Claudio A. Ardagna

Find Claudio A. Ardagna publications at

International Journals

  1. A Comparison of Modeling Strategies in Defining XML-Based Access Control Language
    Ardagna, C. A., and De Capitani di Vimercati, S.
    Computer Systems Science & Engineering Journal, May. 2004
  2. XML-based Access Control Languages
    Ardagna, C. A., De Capitani di Vimercati, E. Damiani S., and Samarati, P.
    Information Security Technical Report, Jul. 2004
  3. Open Source in Web-based Applications: A Case Study on Single Sign-On
    Ardagna, C. A., Frati, F., and Gianini, G.
    International Journal of Information Technology and Web Engineering (IJITWE), Jul. 2006
  4. Secure Authentication Process for High Sensitive Data E-Services: a Roadmap
    Ardagna, C. A., Damiani, E., Frati, F., and Reale, S.
    Journal of Cases on Information Technology (JCIT), Jan. 2007
  5. Advanced Localization of Mobile Terminal in Cellular Network
    Anisetti, M., Ardagna, C. A., Bellandi, V., Damiani, E., and Reale, S.
    International Journal of Communications, Network and System Sciences (IJCNS), Feb. 2008
  6. A Privacy-Aware Access Control System
    Ardagna, C. A., Cremonini, M., De Capitani di Vimercati, S., and Samarati, P.
    Journal of Computer Security (JCS), Sep. 2008
  7. Landscape-aware location-privacy protection in location-based services
    Ardagna, C. A., Cremonini, M., and Gianini, G.
    Journal of System Architecture (JSA), Apr. 2009
  8. Exploiting Cryptography for Privacy-Enhanced Access Control: A result of the PRIME Project
    Ardagna, C. A., Camenisch, J., Kohlweiss, M., Leenes, R., Neven, G., Priem, B., Samarati, P., Sommer, D., and Verdicchio, M.
    Journal of Computer Security (JCS), Jan. 2010
  9. Access Control for Smarter Healthcare Using Policy Spaces
    Ardagna, C. A., De Capitani di Vimercati, S., Foresti, S., Grandison, T., Jajodia, S., and Samarati, P.
    Computers & Security, Nov. 2010
  10. An Obfuscation-based Approach for Protecting Location Privacy
    Ardagna, C. A., Cremonini, M., De Capitani di Vimercati, S., and Samarati, P.
    IEEE Transactions on Dependable and Secure Computing (TDSC), Jan. 2011
  11. Map-Based Location and Tracking in Multipath Outdoor Mobile Networks
    Anisetti, M., Ardagna, C. A., Bellandi, V., Damiani, E., and Reale, S.
    IEEE Transactions on Wireless Communications (TWC), Mar. 2011
  12. Expressive and Deployable Access Control in Open Web Service Applications
    Ardagna, C., De Capitani di Vimercati, S., Paraboschi, S., Pedrini, E., Samarati, P., and Verdicchio, M.
    IEEE Transactions on Service Computing (TSC), Apr. 2011
  13. Minimising Disclosure of Client Information in Credential-Based Interactions
    Ardagna, C. A., De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., and Samarati, P.
    International Journal of Information Privacy, Security and Integrity (IJIPSI), 2012
  14. Landmark-assisted location and tracking in outdoor mobile network
    Anisetti, M., Ardagna, C. A., Bellandi, V., Damiani, E., D:oller, M., Stegmaier, F., Rabl, T., Kosch, H., and Brunie, L.
    Journal of Multimedia Tools and Applications (MTAP), 2012
  15. Web Service Assurance: The Notion and the Issues
    Anisetti, M., Ardagna, C. A., Damiani, E., Frati, F., M"uller, H.A., and Pahlevan, A.
    Future Internet, Feb. 2012
  16. A Test-based Security Certification Scheme for Web Services
    Anisetti, M., Ardagna, C. A., Damiani, E., and Saonara, F.
    ACM Transactions on the Web (TWEB), May. 2013
  17. Providing Users’ Anonymity in Mobile Hybrid Networks
    Ardagna, C. A., Jajodia, S., Samarati, P., and Stavrou, A.
    ACM Transactions on Internet Technology (TOIT), May. 2013
  18. Dependability Certification of Services: A Model-Based Approach
    Ardagna, C. A., Jhawar, R., and Piuri, V.
    Computing, Oct. 2013
  19. An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments
    Ardagna, C. A., Conti, M., Leone, M., and Stefa, J.
    IEEE Transactions on Services Computing, Jul. 2014
  20. From Security to Assurance in the Cloud: A Survey
    Ardagna, C. A., Asal, R., Damiani, E., and Vu, Q.H.
    ACM Computing Surveys (CSUR), Aug. 2015
  21. A Configuration-Independent Score-Based Benchmark for Distributed Databases
    Ardagna, C. A., Damiani, E., Frati, F., and Rebeccani, D.
    IEEE Transactions on Services Computing (TSC), Jan. 2016
  22. Anonymous End-to-End Communications in Adversarial Mobile Clouds
    Ardagna, C. A., Ariyapala, K., Conti, M., Pinotti, C.M., and Stefa, J.
    Pervasive and Mobile Computing, Apr. 2016
  23. Towards transparent and trustworthy cloud
    Anisetti, M., Ardagna, C. A., Damiani, E., Mana, A., and Spanoudakis, G.
    IEEE Cloud Computing Magazine, 2017
  24. A semi-automatic and trustworthy scheme for continuous cloud service certification
    Anisetti, M., Ardagna, C. A., Damiani, E., and Gaudenzi, F.
    IEEE Transactions on Services Computing (TSC), 2017
  25. Certification-Based Cloud Adaptation
    Ardagna, C. A., Asal, R., Damiani, E., Dimitrakos, T., El Ioini, N., and Pahl, C.
    IEEE Transactions on Services Computing (TSC), 2018
  26. Model-based Big Data Analytics-as-a-Service: Take Big Data to the Next Level
    Ardagna, C. A., Bellandi, V., Bezzi, M., Ceravolo, P., Damiani, E., and Hebert, C.
    IEEE Transactions on Services Computing (TSC), 2018
  27. Privacy-aware Big Data Analytics as a Service for Public Health Policies in Smart Cities
    Anisetti, M., Ardagna, C. A., Bellandi, V., Cremonini, M., Damiani, E., and Frati, F.
    Sustainable Cities and Society, Feb. 2018
  28. Cost-Effective Deployment of Certified Cloud Composite Services
    Anisetti, M., Ardagna, C. A., Damiani, E., Gaudenzi, F., and Jeon, G.
    Journal of Parallel and Distributed Computing, 2019
  29. A Trust Assurance Technique for Internet of Things Based on Human Behavior Compliance
    Anisetti, M., Ardagna, C. A., Damiani, E., and Sala, A.
    Concurrency Computation: Practice and Experience, 2019
  30. Test-Based Security Certification of Composite Services
    Anisetti, M., Ardagna, C. A., Damiani, E., and Polegri, G.
    ACM Transactions on the Web (TWEB), Feb. 2019
  31. Multi-Dimensional Certification of Modern Distributed Systems
    Anisetti, Marco, Ardagna, Claudio A., and Bena, Nicola
    IEEE Transactions on Services Computing, 2022

International Conferences

  1. A Web Service Architecture for Enforcing Access Control Policies
    Ardagna, C. A., Damiani, E., De Capitani di Vimercati, S., and Samarati, P.
    In Proc. of the First International Workshop on Views On Designing Complex Architectures (VODCA 2004), Bertinoro, Italy, Sep. 2004
  2. The Architecture of a Privacy-aware Access Control Decision Component
    Ardagna, C. A., Damiani, E., Cremonini, M., De Capitani di Vimercati, S., and Samarati, P.
    In Proc. of the Construction and Analysis of Safe, Secure and Interoperable Smart devices (CASSIS 2005), Nice, France, Mar. 2005
  3. Towards Identity Management for E-Services
    Ardagna, C. A., Damiani, E., De Capitani di Vimercati, S., Cremonini, M., and Samarati, P.
    In Proc. of the TED Conference on e-Government Electronic democracy: The challenge ahead (poster session), Bolzano, Italy, Mar. 2005
  4. Using Open Source Middleware for Securing e-Gov Applications
    Ardagna, C. A., Damiani, E., Frati, F., and Montel, M.
    In Proc. of the First International Conference on Open Source Systems (OSS 2005), Genova, Italy, Jul. 2005
  5. Offline Expansion of XACML Policies Based on P3P Metadata
    Ardagna, C. A., Damiani, E., De Capitani di Vimercati, S., Fugazza, C., and Samarati, P.
    In Proc. of the 5th International Conference on Web Engineering, Sydney, Australia, Jul. 2005
  6. Towards Privacy-Enhanced Authorization Policies and Languages
    Ardagna, C. A., Damiani, E., De Capitani di Vimercati, S., and Samarati, P.
    In Proc. of the 19th IFIP WG11.3 Working Conference on Data and Application Security, Nathan Hale Inn, University of Connecticut, Storrs, USA, Aug. 2005
  7. Supporting Location-Based Conditions in Access Control Policies
    Ardagna, C. A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., and Samarati, P.
    In Proc. of the ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS 2006), Taipei, Taiwan, Mar. 2006
  8. CAS++: an Open Source Single Sign-On Solution for Secure e-Services
    Ardagna, C. A., Damiani, E., De Capitani di Vimercati, S., Frati, F., and Samarati, P.
    In Proc. of the 21st IFIP TC-11 International Information Security Conference, Karlstad, Sweden, May. 2006
  9. Location-based Metadata and Negotiation Protocols for LBAC in a One-to-Many Scenario
    Ardagna, C. A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., and Samarati, P.
    In Proc. of the Workshop On Security and Privacy in Mobile and Wireless Networking (SecPri MobiWi 2006), Coimbra, Portogal, May. 2006
  10. Adopting Open Source for Mission-Critical Applications: A Case Study on Single Sign-On
    Ardagna, C. A., Damiani, E., Frati, F., and Reale, S.
    In Proc. of The Second IFIP International Conference on Open Source Systems (OSS 2006), Como, Italy, Jun. 2006
  11. OpenAmbient: a Pervasive Access Control Architecture
    Anisetti, M., Ardagna, C. A., Bellandi, V., Damiani, E., Vimercati, S. De Capitani, and Samarati, P.
    In Proc. of ETRICS Workshop on Security in Autonomous Systems (SecAS), Friburg, Germany, Jun. 2006
  12. Enhancing User Privacy Through Data Handling Policies
    Ardagna, C. A., De Capitani di Vimercati, S., and Samarati, P.
    In Proc. of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2006), Sophia Antipolis, France, Jul. 2006
  13. Negotiation Protocols for LBAC Systems
    Ardagna, C. A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., and Samarati, P.
    In Proc. of 1st International Conference on Information Security and Computer Forensics (ISCF 2006), Chennai, India, Dec. 2006
  14. Anomalies Detection in Mobile Network Management Data
    Anisetti, M., Ardagna, C. A., Bellandi, V., Bernardoni, E., Damiani, E., and Reale, S.
    In Proc. of the 12th International Conference on Database Systems for Advanced Applications (DASFAA 2007), Bangkok, Thailand, Apr. 2007
  15. A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy
    Ardagna, C. A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., and Samarati, P.
    In Proc. of the 22nd IFIP TC-11 International Information Security Conference (SEC 2007), Sandton, South Africa, May. 2007
  16. Managing Privacy in LBAC Systems
    Ardagna, C. A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., and Samarati, P.
    In Proc. of the Second IEEE International Symposium on Pervasive Computing and Ad Hoc Communications (PCAC 2007), Niagara Falls, Canada, May. 2007
  17. L-VCONF: A Location-Aware Infrastructure for Battlefield Videoconferences
    Damiani, E., Anisetti, M., Ardagna, C. A., and Bellandi, V.
    In Proc. of the IEEE International Conference On Virtual Environments, Human-Computer Interfaces, and Measurement Systems (VECIMS 2007), Ostuni, Italy, Jun. 2007
  18. FOCSE: An OWA-based Evaluation Framework for OS Adoption in Critical Environments
    Ardagna, C. A., Damiani, E., and Frati, F.
    In Proc. of The Third IFIP International Conference on Open Source Systems (OSS 2007), Limerick, Ireland, Jun. 2007
  19. Location Privacy Protection Through Obfuscation-based Techniques
    Ardagna, C. A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., and Samarati, P.
    In Proc. of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2007), Redondo Beach, CA, USA, Jul. 2007
  20. Mobile Network Traffic Data Compression by Means of Wavelet Decomposition
    Ardagna, C. A., Bernardoni, E., Damiani, E., and Reale, S.
    In Proc. of the IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2008), Phitsanulok, Thailand, Feb. 2008
  21. Regulating Exceptions in Healthcare using Policy Spaces
    Ardagna, C. A., De Capitani di Vimercati, S., Grandison, T., Jajodia, S., and Samarati, P.
    In Proc. of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2008), London, U.K., Jul. 2008
  22. Mapping Linux Security Targets to Existing Test Suites
    Ardagna, C. A., Damiani, E., Ioini, N. El, Frati, F., Giovannini, P., and Tchokpon, R.
    In Proc. of The Fourth IFIP International Conference on Open Source Systems (OSS 2008), Milan, Italy, Sep. 2008
  23. A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
    Ardagna, C. A., A.Stavrou, , S.Jajodia, , P.Samarati, , and Martin, R.
    In Proc. of the International Workshop on Privacy in Location-Based Applications (PILBA 2008), Malaga, Spain, Oct. 2008
  24. An Assurance Model for OSS Adoption in Next-Generation Telco Environments
    Ardagna, C. A., Banzi, M., Damiani, E., Frati, F., and Ioini, N. El
    In Proc. of 2009 Third IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2009), Istanbul, Turkey, May. 2009
  25. Assurance evaluation for OSS adoption in a Telco context
    Ardagna, C. A., Damiani, E., and Frati, F.
    In Proc. of the IFIP WG 2.13 International conference on Open Source Systems (OSS), Skovde, Sweden, Jun. 2009
  26. Assurance Process for Large Open Source Code Bases
    Ardagna, C. A., Banzi, M., Damiani, E., and Frati, F.
    In Proc. of the Workshop on Software Security Process (SSP09), Vancouver, Canada, Aug. 2009
  27. Extending XACML for Open Web-based Scenarios
    Ardagna, C. A., De Capitani di Vimercati, S., Pedrini, E., Paraboschi, S., Samarati, P., and Verdicchio, M.
    In Proc. of the W3C Workshop on Access Control Application Scenarios, Luxembourg, Nov. 2009
  28. An XACML-Based Privacy-Centered Access Control System
    Ardagna, C. A., De Capitani di Vimercati, S., Paraboschi, S., Pedrini, E., and Samarati, P.
    In Proc. of the 1st ACM Workshop on Information Security Governance (WISG 2009), Chicago, Illinois, USA, Nov. 2009
  29. PrimeLife Policy Language
    Ardagna, C. A., Bussard, L., De Capitani di Vimercati, S., Neven, G., Pedrini, E., Paraboschi, S., Preiss, F., Samarati, P., Trabelsi, S., and Verdicchio, M.
    In Proc. of the W3C Workshop on Access Control Application Scenarios, Luxembourg, Nov. 2009
  30. Spago4Q and the QEST nD Model: an Open Source Solution for Software Performance Measurement
    Ardagna, C. A., Damiani, E., Frati, F., Oltolina, S., Regoli, M., and Ruffatti, G.
    In Proc. of the 6th International Conference on Open Source Systems (OSS 2010), Notre Dame, IN, USA, May. 2010
  31. Enabling Privacy-Preserving Credential-Based Access Control with XACML and SAML
    Ardagna, C. A., De Capitani di Vimercati, S., Neven, G., Paraboschi, S., Preiss, F.-S., Samarati, P., and Verdicchio, M.
    In Proc. of the 3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2010), Bradford, UK, Jun. 2010
  32. Implementing Open Source Software Governance in Real Software Assurance Processes
    Ardagna, C. A., Banzi, M., Damiani, E., and Frati, F.
    In Proc. of the 1st The First International Conference on Software Business (ICSOB2010), Jyvaskyla, Finland, Jun. 2010
  33. Minimizing Disclosure of Private Information in Credential-Based Interactions: A Graph-Based Approach
    Ardagna, C. A., De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., and Samarati, P.
    In Proc. of the 2nd IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2010), Minneapolis, Minnesota, USA, Aug. 2010
  34. Providing mobile users’ anonymity in hybrid networks
    Ardagna, C. A., Jajodia, S., Samarati, P., and Stavrou, A.
    In Proc. 15th European Symposium on Research in Computer Security (ESORICS 2010), Athens, Greece, Sep. 2010
  35. Supporting Privacy Preferences in Credential-Based Interactions
    Ardagna, C. A., De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., and Samarati, P.
    In Proc. of the Workshop on Privacy in the Electronic Society (WPES 2010), Chicago, Illinois, USA, Oct. 2010
  36. Advanced Security Service cERTificate for SOA: Certified Services go Digital!
    Pazzaglia, J.-C., Lotz, V., Cerda, V. Campos, Damiani, E., Ardagna, C. A., Guergens, S., Mana, A., Pandolfo, C., Spanoudakis, G., Guida, F., and Menicocci, R.
    In Proc. of the Information Security Solutions Europe (ISSE 2010), Berlin, Germany, Oct. 2010
  37. ASSERT4SOA: Toward Security Certification of Service-Oriented Applications
    Anisetti, M., Ardagna, C. A., Guida, F., Guergens, S., Lotz, V., Mana, A., Pandolfo, C., Pazzaglia, J.-C., Pujol, G., and Spanoudakis, G.
    In Proc of the 12th International Symposium on Distributed Objects, Middleware, and Applications (DOA 2010), Crete, Greece, Oct. 2010
  38. Supporting User Privacy Preferences on Information Release in Open Scenarios
    Ardagna, C. A., De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., and Samarati, P.
    In Proc. of the W3C Workshop on Privacy and Data Usage Control, Cambridge, Massachusetts, USA, Oct. 2010
  39. Fine-Grained Disclosure of Access Policies
    Ardagna, C. A., De Capitani di Vimercati, S., Foresti, S., Neven, G., Paraboschi, S., Preiss, F.-S., Samarati, P., and Verdicchio, M.
    In Proc. of the 12th International Conference on Information and Communications Security (ICICS 2010), Barcelona, Spain, Dec. 2010
  40. Defining and Matching Test-Based Certificates in Open SOA
    Anisetti, M., Ardagna, C. A., and Damiani, E.
    In Proc. of the Second International Workshop on Security Testing (SECTEST 2011), Berlin, Germany, Mar. 2011
  41. A Framework to Support Assurance-based Service Search
    Anisetti, M., Ardagna, C. A., Damiani, E., Frati, F., Pahlevan, A., and Muller, H.A.
    In Proc. of the 1st International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2011), Campione d’Italia, Italy, Jun. 2011
  42. Fine-Grained Modeling of Web Services for Test-Based Security Certification
    Anisetti, M., Ardagna, C. A., and Damiani, E.
    In Proc. of the 8th International Conference on Service Computing (SCC 2011), Washington, DC, USA, Jul. 2011
  43. Towards Pattern-based Reliability Certification of Services
    Buckley, I., Fernandez, E., Anisetti, M., Ardagna, C. A., and Damiani, E.
    In Proc. of the 1st International Symposium on Secure Virtual Infrastructures (DOA-SVI 2011), Crete, Greece, Oct. 2011
  44. A Model-Based Approach to Reliability Certification of Services
    Ardagna, C. A., Damiani, E., Jhawar, R., and Piuri, V.
    In Proc. of the 6th IEEE International Conference on Digital Ecosystem Technologies - Complex Environment Engineering (DEST-CEE 2012), Campione d’Italia, Italy, Jun. 2012
  45. Scalability Patterns for Platform-as-a-Service
    Ardagna, C. A., Damiani, E., Frati, F., Rebeccani, D., and Ughetti, M.
    In Proc. of the 5th IEEE International Conference on Cloud Computing (CLOUD 2012), Honolulu, HI, USA, Jun. 2012
  46. A Low-Cost Security Certification Scheme for Evolving Services
    Anisetti, M., Ardagna, C. A., and Damiani, E.
    In Proc. of the 19th IEEE International Conference on Web Services (ICWS 2012), Honolulu, HI, USA, Jun. 2012
  47. Security Certification-Aware Service Discovery and Selection
    Anisetti, M., Ardagna, C. A., Damiani, E., and Maggesi, J.
    In Proc. of the 5th IEEE International Conference on Service-Oriented Computing and Applications (SOCA 2012), Taipei, Taiwan, Dec. 2012
  48. Protecting Privacy of User Information in Continuous Location-Based Services
    Ardagna, C. A., Livraga, G., and Samarati, P.
    In Proc. of the 15th IEEE International Conference on Computational Science and Engineering (CSE 2012), Paphos, Cyprus, Dec. 2012
  49. Early Assessment of Service Performance Based on Simulation
    Ardagna, C. A., Damiani, E., and Sagbo, K.A.R.
    In Proc. of the 10th IEEE International Conference on Services Computing (SCC 2013), San Francisco, CA, USA, Jun. 2013
  50. Security Certification of Composite Services: A Test-Based Approach
    Anisetti, M., Ardagna, C. A., and Damiani, E.
    In Proc. of the 20th IEEE International Conference on Web Services (ICWS 2013), San Francisco, CA, USA, Jun. 2013
  51. Preserving Smartphone Users’ Anonymity in Cloudy Days
    Ardagna, C. A., Conti, M., Leone, M., and Stefa, J.
    In Proc. of the Third International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2013), Nassau, Bahamas, Aug. 2013
  52. Machine-readable privacy certificates for services
    Anisetti, M., Ardagna, C. A., Bezzi, M., Damiani, E., and Sabetta, A.
    In Proc. of the International Conference on Secure Virtual Infrastructures (DOA-Trusted Cloud 2013), Graz, Austria, Sep. 2013
  53. Zero-Knowledge Evaluation of Service Performance Based on Simulation
    Ardagna, C. A., Damiani, E., Sagbo, K.A.R., and Frati, F.
    In Proc. of the 15th IEEE International Symposium on High Assurance Systems Engineering (HASE 2014), Miami, FL, USA, Jan. 2014
  54. On the Management of Cloud Non-Functional Properties: The Cloud Transparency Toolkit
    Ardagna, C. A., Asal, R., Damiani, E., and Vu, Q.H.
    In Proc. of the 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2014), Dubai, UAE, Mar. 2014
  55. e-Auctions for Multi-Cloud Service Provisioning
    Anisetti, M., Ardagna, C. A., Bonatti, P.A., Damiani, E., Faella, M., Galdi, C., and Sauro, L.
    In Proc. of the 11th IEEE International Conference on Services Computing (SCC 2014), Anchorage, AL, USA, Jun. 2014
  56. A Competitive Scalability Approach for Cloud Architectures
    Ardagna, C. A., Damiani, E., Frati, F., Montalbano, G., Rebeccani, D., and Ughetti, M.
    In Proc. of the 7th IEEE International Conference on Cloud Computing (CLOUD 2014), Anchorage, AL, USA, Jun. 2014
  57. A Certification-Based Trust Model for Autonomic Cloud Computing Systems
    Anisetti, M., Ardagna, C. A., and Damiani, E.
    In Proc. of the IEEE Conference on Cloud Autonomic Computing (CAC 2014), London, UK, Sep. 2014
  58. Network and Storage Latency Attacks to Online Trading Protocols in the Cloud
    Ardagna, C. A., and Damiani, E.
    In Proc. of the International Conference on Cloud Computing, Trusted Computing and Secure Virtual Infrastructures, Amantea, Italy, Oct. 2014
  59. Trustworthy Cloud Certification: A Model-Based Approach
    Anisetti, M., Ardagna, C. A., Damiani, E., and El Ioini, N.
    In Proc. of the 4th International Symposium (SIMPDA 2014), Milan, Italy, Nov. 2014
  60. A Hybrid Representation Model for Service Contracts
    Jaramillo, G.E., Anisetti, M., and Ardagna, C. A.
    In Proc. of the International Conference on Information and Communication Technology Research (ICTRC2015), Abu Dhabi, UAE, May. 2015
  61. A Test-Based Incremental Security Certification Scheme for Cloud-Based Systems
    Anisetti, M., Ardagna, C. A., and Damiani, E.
    In Proc. of the 12th IEEE International Conference on Services Computing (SCC 2015), New York, NY, USA, Jun. 2015
  62. Toward Security and Performance Certification of OpenStack
    Anisetti, M., Ardagna, C. A., Damiani, E., Gaudenzi, F., and Veca, R.
    In Proc. of the 8th IEEE International Conference on Cloud Computing (CLOUD 2015), New York, NY, USA, Jun. 2015
  63. A certification framework for cloud-based services
    Anisetti, M., Ardagna, C., Damiani, E., and F. Gaudenzi,
    In Proc. of the ACM Symposium on Applied Computing (SAC 2016), Pisa, Italy, Apr. 2016
  64. A Cost-Effective Certification-Based Service Composition for the Cloud
    Anisetti, M., Ardagna, C., Damiani, E., and Gaudenzi, F.
    In Proc. of the 12th IEEE International Conference on Services Computing (SCC 2016), Jun. 2016
  65. A Certification Technique for Cloud Security Adaptation
    Ardagna, C., Asal, R., Damiani, E., Ioini, N. El, Pahl, C., and Dimitrakos, T.
    In Proc. of the 12th IEEE International Conference on Services Computing (SCC 2016), San Francisco, CA, USA, Jun. 2016
  66. Big Data Analytics as-a-Service: Issues and challenges
    Ardagna, C. A., Ceravolo, P., and Damiani, E.
    In Proc. of the 3rd International Workshop on Privacy and Security of Big Data (PSBD 2016), Washington, VA, USA, Dec. 2016
  67. Scouting Big Data Campaigns using TOREADOR Labs
    Ardagna, C. A., Ceravolo, P., Damiani, E., and Leida, M.
    In Proc. of EURO Pro Workshop EDBT/ICDT 2017 Joint Conference, Venice, Italy, Mar. 2017
  68. What Are My Users Looking For When Preparing A Big Data Campaign
    Ardagna, C. A., Ceravolo, P., Damiani, E., Cota, G. Lena, and Kiani, M. Muneeb
    In Proc. of the 6th IEEE International Congress on Big Data (IEEE BigData Congress 2017), Honolulu, HI, USA, Jun. 2017
  69. A Security Benchmark For OpenStack
    Anisetti, M., Ardagna, C. A., Damiani, E., Gaudenzi, F., and Tufarolo, P.
    In Proc. of the 10th IEEE International Conference on Cloud Computing (IEEE CLOUD 2017), Honolulu, HI, USA, Jun. 2017
  70. A Model-Driven Methodology For Big Data Analytics-as-a-Service
    Ardagna, C. A., Bellandi, V., Bezzi, M., Ceravolo, P., Damiani, E., and Hebert, C.
    In Proc. of the 6th IEEE International Congress on Big Data (IEEE BigData Congress 2017), Honolulu, HI, USA, Jun. 2017
  71. Toward Model-Based Big Data-as-a-Service: The TOREADOR Approach
    Damiani, E., Ardagna, C. A., Ceravolo, P., and Scarabottolo, N.
    In Proc. of the 21st European Conference Advances in Databases and Information Systems (ADBIS 2017), Nicosia, Cyprus, Sep. 2017
  72. Big Data Assurance Evaluation: An SLA-based Approach
    Ardagna, C. A., Damiani, E., Krotsiani, M., Kloukinas, C., and Spanoudakis, G.
    In Proc. of the 14th IEEE International Conference on Services Computing (SCC 2018), San Francisco, CA, USA, Jul. 2018
  73. A Fast and Incremental Development Life Cycle for Data Analytics-as-a-Service
    Ardagna, C. A., Bellandi, V., Ceravolo, P., Damiani, E., Martino, B. Di, D’Angelo, S., and Esposito, A.
    In Proc. of the 7th IEEE International Congress on Big Data (BigData Congress 2018), San Francisco, CA, USA, Jul. 2018
  74. Semantic Support for model based Big Data Analytics-as-a-service (MBDAaaS)
    Redavid, D., Malerba, D., Martino, B. Di, Esposito, A., Ardagna, C. A., Bellandi, V., Ceravolo, P., and Damiani, E.
    In Proc. of the 12th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2018), Matsue, Japan, Jul. 2018
  75. A Knowledge-Based IoT Security Checker
    Anisetti, M., Asal, R., Ardagna, C. A., Comi, L., Damiani, E., and Gaudenzi, F.
    In Proc. of the 2nd Workshop on Fog-to-Cloud Distributed Processing (F2C-DP), Turin, Italy, Aug. 2018
  76. Moon Cloud: A Cloud Platform for ICT Security Governance
    Anisetti, M., Ardagna, C. A., Damiani, E., Gaudenzi, F., Tufarolo, P., and Diomede, N.
    In Proc. of the IEEE Global Communications Conference (GLOBECOM 2018), Abu Dhabi, UAE, Dec. 2018
  77. Trustworthy IoT: An Evidence Collection Approach based on Smart Contracts
    Ardagna, C. A., Asal, R., Damiani, E., El Ioini, N., and Pahl, C.
    In Proc. of the 15th IEEE International Conference on Services Computing (SCC 2019), Milan, Italy, Jul. 2019
  78. Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems
    Anisetti, Marco, Ardagna, Claudio, Bena, Nicola, and Damiani, Ernesto
    In Proc. of SECRYPT 2020, Lieusaint - Paris, France, Jul. 2020
  79. An Assurance Framework and Process for Hybrid Systems
    Anisetti, Marco, Ardagna, Claudio A., Bena, Nicola, and Damiani, Ernesto
    In E-Business and Telecommunications, 2021
  80. An Assurance-Based Risk Management Framework for Distributed Systems
    Anisetti, Marco, Ardagna, Claudio A., Bena, Nicola, and Foppiani, Andrea
    In Proc. of IEEE ICWS 2021, Chicago, IL, USA, Sep. 2021
  81. Towards an Assurance Framework for Edge and IoT Systems
    Anisetti, Marco, Ardagna, Claudio A., Bena, Nicola, and Bondaruc, Ruslan
    In Proc. of IEEE EDGE 2021, Guangzhou, China, Dec. 2021
  82. Bridging the Gap Between Certification and Software Development
    Ardagna, Claudio A., Bena, Nicola, and Pozuelo, Ramon Martín
    In Proc. of ARES 2022, Vienna, Austria, Aug. 2022

Other Publications

  1. Sicurezza e Web Service
    Damiani, E., Samarati, P., Ardagna, C. A., and Lupo Stanghellini, M.
    Sicurezza Digitale, Oct. 2003
  2. XrML - Un Linguaggio per la Gestione dei Diritti Digitali
    Ardagna, C. A., and De Capitani di Vimercati, S.
    Internet Pro, 2004
  3. Accessing Identity Data via EJB
    Ardagna, C. A., Damiani, E., Frati, F., and Raimondi, U.
    Object Database Management System Portal (ODBMS), 2005
  4. Toward Certification of Services
    Anisetti, M., Ardagna, C. A., and Damiani, E.
    In International Workshop on Business System Management and Engineering (BSME 2010), Malaga, Spain, Jun. 2010
  5. Privacy-Aware Languages
    Ardagna, C. A.
    In Encyclopedia of Cryptography and Security, van Tilborg, H.C. A. and Jajodia, S. (eds.), 2011
  6. Script Language Security
    Ardagna, C. A., and Damiani, E.
    In Encyclopedia of Cryptography and Security, van Tilborg, H.C. A. and Jajodia, S. (eds.), 2011
  7. Location information (privacy of)
    Ardagna, C. A.
    In Encyclopedia of Cryptography and Security, van Tilborg, H.C. A. and Jajodia, S. (eds.), 2011
  8. XML-based access control languages
    Ardagna, C. A.
    In Encyclopedia of Cryptography and Security, van Tilborg, H.C. A. and Jajodia, S. (eds.), 2011
  9. STS2Java: An Eclipse Plugin for Early Assessment of Service Performance Based on Simulation
    Ardagna, C. A., Damiani, E., and Sagbo, R.
    In Proc. of the VIII Workshop of the Italian Eclipse Community (Eclipse-IT 2013), Crema, Italy, Sep. 2013
  10. A Java-Based Certification Framework for Service Composition
    Anisetti, M., Ardagna, C. A., Damiani, E., and Giuba, F.
    In Proc. of the VIII Workshop of the Italian Eclipse Community (Eclipse-IT 2013), Crema, Italy, Sep. 2013
  11. XML-Based Access Control Languages
    Ardagna, Claudio A., and Bena, Nicola
    In Encyclopedia of Cryptography, Security and Privacy, Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (eds.), 2021
  12. Privacy-Aware Languages
    Ardagna, Claudio A., and Bena, Nicola
    In Encyclopedia of Cryptography, Security and Privacy, Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (eds.), 2021
  13. Location Information (Privacy of)
    Ardagna, Claudio A., and Bena, Nicola
    In Encyclopedia of Cryptography, Security and Privacy, Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (eds.), 2021