Search filters

List of works by Stefano Paraboschi

A data outsourcing architecture combining cryptography and access control

scholarly article published 2007

Access Control

scholarly article

Access Control Models for XML

Access control: principles and solutions

An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing

An XACML-based privacy-centered access control system

Assessing query privileges via safe and efficient permission composition

article

Authorization enforcement in distributed query evaluation*

Cage4Deno: A Fine-Grained Sandbox for Deno Subprocesses

scientific article published on 05 July 2023

Choosing reputable servents in a P2P network

Combining fragmentation and encryption to protect privacy in data storage

Controlled Information Sharing in Collaborative Distributed Query Processing

Design and implementation of an access control processor for XML documents

Distributed Shuffling for Preserving Access Confidentiality

Efficient Key Management for Enforcing Access Control in Outsourced Scenarios

Efficient and Private Access to Outsourced Data

scholarly article published June 2011

Enabling Privacy-preserving Credential-based Access Control with XACML and SAML

Encryption policies for regulating access to outsourced data

Encryption-Based Policy Enforcement for Cloud Storage

Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients

article by Valentina Ciriani et al published 2009 in Lecture Notes in Computer Science

Enforcing dynamic write privileges in data outsourcing

scholarly article by Sabrina De Capitani di Vimercati published in November 2013

Expressive and Deployable Access Control in Open Web Service Applications

article published in 2011

Extending Loose Associations to Multiple Fragments

Fine-Grained Disclosure of Access Policies

Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases

Fragmentation in Presence of Data Dependencies

Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems

article by Roberto Aringhieri et al published 2006 in Journal of the Association for Information Science and Technology

Implementation of a Storage Mechanism for Untrusted DBMSs

Integrating trust management and access control in data-intensive Web applications

article by Sabrina De Capitani di Vimercati et al published 1 May 2012 in ACM Transactions on the Web

Integrity for Approximate Joins on Untrusted Computational Servers

Integrity for distributed queries

Keep a Few: Outsourcing Data While Maintaining Confidentiality

Key management for multi-user encrypted databases

Loose associations to increase utility in data publishing1

Managing and sharing servents' reputations in P2P systems

Managing key hierarchies for access control enforcement: Heuristic approaches

scholarly article by Carlo Blundo published in July 2010

Metadata Management in Outsourced Encrypted Databases

Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach

Modeling and assessing inference exposure in encrypted databases

article published in 2005

NatiSand: Native Code Sandboxing for JavaScript Runtimes

scientific article published on 03 October 2023

On information leakage by indexes over data fragments

P2P-based collaborative spam detection and filtering

POSTER: Leveraging eBPF to enhance sandboxing of WebAssembly runtimes

scientific article published on 05 July 2023

Preserving confidentiality of security policies in data outsourcing

Private data indexes for selective access to outsourced data

scholarly article published 2011

Protecting Access Confidentiality with Data Distribution and Swapping

Selective Data Encryption in Outsourced Dynamic Environments

Selective data outsourcing for enforcing privacy*

Shuffle Index

Support for Write Privileges on Outsourced Data

Supporting Concurrency in Private Data Outsourcing

article

Supporting concurrency and multiple indexes in private access to outsourced data1

Supporting privacy preferences in credential-based interactions

Trust management services in relational databases

scholarly article published 2007