Publications
-
C. Alcaraz, L. Chen, S. Li, P. Samarati (eds.), Proc. of the 24th International Conference on Information and Communications Security (ICICS 2022), Springer, 2022
[]
-
S. De Capitani di Vimercati, P. Samarati (eds.), Proc. of the 19th International Conference on Security and Cryptography (SECRYPT 2022), ScitePress, 2022
[]
-
S. De Capitani di Vimercati, P. Samarati (eds.), Proc. of the 18th International Conference on Security and Cryptography (SECRYPT 2021), ScitePress, 2021
[]
-
P. Samarati, S. De Capitani di Vimercat, M.S.
Obaidat, J. Ben-Othman (eds.), Proc. of the 17th International Joint Conference on e-Business and Telecommunications (ICETE 2020) - Volume 2: SECRYPT, ScitePress, 2020
[]
-
M.S. Obaidat, P. Samarati (eds.), Proc. of the 16th International Conference on Security and Cryptography (SECRYPT 2019), SciTePress, 2019
[]
-
D. Naccache, S. Xu, S. Qing, P. Samarati,
G. Blanc, R. Lu, Z. Zhang, A. Meddahi (eds.), Proc. of the 20th International Conference on Information and Communications Security (ICICS 2018), Springer, 2018
[]
-
P. Samarati, I. Ray, I. Ray (eds.), From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, Springer, 2018
[]
-
P. Samarati, M.S. Obaidat (eds.), Proc. of the 15th International Conference on Security and Cryptography (SECRYPT 2018), SciTePress, 2018
[]
-
J.K. Liu, P. Samarati (eds.), Proc. of the 13th International Conference on Information Security Practice and Experience (ISPEC 2017), Springer, 2017
[]
-
P. Samarati, M.S. Obaidat, E. Cabello (eds.), Proc. of the 14th International Conference on Security and Cryptography (SECRYPT 2017), SciTePress, 2017
[]
-
G. Barte, E.P. Markatos, P. Samarati (eds.), Proc. of the 12th International Workshop on Security and Trust Management (STM 2016), Springer, 2016
[]
-
C. Callegari, M. van Sinderen, P.G. Sarigiannidis, P. Samarati, E. Cabello, P. Lorenz, M.S. Obaidat (eds.), Proc. of the 13th International Conference on Security and Cryptography (SECRYPT 2016), SciTePress, 2016
[]
-
M.S. Obaidat, P. Lorenz, P. Samarati (eds.), Proc. of the 12th International Conference on Security and Cryptography (SECRYT 2015), SciTePress, 2015
[]
-
P. Samarati (ed.), Proc. of the 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2015), Springer, 2015
[]
-
S. Jajodia, K. Kant, P. Samarati, A. Singhal, V. Swarup, C. Wang (eds.), Secure Cloud Computing, Springer, 2014
[]
-
M.S. Obaidat, A. Holzinger, P. Samarati (eds.), Proc. of International Conference on Security and Cryptography (SECRYPT 2014), SciTePress, 2014
[]
-
P. Samarati (ed.), Proc. of International Conference on Security and Cryptography (SECRYPT 2013), SciTePress, 2013
[]
-
F. Bao, P. Samarati, J. Zhou (eds.), , Springer, 2012
[]
-
A. Josang, P. Samarati, M. Petrocchi (eds.), , Springer, 2012
[]
-
P. Samarati, W. Lou, J. Zhou (eds.), Proc. of International Conference on Security and Cryptography (SECRYPT 2012), SciTePress, 2012
[]
-
J. Lopez, P. Samarati (eds.), Proc. of International Conference on Security and Cryptography (SECRYPT 2011), SciTePress, 2011
[]
-
P. Samarati, S. Foresti, J. Hu, G. Livraga (eds.), , IEEE, Milan, Italy, September 6-8, 2011
[]
-
S.K. Katsikas, P. Samarati (eds.), Proc. of International Conference on Security and Cryptography (SECRYPT 2010), SciTePress, 2010
[]
-
P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis, D. Sauveron, (eds.), Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices, Lecture Notes in Computer Science 6033, Springer, 2010
[]
-
Y. Xiang, P. Samarati, J. Hu, W. Zhou, A. Sadeghi (eds.), Proc. of the 4th International Conference on Network and System Security (NSS 2010), Melborne, Australia, September 1-3, 2010
[]
-
C. Bettini, S. Jajodia, P. Samarati, X. Sean Wang (eds.), , Springer, 2009
[]
-
P. Samarati, M. Yung, F. Martinelli, C.A. Ardagna (eds.), , Springer, September 7-9, 2009
[]
-
S. Cimato, S. Jajodia, P. Samarati (eds.), Proceedings of the IFIP TC11 23rd International Information Security Conference (SEC 2008), Springer, Milano, Italy, September 8 - 10, 2008
[]
-
J. Lopez, P. Samarati, J.L. Ferrer (eds.), Proc. of the 4th European PKI Workshop: Theory and Practice, Palma de Mallorca, Spain, June 28-30, 2007
[]
-
S. Etalle, P. Samarati (eds.), Proc. of the Second International Workshop on Security and Trust Management (STM 2006), Elsevier, Hamburg, Germany, September 20-21, 2006
[]
-
C. Farkas, P. Samarati (eds.), "Research Directions in Data and Applications Security XVIII," in Proc. of the 18th IFIP WG11.3 Working Conference on Data and Applications Security, Sitges, Spain, 2004
[]
-
P. Samarati, P. Ryan, D. Gollmann, R. Molva (eds.), Computer Security - ESORICS 2004, Sophia Antipolis, France, September 2004
[]
-
D. Gritzalis, S. De Capitani di Vimercati, P. Samarati, S. Katsikas (eds.), Security and Privacy in the Age of Uncertainty, Kluwer, 2003
[]
-
P. Samarati, P. Syverson (eds.), Proc. of the Second ACM Workshop on Privacy in the Electronic Society, Washington, USA, October 30, 2003
[]
-
S. De Capitani di Vimercati, P. Samarati (eds.), Proc. of the First ACM Workshop on Privacy in the Electronic Society, Washington, USA, November 21, 2002
[]
-
P. Samarati (ed.), Proc. of the Eighth ACM Conference on Computer and Communications Security, Philadelphia, PA (USA), November 5-8, 2001
[]
-
V. Atluri, P. Samarati (eds.), , Kluwer, 2000
[]
-
D. Gritzalis, S. Jajodia, P. Samarati (eds.), Proc. of the Seventh ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000
[]
-
P. Samarati, R. Sandhu (eds.), Database Security X: Status and Prospects, Chapman and Hall, 1997
[]
-
E. Bacis, S. De Capitani di Vimercati, S. Foresti
and S. Paraboschi, M. Rosa, P. Samarati, "Mix&slice for Efficient Access Revocation on Outsourced Data," in IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 21, n. 3, May/June 2024, pp. 1390-1405
[]
-
C. Chen, B. Moriarty, S. Hu, S. Moran, M.
Pistoia, V. Piuri, P. Samarati, "Model-Agnostic Utility-Preserving Biometric Information Anonymization," in International Journal of Information Security (IJIS), 2024 (to appear)
[]
-
S. De Capitani di Vimercati, D. Facchinetti, S.
Foresti, G. Oldani, S. Paraboschi, M. Rossi
and P. Samarati, "Multi-Dimensional Flat Indexing for Encrypted Data," in IEEE Transactions on Cloud Computing (TCC), 2024 (to appear)
[]
-
S. De Capitani di Vimercati, S. Foresti, S.
Paraboschi, P. Samarati, "Enforcing Corporate Governance Controls with Cloud-based Services," in IEEE Transactions on Services Computing (TSC), 2024 (to appear)
[]
-
S. De Capitani di Vimercati, D. Facchinetti, S. Foresti, G. Livraga, G. Oldani, S. Paraboschi, M. Rossi, P. Samarati, "Scalable Distributed Data Anonymization for Large Datasets," in IEEE Transactions on Big Data (TBD), vol. 9, n. 3, May/June 2023, pp. 818-831
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, "Distributed Query Execution under Access Restrictions," in Computers & Security (COSE), vol. 127, April 2023
[]
-
S. De Capitani di Vimercati, S. Foresti, S.
Jajodia, S. Paraboschi, R. Sassi, P. Samarati, "Sentinels and Twins: Effective Integrity Assessment for Distributed Computation," in IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 34, n. 1, January 2023, pp. 108-122
[]
-
S. De Capitani di Vimercati, S. Foresti, G.
Livraga, P. Samarati, "Supporting User Protection Requirements in Cloud-Based Data Outsourcing," in SN Computer Science, vol. 4, n. 4, July 2023
[]
-
S. De Capitani di Vimercati, S. Foresti, G.
Livraga, P. Samarati, "k-Anonymity: From Theory to Applications," in Transactions on Data Privacy, vol. 16, n. 1, January 2023, pp. 25-49
[]
-
S. De Capitani di Vimercati, S. Foresti, P.
Samarati, "Protecting Data and Queries in Cloud-Based Scenarios," in SN Computer Science, vol. 4, n. 5, September 2023
[]
-
S. De Capitani di Vimercati, S. Foresti, S.
Jajodia, G. Livraga, S. Paraboschi, P.
Samarati, "An Authorization Model for Query Execution in the Cloud," in The VLDB Journal, vol. 31, n. 3, May 2022, pp. 555-579
[]
-
S. De Capitani di Vimercati, S. Foresti, G.
Livraga, V. Piuri, P. Samarati, "Security-Aware Data Allocation in Multicloud Scenarios," in IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 18, n. 5, September-October 2021, pp. 2456-2468
[]
-
S. De Capitani di Vimercati, S. Foresti ,
G. Livraga, P. Samarati, "Towards Owners' Control in Digital Data Markets," in IEEE Systems Journal (ISJ), vol. 15, n. 1, March 2021, pp. 1299-1306
[]
-
S. De Capitani di Vimercati, S. Foresti, G.
Livraga, V. Piuri, P. Samarati, "Supporting User Requirements and Preferences in Cloud Plan Selection," in IEEE Transactions on Services Computing (TSC), vol. 14, n. 1, January/Feburary 2021, pp. 274-285
[]
-
E. Bacis, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, M. Rosa, P. Samarati, "Securing Resources in Decentralized Cloud Storage," in IEEE Transactions on Information Forensics and Security (TIFS), vol. 15, n. 1, December 2020, pp. 286-298
[]
-
A. Shah, R. Ganesan, S. Jajodia, P. Samarati, H. Cam, "Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning," in IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 31, n. 1, January 2020, pp. 16-33
[]
-
S. De Capitani di Vimercati, S. Foresti, G.
Livraga, V. Piuri, P. Samarati, "A Fuzzy-based Brokering Service for Cloud Plan Selection," in IEEE Systems Journal (ISJ), vol. 13, n. 4, December 2019, pp. 4101-4109
[]
-
A. Arman, S. Foresti, G. Livraga, P. Samarati, "Cloud Plan Selection Under Requirements of Multiple Applications," in Security and Privacy, vol. 1, n. 4, July/August 2018
[]
-
R. Buyya, S. Narayana Srirama, G. Casale,
R. Calheiros, Y. Simmhan, B.
Varghese, E. Gelenbe, B. Javadi, L. Miguel
Vaquero, M.A.S. Netto, A.
Nadjaran Toosi, M. Alejandra Rodriguez,
I.M. Llorente, S. De Capitani di
Vimercati, P. Samarati, D. Milojicic, C. Varela
and R. Bahsoon, M. Dias De
Assuncao, O. Rana, W. Zhou, H. Jin, W.
Gentzsch, A.Y. Zomaya, H.
Shen,, "A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade," in ACM Computing Surveys (CSUR), vol. 51, n. 5, November 2018, pp. 1-38 (Article 105)
[]
-
S. De Capitani di Vimercati, S.Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Enforcing Authorizations while Protecting Access Confidentiality," in Journal of Computer Security (JCS), vol. 26, n. 2, January 2018, pp. 143-175
[]
-
S. De Capitani di Vimercati, S. Foresti, S.
Paraboschi, G. Pelosi, P. Samarati, "Three-Server Swapping for Access Confidentiality," in IEEE Transactions on Cloud Computing (TCC), vol. 6, n. 2, April-June 2018, pp. 492-505
[]
-
S. De Capitani di Vimercati, S. Foresti, S.
Jajodia, G. Livraga, S. Paraboschi, P.
Samarati, "An Authorization Model for Multi-Provider Queries," in Proc. of the VLDB Endowment, vol. 11, n. 3, November 2017
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Efficient Integrity Checks for Join Queries in the Cloud," in Journal of Computer Security (JCS), vol. 24, n. 3, 2016, pp. 347-378
[]
-
S. De Capitani di Vimercati, S. Foresti, S.
Jajodia, G. Livraga, S. Paraboschi, P.
Samarati, "Loose Associations to Increase Utility in Data Publishing," in Journal of Computer Security (JCS), vol. 23, n. 1, 2015, pp. 59-88
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Shuffle Index: Efficient and Private Access to Outsourced Data," in ACM Transactions on Storage (TOS), vol. 11, n. 4, October 2015, pp. 1-55 (Article 19)
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, "Fragmentation in Presence of Data Dependencies," in IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 11, n. 6, November/December 2014, pp. 510-523
[]
-
C.A. Ardagna, S. Jajodia, P. Samarati, A. Stavrou, "Providing Users' Anonymity in Mobile Hybrid Networks," in ACM Transactions on Internet Technology (TOIT), vol. 12, n. 3, May 2013, pp. 1-33 (article 7)
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, "Enforcing Dynamic Write Privileges in Data Outsourcing," in Computers & Security, vol. 39, November 2013, pp. 47-63
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Integrity for Join Queries in the Cloud," in IEEE Transactions on Cloud Computing (TCC), vol. 1, n. 2, July-December 2013, pp. 187-200
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Supporting Concurrency and Multiple Indexes in Private Access to Outsourced Data," in Journal of Computer Security (JCS), vol. 21, n. 3, 2013, pp. 425-461
[]
-
C.A. Ardagna, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Minimising Disclosure of Client Information in Credential-Based Interactions," in International Journal of Information Privacy, Security and Integrity (IJIPSI), vol. 1, n. 2/3, 2012, pp. 205-233
[]
-
M. Bezzi, S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, R. Sassi, "Modeling and Preventing Inferences from Sensitive Value Distributions in Data Release," in Journal of Computer Security (JCS), vol. 20, n. 4, 2012, pp. 393-436
[]
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "An OBDD Approach to Enforce Confidentiality and Visibility Constraints in Data Publishing," in Journal of Computer Security (JCS), vol. 20, n. 5, 2012, pp. 463-508
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Psaila, P. Samarati, "Integrating Trust Management and Access Control in Data-Intensive Web Applications," in ACM Transactions on the Web (TWEB), vol. 6, n. 2, May 2012
[]
-
S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Data Privacy: Definitions and Techniques," in International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 20, n. 6, December 2012, pp. 793-817
[]
-
C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "An Obfuscation-based Approach for Protecting Location Privacy," in IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 8, n. 1, January-February 2011, pp. 13-27
[]
-
C. Ardagna, S. De Capitani di Vimercati, S. Paraboschi, E. Pedrini, P. Samarati, M. Verdicchio, "Expressive and Deployable Access Control in Open Web Service Applications," in IEEE Transactions on Service Computing (TSC), vol. 4, n. 2, April-June 2011, pp. 96-109
[]
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Selective Data Outsourcing for Enforcing Privacy," in Journal of Computer Security (JCS), vol. 19, n. 3, 2011, pp. 531-566
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Authorization Enforcement in Distributed Query Evaluation," in Journal of Computer Security (JCS), vol. 19, n. 4, 2011, pp. 751-794
[]
-
S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Anonymization of Statistical Data," in IT - Information Technology, vol. 53, n. 1, January 2011, pp. 18-25
[]
-
C.A. Ardagna, J. Camenisch, M. Kohlweiss, R. Leenes, G. Neven, B. Priem, P. Samarati, D. Sommer, M. Verdicchio, "Exploiting Cryptography for Privacy-Enhanced Access Control: A result of the PRIME Project," in Journal of Computer Security (JCS), vol. 18, n. 1, IOS Press, January 2010, pp. 123-160
[]
-
C.A. Ardagna, S. De Capitani di Vimercati, S. Foresti, T. Grandison, S. Jajodia, P. Samarati, "Access Control for Smarter Healthcare Using Policy Spaces," in Computers & Security, vol. 29, n. 8, November 2010, pp. 848-858
[]
-
C. Blundo, S. Cimato, S. De Capitani di Vimercati, A. De Santis, S. Foresti, S. Paraboschi, P. Samarati, "Managing Key Hierarchies for Access Control Enforcement: Heuristic Approaches," in Computers & Security, vol. 29, n. 5, July 2010, pp. 533-547
[]
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Combining Fragmentation and Encryption to Protect Privacy in Data Storage," in ACM Transactions on Information and System Security (TISSEC), vol. 13, n. 3, July 2010, pp. 22:1-22:33
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Encryption Policies for Regulating Access to Outsourced Data," in ACM Transactions on Database Systems (TODS), vol. 35, n. 2, April 2010, pp. 12:1-12:46
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Fragments and Loose Associations: Respecting Privacy in Data Publishing," in Proc. of the VLDB Endowment, September 2010
[]
-
C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "A Privacy-Aware Access Control System," in Journal of Computer Security (JCS), vol. 16, n. 4, September 2008, pp. 369-392
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, P. Samarati, "Access Control Policies and Languages," in International Journal of Computational Science and Engineering (IJCSE), vol. 3, n. 2, 2007, pp. 94-102
[]
-
R. Aringhieri, E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Fuzzy Techniques for Trust and Reputation Management in Anonymous Peer-to-Peer Systems," in Journal of the American Society for Information Science and Technology (JASIST), vol. 57, n. 4, February 2006
[]
-
S. De Capitani di Vimercati, P. Samarati, "k-Anonymity for Protecting Privacy," in Information Security, October 2006
[]
-
A. Ceselli, E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, P. Samarati, "Modeling and Assessing Inference Exposure in Encrypted Databases," in ACM Transactions on Information and System Security (TISSEC), vol. 8, n. 1, February 2005
[]
-
C.A. Ardagna, E. Damiani S. De Capitani di Vimercati, P. Samarati, "XML-based Access Control Languages," in Information Security Technical Report, vol. 9, n. 3, July-September 2004, pp. 35-46
[]
-
E. Damiani, S. De Capitani di Vimercati, S.
Paraboschi, P. Samarati, "Managing and Sharing Servents' Reputations in P2P Systems," in IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 15, n. 4, July/August 2003, pp. 840-854
[]
-
E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Managing Multiple and Dependable Identities," in IEEE Internet Computing, November-December 2003
[]
-
S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Access control: Principles and Solutions," in Software - Practice and Experience, vol. 33, n. 5, April 2003
[]
-
P. Bonatti, S. De Capitani di Vimercati, P. Samarati, "An Algebra for Composing Access Control Policies," in ACM Transactions on Information and System Security (TISSEC), vol. 5, n. 1, February 2002, pp. 1-35
[]
-
P. Bonatti, P. Samarati, "A Uniform Framework for Regulating Service Access and Information Release on the Web," in Journal of Computer Security (JCS), vol. 10, n. 3, 2002
[]
-
S. Dawson, S. De Capitani di Vimercati, P. Lincoln, P. Samarati, "Maximizing Sharing of Protected Information," in Journal of Computer and System Sciences (JCSS), vol. 64, n. 3, May 2002, pp. 496-541
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Securing SOAP E-Services," in International Journal of Information Security (IJIS), vol. 1, n. 2, February 2002, pp. 100-115
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "A Fine-Grained Access Control System for XML Documents," in ACM Transactions on Information and System Security (TISSEC), vol. 5, n. 2, May 2002
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Controlling Access to XML Documents," in IEEE Internet Computing, vol. 5, n. 6, November/December 2001
[]
-
S. De Capitani di Vimercati, P. Lincoln, L. Ricciulli, P. Samarati, "Global Infrastructure Protection System," in Journal of Computer Security (JCS), vol. 9, n. 4, 2001, pp. 251-283
[]
-
S. Jajodia, P. Samarati, M.L. Sapino, V.S. Subrahmanian, "Flexible Support for Multiple Access Control Policies," in ACM Transactions on Database Systems (TODS), vol. 26, n. 2, June 2001, pp. 214-260
[]
-
P. Samarati, M.K. Reiter, S. Jajodia, "An Authorization Model for a Public Key Management Service," in ACM Transactions on Information and System Security (TISSEC), vol. 4, n. 4, November 2001
[]
-
P. Samarati, "Protecting Respondents' Identities in Microdata Release," in IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 13, n. 6, November/December 2001, pp. 1010-1027
[]
-
E. Bertino, E. Pagani, G.P. Rossi, P. Samarati, "Protecting Information on the Web," in Communications of the ACM, vol. 43, n. 11es, November 2000, pp. 189-199
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Design and Implementation of an Access Control Processor for XML Documents," in Computer Networks, n. 1-6, June 2000 (and in Proc. of the 9th International World Wide Web Conference, Amsterdam, May 15-19, 2000)
[]
-
S. Dawson, S. Qian, P. Samarati, "Providing Security and Interoperation of Heterogeneous Systems," in Distributed and Parallel Databases, vol. 8, n. 1, January 2000, pp. 119-145
[]
-
E. Bertino, S. Jajodia, P. Samarati, "A Flexible Authorization Mechanism for Relational Data Management Systems," in ACM Transactions on Information Systems (TOIS), vol. 17, n. 2, April 1999
[]
-
E. Bertino, C. Bettini, E. Ferrari, P. Samarati, "An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning," in ACM Transactions on Database Systems (TODS), vol. 23, n. 3, September 1998, pp. 231-285
[]
-
E. Bertino, S. De Capitani di Vimercati, E. Ferrari, P. Samarati, "Exception-Based Information Flow Control in Object-Oriented Systems," in ACM Transactions on Information and System Security (TISSEC), vol. 1, n. 1, 1998, pp. 26-65
[]
-
E. Bertino, E. Ferrari, P. Samarati, "Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model," in TAPOS - Journal on Theory And Practice of Object Systems, vol. 4, n. 3, 1998, pp. 183-204
[]
-
E. Bertino, C. Bettini, E. Ferrari, P. Samarati, "Decentralized Administration for a Temporal Access Control Model," in Information Systems, vol. 22, n. 4, 1997, pp. 223-248
[]
-
E. Bertino, P. Samarati, S. Jajodia, "An Extended Authorization Model for Relational Databases," in IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 9, n. 1, January-February 1997
[]
-
S. De Capitani di Vimercati, P. Samarati, "Authorization Specification and Enforcement in Federated Database Systems," in Journal of Computer Security (JCS), vol. 5, n. 2, 1997, pp. 155-188
[]
-
P. Samarati, E. Bertino, A. Ciampichetti, S. Jajodia, "Information Flow Control in Object-Oriented Systems," in IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 9, n. 4, August 1997, pp. 524-537
[]
-
E. Bertino, C. Bettini, E. Ferrari, P. Samarati, "A Temporal Access Control Mechanism for Database Systems," in IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 8, n. 1, February 1996, pp. 67-80 (Special Issue on Secure Database Systems Technology)
[]
-
P. Samarati, P. Ammann, S. Jajodia, "Maintaining Replicated Authorizations in Distributed Database Systems," in Data & Knowledge Engineering (DKE), vol. 18, n. 1, February 1996, pp. 55-84
[]
-
P. Samarati, E. Bertino, S. Jajodia, "An Authorization Model for Distributed Hypertext Systems," in IEEE Transactions on Knowledge and Data Engineering (TKDE), vol. 8, n. 4, August 1996, pp. 555-562 (Special Issue on Digital Libraries)
[]
-
R. Sandhu, P. Samarati, "Authentication, Access Control, and Audit," in ACM Computing Surveys, vol. 28, n. 1, March 1996 (short paper)
[]
-
E. Bertino, S. Jajodia, P. Samarati, "Database Security: Research and Practice," in Information Systems, vol. 20, n. 7, November 1995, pp. 537-556
[]
-
E. Bertino, F. Origgi, P. Samarati, "An Extended Authorization Model for Object Databases," in Journal of Computer Security (JCS), vol. 3, n. 6, 1995, pp. 169-206
[]
-
S. Ceri, M.A.W. Houtsma, A.M. Keller, P. Samarati, "Independent Updates and Incremental Agreement in Replicated Databases," in Distributed and Parallel Databases, vol. 3, n. 3, July 1995
[]
-
F. Cacace, P. Samarati, L. Tanca, "Set-Oriented Retrieval of Complex Objects in Inheritance Hierarchies," in Computing, vol. 55, n. 1, 1995, pp. 55-73
[]
-
R. Sandhu, P. Samarati, "Access Control: Principles and Practice," in IEEE Communications, vol. 32, n. 9, September 1994, pp. 40-48
[]
-
M. Abbadini, M. Beretta, S. De Capitani di
Vimercati, D. Facchinetti, S.
Foresti, G. Oldani, S. Paraboschi, M. Rossi
and P. Samarati, "Supporting Data Owner Control in IPFS Networks," in Proc. of 2024 IEEE International Conference on Communications (ICC 2024), Denver, CO, USA, June 9-13, 2024
[]
-
S. De Capitani di Vimercati, S. Foresti, V.
Ghirimoldi, P. Samarati, "DT-Anon: Decision Tree Target-Driven Anonymization," in Proc. of 38th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2024), San Jose, CA, USA, July 15-17, 2024
[]
-
N. Kouka, V. Piuri, P. Samarati, "Tasks Scheduling with Load Balancing in Fog Computing: A Bi-level Multi-Objective Optimization Approach," in Proc. of the Genetic and Evolutionary Computation Conference (GECCO 2024), Melbourne, Australia, July 14-18, 2024
[]
-
B. Moriarty, C-F Chen, S. Hu, S. Moran,
M. Pistoia, V. Piuri, P. Samarati, "Utility-Preserving Biometric Information Anonymization," in Proc. of the 27th European Symposium on Research in Computer Security (ESORICS 2022), Copenhagen, Denmark, September 26-30, 2022
[]
-
S. De Capitani di Vimercati, D. Facchinetti, S.
Foresti, G. Oldani, S. Paraboschi, M. Rossi
and P. Samarati, "Multi-Dimensional Indexes for Point and Range Queries on Outsourced Encrypted Data," in Proc. of the 2021 IEEE Global Communications Conference (GLOBECOM 2021), Madrid, Spain, December 7-11, 2021
[]
-
S. De Capitani di Vimercati, D. Facchinetti, S. Foresti, G. Oldani, S. Paraboschi, M. Rossi, P. Samarati, "Scalable Distributed Data Anonymization," in Proc. of the 19th International Conference on Pervasive Computing and Communications (PerCom 2021), Kassel, Germany (virtual), March 22-26, 2021
[]
-
S. De Capitani di Vimercati, D. Facchinetti, S. Foresti, G. Oldani, S. Paraboschi, M. Rossi, P. Samarati, "Artifact: Scalable Distributed Data Anonymization," in Proc. of the 19th International Conference on Pervasive Computing and Communications (PerCom 2021), Kassel, Germany (virtual), March 22-26, 2021
[]
-
S. De Capitani di Vimercati, S. Foresti, S.
Jajodia, G. Livraga, S. Paraboschi, P.
Samarati, "Distributed Query Evaluation over Encrypted Data," in Proc. of the 35th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2021), Calgary, Canada (virtual), July 19-20, 2021
[]
-
J.S. Vardakas, K. Ramantas, E. Datsika, M.
Payaro, S. Pollin, E. Vinogradov, M.
Varvarigos, P. Kokkinos, R.
Gonzalez-Sanchez, J.J. Vegas Olmos, I.
Chochliouros, P. Chanclou, P. Samarati, A.
Flizikowski, M.A. Rahman, C. Verikoukis, "Towards Machine-Learning-Based 5G and Beyond Intelligent Networks: The MARSAL Project Vision," in 2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom 2021), Athens, Greece, September 7-10, 2021
[]
-
S. De Capitani di Vimercati, S. Foresti, S.
Paraboschi, P. Samarati, "Enforcing Corporate Governance's Internal Controls and Audit in the Cloud," in Proc. of the 13th IEEE International Conference on Cloud Computing (IEEE CLOUD 2020), Beijing, China (virtual), October 19-23, 2020
[]
-
E. Bacis, S. De Capitani di Vimercati, D.
Facchinetti, S. Foresti, G. Livraga, S.
Paraboschi, M. Rosa, P. Samarati, "Multi-Provider Secure Processing of Sensors Data," in Proc. of the 17th IEEE International Conference on Pervasive Computing and Communications (PerCom 2019), Kyoto, Japan, March 11-15, 2019
[]
-
E. Bacis, S. De Capitani di Vimercati, S.
Foresti, S.
Paraboschi, M. Rosa, P. Samarati, "Dynamic Allocation for Resource Protection in Decentralized Cloud Storage," in Proc. of the 2019 IEEE Global Communications Conference (GLOBECOM 2019), Waikoloa, Hawaii, USA, December 9-13, 2019
[]
-
S. De Capitani di Vimercati, S. Foresti, G.
Livraga, P. Samarati, "Empowering Owners with Control in Digital Data Markets," in Proc. of the 12th IEEE International Conference on Cloud Computing (IEEE CLOUD 2019), Milan, Italy, July 8-13, 2019
[]
-
S. De Capitani di Vimercati, S. Foresti, G.
Livraga, P. Samarati, "Data Security and Privacy in the Cloud," in Proc. of SPIE 10993, Mobile Multimedia/Image Processing, Security, and Applications 2019, 109930D, Baltimore, MD, USA, May 13, 2019
[]
-
E. Bacis, A. Barnett, A. Byrne, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, M. Rosa, P. Samarati, "Distributed Shuffle Index: Analysis and Implementation in an Industrial Testbed," in Proc. of the 5th IEEE Conference on Communications and Network Security (CNS 2017), Las Vegas, NV, USA, October 9-11, 2017 (poster)
[]
-
E. Bacis, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, M. Rosa, P. Samarati, "Distributed Shuffle Index in the Cloud: Implementation and Evaluation," in Proc. of the 4th IEEE International Conference on Cyber Security and Cloud Computing (IEEE CSCloud 2017), New York, USA, June 26-28, 2017
[]
-
A. Arman, S. Foresti, G. Livraga, P. Samarati, "A Consensus-based Approach for Selecting Cloud Plans," in Proc. of the 2nd International Forum on Research and Technologies for Society and Industry (RTSI 2016), Bologna, Italy, September 7-9, 2016
[]
-
E. Bacis, S. De Capitani di Vimercati, S. Foresti, D. Guttadoro, S. Paraboschi, M. Rosa, P. Samarati, A. Saullo, "Managing Data Sharing in OpenStack Swift with Over-Encryption," in Proc. of the 3rd ACM Workshop on Information Sharing and Collaborative Security (WISCS 2016), Vienna, Austria, October 24, 2016
[]
-
E. Bacis, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, M. Rosa, P. Samarati, "Mix&Slice: Efficient Access Revocation in the Cloud," in Proc. of the 23rd ACM Conference on Computer and Communication Security (CCS 2016), Vienna, Austria, October 24-28, 2016
[]
-
E. Bacis, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, M. Rosa, P. Samarati, "Access Control Management for Secure Cloud Storage," in Proc. of the 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, October 10-12, 2016
[]
-
S. De Capitani di Vimercati, S. Foresti, R. Moretti, S. Paraboschi, G. Pelosi, P. Samarati, "A Dynamic Tree-based Data Structure for Access Privacy in the Cloud," in Proc. of the 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016), Luxembourg, Luxembourg, December 12-15, 2016
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Access Control for the Shuffle Index," in Proc. of the 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016), Trento, Italy, July 18-21, 2016
[]
-
S. De Capitani di Vimercati, G. Livraga, V. Piuri
and P. Samarati, G.A. Soares, "Supporting Application Requirements in Cloud-based IoT Information Processing," in Proc. of the International Conference on Internet of Things and Big Data (IoTBD 2016), Rome, Italy, April 23-25, 2016
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Integrity for Approximate Joins on Untrusted Computational Servers," in Proc. of the 30th International Information Security and Privacy Conference (SEC 2015), Hamburg, Germany, May 26-28, 2015
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, "Integrity for Distributed Queries," in Proc. of the 2nd IEEE Conference on Communications and Network Security (CNS 2014), San Francisco, CA, USA, October 29-31, 2014
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Optimizing Integrity Checks for Join Queries in the Cloud," in Proc. of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria, July 14-16, 2014 (best paper award)
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Protecting Access Confidentiality with Data Distribution and Swapping," in Proc. of the 4th IEEE International Conference on Big Data and Cloud Computing (BDCloud 2014), Sydney, Australia, December 3-5, 2014
[]
-
P. Samarati, "Data Security and Privacy in the Cloud," in Proc. of 10th International Conference on Information Security Practice and Experience (ISPEC 2014), Fuzhou, China, May 5-8, 2014
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, "Extending Loose Associations to Multiple Fragments," in Proc. of the 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2013), Newark, NJ, USA, July 15-17, 2013 (best paper runner-up award)
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "On Information Leakage by Indexes over Data Fragments," in Proc. of the 1st International Workshop on Privacy-Preserving Data Publication and Analysis (PrivDB 2013), Brisbane, Australia, April 8, 2013
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Distributed Shuffling for Preserving Access Confidentiality," in Proc. of the 18th European Symposium on Research in Computer Security (ESORICS 2013), Egham, U.K., September 9-11, 2013
[]
-
C.A. Ardagna, G. Livraga, P. Samarati, "Protecting Privacy of User Information in Continuous Location-Based Services," in Proc. of the 15th IEEE International Conference on Computational Science and Engineering (CSE 2012), Paphos, Cyprus, December 5-7, 2012
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Support for Write Privileges on Outsourced Data," in Proc. of the 27th IFIP TC-11 International Information Security and Privacy Conference (SEC 2012), Heraklion, Crete, Greece, June 4-6, 2012
[]
-
S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Managing and Accessing Data in the Cloud: Privacy Risks and Approaches," in Proc. of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012), Cork, Ireland, October 10-12, 2012
[]
-
R. Jhawar, V. Piuri, P. Samarati, "Supporting Security Requirements for Resource Management in Cloud Computing," in Proc. of the 15th IEEE International Conference on Computational Science and Engineering (CSE 2012), Paphos, Cyprus, December 5-7, 2012
[]
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach," in Proc. of the 25th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2011), Richmond, VA, USA, July 11-13, 2011
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Private Data Indexes for Selective Access to Outsourced Data," in Proc. of the 10th Workshop on Privacy in the Electronic Society (WPES 2011), Chicago, Illinois, USA, October 17, 2011
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Supporting Concurrency in Private Data Outsourcing," in Proc. of the 16th European Symposium on Research in Computer Security (ESORICS 2011), Leuven, Belgium, September 12-14, 2011
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Efficient and Private Access to Outsourced Data," in Proc. of the 31st International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, Minnesota, USA, June 20-24, 2011
[]
-
C.A. Ardagna, S. De Capitani di Vimercati, S. Foresti, G. Neven, S. Paraboschi, F.-S. Preiss, P. Samarati, M. Verdicchio, "Fine-Grained Disclosure of Access Policies," in Proc. of the 12th International Conference on Information and Communications Security (ICICS 2010), Barcelona, Spain, December 15-17, 2010
[]
-
C.A. Ardagna, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Minimizing Disclosure of Private Information in Credential-Based Interactions: A Graph-Based Approach," in Proc. of the 2nd IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2010), Minneapolis, Minnesota, USA, August 20-22, 2010
[]
-
C.A. Ardagna, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Supporting User Privacy Preferences on Information Release in Open Scenarios," in Proc. of the W3C Workshop on Privacy and Data Usage Control, Cambridge, Massachusetts, USA, October 4-5, 2010
[]
-
C.A. Ardagna, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Supporting Privacy Preferences in Credential-Based Interactions," in Proc. of the Workshop on Privacy in the Electronic Society (WPES 2010), Chicago, Illinois, USA, October 4, 2010
[]
-
C.A. Ardagna, S. De Capitani di Vimercati, G. Neven, S. Paraboschi, F.-S. Preiss, P. Samarati, M. Verdicchio, "Enabling Privacy-Preserving Credential-Based Access Control with XACML and SAML," in Proc. of the 3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2010), Bradford, UK, June-July 2010
[]
-
C.A. Ardagna, S. Jajodia, P. Samarati, A. Stavrou, "Providing mobile users' anonymity in hybrid networks," in Proc. 15th European Symposium on Research in Computer Security (ESORICS 2010), Athens, Greece, September 2010
[]
-
M. Bezzi, S. De Capitani di Vimercati, G. Livraga, P. Samarati, "Protecting Privacy of Sensitive Value Distributions in Data Release," in Proc. of the 6th Workshop on Security and Trust Management (STM 2010), Athens, Greece, September 23-24, 2010
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Pelosi, P. Samarati, "Encryption-based Policy Enforcement for Cloud Storage," in Proc. of the 1st ICDCS Workshop on Security and Privacy in Cloud Computing (SPCC 2010), Genova, Italy, June 25, 2010
[]
-
P. Samarati, S. De Capitani di Vimercati, "Data Protection in Outsourcing Scenarios: Issues and Directions," in Proc. of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, April 2010 (invited paper)
[]
-
C.A. Ardagna, L. Bussard, S. De Capitani di Vimercati, G. Neven, E. Pedrini, S. Paraboschi, F. Preiss, P. Samarati, S. Trabelsi, M. Verdicchio, "PrimeLife Policy Language," in Proc. of the W3C Workshop on Access Control Application Scenarios, Luxembourg, November 17-18, 2009
[]
-
C.A. Ardagna, S. De Capitani di Vimercati, E. Pedrini, S. Paraboschi, P. Samarati, M. Verdicchio, "Extending XACML for Open Web-based Scenarios," in Proc. of the W3C Workshop on Access Control Application Scenarios, Luxembourg, November 17-18, 2009
[]
-
C. A. Ardagna, S. De Capitani di Vimercati, S. Paraboschi, E. Pedrini, P. Samarati, "An XACML-Based Privacy-Centered Access Control System," in Proc. of the 1st ACM Workshop on Information Security Governance (WISG 2009), Chicago, Illinois, USA, November 13, 2009
[]
-
C. Blundo, S. Cimato, S. De Capitani di Vimercati, A. De Santis, S. Foresti, S. Paraboschi, P. Samarati, "Efficient Key Management for Enforcing Access Control in Outsourced Scenarios," in Proc. of the 24th IFIP TC-11 International Information Security Conference (SEC 2009), Cyprus, Greece, May 18-20, 2009
[]
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients," in Proc. of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2009), Montreal, Quebec, Canada, July 12-15, 2009
[]
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S.
Jajodia, S. Paraboschi, P. Samarati, "Keep a Few: Outsourcing Data while Maintaining Confidentiality," in Proc. of the 14th European Symposium On Research In Computer Security (ESORICS 2009), Saint Malo, France, September 21-25, 2009
[]
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S.
Jajodia, S. Paraboschi, P. Samarati, "Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases," in Proc. of the 29th International Conference on Distributed Computing Systems (ICDCS 2009), Montreal, Quebec, Canada, June 22-26, 2009
[]
-
C.A. Ardagna, S. De Capitani di Vimercati, T. Grandison, S. Jajodia, P. Samarati, "Regulating Exceptions in Healthcare using Policy Spaces," in Proc. of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2008), London, U.K., July 13-16, 2008
[]
-
C.A. Ardagna, A.Stavrou, S.Jajodia, P.Samarati, R. Martin, "A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks," in Proc. of the International Workshop on Privacy in Location-Based Applications (PILBA 2008), Malaga, Spain, October 9, 2008
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Pelosi, P. Samarati, "Preserving Confidentiality of Security Policies in Data Outsourcing," in Proc. of the Workshop on Privacy in the Electronic Society (WPES 2008), Alexandria, Virginia, USA, October 27, 2008
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Assessing Query Privileges via Safe and Efficient Permission Composition," in Proc. of the 15th ACM Conference Conference on Computer and Communications Security (CCS 2008), Alexandria, Virginia, USA, October 27-31, 2008
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Controlled Information Sharing in Collaborative Distributed Query Processing," in Proc. of the 28th International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China, June 17-20, 2008
[]
-
C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Location Privacy Protection Through Obfuscation-based Techniques," in Proc. of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2007), Redondo Beach, CA, USA, July 8-11, 2007
[]
-
C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Managing Privacy in LBAC Systems," in Proc. of the Second IEEE International Symposium on Pervasive Computing and Ad Hoc Communications (PCAC 2007), Niagara Falls, Canada, May 2007
[]
-
C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy," in Proc. of the 22nd IFIP TC-11 International Information Security Conference (SEC 2007), Sandton, South Africa, May 14-16, 2007
[]
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Fragmentation and Encryption to Enforce Privacy in Data Storage," in Proc. of the 12th European Symposium On Research In Computer Security (ESORICS 2007), Dresden, Germany, September 24-26, 2007
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "An experimental evaluation of multi-key strategies for data outsourcing," in Proc. of the 22nd IFIP TC-11 International Information Security Conference (SEC 2007), Sandton, South Africa, May 14-16, 2007
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "A Data Outsourcing Architecture Combining Cryptography and Access Control," in Proc. of the 1st Computer Security Architecture Workshop (CSAW 2007), Fairfax, Virginia, USA, November 2, 2007
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Over-encryption: Management of Access Control Evolution on Outsourced Data," in Proc. of the 33rd International Conference on Very Large Data Bases (VLDB 2007), Vienna, Austria, September 23-28, 2007
[]
-
S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, P. Samarati, "Trust Management Services in Relational Databases," in Proc. of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), Singapore, March 20-22, 2007
[]
-
M. Anisetti, C.A. Ardagna, V. Bellandi, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "OpenAmbient: a Pervasive Access Control Architecture," in Proc. of ETRICS Workshop on Security in Autonomous Systems (SecAS), Friburg, Germany, June 2006
[]
-
C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Supporting Location-Based Conditions in Access Control Policies," in Proc. of the ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS 2006), Taipei, Taiwan, March 21-24, 2006
[]
-
C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Negotiation Protocols for LBAC Systems," in Proc. of 1st International Conference on Information Security and Computer Forensics (ISCF 2006), Chennai, India, December 6-8, 2006
[]
-
C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Location-based Metadata and Negotiation Protocols for LBAC in a One-to-Many Scenario," in Proc. of the Workshop On Security and Privacy in Mobile and Wireless Networking (SecPri MobiWi 2006), Coimbra, Portogal, May 19, 2006
[]
-
C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, F. Frati, P. Samarati, "CAS++: an Open Source Single Sign-On Solution for Secure e-Services," in Proc. of the 21st IFIP TC-11 International Information Security Conference, Karlstad, Sweden, May 22-24, 2006
[]
-
C.A. Ardagna, S. De Capitani di Vimercati, P. Samarati, "Enhancing User Privacy Through Data Handling Policies," in Proc. of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2006), Sophia Antipolis, France, July-August 2006
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Selective Data Encryption in Outsourced Dynamic Environments," in Proc. of the 2nd International Workshop on Views On Designing Complex Architectures (VODCA 2006), Bertinoro, Italy, September 16-17, 2006
[]
-
E. Damiani, S. De Capitani di Vimercati, C. Fugazza, P. Samarati, "Extending Context Descriptions in Semantics-Aware Access Control," in Proc. of the 2nd International Conference on Information Systems Security (ICISS 2006), Kolkata, India, December 17-21, 2006
[]
-
E. Damiani, S. De Capitani di Vimercati, C. Fugazza, P. Samarati, "Modality Conflicts in Semantics-Aware Access Control," in Proc. of the International Conference on Web Engineering, Menlo Park, California, USA, July 12-14, 2006
[]
-
C.A. Ardagna, E. Damiani, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "The Architecture of a Privacy-aware Access Control Decision Component," in Proc. of the Construction and Analysis of Safe, Secure and Interoperable Smart devices (CASSIS 2005), Nice, France, March 8-11, 2005
[]
-
C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, M. Cremonini, P. Samarati, "Towards Identity Management for E-Services," in Proc. of the TED Conference on e-Government Electronic democracy: The challenge ahead (poster session), Bolzano, Italy, March 2005
[]
-
C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, C. Fugazza, P. Samarati, "Offline Expansion of XACML Policies Based on P3P Metadata," in Proc. of the 5th International Conference on Web Engineering, Sydney, Australia, July 25-29, 2005
[]
-
R. Aringhieri, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Assessing Efficiency of Trust Management in Peer-to-Peer Systems," in Proc. of the 1st International Workshop on Collaborative Peer-to-Peer Information Systems (COPS 2005), Linkoping University, Sweden, June 13-15, 2005
[]
-
C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Towards Privacy-Enhanced Authorization Policies and Languages," in Proc. of the 19th IFIP WG11.3 Working Conference on Data and Application Security, Nathan Hale Inn, University of Connecticut, Storrs, USA, August 7-10, 2005
[]
-
P. Ceravolo, E. Damiani, S. De Capitani di Vimercati, C. Fugazza, P. Samarati, "Advanced Metadata for Privacy-Aware Representation of Credentials," in Proc. of the International Workshop on Privacy Data Management, Tokyo, Japan, April 8-9, 2005
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Metadata Management in Outsourced Encrypted Databases," in Proc. of the 2nd VLDB Workshop on Secure Data Management (SDM 2005), Trondheim, Norway, September 2-3, 2005
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, P. Samarati, "Key Management for Multiuser Encrypted Databases," in Proc. of the International Workshop on Storage Security and Survivability, Fairfax, Virginia, USA, November 11, 2005
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, M. Viviani, "Measuring Inference Exposure in Outsourced Encrypted Databases," in Proc. of the 1st Workshop on Quality of Protection (QoP 2005), Milan, Italy, September 15, 2005 (short paper)
[]
-
E. Damiani, S. De Capitani di Vimercati, P. Samarati, "New Paradigms for Access Control in Open Environments," in Proc. of the 5th IEEE International Symposium on Signal Processing and Information, Athens, Greece, December 18-21, 2005
[]
-
E. Damiani, S. De Capitani di Vimercati, P. Samarati, M. Viviani, "A WOWA-based Aggregation Technique on Trust Values Connected to Metadata," in Proc. of the1st International Workshop on Security and Trust Management (STM 2005), Milan, Italy, September 15, 2005
[]
-
S. De Capitani di Vimercati, S. Marrara, P. Samarati, "An Access Control Model for Querying XML Data," in Proc. of the ACM Workshop on Secure Web Services (SWS 2005), Fairfax, VA, USA, November 11, 2005
[]
-
S. De Capitani di Vimercati, P. Samarati, S. Jajodia, "Policies, Models, and Languages for Access Control," in Proc. of the Workshop on Databases in Networked Information Systems, Aizu-Wakamatsu, Japan, March 28-30, 2005
[]
-
C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "A Web Service Architecture for Enforcing Access Control Policies," in Proc. of the First International Workshop on Views On Designing Complex Architectures (VODCA 2004), Bertinoro, Italy, September 11-12, 2004
[]
-
S. Chhabra, E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "A Protocol for Reputation Management in Super-Peer Networks," in Proc. of the 1st International Workshop on Peer2Peer Data Management, Security and Trust, Zaragoza, Spain, August - September 2004
[]
-
E. Damiani, S. De Capitani di Vimercati, C. Fugazza, P. Samarati, "Extending Policy Languages to the Semantic Web," in Proc. of the International Conference on Web Engineering, Munich, Germany, July 28-30, 2004
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Computing Range Queries on Obfuscated Data," in Proc. of the Information Processing and Management of Uncertainty in Knowledge-Based Systems, Perugia, Italy, July 2004
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "P2P-based Collaborative Spam Detection and Filtering," in Proc. of the fourth IEEE International Conference on Peer-to-Peer Computing, Zurich, Switzerland, August 25-27, 2004
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "An Open Digest-based Technique for Spam Detection," in Proc. of the 2004 International Workshop on Security in Parallel and Distributed Systems, San Francisco, CA, USA, September 15-17, 2004
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, A. Tironi, L. Zaniboni, "Spam Attacks: P2P to the Rescue," in Poster Proceedings of the 13th World Wide Web Conference, New York City, USA, May 2004
[]
-
P. Bonatti, S. De Capitani di Vimercati, P. Samarati, "Towards Flexible Credential Negotiation Protocols," in Proc. of the Eleventh Cambridge International Workshop on Security Protocols, Cambridge, England, April 2003
[]
-
M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "An XML-based Approach to Combine Firewalls and Web Services Security Specifications," in Proc. of the ACM Workshop on XML Security, Washington, DC, USA, October 2003
[]
-
M. Cremonini, E. Damiani, P. Samarati, "Semantic-Aware Perimeter Protection," in Proc. of the 17th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, Estes Park, CO, USA, August 2003
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, P. Samarati, "Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs," in Proc. of the 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington, DC, USA, October 2003
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, M. Pesenti, P. Samarati, S. Zara, "Fuzzy Logic Techniques for Reputation Management in Anonymous Peer-to-Peer Systems," in Proc. of the 3rd International Conference in Fuzzy Logic and Technology, Zittau, Germany, September 2003
[]
-
E. Damiani, S. De Capitani di Vimercati, M. Finetti, S. Jajodia, S. Paraboschi, P. Samarati, "Implementation of a Storage Mechanism for Untrusted DBMSs," in Proc. of the Second International IEEE Security in Storage Workshop, Washington, DC, USA, October 2003
[]
-
F. Cornelli, E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Implementing a Reputation-Aware Gnutella Servent," in Proc. of the International Workshop on Peer-to-Peer Computing, Pisa, Italy, May 2002
[]
-
F. Cornelli, E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P . Samarati, "Choosing Reputable Servents in a P2P Network," in Proc. of the 11th International World Wide Web Conference, Honolulu, Hawaii, May 2002
[]
-
E. Damiani, S. De Capitani di Vimercati, E. Fernandez-Medina, P. Samarati, "An Access Control System for SVG Documents," in in Proc. of the 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security (DBSec 2002), King's College, University of Cambridge, UK, July 2002
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, F. Violante, "A Reputation-based Approach for Choosing Reliable Resources in Peer-to-Peer Networks," in Proc. of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, DC, USA, November 2002
[]
-
E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Towards Securing XML Web Services," in Proc. of the 2002 ACM Workshop on XML Security, Washington, DC, USA, November 2002
[]
-
P. Bonatti, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "A Component-based Architecture for Secure Data Publication," in Proc. of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, December 2001
[]
-
P. Bonatti, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "An Access Control Model for Data Archives," in Proc. of the 16th International Conference on Information Security, Paris, France, June 2001
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Fine Grained Access Control for SOAP E-Services," in Proc. of the 10th International World Wide Web Conference, Hong Kong, China, May 2001
[]
-
P. Bonatti, S. De Capitani di Vimercati, P. Samarati, "A Modular Approach to Composing Access Control Policies," in Proc. of the Seventh ACM Conference on Computer and Communications Security, Athens, Greece, 2000
[]
-
P. Bonatti, P. Samarati, "Regulating Service Access and Information Release on the Web," in Proc. of the Seventh ACM Conference on Computer and Communications Security, Athens, Greece, 2000
[]
-
S. Dawson, S. De Capitani di Vimercati, P. Lincoln, P. Samarati, "Classifying Information for External Release," in Proc. of the 15th International Conference on Information Security (IFIP SEC2000), Beijing, China, August 2000
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Securing XML Documents," in Proc. of the 2000 International Conference on Extending Database Technology (EDBT 2000), Konstanz, Germany, March 2000
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "XML Access Control Systems: A Component-Based Approach," in Proc. of the 14th Annual IFIP WG 11.3 Working Conference on Database Security, Schoorl, The Netherlands, August 2000
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Regulating Access to Semistructured Information on the Web," in Proc. of the 15th International Information Security Conference (IFIP SEC 2000), Beijing, China, August 2000
[]
-
S. Dawson, P. Samarati, S. De Capitani di Vimercati, P. Lincoln, G. Wiederhold, M. Bilello, J. Akella, "Secure Access Wrapper: Mediating Security Between Heterogeneous Databases," in Proc. of the Darpa Information Survivability Conference & Exposition, Hilton Head, South Carolina, USA, January 2000
[]
-
S. Dawson, S. De Capitani di Vimercati, P. Lincoln, P. Samarati, "Minimal Data Upgrading to Prevent Inference and Association Attacks," in Proc. of the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), Philadelphia, PA, USA, May - June 1999
[]
-
S. Dawson, S. De Capitani di Vimercati, P. Samarati, "Specification and Enforcement of Classification and Inference Constraints," in Proc. of the 20th IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 1999
[]
-
S. De Capitani di Vimercati, P. Lincoln, L. Ricciulli, P. Samarati, "PGRIP: PNNI Global Routing Infrastructure Protection," in The Internet Society 1999 Network and Distributed System Security Symposium (NDSS 1999), San Diego, CA, USA, February 1999
[]
-
S. Dawson, S. Qian, P. Samarati, "Secure Interoperation of Heterogeneous Systems: A Mediator-Based Approach," in Proc. of the 14th IFIP TC-11 International Conference on Information Security, Vienna, Budapest, August 1998
[]
-
S. Dawson, P. Samarati, G. Wiederhold, "Ensuring Survivability in Information Sharing," in Information Survivability Workshop 1998 (ISW'98), Orlando, Florida, October 1998 (Position paper)
[]
-
L. Ricciulli, S. De Capitani di Vimercati, P. Lincoln, P. Samarati, "PNNI Global Routing Infrastructure Protection," in Information Survivability Workshop 1998 (ISW'98), Orlando, Florida, USA, October 1998 (Position paper)
[]
-
P. Samarati, L. Sweeney, "Generalizing Data to Provide Anonymity when Disclosing Information," in Proc. of the 17th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS 1998), Seattle, WA, USA, June 1-3, 1998
[]
-
E. Ferrari, P. Samarati, E. Bertino, S. Jajodia, "Providing Flexibility in Information Flow Control for Object-Oriented Systems," in Proc. of the 1997 IEEE Symposium on Security and Privacy, Oakland, CA, May 1997
[]
-
S. Jajodia, P. Samarati, V.S. Subramanian, E. Bertino, "A Unified Framework for Enforcing Multiple Access Control Policies," in Proc. of the 1997 ACM International SIGMOD Conference on Management of Data, Tucson, AZ, May 1997
[]
-
S. Jajodia, P. Samarati, V.S. Subramanian, "A Logical Language for Expressing Authorizations," in Proc. of the 1997 IEEE Symposium on Security and Privacy, Oakland, CA, May 1997
[]
-
E. Bertino, C. Bettini, E. Ferrari, P. Samarati, "A Decentralized Temporal Authorization Model," in Information Systems Security - Facing the Information Society of the 21st Century, S.K. Katsikas, D. Gritzalis (eds.), Chapman & Hall, 1996
[]
-
E. Bertino, C. Bettini, E. Ferrari, P. Samarati, "Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control," in Proc. of the 22nd International Conference on Very Large Databases (VLBD), Bombay, India, September 1996
[]
-
E. Bertino, S. Jajodia, P. Samarati, "A Non-Timestamped Authorization Model for Relational Databases," in Proc. of the 3rd ACM Conference on Computer and Communications Security, New Delhi, India, March 1996
[]
-
E. Bertino, S. Jajodia, P. Samarati, "Supporting Multiple Access Control Policies in Database Systems," in Proc. of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, May 1996
[]
-
S. De Capitani di Vimercati, P. Samarati, "An Authorization Model for Federated Systems," in Proc. of the 4th European Symposium on Research in Computer Security, ESORICS'96, Rome, Italy, September 1996
[]
-
S. De Capitani di Vimercati, P. Samarati, "Access Control in Federated Systems," in Proc. of the ACM SIGSAC New Security Paradigms Workshop, Lake Arrowhead, CA, USA, September 1996
[]
-
E. Ferrari, E. Bertino, C. Bettini, A. Motta, P. Samarati, "On Using Materialization Strategies for a Temporal Authorization Model," in Proc. of the Int. Workshop on Materialized Views: Techniques and Applications (in co-operation with ACM-SIGMOD), Montreal, Canada, June 1996
[]
-
E. Bertino, P. Samarati, "Research Issues in Authorization Models for Hypertext Systems," in Proc. of the 1995 ACM SIGSAC New Security Paradigms Workshop, La Jolla, CA, August 1995
[]
-
E. Bertino, C. Bettini, P. Samarati, "A Temporal Authorization Model," in Proc. of the 2nd ACM Conference on Computer and Communications Security, Fairfax, VA, Novemver 1994
[]
-
E. Bertino, C. Bettini, P. Samarati, "A Discretionary Access Control Model with Temporal Authorizations," in Proc. of the 1994 ACM SIGSAC New Security Paradigms Workshop, Little Compton, RI, August 1994
[]
-
E. Bertino, S. Jajodia, P. Samarati, "Enforcing Mandatory Access Controls in Object Bases," in Security for Object-Oriented Systems, B. Thuraisingham, R. Sandhu, T.Y. Lin (eds.), Springer Verlag London Ltd., 1994
[]
-
E. Bertino, F. Origgi, P. Samarati, "A New Authorization Model for Object-Oriented Databases," in Database Security VIII - Status and Prospects, J. Biskup, M. Morgesten, C.E. Landwehr (eds.), North-Holland, 1994
[]
-
E. Bertino, P. Samarati, "Research Issues in Discretionary Authorizations for Object Bases," in Security for Object-Oriented Systems, B. Thuraisingham, R. Sandhu, T.Y. Lin (eds.), Springer Verlag London Ltd., 1994
[]
-
P. Samarati, P. Ammann, S. Jajodia, "Propagation of Authorizations in Distributed Databases," in Proc. of the 2nd ACM Conference on Computer and Communications Security, Fairfax, VA, November 1994
[]
-
S. Castano, G. Martella, P. Samarati, "A New Approach to Security System Development," in Proc. of the 1994 ACM SIGSAC New Security Paradigms Workshop, Little Compton, RI, August 1994
[]
-
E. Bertino, P. Samarati, S. Jajodia, "Authorizations in Relational Database Management Systems," in Proc. of the First ACM Conference on Computer and Communications Security, Fairfax, VA, November 1993
[]
-
E. Bertino, P. Samarati, S. Jajodia, "High Assurance Discretionary Access Control for Object Bases," in Proc. of the First ACM Conference on Computer and Communications Security, Fairfax, VA, November 1993
[]
-
S. Castano, P. Samarati, C. Villa, "Verifying System Security Using Petri Nets," in Proc. of the IEEE 27th Int. Carnahan Conf. on Security Technology, Ottawa, Canada, October 1993
[]
-
S. Ceri, M.A.W. Houtsma, A.M. Keller, P. Samarati, "Achieving Incremental Consistency among Autonomous Replicated Databases," in Proc. of the IFIP Working Conference on Semantics of Interoperable Database Systems (DS-5), Lorne, Australia, November 1992
[]
-
S. Ceri, M.A.W. Houtsma, A.M. Keller, P. Samarati, "The Case for Independent Updates," in Proc. of the 2nd Workshop on the Management of Replicated Data II, Monterey, California, November 1992
[]
-
S. Castano, P. Samarati, "Modeling Users' Behavior and Threats in Security Systems," in Proc. of the Int. Conf. on Safety, Security, and Reliability of Computers (Safecomp '92), Zurich, September 1992
[]
-
S. Castano, P. Samarati, "An Object-Oriented Security Model for Office Environments," in Proc. of the IEEE 26th Int. Carnahan Conf. on Security Technology, Atlanta, October 1992
[]
-
V. De Antonellis, B. Pernici, P. Samarati, "Object-Orientation in the Analysis of Work Organization and Agent Cooperation," in Dynamic Modeling of Information Systems, II, H.G. Sol, R.L. Crosslin (ed.), North-Holland, 1992
[]
-
M.G. Fugini, G. Martella, P. Samarati, "Complementing Access Controls for Comprehensive Security," in Proc. International Conference on Information Systems and Management of Data (CISMOD), Bangalore, July 1992
[]
-
F. Carrettoni, S. Castano, G. Martella, P. Samarati, "RETISS: A Real TIme Security System for Threat Detection Using Fuzzy Logic," in Proc. of the IEEE 25th Int. Carnahan Conf. on Security Technology, Taiwan, October 1991
[]
-
V. De Antonellis, B. Pernici, P. Samarati, "Designing Information Systems for Cooperating Agents," in Human Aspects in Computing: Design and Use of Interactive Systems and Information Management, H.J. Bullinger (ed.), Elsevier Science Publ., 1991
[]
-
V. De Antonellis, B. Pernici, P. Samarati, "F-ORM METHOD: A F-ORM Methodology for Reusing Specifications," in The Object-Oriented Approach in Information Systems, F. Van Assche, B. Moulin, C. Roland (eds.), North-Holland, 1991
[]
-
S. De Capitani di Vimercati, S. Foresti, P.
Samarati, "Query Integrity in Smart Environments," in Security and Privacy in Smart Environments, N. Pitropakis, S. Katsikas (eds.), Springer Nature, 2024
[]
-
S. De Capitani di Vimercati, S. Foresti, G.
Livraga, P. Samarati, "Digital Infrastructure Policies for Data Security and Privacy in Smart Cities," in Smart Cities Policies and Financing, J. Vacca (ed.), Elsevier, 2022
[]
-
S. De Capitani di Vimercati, S. Foresti, G.
Livraga, P. Samarati, "Towards Owner-Controlled Data Sharing," in Advances in Computing, Informatics, Networking and Cybersecurity: A Book Honoring Professor Mohammad S. Obaidat's Significant Scientific Contributions, P. Nicopolitidis, S. Misra, L.T. Yang (eds.), Springer, 2022
[]
-
S. De Capitani di Vimercati, S. Foresti, P.
Samarati, "Specification and Enforcement of Access Policies in Emerging Scenarios," in Cloud Computing Security: Foundations and Challenges, 2nd Edition, J. Vacca (ed.), CRC Press, 2020
[]
-
E. Bacis, S. De Capitani di Vimercati, S. Foresti
and S. Paraboschi, M. Rosa, P. Samarati, "Protecting Resources and Regulating Access in Cloud-based Object Storage," in From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of his 70th Birthday, I. Ray, I. Ray, P. Samarati (eds.), Springer, 2018
[]
-
S. De Capitani di Vimercati, S. Foresti, G.
Livraga, V. Piuri, P. Samarati, "Supporting Users in Cloud Plan Selection," in From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of his 70th Birthday, P. Samarati, I. Ray, I. Ray (eds.), Springer, 2018
[]
-
S. De Capitani di Vimercati, S. Foresti, S.
Paraboschi, G. Pelosi, P. Samarati, "Access Privacy in the Cloud," in From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of his 70th Birthday, I. Ray, I. Ray, P. Samarati (eds.), Springer, 2018
[]
-
S. De Capitani di Vimercati, S. Foresti, G.
Livraga, S. Paraboschi, P. Samarati, "Confidentiality Protection in Large Databases," in A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years, S. Flesca, S. Greco, E. Masciari, D.
Sacca' (eds.), Springer, 2017
[]
-
S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Supporting Users in Data Outsourcing and Protection in the Cloud," in International Conference on Cloud Computing and Services Science, M. Helfert, D. Ferguson, V.M. Munoz, J. Cardoso (eds.), Springer, 2017
[]
-
S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud," in The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday, P. Ryan, D. Naccache, J.-J. Quisquater (eds.), Springer, 2016
[]
-
S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Specification and Enforcement of Access Policies in Emerging Scenarios," in Cloud Computing Security: Foundations and Challenges, J.R. Vacca (ed.), CRC Press, August 2016
[]
-
P. Samarati, S. De Capitani di Vimercati, "Cloud Security: Issues and Concerns," in Encyclopedia on Cloud Computing, S. Murugesan, I. Bojanova (eds.), Wiley, 2016
[]
-
S. De Capitani di Vimercati, S. Foresti, G.
Livraga, S. Paraboschi, P. Samarati, "Privacy in Pervasive Systems: Social and Legal Aspects and Technical Solutions," in Data Management in Pervasive Systems, F. Colace, M. De Santo, V. Moscato, A.
Picariello, F. Schreiber, L. Tanca (eds.), Springer, 2015
[]
-
S. De Capitani di Vimercati, S. Foresti, G.
Livraga, P. Samarati, "Selective and Private Access to Outsourced Data Centers," in Handbook on Data Centers, S.U. Khan, A.Y. Zomaya (eds.), Springer, 2015
[]
-
S. De Capitani di Vimercati, R.F. Erbacher, S.
Foresti, S. Jajodia, G. Livraga, P. Samarati, "Encryption and Fragmentation for Data Confidentiality in the Cloud," in Foundations of Security Analysis and Design VII, A. Aldini, J. Lopez, F. Martinelli (eds.), Springer, 2014
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, P. Samarati, "Database Security and Privacy," in Computer Science Handbook (3rd edition) - Information Systems and Information Technology, A. Tucker, H. Topi (eds.), Taylor and Francis Group, 2014
[]
-
S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Selective and Fine-Grained Access to Data in the Cloud," in Secure Cloud Computing, S. Jajodia, K. Kant, P. Samarati, V. Swarup, C. Wang (eds.), Springer, 2014
[]
-
S. De Capitani di Vimercati, P. Samarati, R. Sandhu, "Access Control," in Computer Science Handbook (3rd edition) - Information Systems and Information Technology, A. Tucker, H. Topi (eds.), Taylor and Francis Group, 2014
[]
-
S. Foresti, P. Samarati, "Supporting User Privacy Preferences in Digital Interactions," in Computer and Information Security Handbook, J.R. Vacca (ed.), Morgan Kaufmann, 2013 (2nd Edition)
[]
-
S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Protecting Data in Outsourcing Scenarios," in Handbook on Securing Cyber-Physical Critical Infrastructure, S.K Das, K. Kant, N. Zhang (eds.), Morgan Kaufmann, 2012
[]
-
C.A. Ardagna, S. De Capitani di Vimercati, G. Neven, S. Paraboschi, E. Pedrini, F.-S. Preiss, P. Samarati, M. Verdicchio, "Advances in Access Control Policies," in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Huebner, K. Rannenberg (eds.), Springer, 2011
[]
-
C.A. Ardagna, S. De Capitani di Vimercati, E. Pedrini, P. Samarati, "Privacy-Aware Access Control System: Evaluation and Decision," in Digital Privacy: PRIME - Privacy and Identity Management for Europe, J. Camenisch, R. Leenes, D. Sommer (eds.), Springer, 2011
[]
-
C.A. Ardagna, S. De Capitani di Vimercati, P. Samarati, "Personal Privacy in Mobile Networks," in Mobile Technologies for Conflict Management: Online Dispute Resolution, Governance, Participation, M. Poblet (ed.), Springer Science+Business Media B.V., 2011
[]
-
C.A. Ardagna, S. De Capitani di Vimercati, P. Samarati, "Privacy Models and Languages: Access Control and Data Handling Policies," in Digital Privacy: PRIME - Privacy and Identity Management for Europe, J. Camenisch, R. Leenes, D. Sommer (eds.), Springer, 2011
[]
-
M. Bezzi, S. De Capitani di Vimercati, S. Foresti, G. Livraga, S. Paraboschi, P. Samarati, "Data Privacy," in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hubner, K. Rannenberg (eds.), Springer, 2011
[]
-
S. De Capitani di Vimercati, S. Foresti, G.
Livraga, P. Samarati, "Protecting Privacy in Data Release," in Foundations of Security Analysis and Design VI, A. Aldini, R. Gorrieri (eds.), Springer, 2011
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Selective Exchange of Confidential Data in the Outsourcing Scenario," in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hubner, K. Rannenberg (eds.), Springer, 2011
[]
-
S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Protecting Information Privacy in the Electronic Society," in e-Business and Telecommunications International Conference (ICETE 2009), J. Filipe, M.S. Obaidat (eds.), Springer, 2011
[]
-
C. A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "Location Privacy in Pervasive Computing," in Security and Privacy in Mobile and Wireless Networking, S. Gritzalis, T. Karygiannis, C. Skianis (eds.), Troubador Publishing, 2009
[]
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Theory of Privacy and Anonymity," in Algorithms and Theory of Computation Handbook (2nd edition), M. Atallah, M. Blanton (eds.), CRC Press, 2009
[]
-
C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "Access Control in Location-Based Services," in Privacy in Location Based Applications, C. Bettini, S. Jajodia, P. Samarati, S. Wang (eds.), Springer, 2009
[]
-
C.A. Ardagna, S. Jajodia, P. Samarati, A. Stavrou, "Privacy Preservation over Untrusted Mobile Networks," in Privacy in Location Based Applications: Research Issues and Emerging Trends, C. Bettini, S. Jajodia, P. Samarati, S. Wang (eds.), Springer, 2009
[]
-
C. A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Privacy in the Electronic Society: Emerging Problems and Solutions," in Statistical Science and Interdisciplinary Research - Vol. 3: Algorithms, Architectures and Information Systems Security, B.B. Bhattacharya, S. Sur-Kolay, S.C. Nandy, A. Bagchi (eds.), World Scientific Press, November 2008
[]
-
C.A. Ardagna, M. Cremonini, S.
De Capitani di Vimercati, P. Samarati, "Managing Privacy in Location-based Access Control Systems," in Mobile Intelligence: Mobile Computing and Computational Intelligence, L.T. Yang, A.B. Waluyo, J. Ma, L. Tan, B. Srinivasan (eds.), John Wiley & Sons, Inc., 2008
[]
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "k-Anonymous Data Mining: A Survey," in Privacy-Preserving Data Mining: Models and Algorithms, C.C. Aggarwal, P.S. Yu (eds.), Springer-Verlag, 2008
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Access Control Models for XML," in Handbook of Database Security: Applications and Trends, M. Gertz, S. Jajodia (eds.), Springer-Verlag, 2008
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Access Control," in The Handbook of Computer Networks, H. Bidgoli (ed.), Wiley, 2008
[]
-
S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Recent Advances in Access Control," in Handbook of Database Security: Applications and Trends, M. Gertz, S. Jajodia (eds.), Springer-Verlag, 2008
[]
-
C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Privacy-enhanced location services information," in Digital Privacy: Theory, Technologies and Practices, Acquisti, De Capitani di Vimercati, Gritzalis, Lambrinoudakis (eds.), Auerbach Publications (Taylor and Francis Group), 2007
[]
-
C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "Privacy-enhanced Location-based Access Control," in The Handbook of Database Security: Applications and Trends, M. Gertz, S. Jajodia (eds.), Springer-Verlag, 2007
[]
-
C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Trust Management," in Security, Privacy and Trust in Modern Data Management, M. Petkovic, W. Jonker (eds.), Springer-Verlag, 2007
[]
-
C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "XML Security," in Security, Privacy and Trust in Modern Data Management, M. Petkovic, W. Jonker (eds.), Springer-Verlag, 2007
[]
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "k-Anonymity," in Secure Data Management in Decentralized Systems, T. Yu, S. Jajodia (eds.), Springer-Verlag, 2007
[]
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Microdata Protection," in Secure Data Management in Decentralized Systems, T. Yu, S. Jajodia (eds.), Springer-Verlag, 2007
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Privacy of Outsourced Data," in Digital Privacy: Theory, Technologies and Practices, A. Acquisti, S. Gritzalis, C. Lambrinoudakis, S. De Capitani di Vimercati (eds.), Auerbach Publications (Taylor and Francis Group), 2007
[]
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, P. Samarati, "Access Control Policies and Languages in Open Environments," in Secure Data Management in Decentralized Systems, T. Yu, S. Jajodia (eds.), Springer-Verlag, 2007
[]
-
S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Authorization and Access Control," in Security, Privacy and Trust in Modern Data Management, M. Petkovic, W. Jonker (eds.), Springer-Verlag, 2007
[]
-
M. Cremonini, P. Samarati, "Contingency Planning Management," in Handbook of Information Security, H. Bidgoli (ed.), Wiley, 2006
[]
-
S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Access control: Principles and Solutions," in Handbook of Information Security, H. Bidgoli (ed.), Wiley, 2006
[]
-
S. De Capitani di Vimercati, P. Samarati, "New Directions in Access Control," in Cyberspace Security and Defense: Research Issues, Kluwer Academic Publisher, 2005
[]
-
P. Bonatti, P. Samarati, "Logics for Authorizations and Security," in Logics for Emerging Applications of Databases, J. Chomicki, R. van der Meyden, G. Saake (eds.), Springer-Verlag, 2003
[]
-
M. Cremonini, P. Samarati, "Disaster Recovery Planning," in The Internet Encyclopedia, H. Bidgoli (ed.), John Wiley & Sons Inc., 2003
[]
-
S. De Capitani di Vimercati, P. Samarati, S. Jajodia, "Hardware and Software Data Security," in EOLSS The Encyclopedia of Life Support Systems, D. Kaeli, Z. Navabi (eds.), EOLSS Publishers, 2001
[]
-
S. De Capitani di Vimercati, P. Samarati, S. Jajodia, "Database Security," in Wiley Encyclopedia of Software Engineering, J. Marciniak (ed.), John Wiley & Sons, 2001
[]
-
P. Samarati, S. De Capitani di Vimercati, "Access Control: Policies, Models, and Mechanisms," in Foundations of Security Analysis and Design, R. Focardi, R. Gorrieri (eds.), Springer-Verlag, 2001
[]
-
P. Samarati, S. Jajodia, "Data Security," in Wiley Encyclopedia of Electrical and Electronics Engineering, J.G. Webster (ed.), John Wiley & Sons, February 1999
[]
-
R. Sandhu, P. Samarati, "Authentication, Access Control and Intrusion Detection," in CRC Handbook of Computer Science and Engineering, A. Tucker (ed.), CRC Press Inc., 1997
[]
-
S. Castano, G. Martella, P. Samarati, "Virus, Pirateria, Sabotaggio: l'Emergenza delle Difficoltà ," in Le Scienze della Comunicazione, RCS Libri & Grandi Opere, 1996/1997
[]
-
E. Bertino, S. Jajodia, P. Samarati, "Access Controls in Object-Oriented Database Systems: Some Approaches and Issues," in Advanced Database Concepts and Research Issues, N. Adam, B. Bhargava (eds.), Springer-Verlag, 1993
[]
-
S. Castano, G. Martella, P. Samarati, "Analysis, Comparison and Design of Role-Based Security Specifications," in Data & Knowledge Engineering (DKE), vol. 21, n. 1, December 1996, pp. 31-55
[]
-
G. Martella, P. Samarati, "La Sicurezza dell'Informazione Aziendale," in Rivista di Informatica, vol. XIX, n. 3, 1989, pp. 229-254
[]
-
P. Samarati, "Multilevel Relational Databases: Issues and Solutions," in Atti del Congresso Annuale AICA, Palermo, September 1994
[]
-
S. Castano, P. Samarati, C. Villa, "Un Modello di Sicurezza per Ambienti Ipertestuali," in Atti del Congresso Annuale AICA, Lecce, September 1993
[]
-
S. Castano, P. Samarati, "Un Modello per la Rilevazione delle Minacce in un Sistema di Elaborazione," in Atti del Congresso Annuale AICA, Torino, October 1992
[]
-
S. Castano, G. Martella, P. Samarati, "Un Modello per la Protezione di Basi di Conoscenza," in Atti del Congresso Annuale AICA, Siena, September 1991
[]
-
M. Bianchini, G. Martella, P. Samarati, "Un Sistema di Sicurezza Object-Oriented per la Protezione dei Documenti nei Sistemi Informativi per l'Ufficio," in Atti del Congresso Annuale AICA, Bari, September 1990
[]
-
P. Samarati, "MoSAICroWN - Data Protection in the Data Market Scenario," in ERCIM News, vol. 121, April 2020
[]
-
E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Towards Privacy-Aware Identity Management," in ERCIM News, n. 63, October 2005
[]
-
E. Damiani, P. Samarati, C.A. Ardagna, M. Lupo Stanghellini , "Sicurezza e Web Service," in Sicurezza Digitale, n. 2, October 2003
[]
-
S. De Capitani di Vimercati, P. Samarati, "Privacy in the Electronic Society," in TILT, n. 15, March 2003
[]
-
P. Samarati, "Regulating Access to Web-published Data," in ERCIM News , April 2002
[]
-
E. Damiani, P. Samarati, "On the Secure Interoperability of E-Business Services," in Business Briefing, Global InfoSecurity, 2001
[]
-
M. Bianchini, S. Castano, G. Martella, P. Samarati, "Un Sistema di Sicurezza Object-Oriented per la Protezione di Documenti," in Sistemi e Software, vol. 25, January 1992
[]
-
G. Martella, P. Samarati, "La Progettazione dei Sistemi di Protezione delle Informazioni in Azienda," in Data Manager, October 1989
[]
-
S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Data Protection in Cloud Scenarios," in Proc. of 10th Int'l Workshop on Data Privacy Management (DPM 2015) and 4th Int'l Workshop on Quantitative Aspects of Security Assurance (QASA 2015), Vienna, Austria, September 21-22, 2015
[]
-
S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Data Security Issues in Cloud Scenarios," in Proc. of the 11th International Conference on Information Systems Security (ICISS 2015), Kolkata, India, December 16-20, 2015
[]
-
S. De Capitani di Vimercati, P. Samarati, "Data Privacy: Problems and Solutions," in Third International Conference on Information Systems Security (ICISS 2007), Delhi, India, December 16-20, 2007 (invited talk)
[]
-
S. De Capitani di Vimercati, P. Samarati, "Privacy in the Electronic Society," in Proc. of the International Conference on Information Systems Security (ICISS 2006), Kolkata, India, December 19-21, 2006 (invited talk)
[]
-
S. De Capitani di Vimercati, P. Samarati, "Protecting Privacy in the Global Infrastructure," in Proc. of the International Conference on Information Security and Computer Forensics, Chennai, India, December 6-8, 2006 (invited talk)
[]
-
E. Damiani, S. David, S. De Capitani di Vimercati, C. Fugazza, P. Samarati, "Open World Reasoning in Semantics-Aware Access Control: a Preliminary Study," in 2nd Italian Semantic Web Workshop (SWAP 2005), University of Trento, Trento, Italy, December 14-16, 2005
[]
-
E. Damiani, S. De Capitani di Vimercati, C. Fugazza, P.Samarati, "Semantics-aware Privacy and Access Control: Motivation and Preliminary Results," in 1st Italian Semantic Web Workshop, Ancona, Italy, December 2004
[]
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Reputation-based Pseudonymity: An Alternative or a Complement to Strong Identities?," in Workshop on Security and Dependability, Brussels, May 10, 2004
[]
-
E. Damiani, P. Samarati, "Towards Context Awareness in Ambient Intelligence," in Workshop on R&D challenges for Resilience in Ambient Intelligence, Brussels, March 19, 2004
[]
-
P. Samarati, "Access Control in the Open Infrastructure," in Proc. of the 1st International Conference on Information & Communication Technology (ICICT), Cairo, Egypt, December 2003
[]
-
S. Osborn, B. Thuraisingham, P. Samarati, "Panel of XML and Security," in Proc. of the 15th IFIP WG11.3 Working Conference on Database and Application Security, Niagara on the Lake, Ontario, Canada, July 2001
[]
-
B. Thuraisingham, S. Jajodia, P. Samarati, J. Dobson, M. Olivier, "Privacy Issues in WWW and Data Mining: Panel Discussion," in Database Security XII - Status and Prospects, S. Jajodia (ed.), Kluwer, 1999
[]
-
B. Thuraisingham, L. Schillper, P. Samarati, T.Y. Lin, S. Jajodia, C. Clifton, "Security Issues in Data Warehousing and Data Mining: Panel Discussion," in Database Security XI - Status and Prospects, T.Y. Lin, S. Qian (eds.), Chapman & Hall, 1998
[]
-
R. Thomas, E. Bertino, P. Samarati, H. Bruggemann, B. Hartman, R. Sandhu, T.C. Ting, "Panel Discussion: Role-Based Access Control and Next-Generation Security Models," in Database Security IX - Status and Prospects, D. Spooner, S. Demurjian, J. Dobson (eds.), Chapman & Hall, 1997
[]
-
S. De Capitani di Vimercati, P. Samarati, "Administrative Policies," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011
[]
-
S. De Capitani di Vimercati, P. Samarati, "Clark and Wilson," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011
[]
-
S. De Capitani di Vimercati, P. Samarati, "Chinese Wall," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011
[]
-
S. De Capitani di Vimercati, P. Samarati, "Mandatory Access Control Policies (MAC)," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011
[]
-
S. De Capitani di Vimercati, P. Samarati, "Polyinstantiation," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011
[]
-
G. Livraga, P. Samarati, "Multilevel Database," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011
[]
-
P. Samarati, "Flexible Authorization Framework (FAF)," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011
[]
-
P. Samarati, "k-anonymity," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011
[]
-
P. Samarati, "Recursive Revoke," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011
[]
-
S. Ceri, M.A.W. Houtsma, A.M. Keller, P. Samarati, "A Classification of Update Methods for Replicated Databases,", CS Dept., Stanford University (STAN-CS-91-1392), October 1991
[]
|