Search filters

List of works by Sabrina De Capitani di Vimercati

A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud

A WOWA-based Aggregation Technique on Trust Values Connected to Metadata

article by Ernesto Damiani et al published May 2006 in Electronic Notes in Theoretical Computer Science

A Web Service Architecture for Enforcing Access Control Policies

A data outsourcing architecture combining cryptography and access control

scholarly article published 2007

A privacy-aware access control system

Access Control Models for XML

Access Control for the Shuffle Index

Access Control in Location-Based Services

Access control for smarter healthcare using policy spaces

article

Access control policies and languages

Access control: principles and solutions

Advanced Metadata for Privacy-Aware Representation of Credentials

article published in 2005

An OBDD approach to enforce confidentiality and visibility constraints in data publishing*

An Obfuscation-Based Approach for Protecting Location Privacy

An XACML-based privacy-centered access control system

An access control model for querying XML data

Assessing query privileges via safe and efficient permission composition

article

Authorization enforcement in distributed query evaluation*

CAS++: An Open Source Single Sign-On Solution for Secure e-Services

Choosing reputable servents in a P2P network

Combining fragmentation and encryption to protect privacy in data storage

Controlled Information Sharing in Collaborative Distributed Query Processing

Controlling access to XML documents

DATA PRIVACY: DEFINITIONS AND TECHNIQUES

Data protection in outsourcing scenarios

article published in 2010

Design and implementation of an access control processor for XML documents

Distributed Shuffling for Preserving Access Confidentiality

Efficient Key Management for Enforcing Access Control in Outsourced Scenarios

Efficient and Private Access to Outsourced Data

scholarly article published June 2011

Enabling Privacy-preserving Credential-based Access Control with XACML and SAML

Encryption policies for regulating access to outsourced data

Encryption-Based Policy Enforcement for Cloud Storage

Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients

article by Valentina Ciriani et al published 2009 in Lecture Notes in Computer Science

Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach

Enforcing Subscription-Based Authorization Policies in Cloud Scenarios

scientific article published in 2012

Enforcing authorizations while protecting access confidentiality1

Enforcing dynamic write privileges in data outsourcing

scholarly article by Sabrina De Capitani di Vimercati published in November 2013

Enhancing User Privacy Through Data Handling Policies

article by C. A. Ardagna et al published 2006 in Lecture Notes in Computer Science

Expressive and Deployable Access Control in Open Web Service Applications

article published in 2011

Extending Loose Associations to Multiple Fragments

Fine-Grained Disclosure of Access Policies

Foreword from the Conference Chairs

Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases

Fragmentation in Presence of Data Dependencies

Generalized Mersenne Prime

article published 2011

Implementation of a Storage Mechanism for Untrusted DBMSs

Integrating trust management and access control in data-intensive Web applications

article by Sabrina De Capitani di Vimercati et al published 1 May 2012 in ACM Transactions on the Web

Integrity for distributed queries

Keep a Few: Outsourcing Data While Maintaining Confidentiality

Key management for multi-user encrypted databases

Loose associations to increase utility in data publishing1

Managing Privacy in LBAC Systems

Managing Privacy in Location-Based Access Control Systems

Managing and accessing data in the cloud: Privacy risks and approaches

Managing and sharing servents' reputations in P2P systems

Managing key hierarchies for access control enforcement: Heuristic approaches

scholarly article by Carlo Blundo published in July 2010

Maximizing Sharing of Protected Information

Metadata Management in Outsourced Encrypted Databases

Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach

Modality conflicts in semantics aware access control

Modeling and assessing inference exposure in encrypted databases

article published in 2005

Modeling and preventing inferences from sensitive value distributions in data release1

New paradigms for access control in open environments

On information leakage by indexes over data fragments

P2P-based collaborative spam detection and filtering

Physical Security

Preserving confidentiality of security policies in data outsourcing

Privacy and Security in Environmental Monitoring Systems

scientific article published in 2013

Privacy in Data Publishing

scientific article published in 2011

Privacy- Enhanced Identity Management for E-Services

Privacy-enhanced Location-based Access Control

Private data indexes for selective access to outsourced data

scholarly article published 2011

Protecting Access Confidentiality with Data Distribution and Swapping

Protecting Data in Outsourcing Scenarios

Protecting Information Privacy in the Electronic Society

Protecting Privacy in Data Release

article published in 2011

Protecting Privacy of Sensitive Value Distributions in Data Release

Recent Advances in Access Control

Regulating Exceptions in Healthcare Using Policy Spaces

article

Secure Audit Logs

article

Secure Logging

article

Secure access wrapper: mediating security between heterogeneous databases

Security, Privacy, and Trust in Mobile Systems and Applications

scholarly article

Selective Data Encryption in Outsourced Dynamic Environments

Selective Exchange of Confidential Data in the Outsourcing Scenario

Selective data outsourcing for enforcing privacy*

Shuffle Index

Support for Write Privileges on Outsourced Data

Supporting Concurrency in Private Data Outsourcing

article

Supporting concurrency and multiple indexes in private access to outsourced data1

Supporting location-based conditions in access control policies

Supporting privacy preferences in credential-based interactions

The Architecture of a Privacy-Aware Access Control Decision Component

Three-Server Swapping for Access Confidentiality

Towards Flexible Credential Negotiation Protocols

Trust management services in relational databases

scholarly article published 2007

XML-based access control languages