scispace - formally typeset
M

Maria Luisa Damiani

Researcher at University of Milan

Publications -  91
Citations -  2952

Maria Luisa Damiani is an academic researcher from University of Milan. The author has contributed to research in topics: Access control & Location-based service. The author has an hindex of 22, co-authored 90 publications receiving 2767 citations. Previous affiliations of Maria Luisa Damiani include École Polytechnique.

Papers
More filters
Journal ArticleDOI

A conceptual view on trajectories

TL;DR: This paper explores how conceptual modeling could provide applications with direct support of trajectories (i.e. movement data that is structured into countable semantic units) as a first class concept and proposes two modeling approaches based on a design pattern and a dedicated data types.
Journal ArticleDOI

Semantic trajectories modeling and analysis

TL;DR: A survey of the approaches and techniques for constructing trajectories from movement tracks, enriching trajectories with semantic information to enable the desired interpretations of movements, and using data mining to analyze semantic trajectories to extract knowledge about their characteristics.
Proceedings ArticleDOI

GEO-RBAC: a spatially aware RBAC

TL;DR: This paper presents GEO-RBAC, an extension of the RBAC model to deal with spatial and location-based information and introduces the concept of role schema, which is extended to cope with hierarchies, modeling permission, user, and activation inheritance.
Proceedings ArticleDOI

Preventing velocity-based linkage attacks in location-aware applications

TL;DR: This work proposes spatial and temporal cloaking transformations to preserve user privacy, and shows experimentally that privacy can be achieved without significant quality of service deterioration.
Journal Article

The PROBE Framework for the Personalized Cloaking of Private Locations

TL;DR: A novel privacy model and an architectural framework for the personalized cloaking of semantic locations that satisfies the privacy constraints specified by the user in the privacy profile (obfuscated location) is presented.