Publications:


Note. This page is outdated. Some of my recent publications are also listed at DBLP. My citations count according to Google is available here.

Journals

In Proceedings

  • CrowdSelect: Increasing Accuracy of Crowdsourcing Tasks through Behavior Prediction and User Selection C. Qiu, Anna Cinzia Squicciarini, B. Carminati, J. Caverlee, D. Khare. ACM CIKM 2016.
  • Uncovering the Spatio-Temporal Dynamics of Memes in the Presence of Incomplete Information J., N. Zhang, A. Squicciarini. ACM CIKM 2016: 1493-1502
  • Content-driven Detection of Cyberbullying on the Instagram Social Network. H. Zhong, H. Li, A. Squicciarini, S. Rajtmajer, C. Griffin, D. Miller and C. Caragea. 25th International Conference on Artificial Intelligence (IJCAI) 2016
  • Efficient Network Path Verification for Policy-routedQueries Sushama Karumanchi, Jingwei Li, Anna Cinzia Squicciarini. Sixth ACM Conference on Data and Application Security and Privacy (CODASPY), March 2016.
  • Constrained social-energy minimization for multi-party sharing in online social networks. S. Rajtmajer, C. Griffin, A. Squicciarini and S. Karumanchi. International Conference on Autonomous and Multiagent Systems (AAMAS), Singapore, May 2016.

    2015

  • Determining a discrete set of site-constrained privacy options for users in social networks through Stackelberg Games. S. Rajtmajer, C. Griffin and A. Squicciarini. Conference on Decision and Game Theory for Security (GAMESEC), London, November 2015.
  • Uncovering Crowdsourced Manipulation of Online Reviews. A. Fayzi, K. Lee, J. Caverlee, A. Squicciarini. ACM SIGIR, Spetember 2015.
  • Identification and characterization of cyberbullying dynamics in an online social network. A. Squicciarini, S. Rajtmajer, Y.Liu and C. Griffin. IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Paris, August 2015.
  • Towards Provenance-Based Anomaly Detection in MapReduce. C. Liao, A. Squicciarini. ACM CCGRID, May 2015.

    2014

  • Securing Resource Discovery in Content Hosting Networks S. Karumanchi, J. Li and A. Squicciarini. 10th International Conference on Security and Privacy in Communication Networks (SecureComm), September 2014.
  • Policy Driven Node Selection in MapReduce A. Squicciarini, D. Lin, S. Sundareswaran and J. Li 10th International Conference on Security and Privacy in Communication Networks (SecureComm), September 2014.
  • Analysing Images' Privacy for the Modern Web A. Squicciarini, C. Caragea, and R. Balakavi. In Proc. of 25th ACM Conference on Hypertext and Social Media (HT 2014). September 2014.
  • Identifying Multi-Regime Behaviors of Memes in Twitter Data. C. Griffin, A. Squicciarini and S. Styer. 8th Science and Information Conference (SAI). August 2014. BEST PAPER AWARD
  • pdf Toward Detecting Compromised MapReduce Workers through Log Analysis E. Yoon, A. Squicciarini. In Proc. of IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing (CCGrid). May 2014.
  • Site-Constrained Privacy Options for Users in Social Networks through Stackelberg Games. C. Griffin, A. Squicciarini, S. Rajtmajer, M. Tentilucci and S. Lin. In Proc. of Sixth ASE International Conference on Social Computing. May 2014.
  • pdf Mapping Moods: Geo-Mapped Sentiment Analysis During Hurricane Sandy C. Caragea, A. Squicciarini, S. Stehle, K. Neppalli, A. Tapia. 11th International Conference on Information Systems for Crisis Response and Management (ISCRAM). May 2014.(See Cornelia's project site)
  • pdf Online Abusive Users Analytics Through Visualization A. Squicciarini, J. Dupont, R. Chen. 23rd ACM International World Wide Web Conference. Demo Paper. April 2014. See a Demo of our project here
  • pdf Enabling Privacy-Preserving Image-Centric Social Discovery X. Yuan, X. Wang, C. Wang, A. Squicciarini, K. Ren. IEEE 34th International Conference on Distributed Computing Systems (ICDCS). April 2014.
  • pdf Situational Awareness through Reasoning on Network Incidents in Controlled Networks A. Squicciarini, G. Petracca, B. Horne and A. Nath Fourth ACM Conference on Data and Application Security and Privacy (CODASPY), March 2014.
  • pdf In The Wild: A Large Scale Study of Web Service Vulnerabilities S. Karumanchi and A. Squicciarini. 29 ACM Symposium on Applied Computing (SAC), March 2014.

    2013

  • Detecting Malicious Co-resident Virtual Machines Indulging in Load-Variation Attacks S. Sundareswaran, A. Squicciarini. 15th International Conference on Information & Communications Security (ICICS), November 2013.
  • WS-Rec: Web Services Recommendations using Heterogeneous Criteria. A. Squicciarini, B. Carminati and S. Karumanchi. 2013 IEEE International Conference on Information Reuse and Integration (IRI), August 2013.
  • Information-oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks. S. Gurung, D. Lin, A. Squicciarini, E. Bertino. The 7th International Conference on Network and System Security (NSS), June 2013.
  • Policy-Compliant Search Query Routing for Web Service Discovery in Peer to Peer Networks S. Karumanchi, A. C. Squicciarini, B. Carminati. IEEE 20th International Conference on Web Services (ICWS), July 2013.
  • pdf Adaptive Data Protection in Distributed Systems A. Squicciarini, G. Petracca, E. Bertino. Third ACM Conference on Data and Application Security and Privacy (CODASPY), February 2013.

    2012

  • Two Species Evolutionary Game Model of User and Moderator Dynamics. C. Griffin, D. Mercer, J. Fan and A. Squicciarini. ASE International Conference on Social Informatics, December 14 - 16, 2012. (A longer version will appear in the ASE Human Journal.)
  • Automatic Social Group Organization and Privacy Management. Anna C Squicciarini, D. Lin, S. Karumanchi, N. DeSisto. 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom) 2012, October 2012.
  • pdf ReasONets: A Fuzzy-based approach for Reasoning on Network Incidents G. Petracca, A. C. Squicciarini, W. Horne, M. Casassa-Mont. 19th ACM Computer and Communications Security (CCS). Demo paper. October 2012.
  • Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks. A. C. Squicciarini, S. Karumanchi, D. Lin. 6th International Conference on Network and System Security (NSS), November 2012
  • Location Privacy Policy Management System. A. Muhammed, D. Lin, A. Squicciarini. 14th International Conference on Information and Communications Security (ICICS), October 2012 [short paper]
  • An Informed Model of Personal Information Release in Social Networking Sites. A. C. Squicciarini, Christopher Griffin. Fourth IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), September 2012. BEST PAPER AWARD
  • A Brokerage-Based Approach for Cloud Service Selection. S Sundareswaran, A. C. Squicciarini, Dan Lin. 5th IEEE International Conference on Cloud Computing (CLOUD), June 2012.
  • XSS-Dec: a hybrid solution to mitigate Cross-Site Scripting attacks. S Sundareswaran, A. C. Squicciarini. 26th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec'12), July 2012.
  • Early Detection of Policies Violations in a Social Media Site: A Bayesian Belief Network Approach. A. C. Squicciarini, W. McGill, G. Petracca, S. Huang. International Symposium on Policies for Distributed Systems & Networks, July 2012.

    2011

  • Towards a Game Theoretical Model for Identity Validation in Social Network Sites. A. C. Squicciarini, C. Griffin, S Sundareswaran. Third IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), October 2011.
  • Privacy-preserving Service Selection in Business Oriented Web Service Composition. A. C. Squicciarini, Barbara Carminati, Sushama Karumanchi. IEEE International Conference on Web Services (ICWS), July 2011.
  • Promoting Distributed Accountability in the Cloud S Sundareswaran, A. C. Squicciarini, Dan Lin, Shuo Huang. 4th IEEE International Conference on Cloud Computing (CLOUD), July 2011.
  • PAIM: Peer-based Automobile Identity Management in Vehicular Ad-hoc Network. A. C. Squicciarini, Dan Lin, Alessandro Mancarella. 35th IEEE Annual International Computer Software and Applications Conference (COMPSAC), July 2011.
  • Distributed Java-Based Content Protection S Sundareswaran, A. C. Squicciarini, Ranjani Sundareswaran. 35th IEEE Annual International Computer Software and Applications Conference (COMPSAC), July 2011.
  • A3P: Adaptive Policy Prediction for Images in Content Sharing Sites. A. Squicciarini, S. Sundareswaran, D., J. Wede. 22nd ACM Conference on Hypertext and on Hypermedia (ACM HT), June 2011. TED NELSON NEWCOMER AWARD
  • Profile-Based Accountability Policies in Grid Computing Systems. W. Lee, A. Squicciarini, E. Bertino. IEEE International Symposium on Policies for Distributed Systems and Networks (Policy), June 2011. (Short paper)
  • Detection and Protection Against Distributed Denial of Services in Accountable Grid Systems. W. Lee, A. Squicciarini, E. Bertino. 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), May 2011.

    2010

  • DeCore: Detecting Content Repurposing Attacks on Clients' Systems S.Sundareswaran and A. Squicciarini. 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm), September 2010.
  • Image Repurposing for Gifar-Based Attacks S. Sundareswaran and A. C. Squicciarini. Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, July 2010.
  • Preventing Information Leakage from Indexing in the Cloud. A. Squicciarini, S. Sundareswaran, D. Lin. IEEE International Conference on Cloud Computing, July 2010.
  • Data Protection Models for Service Provisioning in the Cloud. D. Lin, A. Squicciarini. ACM symposium on access control models and technologies (SACMAT), June 2010.
  • Learning Based Access Control in Online Social Networks. M. Shehab, G. Cheek, H. Touati, A. Squicciarini, P.Cheng, WWW 2010: 19th International World Wide Web Conference, April, 2010. (Poster)
  • PriMa: An Effective Privacy Protection Mechanism for Social Networks. A. Squicciarini, F. Paci, S. Sundareswaran. 5th ACM Symposium on InformAtion, Computer and Communication Security (ASIACCS), April 2010.

    2009

  • Towards Automatic Privacy Management in Web 2.0 with Semantic Analysis on Annotations.
    N. Yvas, A. Squicciarini, Chih-Cheng Chang, D. Yao. CollaborateCom Conference, IEEE. November 2009.
  • Efficient XACML Policy Evaluation with a Statistics Based & Clustering Framework. S. Marouf, M. Shehab, A. Squicciarini, S. Sundareswaran. IEEE Symposium on Policy for Distributed Systems, IEEE. July 2009.
  • The Design and Evaluation of Accountable Grid Systems. W. Lee, A. Squicciarini, E. Bertino. IEEE International Conference on Computing and Distributed Systems (ICDCS). June 2009.
  • Collaborative Privacy Management for Social Networks. A. Squicciarini, M. Shehab, F. Paci. WWW2009: 19th International World Wide Web Conference, Madrid (Spain), April 2009.

    2008

  • Monitoring Virtual Organizations' Contract Enforcement . A. Squicciarini, F. Paci. CollaborateCom, Springer, November 2008.
  • End-to-End Accountability for Grid Computing Systems . A. Squicciarini, W. Lee, E. Bertino, C. Song. IEEE Asia-Pacific Services Computing Conference (IEEE APSCC 2008), December 2008.
  • Beyond User-to-User Access Control for Online Social Networks. M. Shehab, A. Squicciarini and G.-J. Ahn. 10th International Conference on Information and Computer Security (ICICS), Springer, October 2008.
  • Long Running Identity Based Negotiations. Squicciarini, A., Trombetta, M., E. Bertino, S., Braghin. 2008 ACM Digital Identity Management Workshop, October 2008.
  • Verification of Receipts from M-Commerce Transactions on NFC Cellular. Woo, J., Bhargav-Spantzel, A., Squicciarini, A., E. Bertino. 10th IEEE Conference on E-Commerce Technology (CEC' 08), July 2008.
  • Automatic Compliance Verification of Privacy Policies in Federated Digital Identity Management . A. Squicciarini, M. Casassa-Mont, E. Bertino, A. Bhargav-Spantzel. 2008 IEEE Workshop on Policies for Distributed Systems and Networks, June 2008.
  • A protection Mechanism for Query Flood Attacks. Squicciarini, A., Palocia, I., E. Bertino. International Conference on Data and Engineering (ICDE'08), April 2008
  • Privacy Requirements in Identity Management Solutions. . A. Bhargav-Spantzel, A. Squicciarini, M. Young, E. Bertino.
    Symposium on Human Interface 2007.

    Earlier work

  • K-anonymous attribute-based access control. . Squicciarini, A., Trombetta, A., Bharghav-Spantzel, A., Bertino, E. International Conference on Information and Computer Security (ICICS'07), ChinaPress, December 2007.
  • Auth-SL - A System for the Specification and Enforcement of Quality-based Authentication Policies .A. C. Squicciarini, A. Bhargav-Spantzel, A. Czeskis and E. Bertino. International Conference on Information Computer Security (ICICS), Springer, December, 2007.
  • Information carrying identity proof trees. W. Winsborough, A. C. Squicciarini, and E. Bertino. In Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, October 2007.
  • Robust and Secure Interactions in Open Distributed Systems through Recoverable Trust Negotiations . A. C. Squicciarini, A. Trombetta, and E. Bertino. International Conference on Distributed Computing Systems (ICDCS) , IEEE, June, 2007 .
  • A Privacy Preserving Assertion Based Policy Language for Federation Systems. A. C. Squicciarini, A. Azgin Hintoglu, E. Bertino, and Y. Saygin. ACM Symposium on Access Control Models and Technologies, ACM Press, June, 2007 .
  • Access Control Strategies for Virtualized Environments in Grid Computing Systems. A. C. Squicciarini, E. Bertino, and S. Goasguen. 11th IEEE International Workshop on Future Trends of Distributed Computing Systems. FTDCS '07. , IEEE, March, 2007 .
  • Privacy Preserving Multi-Factor Authentication With Biometrics. A. Bhargav-Spantzel, A. C. Squicciarini, and E. Bertino. Proceedings of Second Digital Identity Management workshop at CCS, November 1, 2006 (An extended version of this paper has been invited for publication in Journal of Computer Security).
  • pdf Trust negotiations with customizable anonymity . A. Bhargav-Spantzel, A. C. Squicciarini, E. Bertino, E. Ferrari, and I. Ray. First IEEE/WIC/ACM Web Intelligence/Intelligent Agent Technology Workshop on Web Privacy Intelligence (WPI'06), IEEE press , 18 December 2006.
  • Establishing and Protecting Digital Identity in Federation Systems. A. Bhargav, A. C. Squicciarini, and E. Bertino. First Digital Identity Management workshop at CCS, ACM Press, November 11, 2005 (An extended version of this paper has been published in Journal of Computer Security).
  • pdfTraceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management. A. C. Squicciarini, A. Bhargav, Alexei Czeskis, and E. Bertino. Proc. of 6th International Workshop on Privacy Enhancing Technologies (PET), June 2006.
  • pdfPolicy Languages for Digital Identity in Federation Systems. A. Bhargav, A. C. Squicciarini, and E. Bertino. Proceedings of 6th IEEE International Workshop on Policies for Distributed Systems and Networks Workshop, June, 2006 .
  • A Secure publishing protocol for Virtual Community Contracts. A. C. Squicciarini, E. Bertino, and F. Paci. Proceedings of Iadis International Conference Web Based Communities 2005, Algarve, 23-25 March 2005.
  • Anonymity Preserving Techniques in Trust Negotiations. A. C. Squicciarini, E. Bertino, E. Ferrari, and I. Ray. Proceedings of 5th International Workshop on Privacy Enhancing Technologies (PET), Dubrovnik, Croatia, May 30, 2005.
  • Privacy Preserving Trust Negotiations.E. Bertino, E. Ferrari, and A. C. Squicciarini.Proc. of 4th International Workshop on Privacy Enhancing Technologies (PET), May 2004.
  • A Framework for Contractual Resource Sharing in Coalitions. B. Sadighi Firozabadi, M. Sergot, A. C. Squicciarini, and E. Bertino. Proc. of 5th IEEE International Workshop on Policies for Distributed Systems and Networks, June 2004.
  • A Flexible Access Control Model for Web Services. E. Bertino, and A. C. Squicciarini.
    Proceedings of 6th International Conference on Flexible Query Answering Systems (FQAS), Lyon France, Lecture Notes in Artificial Intelligence, LNAI 3055, June 24-26 2004. Invited paper.
  • A fine-grained Access Control Model For Web Services. E. Bertino, A. C. Squicciarini, and D. Mevi.
    Proceedings of IEEE International Conference on Services Computing (SCC 2004) Conference, Shanghai (China), IEEE, September 15-18, 2004.
  • Trust Negotiation Systems. A. C. Squicciarini. Proceedings of ICDE-EDBT PhD Workshop, Boston, Lecture Notes in Computer Science, LNCS 3268, 29 March 2004.
  • X-TNL: an XML based Language for Trust Negotiations. E. Bertino, E. Ferrari, and A. C. Squicciarini. Proc. of 4th IEEE International Workshop on Policies for Distributed Systems and Networks Workshop, June 2003.
  • An XML framework for Controlled Sharing of Resources in Virtual Communities. E. Bertino, E. Ferrari, and A. C. Squicciarini. Proceedings of 17th IFIP 11.3 Working Conference on Data and Application Security, Aug 2003.
  • Trust-X: an XML framework for trust negotiations. E. Bertino, E. Ferrari, and A. C. Squicciarini. Proc. of 7th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, 2003.

Books

Others