Data privacy: definitions and techniques S De Capitani Di Vimercati, S Foresti, G Livraga, P Samarati International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems …, 2012 | 52 | 2012 |
Fragmentation in presence of data dependencies SDC di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ... IEEE Transactions on Dependable and Secure Computing 11 (6), 510-523, 2014 | 43 | 2014 |
Enforcing dynamic write privileges in data outsourcing SDC Di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ... Computers & Security 39, 47-63, 2013 | 38 | 2013 |
Encryption and fragmentation for data confidentiality in the cloud SDC di Vimercati, RF Erbacher, S Foresti, S Jajodia, G Livraga, ... Foundations of Security Analysis and Design VII, 212-243, 2013 | 28 | 2013 |
Protecting Privacy of User Information in Continuous Location-Based Services CA Ardagna, G Livraga, P Samarati Proc. of the 15th IEEE International Conference on Computational Science and …, 2012 | 28 | 2012 |
Enforcing subscription-based authorization policies in cloud scenarios S De Capitani di Vimercati, S Foresti, S Jajodia, G Livraga Data and Applications Security and Privacy XXVI, 314-329, 2012 | 23 | 2012 |
Protecting privacy in data release SDC di Vimercati, S Foresti, G Livraga, P Samarati International School on Foundations of Security Analysis and Design, 1-34, 2011 | 21 | 2011 |
Extending loose associations to multiple fragments SDC di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ... IFIP Annual Conference on Data and Applications Security and Privacy, 1-16, 2013 | 18 | 2013 |
An OBDD approach to enforce confidentiality and visibility constraints in data publishing V Ciriani, S De Capitani di Vimercati, S Foresti, G Livraga, P Samarati Journal of Computer Security 20 (5), 463-508, 2012 | 18 | 2012 |
Supporting application requirements in cloud-based iot information processing S De Capitani di Vimercati, G Livraga, V Piuri, P Samarati, GA Soares International Conference on Internet of Things and Big Data (IoTBD 2016), 65-72, 2016 | 17 | 2016 |
Integrity for distributed queries SDC di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ... 2014 IEEE Conference on Communications and Network Security, 364-372, 2014 | 15 | 2014 |
SQL access control model S DE CAPITANI DI VIMERCATI, G LIVRAGA Encyclopedia on cryptography and security, 2011 | 15* | 2011 |
Practical techniques building on encryption for protecting and managing data in the cloud SDC di Vimercati, S Foresti, G Livraga, P Samarati The New Codebreakers, 205-239, 2016 | 14 | 2016 |
A consensus-based approach for selecting cloud plans A Arman, S Foresti, G Livraga, P Samarati 2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016 | 12 | 2016 |
Enforcing confidentiality and data visibility constraints: an OBDD approach V Ciriani, SDC Di Vimercati, S Foresti, G Livraga, P Samarati IFIP Annual Conference on Data and Applications Security and Privacy, 44-59, 2011 | 12 | 2011 |
Modeling and Preventing Inferences from Sensitive Value Distributions in Data Release M Bezzi, S De Capitani di Vimercati, S Foresti, G Livraga, P Samarati, ... Journal of Computer Security (JCS) 20 (4), 393-436, 2012 | 10 | 2012 |
Privacy and security in environmental monitoring systems: Issues and solutions SDC di Vimercati, A Genovese, G Livraga, V Piuri, F Scotti Computer and Information Security Handbook, 835-853, 2013 | 9 | 2013 |
Supporting user requirements and preferences in cloud plan selection SDC di Vimercati, S Foresti, G Livraga, V Piuri, P Samarati IEEE Transactions on Services Computing, 2017 | 8 | 2017 |
Application requirements with preferences in cloud-based information processing SDC di Vimercati, G Livraga, V Piuri 2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016 | 8 | 2016 |
Protecting privacy of sensitive value distributions in data release M Bezzi, SDC Di Vimercati, G Livraga, P Samarati International Workshop on Security and Trust Management, 255-270, 2010 | 8 | 2010 |