• 2432 Citations
  • 27 h-Index
20032020
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2003 2020

Filter
Article
2020

REMIND: Risk Estimation Mechanism for Images in Network Distribution

Lin, D., Steiert, D., Morris, J., Squicciarini, A. & Fan, J., Jan 1 2020, In : IEEE Transactions on Information Forensics and Security. 15, p. 539-552 14 p., 8744560.

Research output: Contribution to journalArticle

Electric power distribution
2019
4 Citations (Scopus)

A Cloud Brokerage Architecture for Efficient Cloud Service Selection

Lin, D., Squicciarini, A., Dondapati, V. N. & Sundareswaran, S., Jan 1 2019, In : IEEE Transactions on Services Computing. 12, 1, p. 144-157 14 p., 7516685.

Research output: Contribution to journalArticle

Cloud computing
Costs
Service selection
Brokerage
Service provider
Imitation
Dynamic Networks
Network Topology
Cascade
Topology

Discovering reliable evidence of data misuse by exploiting rule redundancy

Genga, L., Zannone, N. & Squicciarini, A., Nov 1 2019, In : Computers and Security. 87, 101577.

Research output: Contribution to journalArticle

Association rules
redundancy
Transparency
Redundancy
Decision making
2 Citations (Scopus)

Opinion dynamics in the presence of increasing agreement pressure

Semonsen, J., Griffin, C., Squicciarini, A. & Rajtmajer, S., Apr 1 2019, In : IEEE Transactions on Cybernetics. 49, 4, p. 1270-1278 9 p., 8291046.

Research output: Contribution to journalArticle

Complex networks
2018
3 Citations (Scopus)

An emotional step toward automated trust detection in crisis social media

Halse, S. E., Tapia, A., Squicciarini, A. & Caragea, C., Feb 1 2018, In : Information Communication and Society. 21, 2, p. 288-305 18 p.

Research output: Contribution to journalArticle

social media
Bombing
emotion
trustworthiness
twitter

Detecting Suspicious File Migration or Replication in the Cloud

Bowers, A., Liao, C., Steiert, D., Lin, D., Squicciarini, A. & Hurson, A. R., Jan 1 2018, (Accepted/In press) In : IEEE Transactions on Dependable and Secure Computing.

Research output: Contribution to journalArticle

Data transfer
Monitoring
Communication
3 Citations (Scopus)

Towards Privacy-Preserving and Practical Image-Centric Social Discovery

Yuan, X., Wang, X., Wang, C., Squicciarini, A. C. & Ren, K., Sep 1 2018, In : IEEE Transactions on Dependable and Secure Computing. 15, 5, p. 868-882 15 p., 7568994.

Research output: Contribution to journalArticle

Quality of service
Experiments
2017
14 Citations (Scopus)

MMBcloud-tree: Authenticated index for verifiable cloud service selection

Li, J., Squicciarini, A. C., Lin, D., Sundareswaran, S. & Jia, C., Mar 1 2017, In : IEEE Transactions on Dependable and Secure Computing. 14, 2, p. 185-198 14 p., 7123598.

Research output: Contribution to journalArticle

72 Citations (Scopus)

MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs

Lin, D., Kang, J., Squicciarini, A., Wu, Y., Gurung, S. & Tonguz, O., May 1 2017, In : IEEE Transactions on Mobile Computing. 16, 5, p. 1357-1370 14 p., 7516562.

Research output: Contribution to journalArticle

Vehicular ad hoc networks
Routing protocols
Communication
Vehicle to vehicle communications
Information dissemination
5 Citations (Scopus)

Toward automated online photo privacy

Squicciarini, A., Caragea, C. & Balakavi, R., Mar 2017, In : ACM Transactions on the Web. 11, 1, 2.

Research output: Contribution to journalArticle

Blogs
Image classification
Image processing
Internet
14 Citations (Scopus)

Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds

Li, J., Lin, D., Squicciarini, A., Li, J. & Jia, C., Jul 1 2017, In : IEEE Transactions on Cloud Computing. 5, 3, p. 499-509 11 p., 7286786.

Research output: Contribution to journalArticle

Cloud computing
Cryptography
Data storage equipment
2016
4 Citations (Scopus)
social network
Finite automata
Pollution
interaction pattern
popularity
2015
4 Citations (Scopus)

Privacy-aware access control for message exchange in vehicular ad hoc networks

Karumanchi, S., Squicciarini, A. & Lin, D., Jan 1 2015, In : Telecommunication Systems. 58, 4, p. 349-361 13 p.

Research output: Contribution to journalArticle

Vehicular ad hoc networks
Access control
Communication
31 Citations (Scopus)

Privacy policy inference of user-uploaded images on content sharing sites

Squicciarini, A. C., Lin, D., Sundareswaran, S. & Wede, J., Jan 1 2015, In : IEEE Transactions on Knowledge and Data Engineering. 27, 1, p. 193-206 14 p., 6807800.

Research output: Contribution to journalArticle

Image classification
Metadata
Access control
2014
19 Citations (Scopus)

Identifying hidden social circles for advanced privacy configuration

Squicciarini, A., Karumanchi, S., Lin, D. & Desisto, N., Mar 1 2014, In : Computers and Security. 41, p. 40-51 12 p.

Research output: Contribution to journalArticle

privacy
Websites
contact
social network
group practice
6 Citations (Scopus)

Identifying valuable information from Twitter during natural disasters

Truong, B., Caragea, C., Squicciarini, A. & Tapia, A. H., Jan 1 2014, In : Proceedings of the ASIST Annual Meeting. 51, 1

Research output: Contribution to journalArticle

twitter
Disasters
natural disaster
social media
disaster
21 Citations (Scopus)

PriMa: A comprehensive approach to privacy protection in social network sites

Squicciarini, A. C., Paci, F. & Sundareswaran, S., Feb 1 2014, In : Annales des Telecommunications/Annals of Telecommunications. 69, 1-2, p. 21-36 16 p.

Research output: Contribution to journalArticle

Managers
Access control
Data privacy
Specifications
10 Citations (Scopus)

The relativity of privacy preservation based on social tagging

Lee, B., Fan, W., Squicciarini, A., Ge, S. & Huang, Y., Jan 1 2014, In : Information Sciences. 288, 1, p. 87-107 21 p.

Research output: Contribution to journalArticle

Privacy Preservation
Relativity
Tagging
Information services
Information retrieval
6 Citations (Scopus)

Why and how to deceive: game results with sociological evidence

Squicciarini, A. & Griffin, C., Jan 1 2014, In : Social Network Analysis and Mining. 4, 1, p. 1-13 13 p., 161.

Research output: Contribution to journalArticle

Inverse problems
Markov processes
internet community
evidence
reward
2013

Agent-based accountable grid computing systems

Lee, W., Squicciarini, A. & Bertino, E., Aug 1 2013, In : Journal of Supercomputing. 65, 2, p. 903-929 27 p.

Research output: Contribution to journalArticle

Grid computing
Grid Computing
Accountability
Computer systems
Bandwidth
2012
32 Citations (Scopus)

Access control for online social networks third party applications

Shehab, M., Squicciarini, A., Ahn, G. J. & Kokkinou, I., Nov 1 2012, In : Computers and Security. 31, 8, p. 897-911 15 p.

Research output: Contribution to journalArticle

Access control
social network
privacy
Finite automata
interaction
9 Citations (Scopus)

A flexible approach to multisession trust negotiations

Squicciarini, A., Bertino, E., Trombetta, A. & Braghin, S., Jan 1 2012, In : IEEE Transactions on Dependable and Secure Computing. 9, 1, p. 16-29 14 p., 5871654.

Research output: Contribution to journalArticle

Mobile devices
Recovery
112 Citations (Scopus)

Ensuring distributed accountability for data sharing in the cloud

Sundareswaran, S., Squicciarini, A. & Lin, D., May 22 2012, In : IEEE Transactions on Dependable and Secure Computing. 9, 4, p. 556-568 13 p., 6165313.

Research output: Contribution to journalArticle

Cloud computing
Authentication
Health
Internet
2011
31 Citations (Scopus)

Adaptive reordering and clustering-based framework for efficient XACML policy evaluation

Marouf, S., Shehab, M., Squicciarini, A. & Sundareswaran, S., Nov 23 2011, In : IEEE Transactions on Services Computing. 4, 4, p. 300-313 14 p., 5467030.

Research output: Contribution to journalArticle

Access control
Engines
Sun
Web services
Statistics
56 Citations (Scopus)
privacy
social network
management
Data privacy
personal data
1 Citation (Scopus)

Toward scalable trustworthy computing using the human-physiology-immunity metaphor

Hively, L., Sheldon, F. & Squicciarini, A., Jul 1 2011, In : IEEE Security and Privacy. 9, 4, p. 14-23 10 p., 5560629.

Research output: Contribution to journalArticle

Physiology
immunity
physiology
Cloud computing
metaphor
11 Citations (Scopus)

Trust establishment in the formation of Virtual Organizations

Squicciarini, A., Paci, F. & Bertino, E., Jan 1 2011, In : Computer Standards and Interfaces. 33, 1, p. 13-23 11 p.

Research output: Contribution to journalArticle

trustworthiness
Industry
Concretes
paradigm
scenario
7 Citations (Scopus)

Using modeling and simulation to evaluate enterprises' risk exposure to social networks

Squicciarini, A., Rajasekaran, S. D. & Mont, M. C., Jan 1 2011, Computer, 44, 1, p. 66-73 8 p.

Research output: Contribution to specialist publicationArticle

Personnel
Industry
2010
11 Citations (Scopus)

Group-based negotiations in P2P systems

Squicciarini, A., Paci, F., Bertino, E., Trombetta, A. & Braghin, S., Aug 24 2010, In : IEEE Transactions on Parallel and Distributed Systems. 21, 10, p. 1473-1486 14 p., 5401157.

Research output: Contribution to journalArticle

Joining
Authentication
Availability
Specifications
8 Citations (Scopus)

Multifactor identity verification using aggregated proof of knowledge

Bhargav-Spantzel, A., Squicciarini, A., Xue, R. & Bertino, E., Jul 1 2010, In : IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews. 40, 4, p. 372-383 12 p., 5447665.

Research output: Contribution to journalArticle

Network protocols
Costs
53 Citations (Scopus)

Privacy policies for shared content in social network sites

Squicciarini, A., Shehab, M. & Wede, J., Jun 29 2010, In : VLDB Journal. 19, 6, p. 777-796 20 p.

Research output: Contribution to journalArticle

Game theory
Taxation
2009
7 Citations (Scopus)

An Overview of veryIDX - A privacy-preserving digital identity management system for mobile devices

Paci, F., Bertino, E., Kerr, S., Squicciarini, A. & Woo, J., Sep 1 2009, In : Journal of Software. 4, 7, p. 696-706 11 p.

Research output: Contribution to journalArticle

Mobile devices
Bluetooth
Viruses
Authentication
Industry
10 Citations (Scopus)

Web-traveler policies for images on social networks

Squicciarini, A. & Sundareswaran, S., Jan 1 2009, In : World Wide Web. 12, 4, p. 461-484 24 p.

Research output: Contribution to journalArticle

Access control
Scalability
2007
55 Citations (Scopus)

PP-trust-X: A system for privacy preserving trust negotiations

Squicciarini, A., Bertino, E., Ferrari, E., Paci, F. & Thuraisingham, B., Jul 1 2007, In : ACM Transactions on Information and System Security. 10, 3, 1266981.

Research output: Contribution to journalArticle

Open systems
46 Citations (Scopus)

Privacy preserving multi-factor authentication with biometrics

Bhargav-Spantzel, A., Squicciarini, A., Modi, S., Young, M., Bertino, E. & Elliott, S. J., Jan 1 2007, In : Journal of Computer Security. 15, 5, p. 529-560 32 p.

Research output: Contribution to journalArticle

Biometrics
Authentication
Vector spaces
Interoperability
2006
47 Citations (Scopus)

Achieving privacy in trust negotiations with an ontology-based approach

Squicciarini, A. C., Bertino, E., Ferrari, E. & Ray, I., Jan 1 2006, In : IEEE Transactions on Dependable and Secure Computing. 3, 1, p. 13-30 18 p.

Research output: Contribution to journalArticle

Ontology
Substitution reactions
Semantics
Internet
19 Citations (Scopus)

An adaptive access control model for web services

Bertino, E., Squicciarini, A. C., Martino, L. & Paci, F., Jan 1 2006, In : International Journal of Web Services Research. 3, 3, p. 27-60 34 p.

Research output: Contribution to journalArticle

Access control
Web services
WSDL
Specifications
1 Citation (Scopus)

A secure framework for publishing virtual community contracts

Squicciarini, A., Paci, F. & Bertino, E., Jan 1 2006, In : International Journal of Web Based Communities. 2, 2, p. 237-255 19 p.

Research output: Contribution to journalArticle

virtual community
Network protocols
XML
community
integrity
31 Citations (Scopus)

Establishing and protecting digital identity in federation systems

Bhargav-Spantzel, A., Squicciarini, A. & Bertino, E., Jan 1 2006, In : Journal of Computer Security. 14, 3, p. 269-300 32 p.

Research output: Contribution to journalArticle

Authentication
23 Citations (Scopus)

Ws-AC: A fine grained access control system for Web services

Bertino, E., Squicciarini, A., Paloscia, I. & Martino, L., Jun 1 2006, In : World Wide Web. 9, 2, p. 143-171 29 p.

Research output: Contribution to journalArticle

Access control
Web services
Control systems
Internet
Network protocols
2004
54 Citations (Scopus)

Trust negotiations: Concepts, systems, and languages

Bertino, E., Ferrari, E. & Squicciarini, A., Jul 1 2004, In : Computing in Science and Engineering. 6, 4, p. 27-34 8 p.

Research output: Contribution to journalArticle

Open systems
Internet
3 Citations (Scopus)
Open systems
XML
Internet
Open Systems
Prior Knowledge
185 Citations (Scopus)

Trust-χ: A peer-to-peer framework for trust establishment

Bertino, E., Ferrari, E. & Squicciarini, A., Jul 1 2004, In : IEEE Transactions on Knowledge and Data Engineering. 16, 7, p. 827-842 16 p.

Research output: Contribution to journalArticle

Open systems
XML
Internet
Specifications
2003
4 Citations (Scopus)
XML
Specifications
System Architecture
Specification
Framework