Skip to main content
Accessing relational databases through web services increases risks of piracy and tampering. Watermarking guarantees data protection without constraining their access and management. Researchers traditionally compare the extracted... more
Accessing relational databases through web services increases risks of piracy and tampering. Watermarking guarantees data protection without constraining their access and management. Researchers traditionally compare the extracted watermark with the embedded one after simulating attacks to analyze its robustness. However, the literature has not addressed how much watermark signal is retained after querying multi-word textual attributes and how topological features of the watermark affect robustness. In this work, we fill this gap by evaluating a semantics-preserving approach. We execute different classes of queries in three data sets, including an actual database of a public administration. The results show that 99.99% of the marks can be detected when considering a watermark source with a topological factor close to or equal to 1. As valuable contributions, we formally defined the watermark source’s topological factor and the corrosion degree of the watermark detection. This work offers hints to data owners to adjust detection parameters, increasing the chances of spotting the watermark despite having, as evidence, data highly damaged due to malicious operations.
Watermarking techniques for relational data that aim at robustness face the challenge of guaranteeing watermark persistence despite aggressive attacks. Nevertheless, attackers cannot compromise watermark detection to their will since they... more
Watermarking techniques for relational data that aim at robustness face the challenge of guaranteeing watermark persistence despite aggressive attacks. Nevertheless, attackers cannot compromise watermark detection to their will since they must ensure the usability of the stolen data. Attacks that constitute a potential master-key for false ownership claims focus on leaking or compromising values used for watermark synchronization. For instance, brute-force attacks attempt to guess the values of parameters used for watermark embedding. The chances for brute-force attacks of successfully performing illegal watermark detection increases in untrusted environments where the leaks of parameters are common. In this paper, (i) we show how brute-force attacks succeed even if not all watermark detection parameters’ values are correctly guessed, (ii) we define the role played by each parameter in robustness, and (iii) we formalize a method for improving the resilience of existing watermarking techniques in scenarios lacking trust. According to the experimental results, watermarking approaches to which our proposal has been applied benefit in terms of robustness and security requirements, extending the deployment opportunities for other techniques.
Purpose The European H2020 Families_Share project aims at offering a grass-root approach and a co-designed platform supporting families for sharing time and tasks related to childcare, parenting, after-school and leisure activities and... more
Purpose The European H2020 Families_Share project aims at offering a grass-root approach and a co-designed platform supporting families for sharing time and tasks related to childcare, parenting, after-school and leisure activities and other household tasks. To achieve this objective, the Families_Share project has been built on current practices which are already leveraging on mutual help and support among families, such as Time Banks, Social Streets and self-organizing networks of parents active at the neighbourhood level and seek to harness the potential of ICT networks and mobile technologies to increase the effectiveness of participatory innovation. The aim of this paper is to present and discuss the Families_Share methodology and platform, as well as the results obtained by several partecipating communities in different European countries. Design/methodology/approach This paper discusses how the Families Share approach (CAPS project, Horizon 2020) is bringing the sharing econo...
RPL or Routing Protocol for Low power and Lossy Networks (LLNs) is considered the most suited routing technology for IPV6. However, with the rapid advancements in networking and the paradigm shift towards IoT, RPL is facing some... more
RPL or Routing Protocol for Low power and Lossy Networks (LLNs) is considered the most suited routing technology for IPV6. However, with the rapid advancements in networking and the paradigm shift towards IoT, RPL is facing some performance issues due to scalability, resource constraints and mobility. We propose a Geographic location-based Dynamic Opportunistic routing protocol (GDO-RPL) for point-to-point communication, whose algorithm has been extensively simulated within the Contiki Cooja environment. As a testbed for the proposed solution, we evaluated the scenario of an innovative 3D printing system that uses IIoT (Industrial Internet of Things) technologies, such as sensors installed within artifacts collecting data during the lifetime of the object in the environmental context for which it is intended.
We present Legodroid, a Java library for Android that allows cross-programming LEGO Mindstorms through an Android device to exploit its extra computational capabilities in a seamless way. From a programmer’s perspective, the paradigm it... more
We present Legodroid, a Java library for Android that allows cross-programming LEGO Mindstorms through an Android device to exploit its extra computational capabilities in a seamless way. From a programmer’s perspective, the paradigm it suggests for programming the EV3 is straightforward and resembles a standard main function in the likes of leJOS, which natively runs on the EV3 side though. Moreover, the library imposes type-driven coding patterns for interacting with motors and sensors, which guide developers in writing correct code with less runtime errors thanks to a rigid discipline over types. This is particularly effective in Android, whose component-based pattern complicates coding of traditional long-running algorithms for robots. Compared to leJOS, Legodroid users reported shorter bugfixing times and a more accessible paradigm for programming the robot, which had a positive impact on how much resources could be put in writing smarter algorithms and sophisticate interactions.
Cloud federation is an aggregation of services from different providers in a single pool supporting interoperability and resource migration. In federation, Services are assigned to the consumer’s service access pool as per their specific... more
Cloud federation is an aggregation of services from different providers in a single pool supporting interoperability and resource migration. In federation, Services are assigned to the consumer’s service access pool as per their specific functional and associated Quality level requirements. The said assignment is based on the advertised features of services. Sometimes, the selected provider fails to provide the committed service or, it fails to fulfill the expected QoS level. As a result, the consumer is being deprived of getting the services at required quality levels, in spite of subscribing and paying. Re-federation i.e. the inclusion of new services from different providers in the resource pool is a solution. This costly and time consuming re-federation process harms the overall harmony, reputation and performance of the existing federation. In this paper, the necessary strategies to make a federation autonomic is proposed. It helps federation to work in a self-adaptive manner b...
Robust relational database watermarking techniques aim to preserve the watermark in the protected assets despite daily updates and malicious attacks. Nevertheless, most techniques do not analyze the root of operations that can degrade the... more
Robust relational database watermarking techniques aim to preserve the watermark in the protected assets despite daily updates and malicious attacks. Nevertheless, most techniques do not analyze the root of operations that can degrade the embedded watermark signal, being that the case of Structured Query Language (SQL) queries for relational data. In this paper, we perform an empirical analysis of the role played by different types of SQL queries in the persistence and degradation of a watermark signal in a relational data set. According to the type of operation, we present a set of alternatives for the watermark detection process, contributing to the extraction of an ownership copyright signals threshold. Moreover, our proposal allows data owners to consider variations for the selected watermarking technique, according to the suspected malicious operation performed in the copy of available data. Finally, we give evidence of the importance of some features to be considered when selecting a watermark source, making possible the resilience against update operations that affect a high amount of protected data and the enhancement of a partially detected watermark.
... G. Kahn (ed.), pp.322-327, Amsterdam 1991. Cortesi, A., Pil~, G. and Winsborough W., "Comparison of Abstract Interpretations." Tech.Rep. 14/91 Dip. ... Workshop on Logic Programming for Intelligent Systems. Los Angeles, 1981.
Property Driven Program Slicing Sukriti Bhattacharya, Agostino Cortesi Dipartimento di Informatica Università Ca'Foscari di Venezia Program ... Annual ACM SIGPLANSIGACT Symposium on Principles of Programming Languages, pages 238-252,... more
Property Driven Program Slicing Sukriti Bhattacharya, Agostino Cortesi Dipartimento di Informatica Università Ca'Foscari di Venezia Program ... Annual ACM SIGPLANSIGACT Symposium on Principles of Programming Languages, pages 238-252, Los Angeles, California, 1977. ...
... The groundness and equivalence properties are closed under instantiation in the following sense. It is ob-vious that if a grounds x then any a' E A, grounds x. Similarly, if two sets of variables S1 and S2 are equivalent with... more
... The groundness and equivalence properties are closed under instantiation in the following sense. It is ob-vious that if a grounds x then any a' E A, grounds x. Similarly, if two sets of variables S1 and S2 are equivalent with respect to a (see Introduction), then SI and S2 are ...
One of the most popular abstract domains used for the analysis of logic programs is the domain Sharing which expresses the fact that computed substitutions bind variables to terms containing common variables. Despite the fact that this... more
One of the most popular abstract domains used for the analysis of logic programs is the domain Sharing which expresses the fact that computed substitutions bind variables to terms containing common variables. Despite the fact that this domain is widely used and studied, it is not yet known whether its abstract operations are complete or at least optimal. We solve
The amount and variety of data available electronically have dramatically increased in the last decade; however, data and documents are stored in different ways and do not usually show their internal structure. In order to take full... more
The amount and variety of data available electronically have dramatically increased in the last decade; however, data and documents are stored in different ways and do not usually show their internal structure. In order to take full advantage of the topological structure of digital documents, and particularly web sites, their hierarchical organization should be exploited by introducing a notion of query similar to the one used in database systems. A good approach, in that respect, is the one provided by graphical query languages, ...
... at ±45° have been added, along a transverse band which includes the fin connections, the chain plate and the mast partners ... Techniques and Design in Composite Materials 3 doi:10.4028/www. scientific.net/KEM.144 1£ Structural... more
... at ±45° have been added, along a transverse band which includes the fin connections, the chain plate and the mast partners ... Techniques and Design in Composite Materials 3 doi:10.4028/www. scientific.net/KEM.144 1£ Structural Analysis and Design of Sailboats Built of ...
Una delle principali sfide per la comunità accademica è quella della qualità. L'autonomia che è stata data ai singoli Atenei nella specifica dei percorsi di studio espone alla responsabilità di proporre e gestire itinerari formativi... more
Una delle principali sfide per la comunità accademica è quella della qualità. L'autonomia che è stata data ai singoli Atenei nella specifica dei percorsi di studio espone alla responsabilità di proporre e gestire itinerari formativi di qualità, che sappiano confrontarsi sia con le attese culturali degli studenti, che con le esigenze di un mercato del lavoro sempre più attento ai contenuti e alla solidità delle competenze acquisite dai laureati.
Research Interests:
Art
()
The paper describes the certification mark promoted by the Italian Association of Computer Science University Professors (GRIN) for undergraduate and graduate degree programs in Computer Science. The certification process yields a system... more
The paper describes the certification mark promoted by the Italian Association of Computer Science University Professors (GRIN) for undergraduate and graduate degree programs in Computer Science. The certification process yields a system of comparable and transparent curricula that enables the comparison of different sites and supports student mobility across different Universities. It can be seen as a first step towards a European Certification of Computer Science University Curricula.
Reduced product of abstract domains is a rather well-known operation for domain composition in abstract interpretation. In this article, we study its inverse operation, introducing a notion of domain complementation in abstract... more
Reduced product of abstract domains is a rather well-known operation for domain composition in abstract interpretation. In this article, we study its inverse operation, introducing a notion of domain complementation in abstract interpretation. Complementation provides as systematic way to design new abstract domains, and it allows to systematically decompose domains. Also, such an operation allows to simplify domain verification problems, and it yields space-saving representations for complex domains. We show that the complement exists in most coses, and we apply complementation to three well-know abstract domains, notably to Cousot and Cousot's interval domain for integer variable analysis, to Cousot and Cousot's domain for comportment analysis of functional languages, and to the domain Sharing for aliasing analysis of logic languages.
The new rules recently introduced in the Italian University organization force the academic community to face the issue of quality assessment and certification of undergraduate and graduate degree programs. The autonomy that has been... more
The new rules recently introduced in the Italian University organization force the academic community to face the issue of quality assessment and certification of undergraduate and graduate degree programs. The autonomy that has been granted to each University in the specification of the curricula allow the faculties to design their products both with respect to the requirements of the work market, and with respect to the cultural expectations of their potential students. Unfortunately, the quality of Computer ...
Relational data watermarking techniques using virtual primary key schemes try to avoid compromising watermark detection due to the deletion or replacement of the relation's primary key. Nevertheless, these techniques face the limitations... more
Relational data watermarking techniques using virtual primary key schemes try to avoid compromising watermark detection due to the deletion or replacement of the relation's primary key. Nevertheless, these techniques face the limitations that bring high redundancy of the generated set of virtual primary keys, which often compromises the quality of the embedded watermark. As a solution to this problem, this paper proposes double fragmentation of the watermark by using the existing redundancy in the set of virtual primary keys. This way, we guarantee the right identification of the watermark despite the deletion of any of the attributes of the relation. The experiments carried out to validate our proposal show an increment between 81.04% and 99.05% of detected marks with respect to previous solutions found in the literature. Furthermore, we found out that our approach takes advantage of the redundancy present in the set of virtual primary keys. Concerning the computational complexity of the solution, we performed a set of scalability tests that show the linear behavior of our approach with respect to the processes runtime and the number of tuples involved, making it feasible to use no matter the amount of data to be protected.
False ownership claims are carried on through additive and invertibility attacks and, as far as we know, current relational watermarking techniques are not always able to solve the ownership doubts raising from the latter attacks. In this... more
False ownership claims are carried on through additive and invertibility attacks and, as far as we know, current relational watermarking techniques are not always able to solve the ownership doubts raising from the latter attacks. In this paper, we focus on additive attacks. We extend a conventional image-based relational data watermarking scheme by creating a non-colluded backup of the data owner marks, the so-called secondary marks positions. The technique we propose is able to identify the data owner beyond any doubt.
Most of the watermarking techniques designed to protect relational data often use the Primary Key (PK) of relations to perform the watermark synchronization. Despite offering high confidence to the watermark detection, these approaches... more
Most of the watermarking techniques designed to protect relational data often use the Primary Key (PK) of relations to perform the watermark synchronization. Despite offering high confidence to the watermark detection, these approaches become useless if the PK can be erased or updated. A typical example is when an attacker wishes to use a stolen relation, unlinked to the rest of the database. In that case, the original values of the PK lose relevance, since they are not employed to check the referential integrity. Then, it is possible to erase or replace the PK, compromising the watermark detection with no need to perform the slightest modification on the rest of the data. To avoid the problems caused by the PK-dependency some schemes have been proposed to generate Virtual Primary Keys (VPK) used instead. Nevertheless, the quality of the watermark synchronized using VPKs is compromised due to the presence of duplicate values in the set of VPKs and the fragility of the VPK schemes against the elimination of attributes. In this paper, we introduce the metrics to allow precise measuring of the quality of the VPKs generated by any scheme without requiring to perform the watermark embedding. This way, time waste can be avoided in case of low-quality detection. We also analyze the main aspects to design the ideal VPK scheme, seeking the generation of high-quality VPK sets adding robustness to the process. Finally, a new scheme is presented along with the experiments carried out to validate and compare the results with the rest of the schemes proposed in the literature.
In the design of autonomous systems, it is important to consider the preferences of the interested parties to improve the user experience. These preferences are often associated with the contexts in which each system is likely to operate.... more
In the design of autonomous systems, it is important to consider the preferences of the interested parties to improve the user experience. These preferences are often associated with the contexts in which each system is likely to operate. The operational behavior of a system must also meet various non-functional requirements (NFRs), which can present different levels of conflict depending on the operational context. This work aims to model correlations between the individual contexts and the consequent conflicts between NFRs. The proposed approach is based on analyzing the system event logs, tracing them back to the leaf elements at the specification level and providing a contextual explanation of the system’s behavior. The traced contexts and NFR conflicts are then mined to produce Context-Context and Context-NFR conflict sequential rules. The proposed Contextual Explainability (ConE) framework uses BERT-based pre-trained language models and sequential rule mining libraries for der...
Non‐functional requirements (NFRs) play a significant role in the software development process. However, the classical requirement prioritization methods for incremental software development, typically, consider the attributes of... more
Non‐functional requirements (NFRs) play a significant role in the software development process. However, the classical requirement prioritization methods for incremental software development, typically, consider the attributes of functional features only, often neglecting the non‐functional constraints. This might lead to catastrophic defects in the system design, as the conflicts among the NFRs are ignored. In this paper, a novel prioritization approach for functional requirements (FRs) is introduced within the incremental software development process. The proposed approach considers the conflicts among NFRs, in the prioritization process, to minimize the incon sistencies of software development. The devised NFR‐aware prioritization algorithm can be tuned according to the weights that the analyst assigns to NFR conflicts and FR‐NFR dependencies. We have assessed our prioritization approach using available requirements data sets and have compared the results in different scenarios.
Requirements keep changing within an evolving business environment. In incremental software development, where functionalities are identified and delivered incrementally, a need is felt toward capturing and analyzing the impact of the... more
Requirements keep changing within an evolving business environment. In incremental software development, where functionalities are identified and delivered incrementally, a need is felt toward capturing and analyzing the impact of the changes in the system development process. This may require refactoring the order of the development of the system components based on newly added dependencies and conflicts among functional and non-functional requirements. In this paper, we propose a dynamic framework that re-prioritizes the requirements based on newly added (and updated) requirement dependencies and conflicts. We also provide an effective tool for our framework that supports software developers during incremental delivery within a changing business environment.
This article presents the design and experimental evaluation of a non-invasive wearable sensor system that can be used to acquire crucial information about athletes’ performance during inline figure skating training. By combining distance... more
This article presents the design and experimental evaluation of a non-invasive wearable sensor system that can be used to acquire crucial information about athletes’ performance during inline figure skating training. By combining distance and time-of-flight sensors and gyroscopes, the system is able to detect when jumps are performed and provides a live view of the data (e.g., the number and height of jumps) through a graphical user interface. The main novelty of our approach lies in the way in which the optical sensors are orientated. Typically, the sensors are orientated horizontally and positioned in pairs on the ground, where they measure the time interval between the moment the athlete leaves the ground and the moment they land. In our system, an optical sensor is placed under each foot and is vertically orientated so as to constantly measure the distance from the ground. In addition, a gyroscope sensor is placed on the athlete’s back, which provides information on the directio...
Gender balance in research organizations is considered as a key step for ensuring research excellence and quality and inclusive-sustainable innovation. Still, in spite of an increasing number of HE and research institutions committed to... more
Gender balance in research organizations is considered as a key step for ensuring research excellence and quality and inclusive-sustainable innovation. Still, in spite of an increasing number of HE and research institutions committed to make science more equal and some positive trends in figures on Gender equality in STEM research, it still appears to be difficult to prioritize gender equality. This is particularly true for disciplines such as ICT/IST where female representation at all levels is among the lowest ones among STEM topics and where a gender sensitive approach to ICT design and programming is far from being understood in its implications among computer and information systems scientist. H2020 (PGERI and SWAFS programmes in particular), promoted the concept of institutional change for gender equality, insisting on the need for merging change management and gender policies. The volume is focusing on a presentation and reflexive review of results and tools from the H2020 EQ...
Many business applications today still rely on COBOL programs written decades ago that are difficult to maintain and upgrade due to technological limitations and lack of experts in the language. Several companies have been trying to... more
Many business applications today still rely on COBOL programs written decades ago that are difficult to maintain and upgrade due to technological limitations and lack of experts in the language. Several companies have been trying to migrate their software base to modern platforms, but code translation is problematic because most business processes implemented are often no longer documented or even known. Applying existing Program Understanding techniques to COBOL could be a way for aiding IT specialists in charge of a porting but useful raw information must be extracted from the source code in order to get these techniques yield to meaningful results. We believe that the types of variables used in programs are an important part of such raw information and we present an approach based on static analysis of types rather than data. Our system is capable of reconstructing the type-flow of a COBOL program throughout branches, jumps and loops in finite time and to track type information o...

And 188 more