Year |
Citation |
Score |
2020 |
Lin D, Steiert D, Morris J, Squicciarini A, Fan J. REMIND: Risk Estimation Mechanism for Images in Network Distribution Ieee Transactions On Information Forensics and Security. 15: 539-552. DOI: 10.1109/Tifs.2019.2924853 |
0.511 |
|
2019 |
Lin D, Squicciarini AC, Dondapati VN, Sundareswaran S. A Cloud Brokerage Architecture for Efficient Cloud Service Selection Ieee Transactions On Services Computing. 12: 144-157. DOI: 10.1109/Tsc.2016.2592903 |
0.657 |
|
2019 |
Bowers A, Liao C, Steiert D, Lin D, Squicciarini A, Hurson AR. Detecting Suspicious File Migration or Replication in the Cloud Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2018.2885271 |
0.456 |
|
2019 |
Genga L, Zannone N, Squicciarini AC. Discovering reliable evidence of data misuse by exploiting rule redundancy Computers & Security. 87: 101577. DOI: 10.1016/J.Cose.2019.101577 |
0.347 |
|
2018 |
Semonsen J, Griffin C, Squicciarini A, Rajtmajer S. Opinion Dynamics in the Presence of Increasing Agreement Pressure. Ieee Transactions On Cybernetics. PMID 29994648 DOI: 10.1109/Tcyb.2018.2799858 |
0.313 |
|
2018 |
Paci F, Squicciarini A, Zannone N. Survey on Access Control for Community-Centered Collaborative Systems Acm Computing Surveys. 51: 6. DOI: 10.1145/3146025 |
0.457 |
|
2018 |
Yuan X, Wang X, Wang C, Squicciarini AC, Ren K. Towards Privacy-Preserving and Practical Image-Centric Social Discovery Ieee Transactions On Dependable and Secure Computing. 15: 868-882. DOI: 10.1109/Tdsc.2016.2609930 |
0.454 |
|
2018 |
Halse SE, Tapia AH, Squicciarini A, Caragea C. An emotional step toward automated trust detection in crisis social media Information, Communication & Society. 21: 288-305. DOI: 10.1080/1369118X.2016.1272618 |
0.304 |
|
2017 |
Squicciarini A, Caragea C, Balakavi R. Toward Automated Online Photo Privacy Acm Transactions On the Web. 11: 2. DOI: 10.1145/2983644 |
0.425 |
|
2017 |
Lin D, Kang J, Squicciarini A, Wu Y, Gurung S, Tonguz O. MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs Ieee Transactions On Mobile Computing. 16: 1357-1370. DOI: 10.1109/Tmc.2016.2592915 |
0.324 |
|
2017 |
Li J, Squicciarini AC, Lin D, Sundareswaran S, Jia C. MMB$^{cloud}$ -Tree: Authenticated Index for Verifiable Cloud Service Selection Ieee Transactions On Dependable and Secure Computing. 14: 185-198. DOI: 10.1109/Tdsc.2015.2445752 |
0.658 |
|
2017 |
Li J, Lin D, Squicciarini AC, Li J, Jia C. Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds Ieee Transactions On Cloud Computing. 5: 499-509. DOI: 10.1109/Tcc.2015.2485214 |
0.507 |
|
2017 |
Neppalli VK, Caragea C, Squicciarini A, Tapia A, Stehle S. Sentiment analysis during Hurricane Sandy in emergency response International Journal of Disaster Risk Reduction. 21: 213-222. DOI: 10.1016/J.Ijdrr.2016.12.011 |
0.501 |
|
2017 |
Squicciarini AC, Rajtmajer SM, Griffin C. Positive and negative behavioral analysis in social networks Wiley Interdisciplinary Reviews-Data Mining and Knowledge Discovery. 7. DOI: 10.1002/Widm.1203 |
0.303 |
|
2016 |
Liao C, Squicciarini A, Griffin C, Rajtmajer S. A hybrid epidemic model for deindividuation and antinormative behavior in online social networks Social Network Analysis and Mining. 6. DOI: 10.1007/S13278-016-0321-5 |
0.419 |
|
2015 |
Squicciarini AC, Lin D, Sundareswaran S, Wede J. Privacy policy inference of user-uploaded images on content sharing sites Ieee Transactions On Knowledge and Data Engineering. 27: 193-206. DOI: 10.1109/Tkde.2014.2320729 |
0.742 |
|
2015 |
Karumanchi S, Squicciarini A, Lin D. Privacy-aware access control for message exchange in vehicular ad hoc networks Telecommunication Systems. 58: 349-361. DOI: 10.1007/S11235-014-9881-8 |
0.459 |
|
2015 |
Squicciarini AC, Lin D, Sundareswaran S, Li J. Policy driven node selection in mapreduce Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering, Lnicst. 152: 55-72. DOI: 10.1007/978-3-319-23829-6_5 |
0.692 |
|
2014 |
Squicciarini AC, Caragea C, Balakavi R. Analyzing images' privacy for the modern web Ht 2014 - Proceedings of the 25th Acm Conference On Hypertext and Social Media. 136-147. DOI: 10.1145/2631775.2631803 |
0.397 |
|
2014 |
Karumanchi S, Squicciarini AC. In the wild: A large scale study of web services vulnerabilities Proceedings of the Acm Symposium On Applied Computing. 1239-1246. DOI: 10.1145/2554850.2555010 |
0.336 |
|
2014 |
Lee B, Fan W, Squicciarini AC, Ge S, Huang Y. The relativity of privacy preservation based on social tagging Information Sciences. 288: 87-107. DOI: 10.1016/J.Ins.2014.08.015 |
0.538 |
|
2014 |
Squicciarini A, Karumanchi S, Lin D, Desisto N. Identifying hidden social circles for advanced privacy configuration Computers & Security. 41: 40-51. DOI: 10.1016/J.Cose.2013.07.007 |
0.53 |
|
2014 |
Squicciarini AC, Griffin C. Why and how to deceive: game results with sociological evidence Social Network Analysis and Mining. 4: 161. DOI: 10.1007/S13278-014-0161-0 |
0.491 |
|
2014 |
Squicciarini AC, Paci F, Sundareswaran S. PriMa: A comprehensive approach to privacy protection in social network sites Annales Des Telecommunications/Annals of Telecommunications. 69: 21-36. DOI: 10.1007/S12243-013-0371-X |
0.758 |
|
2013 |
Squicciarini AC, Carminati B, Karumanchi S. Privacy aware service selection of composite web services Proceedings of the 9th Ieee International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2013. 260-268. DOI: 10.4108/icst.collaboratecom.2013.254264 |
0.361 |
|
2013 |
Squicciarini AC, Petracca G, Bertino E. Adaptive data protection in distributed sysems Codaspy 2013 - Proceedings of the 3rd Acm Conference On Data and Application Security and Privacy. 365-376. DOI: 10.1145/2435349.2435401 |
0.365 |
|
2013 |
Squicciarini AC, Carminati B, Karumanchi S. WS-Rec: Web services recommendations using heterogeneous criteria Proceedings of the 2013 Ieee 14th International Conference On Information Reuse and Integration, Ieee Iri 2013. 46-53. DOI: 10.1109/IRI.2013.6642452 |
0.413 |
|
2013 |
Karumanchi S, Squicciarini AC, Carminati B. Policy-compliant search query routing for web service discovery in peer to peer networks Proceedings - Ieee 20th International Conference On Web Services, Icws 2013. 387-394. DOI: 10.1109/ICWS.2013.59 |
0.379 |
|
2013 |
Lee W, Squicciarini A, Bertino E. Agent-based accountable grid computing systems The Journal of Supercomputing. 65: 903-929. DOI: 10.1007/S11227-013-0871-5 |
0.448 |
|
2012 |
Sundareswaran S, Squicciarini A, Lin D. Ensuring distributed accountability for data sharing in the cloud Ieee Transactions On Dependable and Secure Computing. 9: 556-568. DOI: 10.1109/Tdsc.2012.26 |
0.746 |
|
2012 |
Squicciarini A, Bertino E, Trombetta A, Braghin S. A Flexible Approach to Multisession Trust Negotiations Ieee Transactions On Dependable and Secure Computing. 9: 16-29. DOI: 10.1109/Tdsc.2011.31 |
0.427 |
|
2012 |
Squicciarini AC, Griffin C. An informed model of personal information release in social networking sites Proceedings - 2012 Ase/Ieee International Conference On Privacy, Security, Risk and Trust and 2012 Ase/Ieee International Conference On Social Computing, Socialcom/Passat 2012. 636-645. DOI: 10.1109/SocialCom-PASSAT.2012.137 |
0.454 |
|
2012 |
Squicciarini AC, McGill W, Petracca G, Huang S. Early detection of policies violations in a social media site: A Bayesian belief network approach Proceedings - 2012 Ieee International Symposium On Policies For Distributed Systems and Networks, Policy 2012. 45-52. DOI: 10.1109/POLICY.2012.19 |
0.403 |
|
2012 |
Shehab M, Squicciarini A, Ahn GJ, Kokkinou I. Access control for online social networks third party applications Computers and Security. 31: 897-911. DOI: 10.1016/J.Cose.2012.07.008 |
0.578 |
|
2012 |
Sundareswaran S, Squicciarini AC. XSS-Dec: A hybrid solution to mitigate cross-site scripting attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7371: 223-238. DOI: 10.1007/978-3-642-31540-4_17 |
0.668 |
|
2012 |
Squicciarini AC, Petracca G, Bertino E. Adaptive data management for self-protecting objects in cloud computing systems Proceedings of the 2012 8th International Conference On Network and Service Management, Cnsm 2012. 140-144. |
0.396 |
|
2011 |
Sundareswaran S, Squicciarini AC. Privacy through web-traveler policies in social network environments Coliaboratecom 2011 - Proceedings of the 7th International Conference On Collaborative Computing: Networking, Applications and Worksharing. 466-472. DOI: 10.4108/icst.collaboratecom.2011.247169 |
0.746 |
|
2011 |
Marouf S, Shehab M, Squicciarini A, Sundareswaran S. Adaptive reordering and clustering-based framework for efficient XACML policy evaluation Ieee Transactions On Services Computing. 4: 300-313. DOI: 10.1109/Tsc.2010.28 |
0.644 |
|
2011 |
Lee W, Squicciarini AC, Bertino E. Profile-based selection of accountability policies in grid computing systems Proceedings - 2011 Ieee International Symposium On Policies For Distributed Systems and Networks, Policy 2011. 145-148. DOI: 10.1109/POLICY.2011.39 |
0.327 |
|
2011 |
Squicciarini AC, Griffin C, Sundareswaran S. Towards a game theoretical model for identity validation in social network sites Proceedings - 2011 Ieee International Conference On Privacy, Security, Risk and Trust and Ieee International Conference On Social Computing, Passat/Socialcom 2011. 1081-1088. DOI: 10.1109/PASSAT/SocialCom.2011.208 |
0.721 |
|
2011 |
Ahn GJ, Shehab M, Squicciarini A. Security and privacy in social networks Ieee Internet Computing. 15: 10-12. DOI: 10.1109/Mic.2011.66 |
0.526 |
|
2011 |
Lee W, Squicciarini AC, Bertino E. Detection and protection against distributed denial of service attacks in accountable grid computing systems Proceedings - 11th Ieee/Acm International Symposium On Cluster, Cloud and Grid Computing, Ccgrid 2011. 534-543. DOI: 10.1109/CCGrid.2011.28 |
0.324 |
|
2011 |
Squicciarini AC, Paci F, Bertino E. Trust establishment in the formation of Virtual Organizations Computer Standards and Interfaces. 33: 13-23. DOI: 10.1016/J.Csi.2010.03.003 |
0.366 |
|
2011 |
Squicciarini AC, Xu H, Zhang X. CoPE: Enabling collaborative privacy management in online social networks Journal of the American Society For Information Science and Technology. 62: 521-534. DOI: 10.1002/Asi.21473 |
0.545 |
|
2010 |
Shehab M, Cheek G, Touati H, Squicciarini AC, Cheng PC. Learning based access control in online social networks Proceedings of the 19th International Conference On World Wide Web, Www '10. 1179-1180. DOI: 10.1145/1772690.1772863 |
0.516 |
|
2010 |
Squicciarini AC, Paci F, Bertino E, Trombetta A, Braghin S. Group-based negotiations in P2P systems Ieee Transactions On Parallel and Distributed Systems. 21: 1473-1486. DOI: 10.1109/Tpds.2010.25 |
0.357 |
|
2010 |
Shehab M, Cheek G, Touati H, Squicciarini AC, Cheng PC. User centric policy management in online social networks Proceedings - 2010 Ieee International Symposium On Policies For Distributed Systems and Networks, Policy 2010. 9-13. DOI: 10.1109/POLICY.2010.10 |
0.503 |
|
2010 |
Squicciarini AC, Sundareswaran S. Erratum to: Web-Traveler Policies for Images on Social Networks World Wide Web. 13: 389-389. DOI: 10.1007/S11280-010-0085-1 |
0.754 |
|
2010 |
Squicciarini AC, Shehab M, Wede J. Privacy policies for shared content in social network sites Vldb Journal. 19: 777-796. DOI: 10.1007/s00778-010-0193-7 |
0.497 |
|
2010 |
Sundareswaran S, Squicciarini AC. DeCore: Detecting content repurposing attacks on clients' systems Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 50: 199-216. DOI: 10.1007/978-3-642-16161-2_12 |
0.719 |
|
2010 |
Bertino E, Martino LD, Paci F, Squicciarini AC. Security for web services and service-oriented architectures Security For Web Services and Service-Oriented Architectures. 1-226. DOI: 10.1007/978-3-540-87742-4 |
0.394 |
|
2010 |
Sundareswaran S, Squicciarini AC. Image repurposing for Gifar-based attacks 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, Ceas 2010. |
0.715 |
|
2009 |
Paci F, Bertino E, Kerr S, Squicciarini AC, Woo J. An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices Journal of Software. 4: 696-706. DOI: 10.4304/Jsw.4.7.696-706 |
0.499 |
|
2009 |
Vyas N, Squicciarini AC, Chang CC, Yao D. Towards automatic privacy management in Web 2.0 with semantic analysis on annotations 2009 5th International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2009. DOI: 10.4108/ICST.COLLABORATECOM2009.8340 |
0.5 |
|
2009 |
Lee W, Squicciarini AC, Bertino E. An assessment of accountability policies for Large-Scale distributed computing systems Acm International Conference Proceeding Series. DOI: 10.1145/1558607.1558652 |
0.311 |
|
2009 |
Squicciarini AC, Shehab M, Paci F. Collective privacy management in Social networks Www'09 - Proceedings of the 18th International World Wide Web Conference. 521-530. DOI: 10.1145/1526709.1526780 |
0.456 |
|
2009 |
Wonjun L, Squicciarini AC, Bertino E. The design and evaluation of accountable grid computing system Proceedings - International Conference On Distributed Computing Systems. 145-154. DOI: 10.1109/ICDCS.2009.54 |
0.37 |
|
2009 |
Paci F, Bauer D, Bertino E, Blough DM, Squicciarini A, Gupta A. Minimal credential disclosure in trust negotiations Identity in the Information Society. 2: 221-239. DOI: 10.1007/S12394-009-0022-6 |
0.471 |
|
2009 |
Squicciarini AC, Sundareswaran S. Web-traveler policies for images on social networks World Wide Web. 12: 461-484. DOI: 10.1007/S11280-009-0070-8 |
0.757 |
|
2009 |
Li F, Luo B, Liu P, Squicciarini AC, Lee D, Chu CH. Defending against attribute-correlation attacks in privacy-aware information brokering Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 10: 100-112. DOI: 10.1007/978-3-642-03354-4_9 |
0.396 |
|
2008 |
Squicciarini AC, Czeskis A, Bhargav-Spantzel A. Privacy policies compliance across digital identity management systems Proceedings of the Sigspatial Acm Gis 2008 International Workshop On Security and Privacy in Gis and Lbs, Springl'08. 72-81. DOI: 10.1145/1503402.1503416 |
0.512 |
|
2008 |
Squicciarini AC, Trombetta A, Bertino E, Braghin S. Identity-based long running negotiations Proceedings of the Acm Conference On Computer and Communications Security. 97-105. DOI: 10.1145/1456424.1456440 |
0.4 |
|
2008 |
Paci F, Bauer D, Bertino E, Blough DM, Squicciarini AC. Minimal credential disclosure in trust negotiations Proceedings of the Acm Conference On Computer and Communications Security. 89-96. DOI: 10.1145/1456424.1456439 |
0.381 |
|
2008 |
Bertino E, Lee W, Squicciarini AC, Thuraisingham B. End-to-end accountability in grid computing systems for coalition information sharing Csiirw'08 - 4th Annual Cyber Security and Information Intelligence Research Workshop: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead. DOI: 10.1145/1413140.1413173 |
0.318 |
|
2008 |
Woo J, Bhagav-Spantzel A, Squicciarini AC, Bertino E. Verification of receipts from M-commerce transactions on NFC cellular phones Proceedings - 10th Ieee Joint Conference On E-Commerce Technology and the 5th Enterprise Computing, E-Commerce and E-Services, Cec 2008 and Eee 2008. 36-43. DOI: 10.1109/CECandEEE.2008.130 |
0.403 |
|
2008 |
Squicciarini AC, Lee W, Bertino E, Song CX. A policy-based accountability tool for grid computing systems Proceedings of the 3rd Ieee Asia-Pacific Services Computing Conference, Apscc 2008. 95-100. DOI: 10.1109/APSCC.2008.257 |
0.367 |
|
2008 |
Shehab M, Squicciarini AC, Ahn GJ. Beyond user-to-user access control for online social networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5308: 174-189. DOI: 10.1007/978-3-540-88625-9-12 |
0.516 |
|
2007 |
Winsborough WH, Squicciarini AC, Bertino E. Information carrying identity proof trees Wpes'07 - Proceedings of the 2007 Acm Workshop On Privacy in Electronic Society. 76-79. DOI: 10.1145/1314333.1314348 |
0.342 |
|
2007 |
Squicciarini A, Bertino E, Ferrari E, Paci F, Thuraisingham B. PP-trust-X: A system for privacy preserving trust negotiations Acm Transactions On Information and System Security. 10: 12. DOI: 10.1145/1266977.1266981 |
0.518 |
|
2007 |
Squicciarini AC, Hintoglu AA, Bertino E, Saygin Y. A privacy preserving assertion based policy language for federation systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 51-60. DOI: 10.1145/1266840.1266849 |
0.389 |
|
2007 |
Bhargav-Spantzel A, Squicciarini AC, Bertino E. Trust negotiation in identity management Ieee Security and Privacy. 5: 55-63. DOI: 10.1109/MSP.2007.46 |
0.462 |
|
2007 |
Squicciarini AC, Trombetta A, Bertino E. Supporting robust and secure interactions in open domains through recovery of trust negotiations Proceedings - International Conference On Distributed Computing Systems. DOI: 10.1109/ICDCS.2007.144 |
0.33 |
|
2007 |
Squicciarini AC, Bertino E, Goasguen S. Access control strategies for virtualized environments in grid computing systems Proceedings of the Ieee Computer Society Workshop On Future Trends of Distributed Computing Systems. 48-54. DOI: 10.1109/FTDCS.2007.10 |
0.379 |
|
2007 |
Bhargav-Spantzel A, Squicciarini AC, Young M, Bertino E. Privacy requirements in identity management solutions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4558: 694-702. |
0.354 |
|
2006 |
Bertino E, Squicciarini AC, Martino L, Paci F. An Adaptive Access Control Model for Web Services International Journal of Web Services Research. 3: 27-60. DOI: 10.4018/Jwsr.2006070102 |
0.427 |
|
2006 |
Bhargav-Spantzel A, Squicciarini A, Bertino E. Privacy preserving multi-factor authentication with biometrics Proceedings of the Second Acm Workshop On Digital Identity Management, Dim 2006. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 63-72. DOI: 10.1145/1179529.1179540 |
0.375 |
|
2006 |
Squicciarini AC, Bertino E, Ferrari E, Ray I. Achieving privacy in trust negotiations with an ontology-based approach Ieee Transactions On Dependable and Secure Computing. 3: 13-30. DOI: 10.1109/Tdsc.2006.3 |
0.507 |
|
2006 |
Bertino E, Bhargav-Spantzel A, Squicciarini AC. Policy languages for digital identity management in federation systems Proceedings - Seventh Ieee International Workshop On Policies For Distributed Systems and Networks, Policy 2006. 2006: 54-64. DOI: 10.1109/POLICY.2006.22 |
0.379 |
|
2006 |
Bertino E, Squicciarini AC, Paloscia I, Martino L. Ws-AC: A fine grained access control system for Web services World Wide Web. 9: 143-171. DOI: 10.1007/S11280-005-3045-4 |
0.513 |
|
2006 |
Squicciarini AC, Paci F, Bertino E. A secure framework for publishing virtual community contracts International Journal of Web Based Communities. 2: 237-255. |
0.323 |
|
2006 |
Bertino E, Squicciarini AC, Martino L, Paci F. An adaptive access control model for web services International Journal of Web Services Research. 3: 27-60. |
0.327 |
|
2005 |
Bertino E, Ferrari E, Squicciarini AC. Privacy-preserving trust negotiations Lecture Notes in Computer Science. 3424: 283-301. |
0.412 |
|
2004 |
Bertino E, Ferrari E, Squicciarini AC. Trust-χ: A peer-to-peer framework for trust establishment Ieee Transactions On Knowledge and Data Engineering. 16: 827-842. DOI: 10.1109/Tkde.2004.1318565 |
0.468 |
|
2004 |
Bertino E, Squicciarini AC, Mevi D. A fine-grained access control model for Web services Proceedings - 2004 Ieee International Conference On Services Computing, Scc 2004. 33-40. DOI: 10.1109/RIDE.2004.1281700 |
0.407 |
|
2004 |
Bertino E, Ferrari E, Squicciarini A. Trust negotiations: concepts, systems, and languages Computing in Science and Engineering. 6: 27-34. DOI: 10.1109/Mcse.2004.22 |
0.352 |
|
2004 |
Bertino E, Squicciarini AC. A flexible access control model for web services Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). 3055: 13-16. |
0.309 |
|
Show low-probability matches. |