Download Claudio Bettini: Curriculum Vitae - Università degli Studi di Milano

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
 Claudio Bettini: Curriculum Vitae Education
•
•
Dottorato in Informatica (Ph.D. in Computer Science), Università degli Studi di Milano, Italy,
1993/05/27.
Laurea in Scienze dell’Informazione (M.S. in Computer Science), Università degli Studi di
Milano, Italy, 1987/02/27.
Academic Career
•
•
•
Full Professor, 2005/10/01-present, Dipartimento di Informatica (Department of Computer
Science) (http://www.di.unimi.it/), Università degli Studi di Milano.
Associate Professor 1998/11/01-2005/09/30, Dipartimento di Informatica e Comunicazione
(DICo), Università degli Studi di Milano.
Assistant Professor, 1993/09/01-1998/10/31 Dipartimento di Scienze dell’Informazione (DSI),
Università degli Studi di Milano.
Other Career Records
•
•
•
•
•
•
Director of EveryWare Lab, 2003-present, Università degli Studi di Milano, Italy
(http://everywarelab.di.unimi.it/).
President and Chief Science Officer, 2011/01-Present, EveryWare Technologies, spin-off of
Università degli Studi di Milano, Italy (http://www.everywaretechnologies.com).
Visiting Professor, 2011, Computer Science Department, Aarhus University, Denmark.
Affiliate member, 2003-2011, Center for Secure Information Systems, George Mason University,
VA, USA (http://csis.gmu.edu/).
Visiting Research Professor, 1994-2002 (multiple visits), Department of Information and
Software Engineering, George Mason University, VA, USA.
Visiting Researcher, 1988-1989, IBM Research, NY, USA.
Awards
• NSF Awards: #0242237 (Controlled Release of Information Based on Contents - 2003),
#0430402 (Privacy-aware Information Release Control - 2004), #0716567 (A Context-Aware
Approach to the Design and Evaluation of Privacy Preservation Techniques in Location-Based
Services - 2007).
Main Professional Activities
•
•
•
•
•
•
Editorial Board of Journal of Pervasive and Mobile Computing (2013-present).
Editorial Board of VLDB Journal (2009-present).
Editorial Board of PeerJ Computer Science Journal (2015-present)
Editorial Board of IEEE Transactions on Knowledge and Data Engineering (2005-2009).
Conference organization
o Steering Committee: TIME (Intern. Symposium on Temporal Representation and
Reasoning) (2003-2014).
o General or co-General Chair: IEEE MDM 2013, TIME 2002
o PC Chair or co/vice-PC Chair: IEEE PERCOM 2013, IEEE PERCOM 2011, TIME 2001,
PC Chair of several international workshops.
o Other roles: IEEE PERCOM 2015 Workshops co-chair, IEEE MDM 2012 Workshops
co-chair, IEEE MDM 2011 Panel Chair, IEEE PERCOM 2010 Google PhD Forum Chair
Conference PC membership: I have been on the PC of over 60 international events including
major ones like VLDB, ICDE, CIKM, and IEEE PERCOM.
Research Interest and Publication Records
Claudio Bettini’s main research interests have been in Temporal and Spatio-Temporal Data Management,
Data Privacy, Mobile and Pervasive Computing, Data Mining and Knowledge Representation and
Reasoning. He has extensively published in major conferences and journals in the areas of Databases,
Artificial Intelligence, and Pervasive Computing. The impact of his scientific production is summarised
by the following indicators (Source: Google Scholar Feb 2015).
Project coordination
•
•
•
•
•
•
•
"SECURE: Intelligent System for Early Diagnosis and Follow-up at Home", Industrial Research
Project funded by Italian MIUR and Regione Lombardia, Local coordinator: Claudio Bettini.
August 2012 - July 2014.
“A Context-Aware Approach to the Design and Evaluation of Privacy Preservation Techniques
in Location-Based Services”, funded by National Science Foundation (NSF) under grant N. CNS0716567 and 0716575, co-PIs: Sushil Jajodia, Claudio Bettini, X. Sean Wang. (Aug 2007 - Jul
2011). 488.584 USD.
ANONIMO. “Computer science and legal methods for the protection of privacy and anonymity”,
Italian MIUR grant PRIN-2007F9437X. Local (Univ. of Milan) PI: Claudio Bettini. (Sep 2008 Sep 2010). 23.000 Euro.
“Formal models and techniques for privacy preservation in adaptive services for mobile
computing”. Italian MIUR grant InterLink N. II04C0EC1DNSF. PI: Claudio Bettini. (20062009).124.000 Euro.
“Privacy-aware Information Release Control”. USA NSF Cyber Trust Program award N. IIS0430402 and 0430165. Co-PIs: Claudio Bettini, Sushil Jajodia, X. Sean Wang. (10/2004-9/2009).
307.000 USD.
“Controlled Release of Information Based on Contents”. USA NSF award N. IIS-0242237 CoPIs: Claudio Bettini, Sushil Jajodia, X. Sean Wang. (6/2003-5/2008). 150.000 USD.
“Middleware for advanced services over large-scale, wired-wireless distributed systems”. Italian
MIUR grant FIRB, Local (Univ. of Milan) PI: Claudio Bettini. (2003-2006). 900.000 Euro.
Industry Research Grants and Contracts
The EveryWare Lab has received grants and has signed significant research and consultancy contracts
from industry (including Siemens, Vodafone Omnitel N.V., Nokia, Nokia-Siemens, Microsoft and
local companies) as well as from local government institutions. In addition, it has received equipment
(mostly mobile devices, laptops, and sensors) from Sun Microsystems, Microsoft Research, and
BTicino-LeGrand.
Recent Collaborators
Alessandra Agostini (Univ. of Milan Bicocca), Alessandro Artale (Free University of Bozen), Elisa
Bertino (Purdue Univ.), Oliver Brdiczka (PARC), Alex Brodsky (George Mason Univ.), Nicolò CesaBianchi (DI, Univ. of Milan), M. Colajanni (Univ. of Modena), Curtis Dyreson (Washington State Univ.),
William Evans (Univ. of British Columbia), Elena Ferrari (Univ. of Insubria), Enrico Franconi (Free
University of Bozen), Jadwiga Indulska (The University of Queensland), Sushil Jajodia (George Mason
Univ.), Christian S. Jensen (Aarhus Univ.), Dario Maggiorini (DI, Univ. of Milan), Angelo Montanari
(Univ. of Udine), Daniela Nicklas (University of Oldenburg), Anand Ranganathan (IBM), Pierangela
Samarati (DI, Univ. of Milan), Richard Snodgrass (Univ. of Arizona), Lingyu Wang (Concordia
University), X. Sean Wang (Fudan Univ.), Duminda Wijesekera (George Mason Univ.).
Supervised PhD Students
Daniele Riboni, Sergio Mascetti, Linda Pareschi, Dario Freni, Letizia Bertolaja, Zaffar Heider, Gabriele
Civitarese.
Teaching Activities
Extensive teaching activity has been done at the University of Milan since 1993 in undergraduate as well
as in graduate programs. I’ve been on the steering committee of the PhD program in computer science
from 2009 to 2013. The following is a list of the courses I have thought:
• Bachelor and master courses:
o Distributed Systems (2002-now),
o Introduction to Databases (2010-now),
o Data Management for Mobile and Pervasive Computing (2009- 2013),
o Mobile Computing (2004-2009),
o Operating Systems (2001-2006),
o Advanced Database Systems (2011, Aarhus Univ., Denmark)
• PhD courses: "Privacy Preserving Techniques for GeoLocation Services", "Advanced issues in
data protection", "Web ontologies", "Temporal Reasoning", "Temporal Data Models".
Keynotes and Invited Talks
• "Ontology-based context-aware activity recognition", invited talk at DemAAL Summer School
on Ambient Assisted Living, Chania, Crete, Greece, 19 September 2013.
• "Location privacy in Geo-Social Networks", Keynote at Workshop on Location-based Services
and Privacy Assurance, SnT and University of Luxemburg, February 4, 2011.
• "How anonymous is k-anonymous? Look at your quasi-ID," Keynote at the 5th VLDB Workshop
on Secure Data Management (SDM), Auckland, New Zealand, August 24, 2008.
• "Web Services for Time Granularity Reasoning", Keynote at the 10th International Symposium
on Temporal Representation and Reasoning (TIME), Cairns, Australia, 8-10 July, 2003.
• "The Santa Claus Private Tracking Problem", Invited talk at Aarhus University, Data-Intensive
Systems Christmas Party, December 5, 2011. Invited by Prof. Christian Jensen.
• "Privacy Challenges in Geo-social Networks", Invited talk at Aalborg University, Daisy Center
for Data-Intensive Systems, November 23, 2011. Invited by Prof. Christian Jensen.
• "Privacy Preservation in Location-Based Proximity Services", Center for Information
Management, Integration and Connectivity (CIMIC), Rutgers University, NJ, December 2009.
Invited by Prof. Vijay Atluri.
• "Privacy Protection through anonymity in location based services", Faculty of Computer Science,
Free University of Bozen, Italy, 2007. Invited by Prof. Michael Bohlen.
• "Integrated Profile and Policy Management for Mobile-oriented Internet Services", Computer
Science Department, University of Vermont, VA, February 23, 2005. Invited by Prof. X. Sean
Wang.
• "Free Schedules for Free Agents in Workflow Systems", Computer Science Department,
University of Waterloo, Canada, July 2000. Invited by Prof. Tamer Ozsu.
• Several presentations to industry partners and sponsors.
Selected Publications by research area (full list at http://bettini.di.unimi.it/My-Site/Publications.html):
•
Privacy in mobile and pervasive computing
o
o
o
C. Bettini, D. Riboni. Privacy Protection in Pervasive Systems: State of the Art and
Technical Challenges. Pervasive and Mobile Computing, Elsevier. 2014.
S. Mascetti, L. Bertolaja, C. Bettini. SafeBox: adaptable spatio-temporal
generalization for location privacy protection, Transactions on Data Privacy 7:2,
2014.
C. Ruiz Vicente, D. Freni, C. Bettini, C. S. Jensen. Location-Related Privacy in Geo-
o
o
o
o
o
•
Context awareness and activity recognition in pervasive computing
o
o
o
o
o
o
•
D. Riboni, C. Bettini. Context provenance to enhance the dependability of ambient
intelligence systems. Personal and Ubiquitous Computing 16(7): 799-818, SpringerVerlag London, 2012.
D. Riboni, C. Bettini, OWL 2 Modeling and Reasoning with Complex Human
Activities, Pervasive and Mobile Computing, 7(3):379-395, Elsevier Science, 2011.
D. Riboni, C. Bettini, COSAR: Hybrid Reasoning for Context-aware Activity
Recognition. Personal and Ubiquitous Computing, 15(3):271-289, Springer London,
2011.
C. Bettini, O. Brdiczka, K. Henricksen, J. Indulska, D. Nicklas, A. Ranganathan, D.
Riboni. A Survey of Context Modelling and Reasoning Techniques, Pervasive and
Mobile Computing, 6(2):161-180, Elsevier Science, 2010.
C. Bettini, L. Pareschi, D. Riboni. Efficient Profile Aggregation and Policy Evaluation
in a Middleware for Adaptive Mobile Applications, Pervasive and Mobile Computing,
4(5): 697-718, Elsevier Science, 2008.
C. Bettini, D. Maggiorini, D. Riboni. Distributed Context Monitoring for the
Adaptation of Continuous Services, World Wide Web Journal, 10(4):503-528, Springer
Netherlands, 2007.
Privacy and security in databases
o
o
o
o
o
o
•
Social Networks. IEEE Internet Computing. 15(3):20-27, 2011.
S. Mascetti, D. Freni, C. Bettini, X. S. Wang, S. Jajodia. Privacy in geo-social
networks: proximity notification with untrusted service providers and curious
buddies, The VLDB Journal, Springer, 2010.
D. Freni, C. Ruiz Vicente, S. Mascetti, C. Bettini, C. S. Jensen. Preserving Location
and Absence Privacy in Geo-Social Networks. Proc. of 19th ACM International
Conference on Information and Knowledge Management, ACM, 2010.
C. Bettini, S. Jajodia, P. Samarati, X. S. Wang (Eds.), Privacy in Location-Based
Applications, State of the Art Survey, LNCS vol. 5599, Springer, 2009.
D. Riboni, L. Pareschi, C. Bettini. Shadow Attacks to Users' Anonymity in Pervasive
Computing Environments, Pervasive and Mobile Computing, 4(6): 819-835, Elsevier
Science, 2008. Extended version of paper appeared in Proc. IEEE PERCOM, 2008.
S. Mascetti, C. Bettini, D. Freni X. S. Wang. Spatial generalisation algorithms for LBS
privacy preservation, Journal of Location Based Services, 2(1), Taylor & Francis, 2008.
D. Riboni, A. Villani, D. Vitali, C. Bettini, L. V. Mancini: Obfuscation of Sensitive Data
for Incremental Release of Network Flows. IEEE/ACM Transactions on Networking,
2014.
D. Riboni, L. Pareschi, C. Bettini. JS-Reduce: Defending Your Data from Sequential
Background Knowledge Attacks. IEEE Transactions on Dependable and Secure
Computing, 9(3):387-400. IEEE Computer Society, 2012.
D. Riboni and C. Bettini, Cor-Split: Defending Privacy in Data Re-Publication from
Historical Correlations and Compromised Tuples. Proc. of the 21st International
Conference on Scientific and Statistical Database Management, Springer, 2009.
C. Yao, L. Wang, X. S. Wang, C. Bettini, Sushil Jajodia. Evaluating privacy threats in
released database views by symmetric indistinguishability, Journal of Computer
Security, 17(1):5-42, IOS Press, 2009.
C. Bettini, S. Jajodia, X. S. Wang, D. Wijesekera. Provisions and Obligations in Policy
Rule Management, Journal of Network and Systems Management, 11(3): 351-372,
Springer, 2003. Extended version of paper appeared in VLDB-2002.
E. Bertino, C. Bettini, E. Ferrari, and P. Samarati, An Access Control Model Supporting
Periodicity Constraints and Temporal Reasoning. ACM Transactions on Database
Systems, 23(3):231--285, ACM, 1998.
Temporal data management, data mining and reasoning
o
o
o
o
o
o
o
C. Bettini, S. Jajodia, X.S. Wang. Time Granularities in Databases, Data Mining, and
Temporal Reasoning, 230 pp., Springer-Verlag, July 2000. ISBN: 978-3-540-66997-5.
C. Bettini, S. Mascetti, X.S. Wang. Supporting temporal reasoning by mapping
calendar expressions to minimal periodic sets, Journal of Artificial Intelligence
Research, 28: 299-348, AAAI Press, 2007.
C. Bettini, X. Wang, S. Jajodia, Temporal Reasoning in Workflow Systems. Distributed
and Parallel Databases, 11(3):269-306, Springer Netherlands, 2002.
C. Bettini, X. Wang, S. Jajodia, Solving Multi-Granularity Temporal Constraint
Networks. Artificial Intelligence, 140(1-2): 107-152, Elsevier Science, 2002
C. Bettini, X. Wang, J. Lin, S. Jajodia, Discovering Frequent Event Patterns With
Multiple Granularities in Time Sequences. IEEE Transactions on Knowledge and Data
Engineering. 10 (2), 1998.
C. Bettini, X. Wang, S. Jajodia, Temporal Semantic Assumptions and Their Use in
Databases. IEEE Transactions on Knowledge and Data Engineering, 10(2), 1998.
X. Wang, C. Bettini, A. Brodsky, S. Jajodia, Logical Design for Temporal Databases
with Multiple Granularities, ACM Transactions on Database Systems, 22(2):115-170,
ACM New York, 1997.