Name
Affiliation
Papers
MARCO CASASSA MONT
HP Laboratories, Bristol, United Kingdom
48
Collaborators
Citations 
PageRank 
51
289
33.03
Referers 
Referees 
References 
649
463
278
Search Limit
100649
Title
Citations
PageRank
Year
Towards safer information sharing in the cloud.40.472015
End-to-end policy based encryption techniques for multi-party data management40.392014
A toolkit for automating compliance in cloud computing services.50.452014
Semantic Generation of Clouds Privacy Policies.00.342014
A SWRL Bridge to XACML for Clouds Privacy Compliant Policies.20.372014
Security and Privacy Governance in Cloud Computing via SLAs and a Policy Orchestration Service.20.372012
ReasONets: a fuzzy-based approach for reasoning on network incidents00.342012
Automating Compliance for Cloud Computing Services.00.342012
End-to-End Policy-Based Encryption and Management of Data in the Cloud140.712011
Risk Assessment and Decision Support for Security Policies and Related Enterprise Operational Processes00.342011
Enhancing Accountability in the Cloud via Sticky Policies70.702011
Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography40.492011
Economic Methods and Decision Making by Security Professionals.00.342011
Assurance for federated identity management50.582010
A Conceptual Model For Privacy Policies With Consent And Revocation Requirements110.652010
Privacy Aware Access Controls for Medical Data Disclosure on European Healthgrids.00.342010
EnCoRe: Towards a Holistic Approach to Privacy.50.512010
Extending XACML access control architecture for allowing preference-based authorisation30.382010
Using security metrics coupled with predictive modeling and simulation to assess security processes50.622009
Ontology-Based Privacy Compliance on European Healthgrid Domains20.392009
Using Modelling and Simulation for Policy Decision Support in Identity Management50.592009
Modelling and Enforcing Privacy for Medical Data Disclosure across Europe.20.422009
Automatic Compliance of Privacy Policies in Federated Digital Identity Management40.452008
Securing Information Transfer in Distributed Computing Environments60.552008
On identity assurance in the presence of federated identity management systems20.592007
On device-based identity management in enterprises30.592007
Panel Discussion Managing Digital Identities --- Challenges and Opportunities00.342007
On Parametric Obligation Policies: Enabling Privacy-Aware Information Lifecycle Management in Enterprises221.112007
A systematic approach to privacy enforcement and policy compliance checking in enterprises50.582006
A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments30.632006
A systemic approach to automate privacy policy enforcement in enterprises151.692006
Towards scalable management of privacy obligations in enterprises70.882006
On Privacy-aware Information Lifecycle Management in Enterprises: Setting the Context20.402006
How ordinary internet users can have a chance to influence privacy policies10.382006
Provision of trusted identity management using trust credentials10.352006
Privacy enforcement for IT governance in enterprises: doing it for real20.522005
An adaptive privacy management system for data repositories100.822005
Handling Privacy Obligations In Enterprises: Important Aspects And Technical Approaches10.442005
Persistent and dynamic trust: analysis and the related impact of trusted platforms111.132005
Position paper: Rule Language Requirement for Privacy-Enabled Identity Management00.342005
Dealing with Privacy Obligations: Important Aspects and Technical Approaches282.842004
A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for Privacy in Health Care251.392003
The HP time vault service: exploiting IBE for timed release of confidential information241.902003
Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information00.342002
Reducing Risks of Widespread Faults and Attacks for Commercial Software Applications: Towards Diversity of Software Components10.382002
Negotiated Revealing of Traders' Credentials in e-Marketplaces: Dealing with Trust and Privacy Issues10.472002
A Distributed System, Adaptive to Trust Assessment, Based on Peer-to-Peer E-Records Replication and Storage10.562001
POWER prototype: towards integrated policy-based management343.272000