Anna C. Squicciarini - Publications

Affiliations: 
Information Sciences and Technology Pennsylvania State University, State College, PA, United States 
Area:
Information Technology, Computer Science

86 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Lin D, Steiert D, Morris J, Squicciarini A, Fan J. REMIND: Risk Estimation Mechanism for Images in Network Distribution Ieee Transactions On Information Forensics and Security. 15: 539-552. DOI: 10.1109/Tifs.2019.2924853  0.511
2019 Lin D, Squicciarini AC, Dondapati VN, Sundareswaran S. A Cloud Brokerage Architecture for Efficient Cloud Service Selection Ieee Transactions On Services Computing. 12: 144-157. DOI: 10.1109/Tsc.2016.2592903  0.657
2019 Bowers A, Liao C, Steiert D, Lin D, Squicciarini A, Hurson AR. Detecting Suspicious File Migration or Replication in the Cloud Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2018.2885271  0.456
2019 Genga L, Zannone N, Squicciarini AC. Discovering reliable evidence of data misuse by exploiting rule redundancy Computers & Security. 87: 101577. DOI: 10.1016/J.Cose.2019.101577  0.347
2018 Semonsen J, Griffin C, Squicciarini A, Rajtmajer S. Opinion Dynamics in the Presence of Increasing Agreement Pressure. Ieee Transactions On Cybernetics. PMID 29994648 DOI: 10.1109/Tcyb.2018.2799858  0.313
2018 Paci F, Squicciarini A, Zannone N. Survey on Access Control for Community-Centered Collaborative Systems Acm Computing Surveys. 51: 6. DOI: 10.1145/3146025  0.457
2018 Yuan X, Wang X, Wang C, Squicciarini AC, Ren K. Towards Privacy-Preserving and Practical Image-Centric Social Discovery Ieee Transactions On Dependable and Secure Computing. 15: 868-882. DOI: 10.1109/Tdsc.2016.2609930  0.454
2018 Halse SE, Tapia AH, Squicciarini A, Caragea C. An emotional step toward automated trust detection in crisis social media Information, Communication & Society. 21: 288-305. DOI: 10.1080/1369118X.2016.1272618  0.304
2017 Squicciarini A, Caragea C, Balakavi R. Toward Automated Online Photo Privacy Acm Transactions On the Web. 11: 2. DOI: 10.1145/2983644  0.425
2017 Lin D, Kang J, Squicciarini A, Wu Y, Gurung S, Tonguz O. MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs Ieee Transactions On Mobile Computing. 16: 1357-1370. DOI: 10.1109/Tmc.2016.2592915  0.324
2017 Li J, Squicciarini AC, Lin D, Sundareswaran S, Jia C. MMB$^{cloud}$ -Tree: Authenticated Index for Verifiable Cloud Service Selection Ieee Transactions On Dependable and Secure Computing. 14: 185-198. DOI: 10.1109/Tdsc.2015.2445752  0.658
2017 Li J, Lin D, Squicciarini AC, Li J, Jia C. Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds Ieee Transactions On Cloud Computing. 5: 499-509. DOI: 10.1109/Tcc.2015.2485214  0.507
2017 Neppalli VK, Caragea C, Squicciarini A, Tapia A, Stehle S. Sentiment analysis during Hurricane Sandy in emergency response International Journal of Disaster Risk Reduction. 21: 213-222. DOI: 10.1016/J.Ijdrr.2016.12.011  0.501
2017 Squicciarini AC, Rajtmajer SM, Griffin C. Positive and negative behavioral analysis in social networks Wiley Interdisciplinary Reviews-Data Mining and Knowledge Discovery. 7. DOI: 10.1002/Widm.1203  0.303
2016 Liao C, Squicciarini A, Griffin C, Rajtmajer S. A hybrid epidemic model for deindividuation and antinormative behavior in online social networks Social Network Analysis and Mining. 6. DOI: 10.1007/S13278-016-0321-5  0.419
2015 Squicciarini AC, Lin D, Sundareswaran S, Wede J. Privacy policy inference of user-uploaded images on content sharing sites Ieee Transactions On Knowledge and Data Engineering. 27: 193-206. DOI: 10.1109/Tkde.2014.2320729  0.742
2015 Karumanchi S, Squicciarini A, Lin D. Privacy-aware access control for message exchange in vehicular ad hoc networks Telecommunication Systems. 58: 349-361. DOI: 10.1007/S11235-014-9881-8  0.459
2015 Squicciarini AC, Lin D, Sundareswaran S, Li J. Policy driven node selection in mapreduce Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering, Lnicst. 152: 55-72. DOI: 10.1007/978-3-319-23829-6_5  0.692
2014 Squicciarini AC, Caragea C, Balakavi R. Analyzing images' privacy for the modern web Ht 2014 - Proceedings of the 25th Acm Conference On Hypertext and Social Media. 136-147. DOI: 10.1145/2631775.2631803  0.397
2014 Karumanchi S, Squicciarini AC. In the wild: A large scale study of web services vulnerabilities Proceedings of the Acm Symposium On Applied Computing. 1239-1246. DOI: 10.1145/2554850.2555010  0.336
2014 Lee B, Fan W, Squicciarini AC, Ge S, Huang Y. The relativity of privacy preservation based on social tagging Information Sciences. 288: 87-107. DOI: 10.1016/J.Ins.2014.08.015  0.538
2014 Squicciarini A, Karumanchi S, Lin D, Desisto N. Identifying hidden social circles for advanced privacy configuration Computers & Security. 41: 40-51. DOI: 10.1016/J.Cose.2013.07.007  0.53
2014 Squicciarini AC, Griffin C. Why and how to deceive: game results with sociological evidence Social Network Analysis and Mining. 4: 161. DOI: 10.1007/S13278-014-0161-0  0.491
2014 Squicciarini AC, Paci F, Sundareswaran S. PriMa: A comprehensive approach to privacy protection in social network sites Annales Des Telecommunications/Annals of Telecommunications. 69: 21-36. DOI: 10.1007/S12243-013-0371-X  0.758
2013 Squicciarini AC, Carminati B, Karumanchi S. Privacy aware service selection of composite web services Proceedings of the 9th Ieee International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2013. 260-268. DOI: 10.4108/icst.collaboratecom.2013.254264  0.361
2013 Squicciarini AC, Petracca G, Bertino E. Adaptive data protection in distributed sysems Codaspy 2013 - Proceedings of the 3rd Acm Conference On Data and Application Security and Privacy. 365-376. DOI: 10.1145/2435349.2435401  0.365
2013 Squicciarini AC, Carminati B, Karumanchi S. WS-Rec: Web services recommendations using heterogeneous criteria Proceedings of the 2013 Ieee 14th International Conference On Information Reuse and Integration, Ieee Iri 2013. 46-53. DOI: 10.1109/IRI.2013.6642452  0.413
2013 Karumanchi S, Squicciarini AC, Carminati B. Policy-compliant search query routing for web service discovery in peer to peer networks Proceedings - Ieee 20th International Conference On Web Services, Icws 2013. 387-394. DOI: 10.1109/ICWS.2013.59  0.379
2013 Lee W, Squicciarini A, Bertino E. Agent-based accountable grid computing systems The Journal of Supercomputing. 65: 903-929. DOI: 10.1007/S11227-013-0871-5  0.448
2012 Sundareswaran S, Squicciarini A, Lin D. Ensuring distributed accountability for data sharing in the cloud Ieee Transactions On Dependable and Secure Computing. 9: 556-568. DOI: 10.1109/Tdsc.2012.26  0.746
2012 Squicciarini A, Bertino E, Trombetta A, Braghin S. A Flexible Approach to Multisession Trust Negotiations Ieee Transactions On Dependable and Secure Computing. 9: 16-29. DOI: 10.1109/Tdsc.2011.31  0.427
2012 Squicciarini AC, Griffin C. An informed model of personal information release in social networking sites Proceedings - 2012 Ase/Ieee International Conference On Privacy, Security, Risk and Trust and 2012 Ase/Ieee International Conference On Social Computing, Socialcom/Passat 2012. 636-645. DOI: 10.1109/SocialCom-PASSAT.2012.137  0.454
2012 Squicciarini AC, McGill W, Petracca G, Huang S. Early detection of policies violations in a social media site: A Bayesian belief network approach Proceedings - 2012 Ieee International Symposium On Policies For Distributed Systems and Networks, Policy 2012. 45-52. DOI: 10.1109/POLICY.2012.19  0.403
2012 Shehab M, Squicciarini A, Ahn GJ, Kokkinou I. Access control for online social networks third party applications Computers and Security. 31: 897-911. DOI: 10.1016/J.Cose.2012.07.008  0.578
2012 Sundareswaran S, Squicciarini AC. XSS-Dec: A hybrid solution to mitigate cross-site scripting attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7371: 223-238. DOI: 10.1007/978-3-642-31540-4_17  0.668
2012 Squicciarini AC, Petracca G, Bertino E. Adaptive data management for self-protecting objects in cloud computing systems Proceedings of the 2012 8th International Conference On Network and Service Management, Cnsm 2012. 140-144.  0.396
2011 Sundareswaran S, Squicciarini AC. Privacy through web-traveler policies in social network environments Coliaboratecom 2011 - Proceedings of the 7th International Conference On Collaborative Computing: Networking, Applications and Worksharing. 466-472. DOI: 10.4108/icst.collaboratecom.2011.247169  0.746
2011 Marouf S, Shehab M, Squicciarini A, Sundareswaran S. Adaptive reordering and clustering-based framework for efficient XACML policy evaluation Ieee Transactions On Services Computing. 4: 300-313. DOI: 10.1109/Tsc.2010.28  0.644
2011 Lee W, Squicciarini AC, Bertino E. Profile-based selection of accountability policies in grid computing systems Proceedings - 2011 Ieee International Symposium On Policies For Distributed Systems and Networks, Policy 2011. 145-148. DOI: 10.1109/POLICY.2011.39  0.327
2011 Squicciarini AC, Griffin C, Sundareswaran S. Towards a game theoretical model for identity validation in social network sites Proceedings - 2011 Ieee International Conference On Privacy, Security, Risk and Trust and Ieee International Conference On Social Computing, Passat/Socialcom 2011. 1081-1088. DOI: 10.1109/PASSAT/SocialCom.2011.208  0.721
2011 Ahn GJ, Shehab M, Squicciarini A. Security and privacy in social networks Ieee Internet Computing. 15: 10-12. DOI: 10.1109/Mic.2011.66  0.526
2011 Lee W, Squicciarini AC, Bertino E. Detection and protection against distributed denial of service attacks in accountable grid computing systems Proceedings - 11th Ieee/Acm International Symposium On Cluster, Cloud and Grid Computing, Ccgrid 2011. 534-543. DOI: 10.1109/CCGrid.2011.28  0.324
2011 Squicciarini AC, Paci F, Bertino E. Trust establishment in the formation of Virtual Organizations Computer Standards and Interfaces. 33: 13-23. DOI: 10.1016/J.Csi.2010.03.003  0.366
2011 Squicciarini AC, Xu H, Zhang X. CoPE: Enabling collaborative privacy management in online social networks Journal of the American Society For Information Science and Technology. 62: 521-534. DOI: 10.1002/Asi.21473  0.545
2010 Shehab M, Cheek G, Touati H, Squicciarini AC, Cheng PC. Learning based access control in online social networks Proceedings of the 19th International Conference On World Wide Web, Www '10. 1179-1180. DOI: 10.1145/1772690.1772863  0.516
2010 Squicciarini AC, Paci F, Bertino E, Trombetta A, Braghin S. Group-based negotiations in P2P systems Ieee Transactions On Parallel and Distributed Systems. 21: 1473-1486. DOI: 10.1109/Tpds.2010.25  0.357
2010 Shehab M, Cheek G, Touati H, Squicciarini AC, Cheng PC. User centric policy management in online social networks Proceedings - 2010 Ieee International Symposium On Policies For Distributed Systems and Networks, Policy 2010. 9-13. DOI: 10.1109/POLICY.2010.10  0.503
2010 Squicciarini AC, Sundareswaran S. Erratum to: Web-Traveler Policies for Images on Social Networks World Wide Web. 13: 389-389. DOI: 10.1007/S11280-010-0085-1  0.754
2010 Squicciarini AC, Shehab M, Wede J. Privacy policies for shared content in social network sites Vldb Journal. 19: 777-796. DOI: 10.1007/s00778-010-0193-7  0.497
2010 Sundareswaran S, Squicciarini AC. DeCore: Detecting content repurposing attacks on clients' systems Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 50: 199-216. DOI: 10.1007/978-3-642-16161-2_12  0.719
2010 Bertino E, Martino LD, Paci F, Squicciarini AC. Security for web services and service-oriented architectures Security For Web Services and Service-Oriented Architectures. 1-226. DOI: 10.1007/978-3-540-87742-4  0.394
2010 Sundareswaran S, Squicciarini AC. Image repurposing for Gifar-based attacks 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, Ceas 2010 0.715
2009 Paci F, Bertino E, Kerr S, Squicciarini AC, Woo J. An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices Journal of Software. 4: 696-706. DOI: 10.4304/Jsw.4.7.696-706  0.499
2009 Vyas N, Squicciarini AC, Chang CC, Yao D. Towards automatic privacy management in Web 2.0 with semantic analysis on annotations 2009 5th International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2009. DOI: 10.4108/ICST.COLLABORATECOM2009.8340  0.5
2009 Lee W, Squicciarini AC, Bertino E. An assessment of accountability policies for Large-Scale distributed computing systems Acm International Conference Proceeding Series. DOI: 10.1145/1558607.1558652  0.311
2009 Squicciarini AC, Shehab M, Paci F. Collective privacy management in Social networks Www'09 - Proceedings of the 18th International World Wide Web Conference. 521-530. DOI: 10.1145/1526709.1526780  0.456
2009 Wonjun L, Squicciarini AC, Bertino E. The design and evaluation of accountable grid computing system Proceedings - International Conference On Distributed Computing Systems. 145-154. DOI: 10.1109/ICDCS.2009.54  0.37
2009 Paci F, Bauer D, Bertino E, Blough DM, Squicciarini A, Gupta A. Minimal credential disclosure in trust negotiations Identity in the Information Society. 2: 221-239. DOI: 10.1007/S12394-009-0022-6  0.471
2009 Squicciarini AC, Sundareswaran S. Web-traveler policies for images on social networks World Wide Web. 12: 461-484. DOI: 10.1007/S11280-009-0070-8  0.757
2009 Li F, Luo B, Liu P, Squicciarini AC, Lee D, Chu CH. Defending against attribute-correlation attacks in privacy-aware information brokering Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 10: 100-112. DOI: 10.1007/978-3-642-03354-4_9  0.396
2008 Squicciarini AC, Czeskis A, Bhargav-Spantzel A. Privacy policies compliance across digital identity management systems Proceedings of the Sigspatial Acm Gis 2008 International Workshop On Security and Privacy in Gis and Lbs, Springl'08. 72-81. DOI: 10.1145/1503402.1503416  0.512
2008 Squicciarini AC, Trombetta A, Bertino E, Braghin S. Identity-based long running negotiations Proceedings of the Acm Conference On Computer and Communications Security. 97-105. DOI: 10.1145/1456424.1456440  0.4
2008 Paci F, Bauer D, Bertino E, Blough DM, Squicciarini AC. Minimal credential disclosure in trust negotiations Proceedings of the Acm Conference On Computer and Communications Security. 89-96. DOI: 10.1145/1456424.1456439  0.381
2008 Bertino E, Lee W, Squicciarini AC, Thuraisingham B. End-to-end accountability in grid computing systems for coalition information sharing Csiirw'08 - 4th Annual Cyber Security and Information Intelligence Research Workshop: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead. DOI: 10.1145/1413140.1413173  0.318
2008 Woo J, Bhagav-Spantzel A, Squicciarini AC, Bertino E. Verification of receipts from M-commerce transactions on NFC cellular phones Proceedings - 10th Ieee Joint Conference On E-Commerce Technology and the 5th Enterprise Computing, E-Commerce and E-Services, Cec 2008 and Eee 2008. 36-43. DOI: 10.1109/CECandEEE.2008.130  0.403
2008 Squicciarini AC, Lee W, Bertino E, Song CX. A policy-based accountability tool for grid computing systems Proceedings of the 3rd Ieee Asia-Pacific Services Computing Conference, Apscc 2008. 95-100. DOI: 10.1109/APSCC.2008.257  0.367
2008 Shehab M, Squicciarini AC, Ahn GJ. Beyond user-to-user access control for online social networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5308: 174-189. DOI: 10.1007/978-3-540-88625-9-12  0.516
2007 Winsborough WH, Squicciarini AC, Bertino E. Information carrying identity proof trees Wpes'07 - Proceedings of the 2007 Acm Workshop On Privacy in Electronic Society. 76-79. DOI: 10.1145/1314333.1314348  0.342
2007 Squicciarini A, Bertino E, Ferrari E, Paci F, Thuraisingham B. PP-trust-X: A system for privacy preserving trust negotiations Acm Transactions On Information and System Security. 10: 12. DOI: 10.1145/1266977.1266981  0.518
2007 Squicciarini AC, Hintoglu AA, Bertino E, Saygin Y. A privacy preserving assertion based policy language for federation systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 51-60. DOI: 10.1145/1266840.1266849  0.389
2007 Bhargav-Spantzel A, Squicciarini AC, Bertino E. Trust negotiation in identity management Ieee Security and Privacy. 5: 55-63. DOI: 10.1109/MSP.2007.46  0.462
2007 Squicciarini AC, Trombetta A, Bertino E. Supporting robust and secure interactions in open domains through recovery of trust negotiations Proceedings - International Conference On Distributed Computing Systems. DOI: 10.1109/ICDCS.2007.144  0.33
2007 Squicciarini AC, Bertino E, Goasguen S. Access control strategies for virtualized environments in grid computing systems Proceedings of the Ieee Computer Society Workshop On Future Trends of Distributed Computing Systems. 48-54. DOI: 10.1109/FTDCS.2007.10  0.379
2007 Bhargav-Spantzel A, Squicciarini AC, Young M, Bertino E. Privacy requirements in identity management solutions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4558: 694-702.  0.354
2006 Bertino E, Squicciarini AC, Martino L, Paci F. An Adaptive Access Control Model for Web Services International Journal of Web Services Research. 3: 27-60. DOI: 10.4018/Jwsr.2006070102  0.427
2006 Bhargav-Spantzel A, Squicciarini A, Bertino E. Privacy preserving multi-factor authentication with biometrics Proceedings of the Second Acm Workshop On Digital Identity Management, Dim 2006. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 63-72. DOI: 10.1145/1179529.1179540  0.375
2006 Squicciarini AC, Bertino E, Ferrari E, Ray I. Achieving privacy in trust negotiations with an ontology-based approach Ieee Transactions On Dependable and Secure Computing. 3: 13-30. DOI: 10.1109/Tdsc.2006.3  0.507
2006 Bertino E, Bhargav-Spantzel A, Squicciarini AC. Policy languages for digital identity management in federation systems Proceedings - Seventh Ieee International Workshop On Policies For Distributed Systems and Networks, Policy 2006. 2006: 54-64. DOI: 10.1109/POLICY.2006.22  0.379
2006 Bertino E, Squicciarini AC, Paloscia I, Martino L. Ws-AC: A fine grained access control system for Web services World Wide Web. 9: 143-171. DOI: 10.1007/S11280-005-3045-4  0.513
2006 Squicciarini AC, Paci F, Bertino E. A secure framework for publishing virtual community contracts International Journal of Web Based Communities. 2: 237-255.  0.323
2006 Bertino E, Squicciarini AC, Martino L, Paci F. An adaptive access control model for web services International Journal of Web Services Research. 3: 27-60.  0.327
2005 Bertino E, Ferrari E, Squicciarini AC. Privacy-preserving trust negotiations Lecture Notes in Computer Science. 3424: 283-301.  0.412
2004 Bertino E, Ferrari E, Squicciarini AC. Trust-χ: A peer-to-peer framework for trust establishment Ieee Transactions On Knowledge and Data Engineering. 16: 827-842. DOI: 10.1109/Tkde.2004.1318565  0.468
2004 Bertino E, Squicciarini AC, Mevi D. A fine-grained access control model for Web services Proceedings - 2004 Ieee International Conference On Services Computing, Scc 2004. 33-40. DOI: 10.1109/RIDE.2004.1281700  0.407
2004 Bertino E, Ferrari E, Squicciarini A. Trust negotiations: concepts, systems, and languages Computing in Science and Engineering. 6: 27-34. DOI: 10.1109/Mcse.2004.22  0.352
2004 Bertino E, Squicciarini AC. A flexible access control model for web services Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). 3055: 13-16.  0.309
Show low-probability matches.