Find Claudio A. Ardagna publications at
International Journals
-
-
Open Source in Web-based Applications: A Case Study on Single Sign-OnInternational Journal of Information Technology and Web Engineering (IJITWE), Jul. 2006
-
Secure Authentication Process for High Sensitive Data E-Services: a RoadmapJournal of Cases on Information Technology (JCIT), Jan. 2007
-
Advanced Localization of Mobile Terminal in Cellular NetworkInternational Journal of Communications, Network and System Sciences (IJCNS), Feb. 2008
-
Landscape-aware location-privacy protection in location-based servicesJournal of System Architecture (JSA), Apr. 2009
-
-
-
-
Map-Based Location and Tracking in Multipath Outdoor Mobile NetworksIEEE Transactions on Wireless Communications (TWC), Mar. 2011
-
-
-
Landmark-assisted location and tracking in outdoor mobile networkJournal of Multimedia Tools and Applications (MTAP), 2012
-
A Test-based Security Certification Scheme for Web ServicesACM Transactions on the Web (TWEB), May. 2013
-
-
An Anonymous End-to-End Communication Protocol for Mobile Cloud EnvironmentsIEEE Transactions on Services Computing, Jul. 2014
-
-
A Configuration-Independent Score-Based Benchmark for Distributed DatabasesIEEE Transactions on Services Computing (TSC), Jan. 2016
-
Anonymous End-to-End Communications in Adversarial Mobile CloudsPervasive and Mobile Computing, Apr. 2016
-
-
A semi-automatic and trustworthy scheme for continuous cloud service certificationIEEE Transactions on Services Computing (TSC), 2017
-
-
Model-based Big Data Analytics-as-a-Service: Take Big Data to the Next LevelIEEE Transactions on Services Computing (TSC), 2018
-
Privacy-aware Big Data Analytics as a Service for Public Health Policies in Smart CitiesSustainable Cities and Society, Feb. 2018
-
Cost-Effective Deployment of Certified Cloud Composite ServicesJournal of Parallel and Distributed Computing, 2019
-
A Trust Assurance Technique for Internet of Things Based on Human Behavior ComplianceConcurrency Computation: Practice and Experience, 2019
-
Test-Based Security Certification of Composite ServicesACM Transactions on the Web (TWEB), Feb. 2019
-
International Conferences
-
-
-
-
Using Open Source Middleware for Securing e-Gov ApplicationsIn Proc. of the First International Conference on Open Source Systems (OSS 2005), Genova, Italy, Jul. 2005
-
-
-
-
-
-
Adopting Open Source for Mission-Critical Applications: A Case Study on Single Sign-OnIn Proc. of The Second IFIP International Conference on Open Source Systems (OSS 2006), Como, Italy, Jun. 2006
-
-
-
-
Anomalies Detection in Mobile Network Management DataIn Proc. of the 12th International Conference on Database Systems for Advanced Applications (DASFAA 2007), Bangkok, Thailand, Apr. 2007
-
-
-
L-VCONF: A Location-Aware Infrastructure for Battlefield VideoconferencesIn Proc. of the IEEE International Conference On Virtual Environments, Human-Computer Interfaces, and Measurement Systems (VECIMS 2007), Ostuni, Italy, Jun. 2007
-
FOCSE: An OWA-based Evaluation Framework for OS Adoption in Critical EnvironmentsIn Proc. of The Third IFIP International Conference on Open Source Systems (OSS 2007), Limerick, Ireland, Jun. 2007
-
-
Mobile Network Traffic Data Compression by Means of Wavelet DecompositionIn Proc. of the IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2008), Phitsanulok, Thailand, Feb. 2008
-
-
Mapping Linux Security Targets to Existing Test SuitesIn Proc. of The Fourth IFIP International Conference on Open Source Systems (OSS 2008), Milan, Italy, Sep. 2008
-
-
An Assurance Model for OSS Adoption in Next-Generation Telco EnvironmentsIn Proc. of 2009 Third IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2009), Istanbul, Turkey, May. 2009
-
Assurance evaluation for OSS adoption in a Telco contextIn Proc. of the IFIP WG 2.13 International conference on Open Source Systems (OSS), Skovde, Sweden, Jun. 2009
-
Assurance Process for Large Open Source Code BasesIn Proc. of the Workshop on Software Security Process (SSP09), Vancouver, Canada, Aug. 2009
-
-
-
-
Spago4Q and the QEST nD Model: an Open Source Solution for Software Performance MeasurementIn Proc. of the 6th International Conference on Open Source Systems (OSS 2010), Notre Dame, IN, USA, May. 2010
-
-
Implementing Open Source Software Governance in Real Software Assurance ProcessesIn Proc. of the 1st The First International Conference on Software Business (ICSOB2010), Jyvaskyla, Finland, Jun. 2010
-
-
-
-
Advanced Security Service cERTificate for SOA: Certified Services go Digital!In Proc. of the Information Security Solutions Europe (ISSE 2010), Berlin, Germany, Oct. 2010
-
ASSERT4SOA: Toward Security Certification of Service-Oriented ApplicationsIn Proc of the 12th International Symposium on Distributed Objects, Middleware, and Applications (DOA 2010), Crete, Greece, Oct. 2010
-
-
-
Defining and Matching Test-Based Certificates in Open SOAIn Proc. of the Second International Workshop on Security Testing (SECTEST 2011), Berlin, Germany, Mar. 2011
-
A Framework to Support Assurance-based Service SearchIn Proc. of the 1st International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2011), Campione d’Italia, Italy, Jun. 2011
-
Fine-Grained Modeling of Web Services for Test-Based Security CertificationIn Proc. of the 8th International Conference on Service Computing (SCC 2011), Washington, DC, USA, Jul. 2011
-
Towards Pattern-based Reliability Certification of ServicesIn Proc. of the 1st International Symposium on Secure Virtual Infrastructures (DOA-SVI 2011), Crete, Greece, Oct. 2011
-
-
Scalability Patterns for Platform-as-a-ServiceIn Proc. of the 5th IEEE International Conference on Cloud Computing (CLOUD 2012), Honolulu, HI, USA, Jun. 2012
-
A Low-Cost Security Certification Scheme for Evolving ServicesIn Proc. of the 19th IEEE International Conference on Web Services (ICWS 2012), Honolulu, HI, USA, Jun. 2012
-
Security Certification-Aware Service Discovery and SelectionIn Proc. of the 5th IEEE International Conference on Service-Oriented Computing and Applications (SOCA 2012), Taipei, Taiwan, Dec. 2012
-
-
Early Assessment of Service Performance Based on SimulationIn Proc. of the 10th IEEE International Conference on Services Computing (SCC 2013), San Francisco, CA, USA, Jun. 2013
-
Security Certification of Composite Services: A Test-Based ApproachIn Proc. of the 20th IEEE International Conference on Web Services (ICWS 2013), San Francisco, CA, USA, Jun. 2013
-
Preserving Smartphone Users Anonymity in Cloudy DaysIn Proc. of the Third International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2013), Nassau, Bahamas, Aug. 2013
-
Machine-readable privacy certificates for servicesIn Proc. of the International Conference on Secure Virtual Infrastructures (DOA-Trusted Cloud 2013), Graz, Austria, Sep. 2013
-
Zero-Knowledge Evaluation of Service Performance Based on SimulationIn Proc. of the 15th IEEE International Symposium on High Assurance Systems Engineering (HASE 2014), Miami, FL, USA, Jan. 2014
-
On the Management of Cloud Non-Functional Properties: The Cloud Transparency ToolkitIn Proc. of the 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2014), Dubai, UAE, Mar. 2014
-
e-Auctions for Multi-Cloud Service ProvisioningIn Proc. of the 11th IEEE International Conference on Services Computing (SCC 2014), Anchorage, AL, USA, Jun. 2014
-
A Competitive Scalability Approach for Cloud ArchitecturesIn Proc. of the 7th IEEE International Conference on Cloud Computing (CLOUD 2014), Anchorage, AL, USA, Jun. 2014
-
A Certification-Based Trust Model for Autonomic Cloud Computing SystemsIn Proc. of the IEEE Conference on Cloud Autonomic Computing (CAC 2014), London, UK, Sep. 2014
-
Network and Storage Latency Attacks to Online Trading Protocols in the CloudIn Proc. of the International Conference on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures, Amantea, Italy, Oct. 2014
-
Trustworthy Cloud Certification: A Model-Based ApproachIn Proc. of the 4th International Symposium (SIMPDA 2014), Milan, Italy, Nov. 2014
-
A Hybrid Representation Model for Service ContractsIn Proc. of the International Conference on Information and Communication Technology Research (ICTRC2015), Abu Dhabi, UAE, May. 2015
-
A Test-Based Incremental Security Certification Scheme for Cloud-Based SystemsIn Proc. of the 12th IEEE International Conference on Services Computing (SCC 2015), New York, NY, USA, Jun. 2015
-
Toward Security and Performance Certification of OpenStackIn Proc. of the 8th IEEE International Conference on Cloud Computing (CLOUD 2015), New York, NY, USA, Jun. 2015
-
A certification framework for cloud-based servicesIn Proc. of the ACM Symposium on Applied Computing (SAC 2016), Pisa, Italy, Apr. 2016
-
A Cost-Effective Certification-Based Service Composition for the CloudIn Proc. of the 12th IEEE International Conference on Services Computing (SCC 2016), Jun. 2016
-
A Certification Technique for Cloud Security AdaptationIn Proc. of the 12th IEEE International Conference on Services Computing (SCC 2016), San Francisco, CA, USA, Jun. 2016
-
Big Data Analytics as-a-Service: Issues and challengesIn Proc. of the 3rd International Workshop on Privacy and Security of Big Data (PSBD 2016), Washington, VA, USA, Dec. 2016
-
Scouting Big Data Campaigns using TOREADOR LabsIn Proc. of EURO Pro Workshop EDBT/ICDT 2017 Joint Conference, Venice, Italy, Mar. 2017
-
What Are My Users Looking For When Preparing A Big Data CampaignIn Proc. of the 6th IEEE International Congress on Big Data (IEEE BigData Congress 2017), Honolulu, HI, USA, Jun. 2017
-
A Security Benchmark For OpenStackIn Proc. of the 10th IEEE International Conference on Cloud Computing (IEEE CLOUD 2017), Honolulu, HI, USA, Jun. 2017
-
A Model-Driven Methodology For Big Data Analytics-as-a-ServiceIn Proc. of the 6th IEEE International Congress on Big Data (IEEE BigData Congress 2017), Honolulu, HI, USA, Jun. 2017
-
Toward Model-Based Big Data-as-a-Service: The TOREADOR ApproachIn Proc. of the 21st European Conference Advances in Databases and Information Systems (ADBIS 2017), Nicosia, Cyprus, Sep. 2017
-
Big Data Assurance Evaluation: An SLA-based ApproachIn Proc. of the 14th IEEE International Conference on Services Computing (SCC 2018), San Francisco, CA, USA, Jul. 2018
-
A Fast and Incremental Development Life Cycle for Data Analytics-as-a-ServiceIn Proc. of the 7th IEEE International Congress on Big Data (BigData Congress 2018), San Francisco, CA, USA, Jul. 2018
-
Semantic Support for model based Big Data Analytics-as-a-service (MBDAaaS)In Proc. of the 12th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2018), Matsue, Japan, Jul. 2018
-
A Knowledge-Based IoT Security CheckerIn Proc. of the 2nd Workshop on Fog-to-Cloud Distributed Processing (F2C-DP), Turin, Italy, Aug. 2018
-
Moon Cloud: A Cloud Platform for ICT Security GovernanceIn Proc. of the IEEE Global Communications Conference (GLOBECOM 2018), Abu Dhabi, UAE, Dec. 2018
-
Trustworthy IoT: An Evidence Collection Approach based on Smart ContractsIn Proc. of the 15th IEEE International Conference on Services Computing (SCC 2019), Milan, Italy, Jul. 2019
-
-
-
-
-
Other Publications
-
-
-
-
Toward Certification of ServicesIn International Workshop on Business System Management and Engineering (BSME 2010), Malaga, Spain, Jun. 2010
-
Privacy-Aware LanguagesIn Encyclopedia of Cryptography and Security, van Tilborg, H.C. A. and Jajodia, S. (eds.), 2011
-
Script Language SecurityIn Encyclopedia of Cryptography and Security, van Tilborg, H.C. A. and Jajodia, S. (eds.), 2011
-
Location information (privacy of)In Encyclopedia of Cryptography and Security, van Tilborg, H.C. A. and Jajodia, S. (eds.), 2011
-
XML-based access control languagesIn Encyclopedia of Cryptography and Security, van Tilborg, H.C. A. and Jajodia, S. (eds.), 2011
-
-
-
-
-