Elisa Costante

Elisa Costante

Eindhoven, Noord-Brabant, Nederland
3K volgers Meer dan 500 connecties

Info

As the Vice President of Research at Forescout Technologies Inc., I lead Forescout Vedere…

Activiteit

Neem nu deel om alle activiteiten te bekijken

Ervaring

  • Forescout Technologies Inc. grafisch

    Forescout Technologies Inc.

    Eindhoven Area, Netherlands

  • -

    Eindhoven Area, Netherlands

  • -

    Eindhoven Area, Netherlands

  • -

    Eindhoven Area, Netherlands

  • -

    Eindhoven Area, Netherlands

  • -

  • -

    Eindhoven Area, Netherlands

  • -

    Finland

Opleiding

Licenties en certificaten

Publicaties

  • Hunting the Unknown - White-Box Database Leakage Detection

    Springer

    Data leakage causes significant losses and privacy breaches worldwide. In this paper we present a white-box data leakage detection system to spot anomalies in database transactions. We argue that our approach represents a major leap forward w.r.t. previous work because: i) it significantly decreases the False Positive Rate (FPR) while keeping the Detection Rate (DR) high; on our experimental dataset, consisting of millions of real enterprise transactions, we measure a FPR that is orders of…

    Data leakage causes significant losses and privacy breaches worldwide. In this paper we present a white-box data leakage detection system to spot anomalies in database transactions. We argue that our approach represents a major leap forward w.r.t. previous work because: i) it significantly decreases the False Positive Rate (FPR) while keeping the Detection Rate (DR) high; on our experimental dataset, consisting of millions of real enterprise transactions, we measure a FPR that is orders of magnitude lower than in state-of-the-art comparable approaches; and ii) the white-box approach allows the creation of self-explanatory and easy to update profiles able to explain why a given query is anomalous, which further boosts the practical applicability of the system.

    Andere auteurs
    Publicatie weergeven
  • Database Anomalous Activities: Detection and Quantification

    Proceeding of International Conference on Security and Cryptography (SECRYPT) 2013

    The disclosure of sensitive data to unauthorized entities is a critical issue for organizations. Timely detection of data leakage is crucial to reduce possible damages. Therefore, breaches should be detected as early as possible, e.g., when data are leaving the database. In this paper, we focus on data leakage detection by monitoring database activities. We present a framework that automatically learns normal user behavior, in terms of database activities, and detects anomalies as deviation…

    The disclosure of sensitive data to unauthorized entities is a critical issue for organizations. Timely detection of data leakage is crucial to reduce possible damages. Therefore, breaches should be detected as early as possible, e.g., when data are leaving the database. In this paper, we focus on data leakage detection by monitoring database activities. We present a framework that automatically learns normal user behavior, in terms of database activities, and detects anomalies as deviation from such behavior. In addition, our approach explicitly indicates the root cause of an anomaly. Finally, the framework assesses the severity of data leakages based on the sensitivity of the disclosed data.

    Andere auteurs
  • Privacy-Aware Web Service Composition and Ranking

    Procs. of the IEEE 20th International Conference on Web Services (ICWS), 2013

    In this paper, we propose a novel privacy-preserving Web service composition and selection approach which (i) makes it possible to verify the compliance between users’ privacy requirements and providers’ privacy policies and (ii) ranks the composite Web services with respect to the privacy level they offer. We demonstrate our approach using a travel agency Web service as an example of service composition.

    Andere auteurs
  • A machine learning solution to assess privacy policy completeness

    Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society (WPES co-located with CCS 2012)

    Andere auteurs
  • What websites know about you : privacy policy analysis using information extraction

    In Proc. of 7th International Workshop on Data Privacy Management (DPM)

    Andere auteurs
  • Trust management and user's trust perception in e-business

    andbook of research on e-business standards and protocols : documents, data and advanced web technologies (IGI Global)

    Andere auteurs
  • On-line trust perception: what really matters

    Proceedings of the First Workshop on Socio-Technical Aspects in Security and Trust

  • A three-layered model to implement data privacy policies

    Computer Standards & Interfaces

    Andere auteurs

Talen

  • English

    Volledige professionele vaardigheid

  • Italian

    Moedertaal of tweetalig

  • Spanish

    Beperkte werkvaardigheid

Meer activiteiten van Elisa

Bekijk het volledige profiel van Elisa

  • Bekijk wie u allebei kent
  • Word voorgesteld
  • Neem rechtstreeks contact op met Elisa
Word lid en bekijk het volledige profiel

Overige vergelijkbare profielen

Anderen hebben Elisa Costante genoemd

Voeg nieuwe vaardigheden toe met behulp van deze cursussen