Giovanni Livraga
Giovanni Livraga
Department of Computer Science, Universita' degli Studi di Milano
Verified email at unimi.it - Homepage
TitleCited byYear
Data privacy: definitions and techniques
S De Capitani Di Vimercati, S Foresti, G Livraga, P Samarati
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems …, 2012
522012
Fragmentation in presence of data dependencies
SDC di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ...
IEEE Transactions on Dependable and Secure Computing 11 (6), 510-523, 2014
432014
Enforcing dynamic write privileges in data outsourcing
SDC Di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ...
Computers & Security 39, 47-63, 2013
382013
Encryption and fragmentation for data confidentiality in the cloud
SDC di Vimercati, RF Erbacher, S Foresti, S Jajodia, G Livraga, ...
Foundations of Security Analysis and Design VII, 212-243, 2013
282013
Protecting Privacy of User Information in Continuous Location-Based Services
CA Ardagna, G Livraga, P Samarati
Proc. of the 15th IEEE International Conference on Computational Science and …, 2012
282012
Enforcing subscription-based authorization policies in cloud scenarios
S De Capitani di Vimercati, S Foresti, S Jajodia, G Livraga
Data and Applications Security and Privacy XXVI, 314-329, 2012
232012
Protecting privacy in data release
SDC di Vimercati, S Foresti, G Livraga, P Samarati
International School on Foundations of Security Analysis and Design, 1-34, 2011
212011
Extending loose associations to multiple fragments
SDC di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ...
IFIP Annual Conference on Data and Applications Security and Privacy, 1-16, 2013
182013
An OBDD approach to enforce confidentiality and visibility constraints in data publishing
V Ciriani, S De Capitani di Vimercati, S Foresti, G Livraga, P Samarati
Journal of Computer Security 20 (5), 463-508, 2012
182012
Supporting application requirements in cloud-based iot information processing
S De Capitani di Vimercati, G Livraga, V Piuri, P Samarati, GA Soares
International Conference on Internet of Things and Big Data (IoTBD 2016), 65-72, 2016
172016
Integrity for distributed queries
SDC di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ...
2014 IEEE Conference on Communications and Network Security, 364-372, 2014
152014
SQL access control model
S DE CAPITANI DI VIMERCATI, G LIVRAGA
Encyclopedia on cryptography and security, 2011
15*2011
Practical techniques building on encryption for protecting and managing data in the cloud
SDC di Vimercati, S Foresti, G Livraga, P Samarati
The New Codebreakers, 205-239, 2016
142016
A consensus-based approach for selecting cloud plans
A Arman, S Foresti, G Livraga, P Samarati
2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016
122016
Enforcing confidentiality and data visibility constraints: an OBDD approach
V Ciriani, SDC Di Vimercati, S Foresti, G Livraga, P Samarati
IFIP Annual Conference on Data and Applications Security and Privacy, 44-59, 2011
122011
Modeling and Preventing Inferences from Sensitive Value Distributions in Data Release
M Bezzi, S De Capitani di Vimercati, S Foresti, G Livraga, P Samarati, ...
Journal of Computer Security (JCS) 20 (4), 393-436, 2012
102012
Privacy and security in environmental monitoring systems: Issues and solutions
SDC di Vimercati, A Genovese, G Livraga, V Piuri, F Scotti
Computer and Information Security Handbook, 835-853, 2013
92013
Supporting user requirements and preferences in cloud plan selection
SDC di Vimercati, S Foresti, G Livraga, V Piuri, P Samarati
IEEE Transactions on Services Computing, 2017
82017
Application requirements with preferences in cloud-based information processing
SDC di Vimercati, G Livraga, V Piuri
2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016
82016
Protecting privacy of sensitive value distributions in data release
M Bezzi, SDC Di Vimercati, G Livraga, P Samarati
International Workshop on Security and Trust Management, 255-270, 2010
82010
The system can't perform the operation now. Try again later.
Articles 1–20