default search action
Marco Casassa Mont
Person information
- affiliation: Hewlett Packard Enterprise Labs, Bristol, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i1]Alec Wilson, Ryan Menzies, Neela Morarji, David Foster, Marco Casassa Mont, Esin Turkbeyler, Lisa Gralewski:
Multi-Agent Reinforcement Learning for Maritime Operational Technology Cyber Security. CoRR abs/2401.10149 (2024) - 2023
- [c50]Alec Wilson, Ryan Menzies, Neela Morarji, David Foster, Marco Casassa Mont, Esin Turkbeyler, Lisa Gralewski:
Multi-Agent Reinforcement Learning for Maritime Operational Technology Cyber Security. CAMLIS 2023: 36-48 - 2022
- [j11]Sabri Barbaria, Marco Casassa Mont, Essam Ghadafi, Halima Mahjoubi Machraoui, Hanene Boussi Rahmouni:
Leveraging Patient Information Sharing Using Blockchain-Based Distributed Networks. IEEE Access 10: 106334-106351 (2022) - 2021
- [j10]Hanene Boussi Rahmouni, Kamran Munir, Intidhar Essefi, Marco Casassa Mont, Tony Solomonides:
An ontology-based compliance audit framework for medical data sharing across europe. Int. Arab J. Inf. Technol. 18(2): 158-169 (2021)
2010 – 2019
- 2017
- [p4]Hamza Attak, Marco Casassa Mont, Cristian Dávila, Eleni-Constantina Davri, Carolina Fernandez, Georgios Gardikis, Bernat Gastón, Ludovic Jacquin, Antonio Lioy, Antonis Litke, Nikolaos K. Papadakis, Dimitris Papadopoulos, Jerónimo Núñez, Eleni Trouva:
SHIELD: Securing Against Intruders and Other Threats Through an NFV-Enabled Environment. Guide to Security in SDN and NFV 2017: 197-225 - 2015
- [j9]Marco Casassa Mont, Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio:
Towards safer information sharing in the cloud. Int. J. Inf. Sec. 14(4): 319-334 (2015) - 2014
- [j8]Michael Beiter, Marco Casassa Mont, Liqun Chen, Siani Pearson:
End-to-end policy based encryption techniques for multi-party data management. Comput. Stand. Interfaces 36(4): 689-703 (2014) - [j7]Nick Papanikolaou, Siani Pearson, Marco Casassa Mont, Ryan K. L. Ko:
A toolkit for automating compliance in cloud computing services. Int. J. Cloud Comput. 3(1): 45-68 (2014) - [c49]Hanene Boussi Rahmouni, Kamran Munir, Marco Casassa Mont, Tony Solomonides:
Semantic Generation of Clouds Privacy Policies. CLOSER (Selected Papers) 2014: 15-30 - [c48]Hanene Boussi Rahmouni, Marco Casassa Mont, Kamran Munir, Tony Solomonides:
A SWRL Bridge to XACML for Clouds Privacy Compliant Policies. CLOSER 2014: 27-37 - 2012
- [c47]Giuseppe Petracca, Anna Cinzia Squicciarini, William G. Horne, Marco Casassa Mont:
ReasONets: a fuzzy-based approach for reasoning on network incidents. CCS 2012: 1010-1012 - [c46]Nick Papanikolaou, Siani Pearson, Marco Casassa Mont, Ryan K. L. Ko:
Automating Compliance for Cloud Computing Services. CLOSER 2012: 631-637 - [c45]Marco Casassa Mont, Kieran McCorry, Nick Papanikolaou, Siani Pearson:
Security and Privacy Governance in Cloud Computing via SLAs and a Policy Orchestration Service. CLOSER 2012: 670-674 - 2011
- [j6]Anna Cinzia Squicciarini, S. D. Rajasekaran, Marco Casassa Mont:
Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks. Computer 44(1): 66-73 (2011) - [j5]Siani Pearson, Marco Casassa Mont:
Sticky Policies: An Approach for Managing Privacy across Multiple Parties. Computer 44(9): 60-68 (2011) - [c44]Siani Pearson, Marco Casassa Mont, Liqun Chen, Archie Reed:
End-to-End Policy-Based Encryption and Management of Data in the Cloud. CloudCom 2011: 764-771 - [c43]Marco Casassa Mont, Richard Brown:
Risk Assessment and Decision Support for Security Policies and Related Enterprise Operational Processes. POLICY 2011: 137-140 - [c42]Siani Pearson, Marco Casassa Mont, Gina Kounga:
Enhancing Accountability in the Cloud via Sticky Policies. STA Workshops 2011: 146-155 - [c41]Nick Papanikolaou, Siani Pearson, Marco Casassa Mont:
Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography. STA Workshops 2011: 166-173 - [c40]Adrian Baldwin, Yolanta Beres, Geoffrey B. Duggan, Marco Casassa Mont, Hilary Johnson, Chris Middup, Simon Shiu:
Economic Methods and Decision Making by Security Professionals. WEIS (Springer Volume) 2011: 213-238 - [c39]Simon Shiu, Adrian Baldwin, Yolanta Beres, Marco Casassa Mont, Geoff Duggan:
Economic Methods and Decision Making by Security Professionals. WEIS 2011 - [p3]Marco Casassa Mont:
Privacy Models and Languages: Obligation Policies. Digital Privacy - PRIME 2011: 331-361 - [p2]Marco Casassa Mont:
Privacy-Aware Identity Lifecycle Management. Digital Privacy - PRIME 2011: 397-426 - [p1]Simone Fischer-Hübner, John Sören Pettersson, Mike Bergmann, Marit Hansen, Siani Pearson, Marco Casassa Mont:
Human-Computer Interaction. Digital Privacy - PRIME 2011: 569-595 - 2010
- [j4]Adrian Baldwin, Marco Casassa Mont, Yolanta Beres, Simon Shiu:
Assurance for federated identity management. J. Comput. Secur. 18(4): 541-572 (2010) - [c38]Hanene Boussi Rahmouni, Tony Solomonides, Marco Casassa Mont, Simon Shiu:
Privacy Aware Access Controls for Medical Data Disclosure on European Healthgrids. HealthGrid 2010: 14-27 - [c37]Marco Casassa Mont, Siani Pearson, Sadie Creese, Michael Goldsmith, Nick Papanikolaou:
A Conceptual Model for Privacy Policies with Consent and Revocation Requirements. PrimeLife 2010: 258-270 - [c36]Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson:
EnCoRe: Towards a Holistic Approach to Privacy. SECRYPT 2010: 171-176 - [c35]Gina Kounga, Marco Casassa Mont, Pete Bramhall:
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation. TrustBus 2010: 153-164
2000 – 2009
- 2009
- [c34]Hanene Boussi Rahmouni, Tony Solomonides, Marco Casassa Mont, Simon Shiu:
Privacy compliance in european healthgrid domains: An ontology-based approach. CBMS 2009: 1-8 - [c33]Yolanta Beres, Marco Casassa Mont, Jonathan Griffin, Simon Shiu:
Using security metrics coupled with predictive modeling and simulation to assess security processes. ESEM 2009: 564-573 - [c32]Hanene Boussi Rahmouni, Tony Solomonides, Marco Casassa Mont, Simon Shiu:
Ontology-Based Privacy Compliance on European Healthgrid Domains. HealthGrid 2009: 183-189 - [c31]Hanene Boussi Rahmouni, Tony Solomonides, Marco Casassa Mont, Simon Shiu:
Modelling and Enforcing Privacy for Medical Data Disclosure across Europe. MIE 2009: 695-699 - [c30]Adrian Baldwin, Marco Casassa Mont, Simon Shiu:
Using Modelling and Simulation for Policy Decision Support in Identity Management. POLICY 2009: 17-24 - 2008
- [j3]Siani Pearson, Marco Casassa Mont, Manny Novoa:
Securing Information Transfer in Distributed Computing Environments. IEEE Secur. Priv. 6(1): 34-42 (2008) - [j2]Marco Casassa Mont, Robert Thyne:
Privacy policy enforcement in enterprises with identity management solutions. J. Comput. Secur. 16(2): 133-163 (2008) - [c29]Anna Cinzia Squicciarini, Marco Casassa Mont, Abhilasha Bhargav-Spantzel, Elisa Bertino:
Automatic Compliance of Privacy Policies in Federated Digital Identity Management. POLICY 2008: 89-92 - 2007
- [c28]Yolanta Beres, Adrian Baldwin, Marco Casassa Mont, Simon Shiu:
On identity assurance in the presence of federated identity management systems. Digital Identity Management 2007: 27-35 - [c27]Marco Casassa Mont, Filipe Beato:
On Parametric Obligation Policies: Enabling Privacy-Aware Information Lifecycle Management in Enterprises. POLICY 2007: 51-55 - [c26]Günther Pernul, Marco Casassa Mont, Eduardo B. Fernández, Sokratis K. Katsikas, Alfred Kobsa, Rolf Oppliger:
Panel Discussion: Managing Digital Identities - Challenges and Opportunities. TrustBus 2007: 2 - [c25]Marco Casassa Mont, Boris Balacheff:
On Device-Based Identity Management in Enterprises. TrustBus 2007: 94-103 - 2006
- [c24]Marco Casassa Mont:
On Privacy-aware Information Lifecycle Management in Enterprises: Setting the Context. ISSE 2006: 405-414 - [c23]Siani Pearson, Marco Casassa Mont:
Provision of Trusted Identity Management Using Trust Credentials. iTrust 2006: 267-282 - [c22]John Sören Pettersson, Simone Fischer-Hübner, Marco Casassa Mont, Siani Pearson:
How ordinary internet users can have a chance to influence privacy policies. NordiCHI 2006: 473-476 - [c21]Marco Casassa Mont, Robert Thyne:
A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. Privacy Enhancing Technologies 2006: 118-134 - [c20]Marco Casassa Mont, Robert Thyne:
Privacy policy enforcement in enterprises with identity management solutions. PST 2006: 25 - [c19]Siani Pearson, Marco Casassa Mont:
A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments. SEC 2006: 471-482 - [c18]Stephen Crane, Marco Casassa Mont:
A Customizable Reputation-based Privacy Assurance System using Active Feedback. SecureComm 2006: 1-8 - [c17]Marco Casassa Mont:
Towards Scalable Management of Privacy Obligations in Enterprises. TrustBus 2006: 1-10 - [c16]Marco Casassa Mont, Siani Pearson, Robert Thyne:
A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises. TrustBus 2006: 91-102 - 2005
- [j1]Marco Casassa Mont:
Handling privacy obligations in enterprises: important aspects and technical approaches. Comput. Syst. Sci. Eng. 20(6) (2005) - [c15]Siani Pearson, Marco Casassa Mont, Stephen Crane:
Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms. iTrust 2005: 355-363 - [c14]Marco Casassa Mont, Robert Thyne, Pete Bramhall:
Privacy Enforcement for IT Governance in Enterprises: Doing It for Real. TrustBus 2005: 226-235 - [c13]Marco Casassa Mont, Siani Pearson:
An Adaptive Privacy Management System for Data Repositories. TrustBus 2005: 236-245 - [c12]Thomas Roessler, Giles Hogben, Marco Casassa Mont, Siani Pearson:
Position paper: Rule Language Requirement for Privacy-Enabled Identity Management. Rule Languages for Interoperability 2005 - 2004
- [c11]Marco Casassa Mont:
Dealing with Privacy Obligations in Enterprises. ISSE 2004: 198-208 - [c10]Marco Casassa Mont:
Dealing with Privacy Obligations: Important Aspects and Technical Approaches. TrustBus 2004: 120-131 - 2003
- [c9]Marco Casassa Mont, Siani Pearson, Pete Bramhall:
Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. DEXA Workshops 2003: 377-382 - [c8]Marco Casassa Mont, Pete Bramhall, Keith Harrison:
A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for Privacy in Health Care. DEXA Workshops 2003: 432-437 - [c7]Marco Casassa Mont, Siani Pearson, Pete Bramhall:
Towards Accountable Management of Privacy and Identity Information. ESORICS 2003: 146-161 - [c6]Marco Casassa Mont, Keith Harrison, Martin Sadler:
The HP time vault service: exploiting IBE for timed release of confidential information. WWW 2003: 160-169 - 2002
- [c5]Marco Casassa Mont, Adrian Baldwin, Yolanta Beres, Keith Harrison, Martin Sadler, Simon Shiu:
Reducing Risks of Widespread Faults and Attacks for Commercial Software Applications: Towards Diversity of Software Components. COMPSAC 2002: 271-278 - [c4]Adrian Baldwin, Simon Shiu, Marco Casassa Mont:
Trust Services: A Framework for Service-Based Solutions. COMPSAC 2002: 507-513 - [c3]Marco Casassa Mont, Richard Brown:
Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information. InfraSec 2002: 59-72 - [c2]Marco Casassa Mont, Michael Yearworth:
Negotiated Revealing of Traders? Credentials in e-Marketplaces: Dealing with Trust and Privacy Issues. WECWIS 2002: 97-102 - 2000
- [c1]Marco Casassa Mont, Adrian Baldwin, Cheh Goh:
POWER prototype: towards integrated policy-based management. NOMS 2000: 789-802
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint