Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Claudio Bettini: Curriculum Vitae Education • • Dottorato in Informatica (Ph.D. in Computer Science), Università degli Studi di Milano, Italy, 1993/05/27. Laurea in Scienze dell’Informazione (M.S. in Computer Science), Università degli Studi di Milano, Italy, 1987/02/27. Academic Career • • • Full Professor, 2005/10/01-present, Dipartimento di Informatica (Department of Computer Science) (http://www.di.unimi.it/), Università degli Studi di Milano. Associate Professor 1998/11/01-2005/09/30, Dipartimento di Informatica e Comunicazione (DICo), Università degli Studi di Milano. Assistant Professor, 1993/09/01-1998/10/31 Dipartimento di Scienze dell’Informazione (DSI), Università degli Studi di Milano. Other Career Records • • • • • • Director of EveryWare Lab, 2003-present, Università degli Studi di Milano, Italy (http://everywarelab.di.unimi.it/). President and Chief Science Officer, 2011/01-Present, EveryWare Technologies, spin-off of Università degli Studi di Milano, Italy (http://www.everywaretechnologies.com). Visiting Professor, 2011, Computer Science Department, Aarhus University, Denmark. Affiliate member, 2003-2011, Center for Secure Information Systems, George Mason University, VA, USA (http://csis.gmu.edu/). Visiting Research Professor, 1994-2002 (multiple visits), Department of Information and Software Engineering, George Mason University, VA, USA. Visiting Researcher, 1988-1989, IBM Research, NY, USA. Awards • NSF Awards: #0242237 (Controlled Release of Information Based on Contents - 2003), #0430402 (Privacy-aware Information Release Control - 2004), #0716567 (A Context-Aware Approach to the Design and Evaluation of Privacy Preservation Techniques in Location-Based Services - 2007). Main Professional Activities • • • • • • Editorial Board of Journal of Pervasive and Mobile Computing (2013-present). Editorial Board of VLDB Journal (2009-present). Editorial Board of PeerJ Computer Science Journal (2015-present) Editorial Board of IEEE Transactions on Knowledge and Data Engineering (2005-2009). Conference organization o Steering Committee: TIME (Intern. Symposium on Temporal Representation and Reasoning) (2003-2014). o General or co-General Chair: IEEE MDM 2013, TIME 2002 o PC Chair or co/vice-PC Chair: IEEE PERCOM 2013, IEEE PERCOM 2011, TIME 2001, PC Chair of several international workshops. o Other roles: IEEE PERCOM 2015 Workshops co-chair, IEEE MDM 2012 Workshops co-chair, IEEE MDM 2011 Panel Chair, IEEE PERCOM 2010 Google PhD Forum Chair Conference PC membership: I have been on the PC of over 60 international events including major ones like VLDB, ICDE, CIKM, and IEEE PERCOM. Research Interest and Publication Records Claudio Bettini’s main research interests have been in Temporal and Spatio-Temporal Data Management, Data Privacy, Mobile and Pervasive Computing, Data Mining and Knowledge Representation and Reasoning. He has extensively published in major conferences and journals in the areas of Databases, Artificial Intelligence, and Pervasive Computing. The impact of his scientific production is summarised by the following indicators (Source: Google Scholar Feb 2015). Project coordination • • • • • • • "SECURE: Intelligent System for Early Diagnosis and Follow-up at Home", Industrial Research Project funded by Italian MIUR and Regione Lombardia, Local coordinator: Claudio Bettini. August 2012 - July 2014. “A Context-Aware Approach to the Design and Evaluation of Privacy Preservation Techniques in Location-Based Services”, funded by National Science Foundation (NSF) under grant N. CNS0716567 and 0716575, co-PIs: Sushil Jajodia, Claudio Bettini, X. Sean Wang. (Aug 2007 - Jul 2011). 488.584 USD. ANONIMO. “Computer science and legal methods for the protection of privacy and anonymity”, Italian MIUR grant PRIN-2007F9437X. Local (Univ. of Milan) PI: Claudio Bettini. (Sep 2008 Sep 2010). 23.000 Euro. “Formal models and techniques for privacy preservation in adaptive services for mobile computing”. Italian MIUR grant InterLink N. II04C0EC1DNSF. PI: Claudio Bettini. (20062009).124.000 Euro. “Privacy-aware Information Release Control”. USA NSF Cyber Trust Program award N. IIS0430402 and 0430165. Co-PIs: Claudio Bettini, Sushil Jajodia, X. Sean Wang. (10/2004-9/2009). 307.000 USD. “Controlled Release of Information Based on Contents”. USA NSF award N. IIS-0242237 CoPIs: Claudio Bettini, Sushil Jajodia, X. Sean Wang. (6/2003-5/2008). 150.000 USD. “Middleware for advanced services over large-scale, wired-wireless distributed systems”. Italian MIUR grant FIRB, Local (Univ. of Milan) PI: Claudio Bettini. (2003-2006). 900.000 Euro. Industry Research Grants and Contracts The EveryWare Lab has received grants and has signed significant research and consultancy contracts from industry (including Siemens, Vodafone Omnitel N.V., Nokia, Nokia-Siemens, Microsoft and local companies) as well as from local government institutions. In addition, it has received equipment (mostly mobile devices, laptops, and sensors) from Sun Microsystems, Microsoft Research, and BTicino-LeGrand. Recent Collaborators Alessandra Agostini (Univ. of Milan Bicocca), Alessandro Artale (Free University of Bozen), Elisa Bertino (Purdue Univ.), Oliver Brdiczka (PARC), Alex Brodsky (George Mason Univ.), Nicolò CesaBianchi (DI, Univ. of Milan), M. Colajanni (Univ. of Modena), Curtis Dyreson (Washington State Univ.), William Evans (Univ. of British Columbia), Elena Ferrari (Univ. of Insubria), Enrico Franconi (Free University of Bozen), Jadwiga Indulska (The University of Queensland), Sushil Jajodia (George Mason Univ.), Christian S. Jensen (Aarhus Univ.), Dario Maggiorini (DI, Univ. of Milan), Angelo Montanari (Univ. of Udine), Daniela Nicklas (University of Oldenburg), Anand Ranganathan (IBM), Pierangela Samarati (DI, Univ. of Milan), Richard Snodgrass (Univ. of Arizona), Lingyu Wang (Concordia University), X. Sean Wang (Fudan Univ.), Duminda Wijesekera (George Mason Univ.). Supervised PhD Students Daniele Riboni, Sergio Mascetti, Linda Pareschi, Dario Freni, Letizia Bertolaja, Zaffar Heider, Gabriele Civitarese. Teaching Activities Extensive teaching activity has been done at the University of Milan since 1993 in undergraduate as well as in graduate programs. I’ve been on the steering committee of the PhD program in computer science from 2009 to 2013. The following is a list of the courses I have thought: • Bachelor and master courses: o Distributed Systems (2002-now), o Introduction to Databases (2010-now), o Data Management for Mobile and Pervasive Computing (2009- 2013), o Mobile Computing (2004-2009), o Operating Systems (2001-2006), o Advanced Database Systems (2011, Aarhus Univ., Denmark) • PhD courses: "Privacy Preserving Techniques for GeoLocation Services", "Advanced issues in data protection", "Web ontologies", "Temporal Reasoning", "Temporal Data Models". Keynotes and Invited Talks • "Ontology-based context-aware activity recognition", invited talk at DemAAL Summer School on Ambient Assisted Living, Chania, Crete, Greece, 19 September 2013. • "Location privacy in Geo-Social Networks", Keynote at Workshop on Location-based Services and Privacy Assurance, SnT and University of Luxemburg, February 4, 2011. • "How anonymous is k-anonymous? Look at your quasi-ID," Keynote at the 5th VLDB Workshop on Secure Data Management (SDM), Auckland, New Zealand, August 24, 2008. • "Web Services for Time Granularity Reasoning", Keynote at the 10th International Symposium on Temporal Representation and Reasoning (TIME), Cairns, Australia, 8-10 July, 2003. • "The Santa Claus Private Tracking Problem", Invited talk at Aarhus University, Data-Intensive Systems Christmas Party, December 5, 2011. Invited by Prof. Christian Jensen. • "Privacy Challenges in Geo-social Networks", Invited talk at Aalborg University, Daisy Center for Data-Intensive Systems, November 23, 2011. Invited by Prof. Christian Jensen. • "Privacy Preservation in Location-Based Proximity Services", Center for Information Management, Integration and Connectivity (CIMIC), Rutgers University, NJ, December 2009. Invited by Prof. Vijay Atluri. • "Privacy Protection through anonymity in location based services", Faculty of Computer Science, Free University of Bozen, Italy, 2007. Invited by Prof. Michael Bohlen. • "Integrated Profile and Policy Management for Mobile-oriented Internet Services", Computer Science Department, University of Vermont, VA, February 23, 2005. Invited by Prof. X. Sean Wang. • "Free Schedules for Free Agents in Workflow Systems", Computer Science Department, University of Waterloo, Canada, July 2000. Invited by Prof. Tamer Ozsu. • Several presentations to industry partners and sponsors. Selected Publications by research area (full list at http://bettini.di.unimi.it/My-Site/Publications.html): • Privacy in mobile and pervasive computing o o o C. Bettini, D. Riboni. Privacy Protection in Pervasive Systems: State of the Art and Technical Challenges. Pervasive and Mobile Computing, Elsevier. 2014. S. Mascetti, L. Bertolaja, C. Bettini. SafeBox: adaptable spatio-temporal generalization for location privacy protection, Transactions on Data Privacy 7:2, 2014. C. Ruiz Vicente, D. Freni, C. Bettini, C. S. Jensen. Location-Related Privacy in Geo- o o o o o • Context awareness and activity recognition in pervasive computing o o o o o o • D. Riboni, C. Bettini. Context provenance to enhance the dependability of ambient intelligence systems. Personal and Ubiquitous Computing 16(7): 799-818, SpringerVerlag London, 2012. D. Riboni, C. Bettini, OWL 2 Modeling and Reasoning with Complex Human Activities, Pervasive and Mobile Computing, 7(3):379-395, Elsevier Science, 2011. D. Riboni, C. Bettini, COSAR: Hybrid Reasoning for Context-aware Activity Recognition. Personal and Ubiquitous Computing, 15(3):271-289, Springer London, 2011. C. Bettini, O. Brdiczka, K. Henricksen, J. Indulska, D. Nicklas, A. Ranganathan, D. Riboni. A Survey of Context Modelling and Reasoning Techniques, Pervasive and Mobile Computing, 6(2):161-180, Elsevier Science, 2010. C. Bettini, L. Pareschi, D. Riboni. Efficient Profile Aggregation and Policy Evaluation in a Middleware for Adaptive Mobile Applications, Pervasive and Mobile Computing, 4(5): 697-718, Elsevier Science, 2008. C. Bettini, D. Maggiorini, D. Riboni. Distributed Context Monitoring for the Adaptation of Continuous Services, World Wide Web Journal, 10(4):503-528, Springer Netherlands, 2007. Privacy and security in databases o o o o o o • Social Networks. IEEE Internet Computing. 15(3):20-27, 2011. S. Mascetti, D. Freni, C. Bettini, X. S. Wang, S. Jajodia. Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies, The VLDB Journal, Springer, 2010. D. Freni, C. Ruiz Vicente, S. Mascetti, C. Bettini, C. S. Jensen. Preserving Location and Absence Privacy in Geo-Social Networks. Proc. of 19th ACM International Conference on Information and Knowledge Management, ACM, 2010. C. Bettini, S. Jajodia, P. Samarati, X. S. Wang (Eds.), Privacy in Location-Based Applications, State of the Art Survey, LNCS vol. 5599, Springer, 2009. D. Riboni, L. Pareschi, C. Bettini. Shadow Attacks to Users' Anonymity in Pervasive Computing Environments, Pervasive and Mobile Computing, 4(6): 819-835, Elsevier Science, 2008. Extended version of paper appeared in Proc. IEEE PERCOM, 2008. S. Mascetti, C. Bettini, D. Freni X. S. Wang. Spatial generalisation algorithms for LBS privacy preservation, Journal of Location Based Services, 2(1), Taylor & Francis, 2008. D. Riboni, A. Villani, D. Vitali, C. Bettini, L. V. Mancini: Obfuscation of Sensitive Data for Incremental Release of Network Flows. IEEE/ACM Transactions on Networking, 2014. D. Riboni, L. Pareschi, C. Bettini. JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks. IEEE Transactions on Dependable and Secure Computing, 9(3):387-400. IEEE Computer Society, 2012. D. Riboni and C. Bettini, Cor-Split: Defending Privacy in Data Re-Publication from Historical Correlations and Compromised Tuples. Proc. of the 21st International Conference on Scientific and Statistical Database Management, Springer, 2009. C. Yao, L. Wang, X. S. Wang, C. Bettini, Sushil Jajodia. Evaluating privacy threats in released database views by symmetric indistinguishability, Journal of Computer Security, 17(1):5-42, IOS Press, 2009. C. Bettini, S. Jajodia, X. S. Wang, D. Wijesekera. Provisions and Obligations in Policy Rule Management, Journal of Network and Systems Management, 11(3): 351-372, Springer, 2003. Extended version of paper appeared in VLDB-2002. E. Bertino, C. Bettini, E. Ferrari, and P. Samarati, An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. ACM Transactions on Database Systems, 23(3):231--285, ACM, 1998. Temporal data management, data mining and reasoning o o o o o o o C. Bettini, S. Jajodia, X.S. Wang. Time Granularities in Databases, Data Mining, and Temporal Reasoning, 230 pp., Springer-Verlag, July 2000. ISBN: 978-3-540-66997-5. C. Bettini, S. Mascetti, X.S. Wang. Supporting temporal reasoning by mapping calendar expressions to minimal periodic sets, Journal of Artificial Intelligence Research, 28: 299-348, AAAI Press, 2007. C. Bettini, X. Wang, S. Jajodia, Temporal Reasoning in Workflow Systems. Distributed and Parallel Databases, 11(3):269-306, Springer Netherlands, 2002. C. Bettini, X. Wang, S. Jajodia, Solving Multi-Granularity Temporal Constraint Networks. Artificial Intelligence, 140(1-2): 107-152, Elsevier Science, 2002 C. Bettini, X. Wang, J. Lin, S. Jajodia, Discovering Frequent Event Patterns With Multiple Granularities in Time Sequences. IEEE Transactions on Knowledge and Data Engineering. 10 (2), 1998. C. Bettini, X. Wang, S. Jajodia, Temporal Semantic Assumptions and Their Use in Databases. IEEE Transactions on Knowledge and Data Engineering, 10(2), 1998. X. Wang, C. Bettini, A. Brodsky, S. Jajodia, Logical Design for Temporal Databases with Multiple Granularities, ACM Transactions on Database Systems, 22(2):115-170, ACM New York, 1997.