Data privacy: definitions and techniques S De Capitani Di Vimercati, S Foresti, G Livraga, P Samarati International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems …, 2012 | 92 | 2012 |
Fragmentation in presence of data dependencies SDC di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ... IEEE Transactions on Dependable and Secure Computing 11 (6), 510-523, 2014 | 59 | 2014 |
Enforcing dynamic write privileges in data outsourcing SDC Di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ... Computers & Security 39, 47-63, 2013 | 44 | 2013 |
Encryption and fragmentation for data confidentiality in the cloud SD Capitani di Vimercati, RF Erbacher, S Foresti, S Jajodia, G Livraga, ... Foundations of security analysis and design VII, 212-243, 2013 | 36 | 2013 |
Protecting Privacy of User Information in Continuous Location-Based Services CA Ardagna, G Livraga, P Samarati Proc. of the 15th IEEE International Conference on Computational Science and …, 2012 | 31 | 2012 |
Enforcing subscription-based authorization policies in cloud scenarios S De Capitani di Vimercati, S Foresti, S Jajodia, G Livraga Data and Applications Security and Privacy XXVI, 314-329, 2012 | 24 | 2012 |
Protecting privacy in data release SD Capitani di Vimercati, S Foresti, G Livraga, P Samarati International School on Foundations of Security Analysis and Design, 1-34, 2011 | 24 | 2011 |
SQL access control model S DE CAPITANI DI VIMERCATI, G LIVRAGA Encyclopedia on cryptography and security, 2011 | 21* | 2011 |
Practical techniques building on encryption for protecting and managing data in the cloud SD Capitani di Vimercati, S Foresti, G Livraga, P Samarati The New Codebreakers, 205-239, 2016 | 20 | 2016 |
Extending loose associations to multiple fragments SD Capitani di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ... IFIP Annual Conference on Data and Applications Security and Privacy, 1-16, 2013 | 20 | 2013 |
An OBDD approach to enforce confidentiality and visibility constraints in data publishing V Ciriani, S De Capitani di Vimercati, S Foresti, G Livraga, P Samarati Journal of Computer Security 20 (5), 463-508, 2012 | 20 | 2012 |
An authorization model for multi provider queries S De Capitani di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ... Proceedings of the VLDB Endowment 11 (3), 256-268, 2017 | 17 | 2017 |
Supporting application requirements in cloud-based IoT information processing S De Capitani di Vimercati, G Livraga, V Piuri, P Samarati, GA Soares International Conference on Internet of Things and Big Data (IoTBD 2016), 65-72, 2016 | 17 | 2016 |
Integrity for distributed queries SDC di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ... 2014 IEEE Conference on Communications and Network Security, 364-372, 2014 | 17 | 2014 |
A consensus-based approach for selecting cloud plans A Arman, S Foresti, G Livraga, P Samarati 2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016 | 15 | 2016 |
Loose associations to increase utility in data publishing 1 S De Capitani di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ... Journal of Computer Security 23 (1), 59-88, 2015 | 15 | 2015 |
Enforcing confidentiality and data visibility constraints: An OBDD approach V Ciriani, SD Capitani di Vimercati, S Foresti, G Livraga, P Samarati IFIP Annual Conference on Data and Applications Security and Privacy, 44-59, 2011 | 15 | 2011 |
A fuzzy-based brokering service for cloud plan selection SDC di Vimercati, S Foresti, G Livraga, V Piuri, P Samarati IEEE Systems Journal 13 (4), 4101-4109, 2019 | 14 | 2019 |
Privacy and security in environmental monitoring systems: issues and solutions SDC di Vimercati, A Genovese, G Livraga, V Piuri, F Scotti Computer and Information Security Handbook, 835-853, 2013 | 14 | 2013 |
Modeling and Preventing Inferences from Sensitive Value Distributions in Data Release M Bezzi, S De Capitani di Vimercati, S Foresti, G Livraga, P Samarati, ... Journal of Computer Security (JCS) 20 (4), 393-436, 2012 | 11 | 2012 |