The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Claudio Bettini: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiaoyang Sean Wang, Claudio Bettini, Alexander Brodsky, Sushil Jajodia
    Logical Design for Temporal Databases with Multiple Granularities. [Citation Graph (6, 8)][DBLP]
    ACM Trans. Database Syst., 1997, v:22, n:2, pp:115-170 [Journal]
  2. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    A General Framework for Time Granularity and Its Application to Temporal Reasoning. [Citation Graph (4, 0)][DBLP]
    Ann. Math. Artif. Intell., 1998, v:22, n:1-2, pp:29-58 [Journal]
  3. Claudio Bettini, Xiaoyang Sean Wang, Elisa Bertino, Sushil Jajodia
    Semantic Assumptions and Query Evaluation in Temporal Databases. [Citation Graph (3, 13)][DBLP]
    SIGMOD Conference, 1995, pp:257-268 [Conf]
  4. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
    A Temporal Access Control Mechanism for Database Systems. [Citation Graph (3, 10)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:67-80 [Journal]
  5. Elisa Bertino, Claudio Bettini, Pierangela Samarati
    A Temporal Authorization Model. [Citation Graph (2, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:126-135 [Conf]
  6. Claudio Bettini, Curtis E. Dyreson, William S. Evans, Richard T. Snodgrass, Xiaoyang Sean Wang
    A Glossary of Time Granularity Concepts. [Citation Graph (2, 0)][DBLP]
    Temporal Databases, Dagstuhl, 1997, pp:406-413 [Conf]
  7. Claudio Bettini
    A Family of Temporal Terminological Logics. [Citation Graph (1, 0)][DBLP]
    AI*IA, 1993, pp:120-131 [Conf]
  8. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Testing Complex Temporal Relationships Involving Multiple Granularities and Its Application to Data Mining. [Citation Graph (1, 7)][DBLP]
    PODS, 1996, pp:68-78 [Conf]
  9. Elena Ferrari, Elisa Bertino, Claudio Bettini, Alberto Motta, Pierangela Samarati
    On Using Materialization Strategies for a Temporal Authorization Model. [Citation Graph (1, 0)][DBLP]
    VIEWS, 1996, pp:34-42 [Conf]
  10. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
    Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control. [Citation Graph (1, 6)][DBLP]
    VLDB, 1996, pp:472-483 [Conf]
  11. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Mining Temporal Relationships with Multiple Granularities in Time Sequences. [Citation Graph (1, 7)][DBLP]
    IEEE Data Eng. Bull., 1998, v:21, n:1, pp:32-38 [Journal]
  12. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
    Decentralized Administration for a Temporal Access Control Model. [Citation Graph (1, 0)][DBLP]
    Inf. Syst., 1997, v:22, n:4, pp:223-248 [Journal]
  13. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Temporal Semantic Assumptions and Their Use in Databases. [Citation Graph (1, 21)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1998, v:10, n:2, pp:277-296 [Journal]
  14. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia, Jia-Ling Lin
    Discovering Frequent Event Patterns with Multiple Granularities in Time Sequences. [Citation Graph (1, 14)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1998, v:10, n:2, pp:222-237 [Journal]
  15. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
    An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. [Citation Graph (1, 18)][DBLP]
    ACM Trans. Database Syst., 1998, v:23, n:3, pp:231-285 [Journal]
  16. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Satisfiability of Quantitative Temporal Constraints with Multiple Granularities. [Citation Graph (0, 0)][DBLP]
    CP, 1997, pp:435-449 [Conf]
  17. Claudio Bettini, Sergio Mascetti, Vincenzo Pupillo
    A System Prototype for Solving Multi-granularity Temporal CSP. [Citation Graph (0, 0)][DBLP]
    CSCLP, 2004, pp:142-156 [Conf]
  18. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    An Architecture for Supporting Interoperability among Temporal Databases. [Citation Graph (0, 0)][DBLP]
    Temporal Databases, Dagstuhl, 1997, pp:36-55 [Conf]
  19. Claudio Bettini, Simone Ruffini
    Deriving Abstract Views of Multi-granularity Temporal Constraint Networks. [Citation Graph (0, 0)][DBLP]
    DEXA, 2002, pp:454-463 [Conf]
  20. Claudio Bettini
    A Formalization of Interval-Based Temporal Subsumption in First Order Logic. [Citation Graph (0, 0)][DBLP]
    ECAI Workshop on Knowledge Representation and Reasoning, 1992, pp:53-73 [Conf]
  21. Claudio Bettini, Nicolò Cesa-Bianchi, Daniele Riboni
    A Distributed Architecture for Management and Retrieval of Extended Points of Interest. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:266-272 [Conf]
  22. Alessandra Agostini, Claudio Bettini, Nicolò Cesa-Bianchi, Dario Maggiorini, Daniele Riboni, Michele Ruberl, Cristiano Sala, Davide Vitali
    Towards Highly Adaptive Services for Mobile Computing. [Citation Graph (0, 0)][DBLP]
    MOBIS, 2004, pp:121-134 [Conf]
  23. Claudio Bettini, Sergio Mascetti, Vincenzo Pupillo
    GSTP: A Temporal Reasoning System Supporting Multi-Granularity Temporal Constraints. [Citation Graph (0, 0)][DBLP]
    IJCAI, 2003, pp:1633-1634 [Conf]
  24. Alessandra Agostini, Claudio Bettini, Daniele Riboni
    Demo: ontology-based context-aware delivery of extended points of interest. [Citation Graph (0, 0)][DBLP]
    Mobile Data Management, 2005, pp:322-323 [Conf]
  25. Alessandra Agostini, Claudio Bettini, Daniele Riboni
    Loosely Coupling Ontological Reasoning with an Efficient Middleware for Context-awareness. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2005, pp:175-182 [Conf]
  26. Claudio Bettini, Daniele Riboni
    Profile Aggregation and Policy Evaluation for Adaptive Internet Services. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2004, pp:290-298 [Conf]
  27. Alessandra Agostini, Claudio Bettini, Daniele Riboni
    Experience Report: Ontological Reasoning for Context-aware Internet Services. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2006, pp:8-12 [Conf]
  28. Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera
    Obligation Monitoring in Policy Management. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:2-12 [Conf]
  29. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Identifying Sensitive Associations in Databases for Release Control. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:187-201 [Conf]
  30. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Protecting Privacy Against Location-Based Personal Identification. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:185-199 [Conf]
  31. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Minimizing Agent Synchronization in Workflow Systems with Temporal Constraints. [Citation Graph (0, 0)][DBLP]
    SEBD, 2001, pp:339-346 [Conf]
  32. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
    A decentralized temporal autoritzation model. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:271-280 [Conf]
  33. Claudio Bettini
    Web services for time granularity reasoning. [Citation Graph (0, 0)][DBLP]
    TIME, 2003, pp:2-4 [Conf]
  34. Claudio Bettini, Sergio Mascetti
    An Efficient Algorithm for Minimizing Time Granularity Periodical Representations. [Citation Graph (0, 0)][DBLP]
    TIME, 2005, pp:20-25 [Conf]
  35. Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang
    Mapping Calendar Expressions into Periodical Granularities. [Citation Graph (0, 0)][DBLP]
    TIME, 2004, pp:96-102 [Conf]
  36. Claudio Bettini, Roberto De Sibi
    Symbolic Representation of User-Defined Time Granularities. [Citation Graph (0, 0)][DBLP]
    TIME, 1999, pp:17-28 [Conf]
  37. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Free Schedules for Free Agents in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    TIME, 2000, pp:31-38 [Conf]
  38. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    A General Framework and Reasoning Model for Time Granularity. [Citation Graph (0, 0)][DBLP]
    TIME, 1996, pp:104-111 [Conf]
  39. Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    k-Anonymity in Databases with Timestamped Data. [Citation Graph (0, 0)][DBLP]
    TIME, 2006, pp:177-186 [Conf]
  40. Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera
    Provisions and Obligations in Policy Management and Security Applications. [Citation Graph (0, 0)][DBLP]
    VLDB, 2002, pp:502-513 [Conf]
  41. Claudio Bettini
    Semantic Compression of Temporal Data. [Citation Graph (0, 0)][DBLP]
    WAIM, 2001, pp:267-278 [Conf]
  42. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Solving multi-granularity temporal constraint networks. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 2002, v:140, n:1/2, pp:107-152 [Journal]
  43. Yves Lespérance, Gerd Wagner, William P. Birmingham, Kurt D. Bollacker, Alexander Nareyek, J. Paul Walser, David W. Aha, Timothy W. Finin, Benjamin N. Grosof, Nathalie Japkowicz, Robert Holte, Lise Getoor, Carla P. Gomes, Holger H. Hoos, Alan C. Schultz, Miroslav Kubat, Tom M. Mitchell, Jörg Denzinger, Yolanda Gil, Karen L. Myers, Claudio Bettini, Angelo Montanari
    AAAI 2000 Workshop Reports. [Citation Graph (0, 0)][DBLP]
    AI Magazine, 2001, v:22, n:1, pp:127-136 [Journal]
  44. Claudio Bettini, Roberto De Sibi
    Symbolic representation of user-defined time granularities. [Citation Graph (0, 0)][DBLP]
    Ann. Math. Artif. Intell., 2000, v:30, n:1-4, pp:53-92 [Journal]
  45. Claudio Bettini, Angelo Montanari
    Research Issues and Trends in Spatial and Temporal Granularities. [Citation Graph (0, 0)][DBLP]
    Ann. Math. Artif. Intell., 2002, v:36, n:1-2, pp:1-4 [Journal]
  46. Claudio Bettini
    Time-Dependent Concepts: Representation and Reasoning Using Temporal Description Logics. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1997, v:22, n:1, pp:1-38 [Journal]
  47. Claudio Bettini, Angelo Montanari
    Temporal representation and reasoning. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2003, v:44, n:2, pp:139-141 [Journal]
  48. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Temporal Reasoning in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2002, v:11, n:3, pp:269-306 [Journal]
  49. Claudio Bettini
    Review - Time Constraints in Workflow Systems. [Citation Graph (0, 4)][DBLP]
    ACM SIGMOD Digital Review, 2000, v:2, n:, pp:- [Journal]
  50. Claudio Bettini
    Review - Temporal Entity-Relationship Models - A Survey. [Citation Graph (0, 2)][DBLP]
    ACM SIGMOD Digital Review, 2000, v:2, n:, pp:- [Journal]
  51. Claudio Bettini
    Review - On Modeling and Verification of Temporal Constraints in Production Workflows. [Citation Graph (0, 4)][DBLP]
    ACM SIGMOD Digital Review, 2000, v:2, n:, pp:- [Journal]
  52. Claudio Bettini
    Review - Temporal Logic in Information Systems. [Citation Graph (0, 5)][DBLP]
    ACM SIGMOD Digital Review, 2000, v:2, n:, pp:- [Journal]
  53. Claudio Bettini
    Review - Temporal Entity-Relationship Models - A Survey. [Citation Graph (0, 2)][DBLP]
    ACM SIGMOD Digital Review, 1999, v:1, n:, pp:- [Journal]
  54. Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera
    Provisions and Obligations in Policy Rule Management. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2003, v:11, n:3, pp:- [Journal]
  55. Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera
    Reasoning with advanced policy rules and its application to access control. [Citation Graph (0, 0)][DBLP]
    Int. J. on Digital Libraries, 2004, v:4, n:3, pp:156-170 [Journal]
  56. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Information Release Control: A Learning-Based Architecture. [Citation Graph (0, 0)][DBLP]
    J. Data Semantics, 2005, v:2, n:, pp:176-198 [Journal]
  57. Claudio Bettini, Simone Ruffini
    Direct Granularity Conversions among Temporal Constraints. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2003, v:9, n:9, pp:1123-1136 [Journal]
  58. Linda Pareschi, Claudio Bettini
    Beyond Anonymity in Location Based Services. [Citation Graph (0, 0)][DBLP]
    SEBD, 2007, pp:447-454 [Conf]
  59. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    The Role of Quasi-identifiers in k-Anonymity Revisited [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  60. Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang
    Supporting Temporal Reasoning by Mapping Calendar Expressions to Minimal Periodic Sets. [Citation Graph (0, 0)][DBLP]
    J. Artif. Intell. Res. (JAIR), 2007, v:28, n:, pp:299-348 [Journal]

  61. On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques. [Citation Graph (, )][DBLP]


  62. Privacy in Georeferenced Context-aware Services: A Survey. [Citation Graph (, )][DBLP]


  63. Anonymity and Historical-Anonymity in Location-Based Services. [Citation Graph (, )][DBLP]


  64. Privacy in Georeferenced Context-Aware Services: A Survey. [Citation Graph (, )][DBLP]


  65. Anonymity in Location-Based Services: Towards a General Framework. [Citation Graph (, )][DBLP]


  66. A Comparison of Spatial Generalization Algorithms for LBS Privacy Preservation. [Citation Graph (, )][DBLP]


  67. ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS. [Citation Graph (, )][DBLP]


  68. Pcube: A System to Evaluate and Test Privacy-Preserving Proximity Services. [Citation Graph (, )][DBLP]


  69. Privacy-Aware Proximity Based Services. [Citation Graph (, )][DBLP]


  70. A Performance Evaluation of Ontology-Based Context Reasoning. [Citation Graph (, )][DBLP]


  71. Anonymity and Diversity in LBS: A Preliminary Investigation. [Citation Graph (, )][DBLP]


  72. Composition and Generalization of Context Data for Privacy Preservation. [Citation Graph (, )][DBLP]


  73. Protecting Users' Anonymity in Pervasive Computing Environments. [Citation Graph (, )][DBLP]


  74. IEEE PerCom 2010 PhD Forum: Message from the PhD Forum chair. [Citation Graph (, )][DBLP]


  75. Towards the adaptive integration of multiple context reasoners in pervasive computing environments. [Citation Graph (, )][DBLP]


  76. How Anonymous Is k-Anonymous? Look at Your Quasi-ID. [Citation Graph (, )][DBLP]


  77. Longitude: Centralized Privacy-Preserving Computation of Users' Proximity. [Citation Graph (, )][DBLP]


  78. Hide & Crypt: Protecting Privacy in Proximity-Based Services. [Citation Graph (, )][DBLP]


  79. Cor-Split: Defending Privacy in Data Re-publication from Historical Correlations and Compromised Tuples. [Citation Graph (, )][DBLP]


  80. Preserving Anonymity of Recurrent Location-Based Queries. [Citation Graph (, )][DBLP]


  81. Context-Aware Activity Recognition through a Combination of Ontological and Statistical Reasoning. [Citation Graph (, )][DBLP]


  82. Context-aware Web Services for Distributed Retrieval of Points of Interest. [Citation Graph (, )][DBLP]


  83. Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002