Elena Ferrari
#105,766
Most Influential Person Now
Italian computer scientist
Elena Ferrari's AcademicInfluence.com Rankings
Elena Ferraricomputer-science Degrees
Computer Science
#4081
World Rank
#4297
Historical Rank
Database
#5627
World Rank
#5839
Historical Rank
Download Badge
Computer Science
Why Is Elena Ferrari Influential?
(Suggest an Edit or Addition)According to Wikipedia, Elena Ferrari is a Professor of Computer Science and Director of the STRICT Social Lab at the Università degli Studi dell’Insubria, Varese, Italy. Ferrari was named Fellow of the Institute of Electrical and Electronics Engineers in 2013 for contributions to security and privacy for data and applications. She has been named one of the “50 Most Influential Italian Women in Tech” in 2018. She was elected as an ACM Fellow in 2019 "for contributions to security and privacy of data and social network systems".
Elena Ferrari's Published Works
Published Works
- TRBAC: a temporal role-based access control model (2000) (904)
- The specification and enforcement of authorization constraints in workflow management systems (1999) (593)
- Secure and selective dissemination of XML documents (2002) (364)
- Enforcing access control in Web-based social networks (2009) (343)
- Rule-Based Access Control for Social Networks (2006) (270)
- Trust-X: A Peer-to-Peer Framework for Trust Establishment (2004) (259)
- An access control model supporting periodicity constraints and temporal reasoning (1998) (255)
- Securing XML Documents with Author-X (2001) (238)
- Specifying and enforcing access control policies for XML document sources (2000) (222)
- A semantic web based framework for social network access control (2009) (189)
- A logical framework for reasoning about access control models (2001) (168)
- Selective and authentic third-party distribution of XML documents (2004) (161)
- Content-Based Filtering in On-Line Social Networks (2010) (152)
- A logical framework for reasoning about access control models (2003) (145)
- Big Data - Security and Privacy (2015) (142)
- A Temporal Access Control Mechanism for Database Systems (1996) (136)
- Semantic web-based social network access control (2011) (134)
- A Content-Based Authorization Model for Digital Libraries (2002) (133)
- On specifying security policies for web documents with an XML-based language (2001) (129)
- CASTLE: Continuously Anonymizing Data Streams (2011) (128)
- A System to Filter Unwanted Messages from OSN User Walls (2013) (118)
- A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems (1997) (117)
- Security Conscious Web Service Composition (2006) (100)
- Trust negotiations: concepts, systems, and languages (2004) (95)
- Privacy-Aware Collaborative Access Control in Web-Based Social Networks (2008) (94)
- Collaborative access control in on-line social networks (2011) (91)
- User similarities on social networks (2012) (89)
- Hybrid-IoT: Hybrid Blockchain Architecture for Internet of Things - PoW Sub-Blockchains (2018) (85)
- Controlled access and dissemination of XML documents (1999) (82)
- Private Relationships in Social Networks (2007) (80)
- Database Security (2009) (79)
- Providing flexibility in information flow control for object oriented systems (1997) (78)
- Author-X: A Java-Based System for XML Data Protection (2000) (76)
- Temporal Synchronization Models for Multimedia Data (1998) (75)
- PP-trust-X: A system for privacy preserving trust negotiations (2007) (73)
- Network and profile based measures for user similarities on social networks (2011) (72)
- /spl Xscr/-TNL: an XML-based language for trust negotiations (2003) (68)
- Achieving privacy in trust negotiations with an ontology-based approach (2006) (67)
- A logical framework for reasoning on data access control policies (1999) (67)
- A framework to enforce access control over data streams (2010) (64)
- XML and Data Integration (2001) (63)
- Privacy in Social Networks: How Risky is Your Social Graph? (2012) (62)
- A temporal key management scheme for secure broadcasting of XML documents (2002) (62)
- Privacy Aware Access Control for Big Data: A Research Roadmap (2015) (58)
- A Formal Temporal Object-Oriented Data Model (1996) (56)
- Audit Trail (2020) (52)
- GuardMR: Fine-grained Security Policy Enforcement for MapReduce Systems (2015) (51)
- A hierarchical access control model for video database systems (2003) (51)
- Access Control in Data Management Systems (2010) (51)
- An Authorization Model and Its Formal Semantics (1998) (49)
- Privacy-Preserving Enhanced Collaborative Tagging (2014) (49)
- Access control and privacy in web-based social networks (2008) (49)
- Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques (2010) (48)
- Decentralized privacy preserving services for Online Social Networks (2018) (47)
- Detecting Spam Accounts on Twitter (2018) (45)
- Collaborative Commerce and Knowledge Management (2002) (44)
- A deep learning model for Twitter spam detection (2020) (44)
- Protection and administration of XML data sources (2002) (43)
- Evolutionary Inference of Attribute-Based Access Control Policies (2015) (43)
- A system to specify and manage multipolicy access control models (2002) (42)
- Privacy-Preserving Trust Negotiations (2004) (39)
- Query Processing (1997) (39)
- Enforcing access control over data streams (2007) (39)
- Securing XML data in third-party distribution systems (2005) (38)
- AutoBotCatcher: Blockchain-Based P2P Botnet Detection for the Internet of Things (2018) (38)
- Enhancing MongoDB with Purpose-Based Access Control (2017) (38)
- Towards standardized Web services privacy technologies (2004) (38)
- Security and Trust in Online Social Networks (2013) (38)
- Exception-based information flow control in object-oriented systems (1998) (37)
- Extending the ODMG Object Model with Time (1998) (37)
- Exploring privacy issues in Web services discovery/agencies (2005) (36)
- Specifying Access Control Policies on Data Streams (2007) (35)
- Web and information security (2002) (35)
- Enforcement of Purpose Based Access Control within Relational Database Management Systems (2014) (34)
- Access control for XML documents and data (2004) (34)
- Access Control Enforcement within MQTT-based Internet of Things Ecosystems (2018) (34)
- ACStream: Enforcing Access Control over Data Streams (2009) (33)
- MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations (2000) (32)
- Web Service Composition: A Security Perspective (2005) (32)
- Computing Reputation for Collaborative Private Networks (2009) (32)
- CASTLE: A delay-constrained scheme for ks-anonymizing data streams (2008) (31)
- T_Chimera: A Temporal Object-Oriented Data Model (1997) (30)
- Securing XML documents: the author-X project demonstration (2001) (30)
- SAMPAC: Socially-Aware collaborative Multi-Party Access Control (2017) (30)
- Efficient Enforcement of Action-Aware Purpose-Based Access Control within Relational Database Management Systems (2015) (29)
- Role Based Access Control Models (2001) (29)
- Risks of Friendships on Social Networks (2012) (29)
- Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control (1996) (29)
- A Decentralized Security Framework for Web-Based Social Networks (2008) (29)
- Towards a Modeling and Analysis Framework for Privacy-Aware Systems (2012) (29)
- Towards Secure Execution Orders for CompositeWeb Services (2007) (28)
- Privacy-Aware Access Control in Social Networks: Issues and Solutions (2010) (28)
- Risk Assessment in Social Networks Based on User Anomalous Behaviors (2018) (28)
- Fine-Grained Access Control Within NoSQL Document-Oriented Datastores (2016) (27)
- Enforcing relationships privacy through collaborative access control in web-based Social Networks (2009) (27)
- A nested transaction model for multilevel secure database management systems (2001) (26)
- Spatial Data on the Web, Modeling and Management (2007) (26)
- Security Conscious Web Service Composition with Semantic Web Support (2007) (25)
- Directions for Web and e-commerce applications security (2001) (25)
- Modeling Spatio-Temporal Constraints for Multimedia Objects (1999) (24)
- A Multi-dimensional and Event-Based Model for Trust Computation in the Social Web (2012) (24)
- Combining Social Networks and Semantic Web Technologies for Personalizing Web Access (2008) (24)
- Temporal Authorization Bases: From Specification to Integration (2000) (24)
- A Logic-Based Approach for Enforcing Access Control (2000) (24)
- Security and Privacy for Web Databases and Services (2004) (23)
- An authorization system for digital libraries (2002) (23)
- Secure Information Sharing on Support of Emergency Management (2011) (23)
- Confidential Business Process Execution on Blockchain (2018) (23)
- Blockchain as a Platform for Secure Inter-Organizational Business Processes (2018) (22)
- An approach to model and query event-based temporal data (1998) (22)
- Trust and Share: Trusted Information Sharing in Online Social Networks (2012) (22)
- Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems (2006) (21)
- Decentralizing Privacy Enforcement for Internet of Things Smart Objects (2018) (20)
- Merkle Tree Authentication in UDDI Registries (2004) (20)
- Proceedings of the tenth ACM symposium on Access control models and technologies (2003) (20)
- Access control technologies for Big Data management systems: literature review and future trends (2019) (18)
- Enhancing User Control on Personal Data Usage in Internet of Things Ecosystems (2016) (18)
- An infrastructure for managing secure update operations on XML data (2003) (18)
- Towards Virtual Private NoSQL datastores (2016) (18)
- A General Framework for Web Content Filtering (2010) (17)
- An Authorization Model for Supporting the Speciication and Enforcement of Authorization Constraints in Workkow Management Systems (1999) (17)
- Trust Management III, Third IFIP WG 11.11 International Conference, IFIPTM 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings (2009) (17)
- A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks (2011) (17)
- EgoCentric: Ego Networks for Knowledge-based Short Text Classification (2014) (17)
- MaX: an access control system for digital libraries and the Web (2002) (16)
- Detecting anomalies in social network data consumption (2014) (16)
- Enforcing Obligations within RelationalDatabase Management Systems (2014) (16)
- Towards supporting fine-grained access control for Grid resources (2004) (16)
- Web Content Filtering (2006) (16)
- T-ODMG: an ODMG compliant temporal object model supporting multiple granularity management (2003) (16)
- A Constraint-Based Approach for the Authoring of Multi-Topic Multimedia Presentations (2005) (15)
- Querying multiple temporal granularity data (2000) (15)
- Administration Policies in a Multipolicy Autorization System (1997) (15)
- Research Challenges at the Intersection of Big Data, Security and Privacy (2019) (15)
- Using RDF for policy specification and enforcement (2004) (15)
- Towards a Unifying Attribute Based Access Control Approach for NoSQL Datastores (2017) (15)
- AC-XML documents: improving the performance of a web access control module (2005) (15)
- Supporting Delegation in Secure Workflow Management Systems (2003) (14)
- Management of access control policies for XML document sources (2003) (14)
- Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 (2017) (14)
- P3D - Privacy-Preserving Path Discovery in Decentralized Online Social Networks (2011) (14)
- A Privacy-Preserving Framework for Constrained Choreographed Service Composition (2015) (13)
- Object-Oriented Database (1999) (13)
- Access Control in the Era of Big Data: State of the Art and Research Directions (2018) (13)
- Secure Web Service Composition with Untrusted Broker (2014) (13)
- A temporal object-oriented data model with multiple granularities (1999) (13)
- Assuring Security Properties in Third-party Architectures (2005) (12)
- Database as a Service: Challenges and solutions for privacy and security (2009) (12)
- An Update Protocol for XML Documents in Distributed and Cooperative Systems (2005) (12)
- Community-Based Identity Validation on Online Social Networks (2014) (12)
- An access control mechanism for large scale data dissemination systems (2001) (12)
- Data Confidentiality (2009) (11)
- Automatic Abstracting (2009) (11)
- CiVeDi: a customized virtual environment for database interaction (2004) (10)
- Learning Privacy Habits of PDS Owners (2017) (10)
- Privacy-Aware Personal Data Storage (P-PDS): Learning how to Protect User Privacy from External Applications (2019) (10)
- Detection of Unspecified Emergencies for Controlled Information Sharing (2016) (9)
- Content-based filtering of Web documents: the MaX system and the EUFORBIA project (2003) (9)
- COIP—Continuous, Operable, Impartial, and Privacy-Aware Identity Validity Estimation for OSN Profiles (2016) (9)
- Privacy Settings Recommender for Online Social Network (2016) (9)
- An approach to cooperative updates of XML documents in distributed systems (2005) (9)
- Navigational Accesses in a Temporal Object Model (1998) (9)
- Security and Privacy in Social Networks (2009) (9)
- Anonymity Preserving Techniques in Trust Negotiations (2005) (8)
- Regulating data sharing across MQTT environments (2021) (8)
- A Secure Publishing Service for Digital Libraries of XML Documents (2001) (8)
- Navigating through multiple temporal granularity objects (2001) (8)
- DIVa: Decentralized identity validation for social networks (2015) (8)
- A system for securing push-based distribution of XML documents (2007) (8)
- Enhancing NoSQL datastores with fine-grained context-aware access control: a preliminary study on MongoDB (2017) (8)
- Privacy in Social Collaboration (2013) (8)
- Enforcing Trust Preferences in Mobile Person-to-Person Payments (2013) (8)
- A Multi-Strategy Approach to Rating and Filtering Online Resources (2005) (8)
- CARDS - Collaborative Audit and Report Data Sharing for A-Posteriori Access Control in DOSNs (2015) (7)
- Protecting Datasources over the Web: Policies, Models, and Mechanisms (2003) (7)
- Author-Chi - A System for Secure Dissemination and Update of XML Documents (2003) (7)
- On Using Materialization Strategies for a Temporal Authorization Model (1996) (7)
- Signature and Access Control Policies for XML Documents (2003) (7)
- Combining access control and trust negotiations in an On-line Social Network (2010) (7)
- Graph Based Local Risk Estimation in Large Scale Online Social Networks (2015) (7)
- Guest editorial: Special issue on access control models and technologies (2005) (7)
- Audio Feature Extraction (2009) (6)
- Trustworthy and effective person-to-person payments over multi-hop MANETs (2016) (6)
- Secure third party distribution of XML data (2005) (6)
- Issues with Privacy Preservation in Query Log Mining (2010) (6)
- Trusted Privacy Manager: A System for Privacy Enforcement (2005) (6)
- Confidential Discovery of IoT Devices through Blockchain (2019) (6)
- A Risk-Benefit Driven Architecture for Personal Data Release (Invited Paper) (2016) (6)
- Decentralized Administration for a Temporal Access Control Model (1997) (6)
- What Happens to My Online Social Estate When I Am Gone? An Integrated Approach to Posthumous Online Data Management (2015) (6)
- A decentralized temporal autoritzation model (1996) (6)
- QUATRO Plus: Quality You Can Trust? (2009) (6)
- Trust-/spl Xscr/;: a peer-to-peer framework for trust establishment (2004) (6)
- Confidentiality Enforcement for XML Outsourced Data (2006) (5)
- Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model (1998) (5)
- Blockchain-based controlled information sharing in inter-organizational workflows (2020) (5)
- Privacy, Security, and Trust in KDD, Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, NV, USA, August 24, 2008, Revised Selected Papers (2009) (5)
- Identity, Privacy, and Deception in Social Networks (2014) (5)
- Graphical User Interfaces for Privacy Settings (2018) (5)
- Access control for web data: models and policy languages (2006) (5)
- Privacy in Web Service Transactions: A Tale of More than a Decade of Work (2018) (5)
- Blockchain-Based Privacy Enforcement in the IoT Domain (2022) (5)
- A decentralized temporal authorization model (1996) (5)
- Guest editorial: special issue on privacy preserving data management (2006) (5)
- Linguistic precedent and nomadic meanings in EC private law (2010) (4)
- Evaluating the effects of access control policies within NoSQL systems (2021) (4)
- Performance analysis of relationship-based access control in OSNs (2012) (4)
- Cluster-Based Anonymization of Directed Graphs (2019) (4)
- SHARE: Secure information sharing framework for emergency management (2013) (4)
- Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems (2009) (4)
- An XML-Based Approach to Document Flow Verification (2004) (4)
- Controlled information sharing for unspecified emergencies (2013) (4)
- A Comprehensive XML Based Approach to Trust Negotiations (2005) (4)
- Access Control Enforcement in IoT: state of the art and open challenges in the Zero Trust era (2021) (4)
- ViRdB: integrating virtual reality and multimedia databases for customized visualization of cultural heritage (2003) (4)
- Helping Users Managing Context-Based Privacy Preferences (2019) (4)
- Enhanced Audit Strategies for Collaborative and Accountable Data Sharing in Social Networks (2018) (4)
- A multi-layer framework for personalized social tag-based applications (2012) (4)
- XML and Object Technology (2000) (4)
- Complementing MongoDB with Advanced Access Control Features: Concepts and Research Challenges (2015) (4)
- CADIVa: cooperative and adaptive decentralized identity validation model for social networks (2016) (4)
- A Flexible Authentication Method for UDDI Registries (2003) (4)
- Approaches to Handling Temporal Data in Object-Oriented Databases (1997) (4)
- A Survey of Challenges and Solutions for Privacy in Clinical Genomics Data Mining (2010) (4)
- Trust-Chi: An XML Framework for Trust Negotiations (2003) (4)
- Trust and privacy correlations in social networks: A deep learning framework (2016) (4)
- An extended access control mechanism exploiting data dependencies (2017) (3)
- Adapting Users' Privacy Preferences in Smart Environments (2019) (3)
- Analyzing Private Network Data (2010) (3)
- Draft Common Frame of Reference and Terminology (2010) (3)
- A System for Timely and Controlled Information Sharing in Emergency Situations (2013) (3)
- Web retrieval of XML documents: practice and challenges (2003) (3)
- Contract Law Harmonization and Regional Integration: Can the CIS Learn From the EU? (2006) (3)
- XML security (2004) (3)
- PAutoBotCatcher: A blockchain-based privacy-preserving botnet detector for Internet of Things (2021) (3)
- An Integrated Approach to Rating and Filtering Web Content (2005) (3)
- The Quality Social Network: A collaborative environment for personalizing Web access (2009) (3)
- Cluster-Based Anonymization of Knowledge Graphs (2020) (3)
- Learning What to Share in Online Social Networks Using Deep Reinforcement Learning (2018) (3)
- A Blockchain-based Trustworthy Certification Process for Composite Services (2020) (3)
- Anomalous change detection in time-evolving OSNs (2016) (3)
- A Formal Temporal Object-Oriented Data Model Elisa (1996) (3)
- Knowledge‐based approaches for identity management in online social networks (2018) (3)
- Towards a framework to handle privacy since the early phases of the development: Strategies and open challenges (2012) (3)
- Privacy Protection of Personal Data in Social Networks (2010) (2)
- A rule-based policy language for selective trust propagation in social networks (2011) (2)
- Trust- X : An XML Framework for Trust Negotiations (2003) (2)
- Specifying and computing hierarchies of temporal authorizations (1999) (2)
- Discovering trust patterns in ego networks (2014) (2)
- Data Manipulation Language (2009) (2)
- A Language and an Inference Engine for Twitter Filtering Rules (2016) (2)
- Multi-Dimensional Conversation Analysis Across Online Social Networks (2013) (2)
- Privacy Issues in the Web Services Architecture (WSA) (2006) (2)
- Flow policies: specification and enforcement (2004) (2)
- Secure Data Dissemination (2004) (2)
- Trust Negotiations with Customizable Anonymity (2006) (2)
- Compatibility-driven and adaptable service composition (2009) (2)
- Distributed Cooperative Updates of XML Documents (2002) (2)
- Policies for Composed Emergencies in Support of Disaster Management (2012) (2)
- Information Security (2004) (2)
- LAMP - Label-Based Access-Control for More Privacy in Online Social Networks (2016) (2)
- Privacy and Anonymity in Location Data Management (2010) (2)
- Guest Editors' Introduction: Special Section on Data and Applications Security and Privacy (2012) (2)
- An Access Control System for Digital Libraries and the Web: The MaX Prototype Demonstration (2002) (2)
- Chapter 16: Found in Translation: national concepts and EU Legal Terminology (2014) (2)
- Dynamic reputation-based trust computation in private networks (2009) (2)
- Conceptual Framework and Architecture for Privacy Audit (2012) (2)
- Trust-based Information Sharing in Collaborative Communities: Issues and Challenges (2009) (2)
- LiMNet: Early-Stage Detection of IoT Botnets with Lightweight Memory Networks (2021) (2)
- Digital Trust: Trust Management in Cyberspace (2020) (2)
- Privacy-Preserving Sequential Publishing of Knowledge Graphs (2021) (2)
- On comparing the expressing power of access control model frameworks (2004) (2)
- Authentication Techniques for UDDI Registries (2007) (2)
- Database Protection (2009) (2)
- First ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD (2007) (2)
- PinKDD'08: privacy, security, and trust in KDD post workshop report (2008) (2)
- Emergency-Driven Assured Information Sharing in Secure Online Social Networks: A Position Paper (2016) (2)
- An extended access control mechanism exploiting data dependencies (2016) (1)
- Document Identifier (2020) (1)
- A Risk Assessment Mechanism for Android Apps (2021) (1)
- A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities (2006) (1)
- Access Control Administration Policies (2009) (1)
- Formulation of rights and European legal discourse: any theory behind it? (2016) (1)
- CASTLE : A δ-constrained scheme for k s-anonymizing data streams (2007) (1)
- Special issue on secure and privacy-aware data management (2014) (1)
- Secure Web Service Composition: Issues and Architectures (2008) (1)
- Translation and Interpretation of EU Multilingual Legal Acts: The Viewpoint of a Comparative Private Lawyer (2014) (1)
- Anonymity in Location-Based Services (2009) (1)
- Requirements and Challenges for Secure and Trustworthy UAS Collaboration (2020) (1)
- Securing Documents with Author-X (2001) (1)
- Sanctioning Mechanisms in Virtual Communities (2006) (1)
- Special Issue: Object‐oriented Databases (2001) (1)
- Spatial Data on the Web: Issues and Challenges (2007) (1)
- Privacy, Security, and Trust in KDD, First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers (2008) (1)
- Access Control (2009) (1)
- Development of Multilevel Secure Database Systems (2002) (1)
- Gossip-Based Behavioral Group Identification in Decentralized OSNs (2016) (1)
- Trust-X: a trust negotiation proposal (2004) (0)
- Privacy and Security Issues for Human Digital Twins (2022) (0)
- Access control technologies for Big Data management systems: literature review and future trends (2019) (0)
- Web Usage Data (2010) (0)
- 2015 IEEE International Conference on Information Reuse and Integration, IRI 2015, San Francisco, CA, USA, August 13-15, 2015 (2015) (0)
- Identification Services for Online Social Networks (OSNs) Extended Abstract (2017) (0)
- Collaborative Commerce and Knowledge Management Paper 184 Collaborative Commerce and Knowledge Management Bhavani Thuraisingham (mitre) (2002) (0)
- Data Types for Moving Objects (2009) (0)
- Distance-Preserving Mapping (2009) (0)
- Similarity Metrics on Social Networks (2014) (0)
- Barbara Pozzo (editor), Ordinary Language and Legal Language (2006) (0)
- Beat the DIVa - decentralized identity validation for online social networks (2016) (0)
- Session details: Role Engineering (2002) (0)
- Data Errors (2022) (0)
- CADIVa: cooperative and adaptive decentralized identity validation model for social networks (2016) (0)
- Guest Editorial: Special Section on the International Conference on Data Engineering (2016) (0)
- Adaptive Database Replication (2009) (0)
- Access control and Privacy in On-line Social Networks: Issues and Solutions (2010) (0)
- Mammoth: Monitoring the ABAC Monitor of MQTT-based Internet of Things ecosystems (2020) (0)
- Digital Surface Model (2009) (0)
- CORRECTNESS CONTROL OF PRIVACY-PRESERVING DECENTRALIZED CONSTRAINED WEB SERVICE COMPOSITIONS THROUGH AUDITING (2016) (0)
- XML and Obje t Te (2007) (0)
- Degrees of Consistency (2009) (0)
- A Blockchain-based Framework in Support of Privacy Preferences Enforcement for Scientific Workflows : (Invited Paper) (2022) (0)
- Fine-Grained Access Control Within NoSQL Document-Oriented Datastores (2016) (0)
- Privacy-Aware Access Control in Decentralized Online Social Networks (2021) (0)
- Session details: Authorization and Authentication (2017) (0)
- Knowledge Management for Heterogeneous Information Exchange (2002) (0)
- Report on the 9th ACM symposium on access control models and technologies (SACMAT'04) (2004) (0)
- A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases (1997) (0)
- Efficient ABAC based information sharing within MQTT environments under emergencies (2022) (0)
- Hierarchical categorisation of web tags for Delicious (2011) (0)
- Special issue on secure and privacy-aware data management (2014) (0)
- Web Data Protection: Principles and Research Issues (2004) (0)
- Advanced Techniques for Web Content Filtering (2008) (0)
- Secure Outsourcing of Geographical Data Over the Web: Techniques and Architectures (2007) (0)
- Adversarial Information Retrieval (2009) (0)
- Adaptive Metric Techniques (2009) (0)
- Enforcement for Internet of Things Smart Objects (2018) (0)
- PinKDD'07: privacy, security, and trust in KDD post-workshop report (2007) (0)
- Message from the ICDE 2014 program committee and general chairs (2014) (0)
- A Risk Estimation Mechanism for Android Apps based on Hybrid Analysis (2022) (0)
- PriApp-Install: Learning User Privacy Preferences on Mobile Apps' Installation (2022) (0)
- Spatio-Temporal and Mobility Data (2010) (0)
- Output Privacy in Stream Mining (2010) (0)
- Dirichlet Tessellation (2009) (0)
- Privacy Pitfalls and Solutions in Trust Negotiations (2005) (0)
- A framework for privacy aware data management in relational databases (2014) (0)
- Time-Aware Anonymization of Knowledge Graphs (2022) (0)
- A Comprehensive Framework for Secure Outsourcing of XML Data (2008) (0)
- Dynamic Information Management and Exchange for Command and Control Applications: A Framework in Support of Emergency Management for Specified and Unspecified Emergencies (2014) (0)
- Temperature Transformations in Relativistic Thermodynamics (1999) (0)
- Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD (2007) (0)
- Towards Privacy aware Big Data analytics (2014) (0)
- Session details: Secure sharing and policy combination (2009) (0)
- Detecting anomalies in social network data consumption (2014) (0)
- Data Tracking (2009) (0)
- Data Perturbation (2009) (0)
- DELIVERABLE D 3 Software architecture of the EUFORBIA demonstrator (0)
- New big data platforms are more efficient, but pose a serious threat to privacy (2017) (0)
- Data Cache (2009) (0)
- A system for controlled outsourcing of personal data (2006) (0)
- Access control techniques and methodologies for grid systems (2004) (0)
- Welcome from the ASONAM 2017 program chairs (2017) (0)
- User similarities on social networks (2013) (0)
- W 13 . The First ECOOP Workshop onObject-Oriented (2007) (0)
- DIVa (2015) (0)
- Privacy Preserving Decentralized Identity Validation for Geo-social Networks over MANET (2015) (0)
- Correction to 'MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations' (2001) (0)
- Secure Object Deletion and Garbage Collection in Multilevel Object Bases (1999) (0)
- Protection and administration of XML data sources q (2002) (0)
- Access Control, Privacy and Trust in On-line Social Networks: Issues and Solutions (2011) (0)
- Traces and Streams (2010) (0)
- Early-Stage Ransomware Detection Based on Pre-attack Internal API Calls (2023) (0)
- SocialCloudShare: a Facebook Application for a Relationship-based Information Sharing in the Cloud (2014) (0)
- MalRec: A Blockchain-based Malware Recovery Framework for Internet of Things (2022) (0)
- Decentralized Data Integration System (2009) (0)
- Chapter VI Web Content Filtering (2019) (0)
This paper list is powered by the following services:
Other Resources About Elena Ferrari
What Schools Are Affiliated With Elena Ferrari?
Elena Ferrari is affiliated with the following schools: