Pierangela Samarati
#85,618
Most Influential Person Now
Italian researcher
Pierangela Samarati's AcademicInfluence.com Rankings
Pierangela Samaraticomputer-science Degrees
Computer Science
#2870
World Rank
#3004
Historical Rank
Information Security
#11
World Rank
#11
Historical Rank
Algorithms
#97
World Rank
#97
Historical Rank
Database
#720
World Rank
#755
Historical Rank
Download Badge
Computer Science
Pierangela Samarati's Degrees
- PhD Computer Science University of Milan
- Masters Computer Science University of Milan
- Bachelors Computer Science University of Milan
Similar Degrees You Can Earn
Why Is Pierangela Samarati Influential?
(Suggest an Edit or Addition)According to Wikipedia, Pierangela Samarati from the Università degli Studi di Milano, Italy, was named Fellow of the Institute of Electrical and Electronics Engineers in 2012 for contributions to information security, data protection, and privacy. She was named a 2021 ACM Fellow "for contributions to data security and privacy".
Pierangela Samarati's Published Works
Published Works
- Protecting Respondents' Identities in Microdata Release (2001) (2359)
- Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression (1998) (1502)
- Access control: principle and practice (1994) (1211)
- Location privacy in pervasive computing (2008) (864)
- Generalizing data to provide anonymity when disclosing information (abstract) (1998) (862)
- Flexible support for multiple access control policies (2001) (736)
- A reputation-based approach for choosing reliable resources in peer-to-peer networks (2002) (730)
- Access Control: Policies, Models, and Mechanisms (2000) (674)
- A fine-grained access control system for XML documents (2002) (544)
- A logical language for expressing authorizations (1997) (517)
- Access control: principles and practice (1994) (497)
- Over-encryption: Management of Access Control Evolution on Outsourced Data (2007) (488)
- Choosing reputable servents in a P2P network (2002) (457)
- Balancing confidentiality and efficiency in untrusted relational DBMSs (2003) (410)
- Location Privacy Protection Through Obfuscation-Based Techniques (2007) (347)
- An algebra for composing access control policies (2002) (346)
- Database Security (1994) (332)
- A unified framework for enforcing multiple access control policies (1997) (330)
- An access control model supporting periodicity constraints and temporal reasoning (1998) (255)
- An Obfuscation-Based Approach for Protecting Location Privacy (2011) (237)
- Combining fragmentation and encryption to protect privacy in data storage (2010) (227)
- Managing and Sharing Servents' Reputations in P2P Systems (2003) (226)
- Regulating service access and information release on the Web (2000) (218)
- A Uniform Framework for Regulating Service Access and Information Release on the Web (2002) (215)
- Supporting location-based conditions in access control policies (2006) (178)
- Data protection in outsourcing scenarios: issues and directions (2010) (175)
- Design and implementation of an access control processor for XML documents (2000) (171)
- Authentication, access control, and audit (1996) (166)
- Encryption policies for regulating access to outsourced data (2010) (164)
- Securing XML Documents (2000) (154)
- Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems (2006) (153)
- A data outsourcing architecture combining cryptography and access control (2007) (151)
- A flexible authorization mechanism for relational data management systems (1999) (150)
- Modeling and assessing inference exposure in encrypted databases (2005) (150)
- P2P-based collaborative spam detection and filtering (2004) (142)
- A Temporal Access Control Mechanism for Database Systems (1996) (136)
- A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade (2017) (130)
- An Extended Authorization Model for Relational Databases (1997) (127)
- Supporting multiple access control policies in database systems (1996) (127)
- An Open Digest-based Technique for Spam Detection (2004) (124)
- A Manifesto for Future Generation Cloud Computing (2017) (121)
- Computer Security – ESORICS 2004 (2004) (112)
- Keep a Few: Outsourcing Data While Maintaining Confidentiality (2009) (108)
- A privacy-aware access control system (2008) (107)
- Managing and accessing data in the cloud: Privacy risks and approaches (2012) (106)
- Fragmentation and Encryption to Enforce Privacy in Data Storage (2007) (105)
- Providing Security and Interoperation of Heterogeneous Systems (2004) (102)
- Efficient and Private Access to Outsourced Data (2011) (100)
- A modular approach to composing access control policies (2000) (100)
- Key management for multi-user encrypted databases (2005) (97)
- k -Anonymous Data Mining: A Survey (2008) (91)
- Fine grained access control for SOAP E-services (2001) (88)
- Policies, Models, and Languages for Access Control (2005) (85)
- Information Flow Control in Object-Oriented Systems (1997) (85)
- An Authorization Model for a Distributed Hypertext System (1996) (84)
- Access control: principles and solutions (2003) (83)
- Data Privacy: Definitions and Techniques (2012) (80)
- Access control policies and languages (2007) (79)
- Supporting Security Requirements for Resource Management in Cloud Computing (2012) (78)
- Providing flexibility in information flow control for object oriented systems (1997) (78)
- New paradigms for access control in open environments (2005) (76)
- Managing Multiple and Dependable Identities (2003) (75)
- Extending Policy Languages to the Semantic Web (2004) (72)
- Access control for smarter healthcare using policy spaces (2010) (72)
- PrimeLife Policy Language (2010) (70)
- Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project (2010) (68)
- Database Security: Research and Practice (1995) (67)
- Controlling Access to XML Documents (2001) (65)
- A classification of update methods for replicated databases (1991) (64)
- Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases (2009) (60)
- Authorizations in relational database management systems (1993) (59)
- Authorization Specification and Enforcement in Federated Database Systems (1997) (58)
- Encryption-Based Policy Enforcement for Cloud Storage (2010) (57)
- Fragmentation in Presence of Data Dependencies (2014) (56)
- Towards securing XML Web services (2002) (55)
- Preserving confidentiality of security policies in data outsourcing (2008) (54)
- Cloud Security: Issues and Concerns (2016) (53)
- A temporal authorization model (1994) (53)
- Expressive and Deployable Access Control in Open Web Service Applications (2011) (52)
- Implementing a Reputation-Aware Gnutella Servent (2002) (50)
- Selective Data Encryption in Outsourced Dynamic Environments (2007) (49)
- A Web Service Architecture for Enforcing Access Control Policies (2004) (48)
- Securing SOAP e-services (2002) (48)
- An XACML-based privacy-centered access control system (2009) (48)
- Implementation of a Storage Mechanism for Untrusted DBMSs (2003) (47)
- Access Control (2014) (47)
- Metadata Management in Outsourced Encrypted Databases (2005) (46)
- Access Control Policies and Languages in Open Environments (2007) (45)
- A WOWA-based Aggregation Technique on Trust Values Connected to Metadata (2005) (43)
- Access control in federated systems (1996) (41)
- Applied Cryptography and Network Security (2012) (41)
- High assurance discretionary access control for object bases (1993) (41)
- Mix&Slice: Efficient Access Revocation in the Cloud (2016) (41)
- XML access control systems: a component-based approach (2000) (40)
- Database security and privacy (1996) (40)
- Exception-based information flow control in object-oriented systems (1998) (37)
- Integrity for join queries in the cloud (2013) (37)
- Enforcing dynamic write privileges in data outsourcing (2013) (37)
- Encryption and Fragmentation for Data Confidentiality in the Cloud (2013) (36)
- Enabling Privacy-preserving Credential-based Access Control with XACML and SAML (2010) (36)
- Authentication, Access Controls, and Intrusion Detection (2004) (36)
- A component-based architecture for secure data publication (2001) (35)
- Fragments and loose associations (2010) (35)
- Logics for Authorization and Security (2003) (35)
- Privacy-enhanced Location-based Access Control (2008) (34)
- F-ORM METHOD: a F-ORM Methodology for Reusing Specifications (1991) (34)
- Selective data outsourcing for enforcing privacy (2011) (34)
- Privacy in Location-Based Applications: Research Issues and Emerging Trends (2009) (34)
- An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing (2007) (34)
- Specification and enforcement of classification and inference constraints (1999) (33)
- Private data indexes for selective access to outsourced data (2011) (33)
- Maximizing Sharing of Protected Information (2002) (33)
- Access Control in Object-Oriented Database Systems - Some Approaches and Issues (1993) (32)
- Authorization enforcement in distributed query evaluation (2011) (32)
- Efficient Key Management for Enforcing Access Control in Outsourced Scenarios (2009) (31)
- Access Control in Location-Based Services (2009) (31)
- Minimal data upgrading to prevent inference and association attacks (1999) (31)
- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients (2009) (30)
- Integrating trust management and access control in data-intensive Web applications (2012) (30)
- Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control (1996) (29)
- Protecting Privacy of User Information in Continuous Location-Based Services (2012) (29)
- Logics for Authorizations and Security (2004) (28)
- Recent Advances in Access Control (2008) (28)
- Towards Privacy-Enhanced Authorization Policies and Languages (2005) (28)
- Maintaining Replicated Authorizations in Distributed Database Systems (1996) (27)
- Authorization and Access Control (2007) (27)
- Controlled Information Sharing in Collaborative Distributed Query Processing (2008) (27)
- Enhancing User Privacy Through Data Handling Policies (2006) (27)
- Regulating Exceptions in Healthcare Using Policy Spaces (2008) (25)
- Privacy Preservation over Untrusted Mobile Networks (2009) (24)
- XML-based access control languages (2004) (24)
- Assessing query privileges via safe and efficient permission composition (2008) (24)
- A new Authorization Model for Object-Oriented Databases (1994) (24)
- Protecting Privacy in Data Release (2015) (23)
- Minimising disclosure of client information in credential-based interactions (2012) (23)
- Theory of privacy and anonymity (2010) (23)
- Proceedings of the 8th ACM conference on Computer and Communications Security (1998) (23)
- Security and Privacy in the Cloud (2016) (22)
- Secure Cloud Computing (2014) (21)
- Shuffle Index (2015) (21)
- Distributed Shuffling for Preserving Access Confidentiality (2013) (20)
- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud (2015) (20)
- A protocol for reputation management in super-peer networks (2004) (20)
- An OBDD approach to enforce confidentiality and visibility constraints in data publishing (2012) (20)
- An XML-based approach to combine firewalls and web services security specifications (2003) (19)
- Data security and privacy in the cloud (2014) (19)
- Selective and Fine-Grained Access to Data in the Cloud (2014) (19)
- Extending Loose Associations to Multiple Fragments (2013) (19)
- An Access Control Model for Data Archives (2001) (18)
- Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach (2010) (18)
- Secure Interoperation of Heterogeneous Systems: A Mediator-Based Approach (1998) (18)
- Providing Mobile Users' Anonymity in Hybrid Networks (2010) (18)
- An authorization model for a public key management service (2001) (18)
- Supporting concurrency and multiple indexes in private access to outsourced data (2013) (17)
- Providing Users’ Anonymity in Mobile Hybrid Networks (2013) (17)
- Security and Privacy in the Age of Uncertainty (2003) (17)
- Securing Resources in Decentralized Cloud Storage (2020) (17)
- Modality conflicts in semantics aware access control (2006) (17)
- An Authorization Model for Federated Systems (1996) (17)
- Loose associations to increase utility in data publishing (2015) (17)
- A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy (2007) (17)
- XML Security (2007) (17)
- Supporting Application Requirements in Cloud-based IoT Information Processing (2016) (16)
- An access control model for querying XML data (2005) (16)
- Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach (2011) (16)
- Research Directions in Data and Applications Security XVIII (2004) (16)
- On information leakage by indexes over data fragments (2013) (16)
- An Access Control System for SVG Documents (2002) (16)
- Research Issues in Discretionary Authorizations for Object Bases (1993) (16)
- Privacy and Civil Liberties (2002) (16)
- A Fuzzy-Based Brokering Service for Cloud Plan Selection (2019) (16)
- Managing key hierarchies for access control enforcement: Heuristic approaches (2010) (16)
- Trust management services in relational databases (2007) (15)
- Privacy-Enhanced Location Services Information (2007) (15)
- Efficient integrity checks for join queries in the cloud (2016) (15)
- Offline Expansion of XACML Policies Based on P3P Metadata (2005) (15)
- Independent updates and incremental agreement in replicated databases (1995) (15)
- Access Control Management for Secure Cloud Storage (2016) (14)
- Three-Server Swapping for Access Confidentiality (2018) (14)
- Spam attacks: p2p to the rescue (2004) (14)
- Integrity for distributed queries (2014) (14)
- Support for Write Privileges on Outsourced Data (2012) (13)
- Supporting privacy preferences in credential-based interactions (2010) (13)
- Supporting Concurrency in Private Data Outsourcing (2011) (13)
- An Authorization Model for Multi-Provider Queries (2017) (13)
- A Uniied Framework for Enforcing Multiple Access Control Policies (1997) (13)
- RETISS: a real time security system for threat detection using fuzzy logic (1991) (12)
- Over-Encryption: Management of Access Control Evolution on Encrypted Data (2007) (12)
- A discretionary access control model with temporal authorizations (1994) (12)
- Measuring Inference Exposure in Outsourced Encrypted Databases (2006) (12)
- Protecting information on the Web (2000) (12)
- Enriching Access Control to Support Credential-Based Specificatons (2002) (11)
- A non-timestamped authorization model for data management systems (1996) (11)
- OpenAmbient : a pervasive access control architecture (2006) (11)
- Managing Privacy in LBAC Systems (2007) (11)
- Secure access wrapper: mediating security between heterogeneous databases (2000) (10)
- Supporting User Requirements and Preferences in Cloud Plan Selection (2017) (10)
- Data Security Issues in Cloud Scenarios (2015) (10)
- A consensus-based approach for selecting cloud plans (2016) (10)
- Achieving Incremental Consistency among Autonomous Replicated Databases (1992) (10)
- Modeling and preventing inferences from sensitive value distributions in data release (2012) (10)
- Security and Privacy Issues for the World Wide Web: Panel Discussion (1998) (10)
- Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems (2003) (9)
- A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud (2016) (9)
- Security, Privacy, and Trust in Mobile Systems (2008) (9)
- Advanced Metadata for Privacy-Aware Representation of Credentials (2005) (9)
- Design and implementation of an access processor for xml documents (2000) (9)
- An access control system for data archives (2001) (9)
- Optimizing Integrity Checks for Join Queries in the Cloud (2014) (9)
- Guest Editorial Special Issue on Security for IoT: The State of the Art (2014) (8)
- Extending Context Descriptions in Semantics-Aware Access Control (2006) (8)
- The case for independent updates (1992) (8)
- Towards Machine-Learning-Based 5G and Beyond Intelligent Networks: The MARSAL Project Vision (2021) (8)
- An object-oriented security model for office environments (1992) (8)
- NEW DIRECTIONS IN ACCESS CONTROL (2005) (8)
- A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks (2008) (8)
- Privacy in the Electronic Society (2006) (8)
- Access Control Models for XML (2008) (7)
- Empowering Owners with Control in Digital Data Markets (2019) (7)
- On Using Materialization Strategies for a Temporal Authorization Model (1996) (7)
- Privacy- Enhanced Identity Management for E-Services (2007) (7)
- Protecting Access Confidentiality with Data Distribution and Swapping (2014) (7)
- Protecting Data in Outsourcing Scenarios (2012) (7)
- Mandatory Access Control Policy (MAC) (2011) (7)
- Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings (2010) (7)
- Scalable Distributed Data Anonymization (2021) (6)
- Regulating Access To Semistructured Information on the Web (2000) (6)
- Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices (2010) (6)
- CAS++: An Open Source Single Sign-On Solution for Secure e-Services (2006) (6)
- The Architecture of a Privacy-Aware Access Control Decision Component (2005) (6)
- Dynamic Allocation for Resource Protection in Decentralized Cloud Storage (2019) (6)
- SSRI online First experiences in a three-years course degree offered in e-learning at the University of Milan (2005) (6)
- Fine-Grained Disclosure of Access Policies (2010) (6)
- Anonymization of Statistical Data (2011) (6)
- Decentralized Administration for a Temporal Access Control Model (1997) (6)
- A decentralized temporal autoritzation model (1996) (6)
- Access Control of SVG Documents (2002) (6)
- A new approach to security system development (1994) (6)
- Security Issues in Data Warehousing and Data Mining: Panel Discussion (1997) (6)
- Protecting Privacy of Sensitive Value Distributions in Data Release (2010) (5)
- Location-based metadata and negotiation protocols for LBAC in a one-to-many scenario (2006) (5)
- Advances in Access Control Policies (2011) (5)
- Propagation of authorizations in distributed database systems (1994) (5)
- Supporting Users in Data Outsourcing and Protection in the Cloud (2016) (5)
- Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model (1998) (5)
- Selective and Private Access to Outsourced Data Centers (2015) (5)
- Object Orientation in the Analysis of Work Oranization and Agent Co-operation (1991) (5)
- Confidentiality Protection in Large Databases (2018) (5)
- Managing Data Sharing in OpenStack Swift with Over-Encryption (2016) (5)
- A decentralized temporal authorization model (1996) (5)
- Enforcing authorizations while protecting access confidentiality (2018) (4)
- Privacy in Pervasive Systems: Social and Legal Aspects and Technical Solutions (2015) (4)
- Protecting Information Privacy in the Electronic Society (2009) (4)
- Verifying system security using Petri Nets (1993) (4)
- Distributed Query Evaluation over Encrypted Data (2021) (4)
- Communications and Networking for Smart Grid: Technology and Practice (2011) (4)
- Extending XACML fr Open Web-based Scenarios (2010) (4)
- Security-Aware Data Allocation in Multicloud Scenarios (2021) (4)
- Enforcing Mandatory Access Control in Object Bases (1993) (4)
- Data Protection in Cloud Scenarios (2015) (4)
- Open world reasoning in semantics-aware access control: A preliminary study (2005) (4)
- Trust Management (2007) (4)
- Multi-dimensional indexes for point and range queries on outsourced encrypted data (2021) (4)
- Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy (2008) (4)
- Research issues in authorization models for hypertext systems (1995) (4)
- Artifact: Scalable Distributed Data Anonymization (2021) (4)
- Analysis, Comparison and Design of Role-Based Security Specifications (1996) (4)
- Distributed Shuffle Index in the Cloud: Implementation and Evaluation (2017) (4)
- Contingency planning management (2006) (4)
- HARDWARE AND SOFTWARE DATA SECURITY (3)
- Cellular Network Security (2011) (3)
- 2010 Fourth International Conference on Network and System Security (2010) (3)
- Proceedings of the 4th European PKI workshop: Theory and Practice on Public Key Infrastructure: Theory and Practice (2007) (3)
- Clark and Wilson (2011) (3)
- Privacy in the Electronic Society: Emerging Problems and Solutions (2008) (3)
- Supporting User Privacy Preferences in Digital Interactions (2013) (3)
- Remote Attestation (2011) (3)
- Conceptual Modeling (2012) (3)
- An authorization model for query execution in the cloud (2021) (3)
- Multi-Provider Secure Processing of Sensors Data (2019) (3)
- Data Privacy - Problems and Solutions (2007) (3)
- Supporting Users in Cloud Plan Selection (2018) (3)
- Computer Security - ESORICS 2004: 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings (Lecture Notes in Computer Science) (2004) (3)
- Toward Owners’ Control in Digital Data Markets (2021) (3)
- Data and Applications Security and Privacy XXIX (2015) (3)
- An Extended Authorization Model for Object Databases (1995) (2)
- Business Continuity Planning (2012) (2)
- Cloud plan selection under requirements of multiple applications (2018) (2)
- Personal Privacy in Mobile Networks (2011) (2)
- PGRIP: PNNI Global Routing Infrastructure Protection (1999) (2)
- Access control constrains what a user can do directly, as well as what programs executing on behalf of the users are allowed to do. In this way access control seeks to prevent activity that could lead to breach of security. (1994) (2)
- Cloud technology options towards Free Flow of Data (2017) (2)
- Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices. International Workshop, WISTP 2010, Passau, Germany (2010) (2)
- Panel on XML and Security (2001) (2)
- Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings (2012) (2)
- An access control system for svgdocuments (2000) (2)
- Open Source Contributions (2011) (2)
- Towards identity management for e-services (2005) (2)
- Recursive Revoke (2011) (2)
- Security of Data and Transaction Processing (2000) (2)
- Access Control for the Shuffle Index (2016) (2)
- Multimedia Security and Digital Rights Management Technology (2004) (2)
- Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005 (2005) (2)
- Supporting User Privacy Preferences on Information Release in Open Scenarios (2010) (2)
- Flexible Authorization Framework (FAF) (2011) (1)
- Administrative Policies (2011) (1)
- Towards privacy-aware identity management (2005) (1)
- Privacy Models and Languages: Access Control and Data Handling Policies (2011) (1)
- Global Infrastructure Protection System (2002) (1)
- Enforcing Corporate Governance's Internal Controls and Audit in the Cloud (2020) (1)
- Proceedings of the ACM Workshop on Privacy in the Electronic Society : November 21, 2002, Washington, DC, USA : (in association with 9th ACM Conference on Computer and Communications Security) (2003) (1)
- Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005 (2005) (1)
- Utility-Preserving Biometric Information Anonymization (2022) (1)
- Guest Editorial Special Issue on Trust, Security, and Privacy in Crowdsourcing (2018) (1)
- Protecting Resources and Regulating Access in Cloud-Based Object Storage (2018) (1)
- Digital infrastructure policies for data security and privacy in smart cities (2022) (1)
- Towards Owner-Controlled Data Sharing (2022) (1)
- Integrity for Approximate Joins on Untrusted Computational Servers (2015) (1)
- Open WorldReasoning inSemantics-Aware AccessControl: aPreliminaryStudy (2005) (1)
- Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning (2020) (1)
- Proceedings of the 12th International Conference on Information Security (2009) (1)
- Privacy-Aware Access Control System: Evaluation and Decision (2011) (1)
- Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008 (2008) (1)
- Semantics-Aware Perimeter Protection (2003) (1)
- Protecting data privacy in outsourcing scenarios: invited talk (2010) (1)
- Public-Key Authenticated Encryption (2011) (1)
- Editorial (2010) (0)
- Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005 (2005) (0)
- Data Security and Privacy in Emerging Scenarios (2022) (0)
- Offline Expansion of XACML Policies (2005) (0)
- Chinese Wall (2011) (0)
- Towards Flexible Credential Negotiation Protocols (Discussion) (2003) (0)
- Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002 (2002) (0)
- Guest Editor's Introduction (2004) (0)
- Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers (2013) (0)
- Metadata management in encrypted outsourced databases (2005) (0)
- Distributed query execution under access restrictions (2022) (0)
- Best Readings in Communications and Information Systems Security (2013) (0)
- An authorization model for query execution in the cloud (2021) (0)
- DATA PRIVACY PRESERVING USING KNN CLASSIFICATION OVER ENCRYPTED DATA IN CLOUD Mythily (2016) (0)
- Towards flexible credential negotiation protocols. Commentary. Authors' reply (2005) (0)
- T OWARDS I DENTITY M ANAGEMENT FOR E-S ERVICES (0)
- Fine Grained A ess Control for SOAP E-Servi es (2001) (0)
- Guest Editorial (2007) (0)
- Panel Discussion: Role-Based Access Control and Next-Generation Security Models (1995) (0)
- WPES'03 : proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society : Washington, DC, USA , October 30, 2003, co-located with CCS'03 (2003) (0)
- Security and Trust Management (2016) (0)
- Privacy in the Cloud (2018) (0)
- MOSAICrOWN - Data Protection in the Data Market Scenario (2020) (0)
- Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003 (2003) (0)
- Modeling Users' Behavior And Threats For Security (1992) (0)
- Implementing a Reputation-AwareGnutella (2002) (0)
- Supporting User Protection Requirements in Cloud-Based Data Outsourcing (2023) (0)
- Extensible Markup Language has (2001) (0)
- Whitepaper on Cloud technology options towards Free Flow of Data : DPSP Cluster Projects (2017) (0)
- Role-based access control and next-generation security models (panel) (1996) (0)
- Control for the Shu ffl e Index (2016) (0)
- 1 Managing Privacy in Location-based Access Control Systems (2008) (0)
- 8 Trust Management (2007) (0)
- Workshop Program Committee MFSec 2015 (2015) (0)
- Information and Communications Security (2018) (0)
- Access Lists (2020) (0)
- Security of Data and Transaction Processing - Guest Editor's Introduction. (2000) (0)
- Scalable Distributed Data Anonymization for Large Datasets (2022) (0)
- MaSS: Multi-attribute Selective Suppression (2022) (0)
- SECRYPT 2013 : proceedings of the 10th International conference on security and cryptography : Reykjavik, Iceland, july 29 - 31, 2013 (2013) (0)
- Local Arrangements Committee (2010) (0)
- Security and Privacy in the Age of Uncertainty: IFIP TC11 18th International Conference on Information Security (SEC2003) May 26-28, 2003 (2013) (0)
- MQ or Multivariate Quadratic Public-Key Cryptosystem (MQPKC) (2011) (0)
- Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings (2007) (0)
- Distributed shuffle index: Analysis and implementation in an industrial testbed (2017) (0)
- Erratum to: Security and Privacy in the Age of Uncertainty (2003) (0)
- CHAPTER 4 XML ACCESS CONTROL SYSTEMS : A COMPONENT-BASED APPROACHE (2000) (0)
- Chapter 56 – Supporting User Privacy Preferences in Digital Interactions (2017) (0)
- Copyright page (2010) (0)
- Towards Flexible Credential Negotiation Protocols (2003) (0)
- 6 XML Security (2017) (0)
- Security and Trust Management (2012) (0)
- From Database to Cyber Security (2018) (0)
- IoT Sensors and Devices Area Editor (2014) (0)
- Disaster Recovery Planning (2004) (0)
- SECRYPT 2010 : proceedings of the 5th International conference on security and cryptography : 26-28 july 2010, Athens, Greece (2010) (0)
- Chapter 15 Privacy-Enhanced Location Services (2007) (0)
- Proceedings of the tenth annual IFIP TC11/WG11.3 international conference on Database security: volume X : status and prospects: status and prospects (1997) (0)
- k-Anonymity: From Theory to Applications (2023) (0)
- Special issue on Security in the World Wide Web (WWW) (1997) (0)
- Foreword from the Conference Chairs (2011) (0)
- Chapter 5 . 1 – Protecting Data in Outsourcing Scenarios (2011) (0)
- File System Permissions (2011) (0)
- Data Security (2008) (0)
- Runtime Analysis (2011) (0)
- Firewall Policy Analysis (2011) (0)
- Access Control for the Web-Based Infrastructure (Data-Centric Systems and Applications) (2005) (0)
- Access Privacy in the Cloud (2018) (0)
- Multilevel DBMS (2021) (0)
- Multilevel Database (2011) (0)
- Database Security Volume X, Status and Prospects, IFIP TC11 / WG11.3 Tenth International Conference on Database Security, 22-24 July 1996, Como, Italy (1997) (0)
- Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings (2009) (0)
- Cloud Security : Issues and Concerns Authors (2014) (0)
- Welcome Message from the General Chairs and Technical Program Chairs (2015) (0)
- Credential Verification (2011) (0)
- Maximizing Information Sharing while Preventing Inferen e andAsso iation Atta ks (1999) (0)
- Classifying Information for External Release (2000) (0)
- Access Control in the Open Infrastructure (0)
- NSS 2011 : 2011 5th International conference on network and system security : september 6-8, 2011, Milan, Italy : proceedings (2011) (0)
- Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice (2007) (0)
- Specification and Enforcement of Access Policies in Emerging Scenarios (2016) (0)
- Chapter 1 Access Control (2012) (0)
- INCoS-2014 Organizing Committee (2014) (0)
- Computer security - ESORICS 2004 : 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004 : proceedings (2004) (0)
- Sentinels and Twins: Effective Integrity Assessment for Distributed Computation (2023) (0)
- Requirements of a policy composition framework (0)
- Identity based Distributed Data Storage using Digital Signature and Diffie Hellmann Key Exchange Mechanism (2020) (0)
- Preface of special issue of the proceedings of theSecond International Workshop on Security and Trust Management (STM 2006) (2007) (0)
- Private Key Cryptosystem (2006) (0)
- Data Privacy (2011) (0)
- Clark and Wilson Model (2011) (0)
- Proceedings of the 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2015) (2014) (0)
- Selective Exchange of Confidential Data in the Outsourcing Scenario (2011) (0)
This paper list is powered by the following services:
Other Resources About Pierangela Samarati
What Schools Are Affiliated With Pierangela Samarati?
Pierangela Samarati is affiliated with the following schools: