Publications:
Note. This page is often outdated. Some of my recent publications are also listed at
DBLP. My citations count according to Google is available
here.
Journals
-
Toward Automated Online Photo Privacy. A. Squicciarini, C. Caragea, R. Balakavi. ACM Transactions on the Web (TWEB) 11(1): 2:1-2:29 (2017)
- Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
A. Squicciarini, D. Lin, S. Sundareswaran, and Josh Wede.
IEEE Transactions on Knowledge and Data Engineering (TKDE). Vol. 27(1), 2015, Pages 193-206.
- Why and How to Deceive: Game and Complexity Results with Sociological Evidence Anna Squicciarini, Christopher Griffin.
Journal Social Network Analysis and Mining. Vol. 4(1) Springer. 2014.
- Identifying Hidden Social Circles for Advanced Privacy Configuration A. Squicciarini, D. Lin, S. Karumanchi, and N. Desisto.
Computers and Security Journal, Elsevier. 2013. Featured on
PSU research news
- PriMa: a comprehensive approach to privacy protection in social network sites A. Squicciarini, F. Paci, S. Sundareswaran.
Annals of telecommunications, Springer. To appear.
- Access control for online social networks third party applications M. Shehab, A. Squicciarini,
G-J Ahn, I. Kokkinou. Computer and Security Journal, Elservier. Vol.31(8), November 2012, Pages 897–911.
- Ensuring Distributed Accountability for Data Sharing in the Cloud S. Sundareswaran, A. Squicciarini, D. Lin. IEEE Transactions on Dependable and Secure Computing. Vol. 9(4). Pages
556-568. 2012.
- A Flexible Approach to Multi-Session Trust
Negotiation. A. Squicciarini, E. Bertino, A. Trombetta, S. Braghin.
IEEE Transactions on Dependable and Secure Systems. Vol. 9(1). Pages 16-29, 2012.
- Toward Scalable Trustworthy
Computing Using the Human-Physiology-Immunity Metaphor
Lee Hively, Fredrick Sheldon A. C. Squicciarini.
IEEE Security & Privacy Magazine. Vol. 9(4). Pages 14--23. 2011 (Cover Feature).
- Trust Establishment in the Formation of Virtual Organizations. A. Squicciarini, F. Paci, E. Bertino.
Computer Standards and Interface. Elsevier. Vol. 33(1). Pages 13-23. 2011.
- Adaptive Reordering & Clustering Based Framework for Efficient XACML Policy Evaluation.
S. Marouf, M. Shehab, A. C. Squicciarini, and S. Sundareswaran.
IEEE Transactions on Services Computing, Vol. 4(4). Pages 300-313. 2011
- Privacy Policies for Shared Content in Social Network Sites,
A. C. Squicciarini, M. Shehab, J. Wede.
VLDB Journal, Springer. Vol. 19(3). Pages 777-796. 2010.
- Multi-Factor Identity Verification Using Aggregated Proof of Knowledge.
A.Bhargav-Spantzel, A. Squicciarini, E. Bertino, X. Rue.
IEEE Transactions on Systems, Man and Cybernetics, Part C. To appear.
- Group-Based Negotiations on P2P Systems. A. Squicciarini, F. Paci, E. Bertino, E. Trombetta, S. Braghin.
IEEE Transactions on Parallel and Distributed Systems. Vol. 21(10). Pages 1473-1486. 2010.
- Minimal Credential Disclosure in Trust Negotiations.
F. Paci, D.Bauer, E. Bertino, D. M. Blough, A. Squicciarini, A. Gupta.
Identity in the Information Society, 2009.
2009 and earlier
- Web-Traveler Policies for Images on Social Networks.
A. C. Squicciarini, S. Sundareswaran.
In World Wide Web Journal. Springer. Vol.12(4). Pages 461-484. 2009.
- PP-Trust-X A system for Privacy Preserving Trust Negotiations.
A. C. Squicciarini, E. Bertino, E. Ferrari, F. Paci, and B. Thuraisingham.
In ACM TISSEC -Transactions on Systems and Information Security. 2007
- Privacy Preserving
Multi-Factor Authentication with Biometrics. A. Bhargav-Spantzel, A. C. Squicciarini,
E. Bertino, Shimon Modi, Matthew Young, and Stephen J. Elliott. Journal of Computer Security, IOSPress.
- Establishing and Protecting Digital Identity in Federation Systems. Bhargav-Spantzel, A. C. Squicciarini,
and E. Bertino. Journal of Computer Security, IOSPress, Vol. 14 N.3, pp. 269-300, 2006.
- Achieving Privacy with
an Ontology-Based approach in Trust Negotiations. A. C. Squicciarini, E. Bertino, and E. Ferrari.
IEEE Transaction on Dependable and Secure Computing (TDSC), Vol. 3 N. 1, pp. 13-30, January-March 2006.
-
Trust-X: a Peer to Peer framework for Trust Establishment. E. Bertino, E. Ferrari, and A. C. Squicciarini. IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol. 16 N. 7, pp. 827-842, July 2004.
Ws-Ac: a Fine Grained Access Control Model for Web Services.
A. C. Squicciarini, E. Bertino, I. Paloscia, and L. Martino. World Wide Web- Special Issue
on Web Resources Access , Kluwer, Vol. 9 N. 2, pp. 143-171,
June 2006. - Integrating Federated Digital Identity Management and Trust Negotiation-- issues and solutions. A. Bhargav, A. C. Squicciarini,
and E. Bertino. Security and Privacy Magazine , IEEE, Vol.5 N. 2 , pp. 55-64 , March-April 2007 .
- Trust Negotiation, Concepts, Systems and Languages. E. Bertino, E. Ferrari, and A. C. Squicciarini. Computing in
Science Engineering (CISE), IEEE, Vol. 6 N. 4, pp. 27-32, July 2004.
- An Adaptive Access Control Model for Web Services. A. C. Squicciarini, E. Bertino, L. Martino, and F. Paci. Journal of Web Services Research (JWSR), Vol. 3 N.3 , pp. 27--60, 2006.
In Proceedings (not quite up to date)
2020
I have done some cool stuff despite the pandemic.. I will update shortly!
2019
To be updated.
2018
-
Flexible Inference for Cyberbully Incident Detection. Haoti Zhong, David J. Miller, Anna Squicciarini. ECML/PKDD (3) 2018: 356-371
- Combating Crowdsourced Review Manipulators: A Neighborhood-Based Approach. Parisa Kaghazgaran, James Caverlee, Anna Squicciarini:
ACM WSDM 2018: 306-314
-
Combating Behavioral Deviance via User Behavior Control. Chenxi Qiu, Anna Squicciarini, Christopher Griffin, Prasanna Umar.International Conference on Autonomous and Multiagent Systems (AAMAS) 2018: 202-210
-
CrowdEval: A Cost-Efficient Strategy to Evaluate Crowdsourced Worker's Reliability. Chenxi Qiu, Anna Squicciarini, Dev Rishi Khare, Barbara Carminati, James Caverlee.International Conference on Autonomous and Multiagent Systems(AAMAS) 2018: 1486-1494
-
Multi-Party Access Control: Requirements, State of the Art and Open Challenges. Anna Squicciarini, Sarah Rajtmajer, Nicola Zannone. Invited. ACM SACMAT 2018
2017
-
Real-Time Detection of Illegal File Transfers in the Cloud
A. Bowers, D. Lin, A. Squicciarini, R. Hurson. IEEE International Conference on Distributed Computing Systems (ICDCS) 2017: 2597-2600.
-
Consensus on Social Graphs under Increasing Peer Pressure. Justin Semonsen, Christopher Griffin, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer.International Conference on Autonomous and Multiagent Systems (AAMAS) 2017: 1731-1732
- A Group-Based Personalized Model for Image Privacy Classification and Labeling. H. Zhong, A. C. Squicciarini, D. J. Miller, C. Caragea. 26th International Conference on Artificial Intelligence
(IJCAI) 2017: 3952-3958.
2016
-
CrowdSelect: Increasing Accuracy of Crowdsourcing Tasks through Behavior Prediction and User Selection
C. Qiu, A. C. Squicciarini, B. Carminati, J. Caverlee, D. Khare. ACM International Conference on Information and Knowledge Management (CIKM) 2016.
- An In-Depth Study of Peer Influence on Collective Decision Making for Multi-party Access Control (Invited Paper) A. Tyagi, A. Squicciarini, S. Rajtmajer, C. Griffin. Integration Reuse of Information (IRI) Conference, 2016.
-
Uncovering the Spatio-Temporal Dynamics of Memes in the Presence of Incomplete Information
J., N. Zhang, A. Squicciarini.
ACM International Conference on Information and Knowledge Management (CIKM) 2016: 1493-1502
- Content-driven Detection of Cyberbullying on the Instagram Social Network.
H. Zhong, H. Li, A. Squicciarini, S. Rajtmajer, C. Griffin, D. Miller and C. Caragea. 25th International Conference on Artificial Intelligence (IJCAI) 2016
- Efficient Network Path Verification for Policy-routedQueries Sushama Karumanchi, Jingwei Li, Anna Cinzia Squicciarini. Sixth ACM Conference on Data and Application Security and Privacy
(CODASPY), March 2016.
- Constrained social-energy minimization for multi-party sharing in online social networks. S. Rajtmajer, C. Griffin, A. Squicciarini and S. Karumanchi.
International Conference on Autonomous and Multiagent Systems (AAMAS), Singapore, May 2016.
2015
- Determining a discrete set of site-constrained privacy options for users in social networks through Stackelberg Games.
S. Rajtmajer, C. Griffin and A. Squicciarini.
Conference on Decision and Game Theory for Security (GAMESEC), London, November 2015.
- Uncovering Crowdsourced Manipulation of Online Reviews. A. Fayzi, K. Lee, J. Caverlee, A. Squicciarini. ACM SIGIR, Spetember 2015.
- Identification and characterization of cyberbullying dynamics in an online social network. A. Squicciarini, S. Rajtmajer, Y.Liu and C. Griffin.
IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, August 2015.
- Towards Provenance-Based Anomaly Detection in MapReduce. C. Liao, A. Squicciarini. ACM CCGRID, May 2015.
2014
- Securing Resource Discovery in Content Hosting Networks S. Karumanchi, J. Li and A. Squicciarini. 10th International Conference on Security and Privacy in Communication Networks
(SecureComm), September 2014.
- Policy Driven Node Selection in MapReduce A. Squicciarini, D. Lin, S. Sundareswaran and J. Li 10th International Conference on Security and Privacy in Communication Networks (SecureComm), September 2014.
- Analysing Images' Privacy for the Modern Web A. Squicciarini, C. Caragea, and R. Balakavi. In Proc. of 25th ACM Conference on Hypertext and Social Media (HT 2014). September 2014.
- Identifying Multi-Regime Behaviors of Memes in Twitter Data. C. Griffin, A. Squicciarini and S. Styer. 8th Science and Information Conference (SAI). August 2014. BEST PAPER AWARD
-
Toward Detecting Compromised MapReduce
Workers through Log Analysis E. Yoon, A. Squicciarini. In Proc. of
IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing (CCGrid). May 2014.
- Site-Constrained Privacy Options for Users in Social Networks through Stackelberg Games.
C. Griffin, A. Squicciarini, S. Rajtmajer, M. Tentilucci and S. Lin. In Proc. of Sixth ASE International Conference on Social Computing. May 2014.
- Mapping Moods: Geo-Mapped Sentiment Analysis During Hurricane Sandy
C. Caragea, A. Squicciarini, S. Stehle, K. Neppalli, A. Tapia.
11th International Conference on Information Systems for Crisis Response and Management (ISCRAM). May 2014.(See Cornelia's project site)
-
Online Abusive Users Analytics Through Visualization A. Squicciarini, J. Dupont, R. Chen.
23rd ACM International World Wide Web Conference. Demo Paper. April 2014. See a Demo of our project here
-
Enabling Privacy-Preserving Image-Centric Social Discovery
X. Yuan, X. Wang, C. Wang, A. Squicciarini, K. Ren. IEEE 34th International Conference on Distributed Computing Systems (ICDCS). April 2014.
-
Situational Awareness through Reasoning on Network Incidents in Controlled Networks A. Squicciarini, G. Petracca, B. Horne and A. Nath
Fourth ACM Conference on Data and Application Security and Privacy (CODASPY), March 2014.
-
In The Wild: A Large Scale Study of Web Service Vulnerabilities S. Karumanchi and A. Squicciarini.
29 ACM Symposium on Applied Computing (SAC), March 2014.
2013
- Detecting Malicious Co-resident Virtual Machines Indulging in Load-Variation Attacks
S. Sundareswaran, A. Squicciarini. 15th International Conference on Information & Communications Security
(ICICS), November 2013.
- WS-Rec: Web Services Recommendations using Heterogeneous Criteria.
A. Squicciarini, B. Carminati and S. Karumanchi. 2013 IEEE International Conference on Information Reuse and Integration (IRI), August 2013.
- Information-oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks.
S. Gurung, D. Lin, A. Squicciarini, E. Bertino. The 7th International Conference on Network and System Security (NSS), June 2013.
- Policy-Compliant Search Query Routing for Web Service Discovery in Peer to Peer Networks
S. Karumanchi, A. C. Squicciarini, B. Carminati. IEEE 20th International Conference on Web Services (ICWS), July 2013.
- Adaptive Data Protection in Distributed Systems A. Squicciarini,
G. Petracca,
E. Bertino.
Third ACM Conference on Data and Application Security and Privacy (CODASPY), February 2013.
2012
- Two Species Evolutionary Game Model of User and Moderator Dynamics.
C. Griffin, D. Mercer, J. Fan and A. Squicciarini. ASE International Conference on Social Informatics, December 14 - 16, 2012.
(A longer version will appear in the ASE Human Journal.)
- Automatic Social Group Organization and Privacy Management. Anna C Squicciarini, D. Lin, S. Karumanchi, N. DeSisto. 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing
(CollaborateCom) 2012, October 2012.
- ReasONets: A Fuzzy-based approach for Reasoning on Network Incidents
G. Petracca, A. C. Squicciarini, W. Horne, M. Casassa-Mont. 19th ACM Computer and Communications Security (CCS). Demo paper. October 2012.
-
Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks.
A. C. Squicciarini, S. Karumanchi, D. Lin.
6th International Conference on Network and System Security (NSS), November 2012
-
Location Privacy Policy Management System.
A. Muhammed, D. Lin, A. Squicciarini.
14th International Conference on Information and Communications Security (ICICS), October 2012 [short paper]
-
An Informed Model of Personal Information Release in Social Networking Sites.
A. C. Squicciarini, Christopher Griffin.
Fourth IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), September 2012. BEST PAPER AWARD
-
A Brokerage-Based Approach for Cloud Service Selection.
S Sundareswaran, A. C. Squicciarini, Dan Lin.
5th IEEE International Conference on Cloud Computing (CLOUD), June 2012.
-
XSS-Dec: a hybrid solution to mitigate Cross-Site Scripting attacks.
S Sundareswaran, A. C. Squicciarini.
26th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec'12), July 2012.
- Early Detection of Policies Violations in a Social Media Site: A Bayesian Belief Network Approach.
A. C. Squicciarini, W. McGill, G. Petracca, S. Huang.
International Symposium on Policies for Distributed Systems & Networks, July 2012.
2011
- Towards a Game Theoretical Model for Identity Validation in Social Network Sites.
A. C. Squicciarini, C. Griffin, S Sundareswaran.
Third IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), October 2011.
- Privacy-preserving Service Selection in Business Oriented Web Service Composition.
A. C. Squicciarini, Barbara Carminati, Sushama Karumanchi.
IEEE International Conference on Web Services (ICWS), July 2011.
- Promoting Distributed Accountability in the Cloud
S Sundareswaran, A. C. Squicciarini, Dan Lin, Shuo Huang.
4th IEEE International Conference on Cloud Computing (CLOUD), July 2011.
- PAIM: Peer-based Automobile Identity Management in Vehicular Ad-hoc Network.
A. C. Squicciarini, Dan Lin, Alessandro Mancarella.
35th IEEE Annual International Computer Software and Applications Conference (COMPSAC), July 2011.
- Distributed Java-Based Content Protection
S Sundareswaran, A. C. Squicciarini, Ranjani Sundareswaran.
35th IEEE Annual International Computer Software and Applications Conference (COMPSAC), July 2011.
- A3P: Adaptive Policy Prediction for Images in Content Sharing Sites.
A. Squicciarini, S. Sundareswaran, D., J. Wede.
22nd ACM Conference on Hypertext and on Hypermedia (ACM HT), June 2011.
TED NELSON NEWCOMER AWARD
- Profile-Based Accountability Policies in Grid Computing Systems.
W. Lee, A. Squicciarini, E. Bertino.
IEEE International Symposium on Policies for Distributed Systems and Networks (Policy), June 2011. (Short paper)
- Detection and Protection Against Distributed Denial of Services in Accountable Grid Systems.
W. Lee, A. Squicciarini, E. Bertino.
11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), May 2011.
2010
- DeCore: Detecting Content Repurposing Attacks on Clients' Systems
S.Sundareswaran and A. Squicciarini.
6th International ICST Conference on
Security and Privacy in Communication Networks (SecureComm), September 2010.
- Image Repurposing for Gifar-Based Attacks S. Sundareswaran and A. C. Squicciarini.
Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, July 2010.
-
Preventing Information Leakage from Indexing in the Cloud.
A. Squicciarini, S. Sundareswaran, D. Lin.
IEEE International Conference on Cloud Computing, July 2010.
-
Data Protection Models for Service Provisioning in the Cloud.
D. Lin, A. Squicciarini.
ACM symposium on access control models and technologies (SACMAT), June 2010.
- Learning Based Access Control in Online Social Networks.
M. Shehab, G. Cheek, H. Touati, A. Squicciarini, P.Cheng,
WWW 2010: 19th International World Wide Web Conference, April, 2010. (Poster)
-
PriMa: An Effective Privacy Protection Mechanism for Social Networks.
A. Squicciarini, F. Paci, S. Sundareswaran.
5th ACM Symposium on InformAtion, Computer and Communication Security (ASIACCS), April 2010.
2009
-
Towards Automatic Privacy Management in
Web 2.0 with Semantic Analysis on Annotations.
N. Yvas, A. Squicciarini, Chih-Cheng Chang, D. Yao.
CollaborateCom Conference, IEEE. November 2009.
-
Efficient XACML Policy Evaluation with a Statistics Based & Clustering Framework.
S. Marouf, M. Shehab, A. Squicciarini, S. Sundareswaran.
IEEE Symposium on Policy for Distributed Systems, IEEE. July 2009.
- The Design and Evaluation of Accountable Grid Systems.
W. Lee, A. Squicciarini, E. Bertino.
IEEE International Conference on Computing and Distributed Systems (ICDCS). June 2009.
- Collaborative Privacy Management for Social Networks.
A. Squicciarini, M. Shehab, F. Paci.
WWW2009: 19th International World Wide Web Conference, Madrid (Spain), April 2009.
2008
- Monitoring Virtual Organizations' Contract Enforcement .
A. Squicciarini, F. Paci.
CollaborateCom, Springer, November 2008.
- End-to-End Accountability for Grid Computing Systems .
A. Squicciarini, W. Lee, E. Bertino, C. Song.
IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2008), December 2008.
- Beyond User-to-User Access Control for Online Social Networks.
M. Shehab, A. Squicciarini and G.-J. Ahn.
10th International Conference on Information and Computer Security (ICICS), Springer, October 2008.
- Long Running Identity Based Negotiations.
Squicciarini, A., Trombetta, M., E. Bertino, S., Braghin. 2008 ACM Digital Identity Management Workshop, October 2008.
- Verification of Receipts from M-Commerce Transactions on NFC
Cellular.
Woo, J., Bhargav-Spantzel, A., Squicciarini, A., E. Bertino.
10th IEEE Conference on E-Commerce Technology (CEC' 08), July 2008.
- Automatic Compliance Verification of Privacy Policies in Federated Digital Identity Management .
A. Squicciarini, M. Casassa-Mont, E. Bertino, A. Bhargav-Spantzel. 2008 IEEE Workshop on Policies for
Distributed Systems and Networks, June 2008.
- A protection Mechanism for Query Flood Attacks.
Squicciarini, A., Palocia, I., E. Bertino. International Conference on Data and Engineering (ICDE'08), April 2008
- Privacy Requirements in Identity Management Solutions. .
A. Bhargav-Spantzel, A. Squicciarini, M. Young, E. Bertino.
Symposium on Human Interface 2007.
Earlier work
- K-anonymous attribute-based access control. .
Squicciarini, A., Trombetta, A., Bharghav-Spantzel, A., Bertino, E. International
Conference on Information and Computer Security (ICICS'07), ChinaPress, December 2007.
- Auth-SL - A System for the Specification and Enforcement of
Quality-based Authentication Policies
.A. C. Squicciarini, A. Bhargav-Spantzel, A. Czeskis and E. Bertino. International Conference on Information
Computer Security (ICICS), Springer, December, 2007.
- Information carrying identity proof trees.
W. Winsborough, A. C. Squicciarini, and E. Bertino.
In Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, October 2007.
- Robust and Secure Interactions in Open Distributed
Systems through Recoverable Trust Negotiations
. A. C. Squicciarini, A. Trombetta, and E. Bertino. International Conference on Distributed Computing Systems (ICDCS) , IEEE, June, 2007 .
- A Privacy Preserving Assertion Based Policy Language for Federation Systems.
A. C. Squicciarini, A. Azgin Hintoglu, E. Bertino, and Y. Saygin.
ACM Symposium on Access Control Models and Technologies, ACM Press, June, 2007 .
- Access Control Strategies for Virtualized Environments in Grid Computing
Systems. A. C. Squicciarini, E. Bertino, and S. Goasguen. 11th IEEE International Workshop on Future Trends of Distributed Computing Systems. FTDCS '07.
, IEEE, March, 2007 .
- Privacy Preserving Multi-Factor Authentication With Biometrics.
A. Bhargav-Spantzel, A. C. Squicciarini, and E. Bertino. Proceedings of Second Digital Identity Management workshop at CCS, November 1, 2006 (An extended version of this paper has been invited for publication in Journal of Computer Security).
- Trust negotiations with customizable anonymity . A. Bhargav-Spantzel, A. C. Squicciarini, E. Bertino, E. Ferrari, and I. Ray. First IEEE/WIC/ACM Web Intelligence/Intelligent Agent
Technology Workshop on Web Privacy Intelligence (WPI'06), IEEE press , 18 December 2006.
- Establishing and Protecting Digital Identity in Federation Systems.
A. Bhargav, A. C. Squicciarini, and E. Bertino. First Digital Identity Management workshop at CCS, ACM Press, November 11, 2005 (An extended version of this paper has been published in Journal of Computer Security).
- Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management. A. C. Squicciarini, A. Bhargav, Alexei Czeskis, and E. Bertino. Proc. of 6th International Workshop on Privacy Enhancing Technologies (PET), June 2006.
- Policy Languages for Digital Identity in Federation Systems. A. Bhargav, A. C. Squicciarini, and E. Bertino.
Proceedings of 6th IEEE International Workshop on Policies for Distributed Systems and Networks Workshop, June, 2006 .
- A Secure publishing protocol for Virtual Community Contracts. A. C. Squicciarini, E. Bertino, and F. Paci. Proceedings of Iadis International Conference Web Based Communities 2005, Algarve, 23-25 March 2005.
- Anonymity Preserving Techniques in Trust Negotiations. A. C. Squicciarini, E. Bertino, E. Ferrari, and I. Ray. Proceedings of 5th International Workshop on Privacy Enhancing Technologies (PET), Dubrovnik, Croatia, May 30, 2005.
- Privacy Preserving Trust Negotiations.E. Bertino, E. Ferrari, and A. C. Squicciarini.Proc. of 4th International Workshop on Privacy Enhancing Technologies (PET), May 2004.
- A Framework for Contractual Resource Sharing in Coalitions. B. Sadighi Firozabadi, M. Sergot, A. C. Squicciarini, and E. Bertino. Proc. of 5th IEEE International Workshop on Policies for Distributed Systems and Networks, June 2004.
- A Flexible Access Control Model for Web Services. E. Bertino, and A. C. Squicciarini.
Proceedings of 6th International Conference on Flexible Query Answering Systems (FQAS), Lyon France, Lecture Notes in Artificial Intelligence, LNAI 3055, June 24-26 2004. Invited paper. - A fine-grained Access Control Model For Web Services. E. Bertino, A. C. Squicciarini, and D. Mevi.
Proceedings of IEEE International Conference on Services Computing (SCC 2004) Conference, Shanghai (China), IEEE, September 15-18, 2004. - Trust Negotiation Systems. A. C. Squicciarini. Proceedings of ICDE-EDBT PhD Workshop, Boston, Lecture Notes in Computer Science, LNCS 3268, 29 March 2004.
- X-TNL: an XML based Language for Trust Negotiations. E. Bertino, E. Ferrari, and A. C. Squicciarini. Proc. of 4th IEEE International Workshop on Policies for Distributed Systems and Networks Workshop, June 2003.
- An XML framework for Controlled Sharing of Resources in Virtual Communities. E. Bertino, E. Ferrari, and A. C. Squicciarini.
Proceedings of 17th IFIP 11.3 Working Conference on Data and Application Security, Aug 2003.
- Trust-X: an XML framework for trust negotiations. E. Bertino, E. Ferrari, and A. C. Squicciarini. Proc. of 7th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, 2003.
Books
-
Security for Service Oriented Architectures Concepts,
Architectures and Standards Springer .
E. Bertino, L. D. Martino, F. Paci , A.C. Squicciarini
Springer
- A Comprehensive XML Based Approach to Trust Negotiations.E. Bertino, E. Ferrari, and A. C. Squicciarini.
Advances in Security and Payment Methods for Mobile Commerce, Idea Group Publishers, Chapter 6, Published.
- Sanctioning Mechanisms in Virtual Communities.
E. Bertino, E. Ferrari, and A. C. Squicciarini.
Encyclopedia of Virtual Communities and Technologies (short paper), Idea Group Publisher, To appear.
Others