.dicom.uninsubria.it\/barbara.carminati\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=97"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}