Search filters

List of works by Pierangela Samarati

A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud

A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy

A WOWA-based Aggregation Technique on Trust Values Connected to Metadata

article by Ernesto Damiani et al published May 2006 in Electronic Notes in Theoretical Computer Science

A Web Service Architecture for Enforcing Access Control Policies

A component-based architecture for secure data publication

scholarly article

A consensus-based approach for selecting cloud plans

A data outsourcing architecture combining cryptography and access control

scholarly article published 2007

A privacy-aware access control system

A temporal access control mechanism for database systems

Access Control

scholarly article

Access Control Management for Secure Cloud Storage

Access Control Models for XML

Access Control for the Shuffle Index

Access Control in Location-Based Services

Access control for smarter healthcare using policy spaces

article

Access control policies and languages

Access control: principle and practice

Access control: principles and solutions

Advanced Metadata for Privacy-Aware Representation of Credentials

article published in 2005

An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing

An Extended Authorization Model for Object Databases*

article

An OBDD approach to enforce confidentiality and visibility constraints in data publishing*

An Obfuscation-Based Approach for Protecting Location Privacy

An XACML-based privacy-centered access control system

An access control model for querying XML data

An authorization model for a distributed hypertext system

article

An authorization model for a public key management service

An extended authorization model for relational databases

article

Analysis, comparison and design of role-based security specifications

Assessing query privileges via safe and efficient permission composition

article

Authentication, access control, and audit

Authorization enforcement in distributed query evaluation*

Business Continuity Planning

CAS++: An Open Source Single Sign-On Solution for Secure e-Services

Choosing reputable servents in a P2P network

Combining fragmentation and encryption to protect privacy in data storage

Communications and Networking for Smart Grid: Technology and Practice

Controlled Information Sharing in Collaborative Distributed Query Processing

Controlling access to XML documents

DATA PRIVACY: DEFINITIONS AND TECHNIQUES

Data Protection in Cloud Scenarios

Data Security Issues in Cloud Scenarios

Data Security and Privacy in the Cloud

article published in 2014

Data protection in outsourcing scenarios

article published in 2010

Database security: Research and practice

Design and implementation of an access control processor for XML documents

Distributed Shuffling for Preserving Access Confidentiality

Editorial

scholarly article by Dimitris Gritzalis published in June 2010

Efficient Key Management for Enforcing Access Control in Outsourced Scenarios

Efficient and Private Access to Outsourced Data

scholarly article published June 2011

Efficient integrity checks for join queries in the cloud1

Enabling Privacy-preserving Credential-based Access Control with XACML and SAML

Encryption policies for regulating access to outsourced data

Encryption-Based Policy Enforcement for Cloud Storage

Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients

article by Valentina Ciriani et al published 2009 in Lecture Notes in Computer Science

Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach

Enforcing dynamic write privileges in data outsourcing

scholarly article by Sabrina De Capitani di Vimercati published in November 2013

Enhancing User Privacy Through Data Handling Policies

article by C. A. Ardagna et al published 2006 in Lecture Notes in Computer Science

Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project

scholarly article by Claudio A. Ardagna et al published 1 January 2010 in Journal of Computer Security

Expressive and Deployable Access Control in Open Web Service Applications

article published in 2011

Extending Loose Associations to Multiple Fragments

Fine-Grained Disclosure of Access Policies

Flexible support for multiple access control policies

Foreword from the Conference Chairs

Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases

Fragmentation in Presence of Data Dependencies

Guest Editorial

Guest Editorial

Guest Editorial Special Issue on Security for IoT: The State of the Art

Guest editors' preface

Implementation of a Storage Mechanism for Untrusted DBMSs

Independent updates and incremental agreement in replicated databases

Information flow control in object-oriented systems

Integrating trust management and access control in data-intensive Web applications

article by Sabrina De Capitani di Vimercati et al published 1 May 2012 in ACM Transactions on the Web

Integrity for Approximate Joins on Untrusted Computational Servers

Integrity for distributed queries

Integrity for join queries in the cloud

Keep a Few: Outsourcing Data While Maintaining Confidentiality

Key management for multi-user encrypted databases

Loose associations to increase utility in data publishing1

Maintaining replicated authorizations in distributed database systems

Managing Data Sharing in OpenStack Swift with Over-Encryption

Managing Privacy in LBAC Systems

Managing Privacy in Location-Based Access Control Systems

Managing and accessing data in the cloud: Privacy risks and approaches

Managing and sharing servents' reputations in P2P systems

Managing key hierarchies for access control enforcement: Heuristic approaches

scholarly article by Carlo Blundo published in July 2010

Managing multiple and dependable identities

Maximizing Sharing of Protected Information

Message from the general chairs and technical program chairs

Metadata Management in Outsourced Encrypted Databases

Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach

Mix&Slice

Modality conflicts in semantics aware access control

Modeling and assessing inference exposure in encrypted databases

article published in 2005

Modeling and preventing inferences from sensitive value distributions in data release1

New paradigms for access control in open environments

On information leakage by indexes over data fragments

Optimizing Integrity Checks for Join Queries in the Cloud

P2P-based collaborative spam detection and filtering

Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud

Preface

Preserving confidentiality of security policies in data outsourcing

Privacy Preservation over Untrusted Mobile Networks

Privacy- Enhanced Identity Management for E-Services

Privacy-enhanced Location-based Access Control

Private data indexes for selective access to outsourced data

scholarly article published 2011

Protecting Access Confidentiality with Data Distribution and Swapping

Protecting Data in Outsourcing Scenarios

Protecting Information Privacy in the Electronic Society

Protecting Privacy in Data Release

article published in 2011

Protecting Privacy of Sensitive Value Distributions in Data Release

Protecting Privacy of User Information in Continuous Location-Based Services

Protecting information on the Web

Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression

scientific article published in August 1998

Protecting respondents identities in microdata release

Providing Mobile Users’ Anonymity in Hybrid Networks

Providing Users’ Anonymity in Mobile Hybrid Networks

article published in 2013

Recent Advances in Access Control

Regulating Exceptions in Healthcare Using Policy Spaces

article

Secure access wrapper: mediating security between heterogeneous databases

Selective Data Encryption in Outsourced Dynamic Environments

Selective and Fine-Grained Access to Data in the Cloud

Selective and Private Access to Outsourced Data Centers

Selective data outsourcing for enforcing privacy*

Set-Oriented retrieval of complex objects in inheritance hierarchies

Shuffle Index

Special issue on Security in the World Wide Web (WWW)

scholarly article by Elisa Bertino et al published 1 July 1997 in Journal of Computer Security

Specification and enforcement of classification and inference constraints

Support for Write Privileges on Outsourced Data

Supporting Concurrency in Private Data Outsourcing

article

Supporting Security Requirements for Resource Management in Cloud Computing

scholarly article published December 2012

Supporting User Privacy Preferences in Digital Interactions

Supporting concurrency and multiple indexes in private access to outsourced data1

Supporting location-based conditions in access control policies

Supporting privacy preferences in credential-based interactions

The Architecture of a Privacy-Aware Access Control Decision Component

Three-Server Swapping for Access Confidentiality

Towards Flexible Credential Negotiation Protocols

Towards Flexible Credential Negotiation Protocols

Trust management services in relational databases

scholarly article published 2007

XML-based access control languages