Name
Affiliation
Papers
ALBERTO TROMBETTA
Università degli Studi dell'Insubria, Varese, Italy
56
Collaborators
Citations 
PageRank 
51
575
43.92
Referers 
Referees 
References 
1322
958
595
Search Limit
1001000
Title
Citations
PageRank
Year
An ontology-based framework for a Less Invasive Domestic Management System (LIDoMS)00.342020
Secure Selections on Encrypted Multi-writer Streams00.342019
An Event-Driven Integrative Framework Enabling Information Notification Among Manufacturing Resources10.352019
Strengthening the Cybersecurity of Manufacturing Companies: A Semantic Approach Compliant with the NIST Framework.00.342018
Semantic based events signaling for AAL systems.50.412018
Secure Queries on Encrypted Multi-writer Tables00.342017
Secure and Efficient Data Sharing with Atribute-based Proxy Re-encryption Scheme00.342017
Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption.00.342014
Multidimensional Reputation Network for Service Composition in the Internet of Things10.352014
Answering queries using pairings.00.342014
A Framework for Trust-Based Multidisciplinary Team Recommendation.10.382013
Querying data across different legal domains00.342013
Identity-based security systems for vehicular ad-hoc networks30.392013
Distributed access control policies for spectrum sharing.10.352013
Data Quality Evaluation of Scientific Datasets - A Case Study in a Policy Support Context.10.352013
A Method and Guidelines for the Cooperation of Ontologies and Relational Databases in Semantic Web Applications.10.362012
BPMN: An introduction to the standard1154.482012
A Flexible Approach to Multisession Trust Negotiations30.432012
A rule-based policy language for selective trust propagation in social networks00.342011
Privacy-Preserving Updates to Anonymous and Confidential Databases20.392011
Adaptive and Distributed Access Control in Cognitive Radio Networks50.692010
State-Based firewall for industrial protocols with critical-state prediction monitor00.342010
Distributed Intrusion Detection System For Scada Protocols20.592010
Modbus/DNP3 State-Based Intrusion Detection System452.702010
Advanced Trust Negotiations In Critical Infrastructures30.432010
Combining access control and trust negotiations in an On-line Social Network.30.462010
Integrating Privacy Policies into Business Processes.10.392009
Modeling and Validating BPMN Diagrams10.372009
State-based network intrusion detection systems for SCADA protocols: a proof of concept211.492009
Design And Implementation Of A Secure Modbus Protocol211.702009
An experimental investigation of malware attacks on SCADA systems.291.992009
Privately Updating Suppression and Generalization based k-Anonymous Databases00.342008
Scada Malware, a Proof of Concept131.662008
Identity-based long running negotiations50.512008
Building a Domain Ontology from Glossaries: A General Methodology30.492008
Introducing privacy in a hospital information system50.452008
Privacy-aware role based access control1224.512007
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations100.702007
Private Updates to Anonymous Databases50.742006
Equivalences and optimizations in an expressive XSLT subset10.362006
A framework for modeling and evaluating automatic semantic reconciliation702.712005
Short-Term Content Adaptation in Web-based Learning Systems10.382005
Representation and management of ontologies in cultural heritage domain10.362005
A model for short-term content adaptation10.372005
Equivalences and optimizations in an expressive XSLT fragment40.512004
Evaluating Matching Algorithms: the Monotonicity Principle110.932003
A similarity based relational algebra for Web and multimedia data80.552003
A Model for Schema Integration in Heterogeneous Databases50.512003
Imprecision Based Queries Over Materialized and Virtual Integrated Views00.342003
Workflow Architecture for Interactive Video Management Systems10.362002
  • 1
  • 2