Giovanni Livraga

According to our database1, Giovanni Livraga authored at least 34 papers between 2010 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Multi-Provider Secure Processing of Sensors Data.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Empowering Owners with Control in Digital Data Markets.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

2018
Supporting Users in Cloud Plan Selection.
Proceedings of the From Database to Cyber Security, 2018

Confidentiality Protection in Large Databases.
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018

2017
An Authorization Model for Multi-Provider Queries.
PVLDB, 2017

2016
Application requirements with preferences in cloud-based information processing.
Proceedings of the IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016

A consensus-based approach for selecting cloud plans.
Proceedings of the IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016

Supporting Application Requirements in Cloud-based IoT Information Processing.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

Supporting Users in Data Outsourcing and Protection in the Cloud.
Proceedings of the Cloud Computing and Services Science - 6th International Conference, 2016

Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud.
Proceedings of the New Codebreakers, 2016

2015
Protecting Privacy in Data Release
Advances in Information Security 57, Springer, ISBN: 978-3-319-16109-9, 2015

Selective and Private Access to Outsourced Data Centers.
Proceedings of the Handbook on Data Centers, 2015

Loose associations to increase utility in data publishing.
Journal of Computer Security, 2015

Privacy in Pervasive Systems: Social and Legal Aspects and Technical Solutions.
Proceedings of the Data Management in Pervasive Systems, 2015

2014
Fragmentation in Presence of Data Dependencies.
IEEE Trans. Dependable Sec. Comput., 2014

Integrity for distributed queries.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Enforcing dynamic write privileges in data outsourcing.
Computers & Security, 2013

Encryption and Fragmentation for Data Confidentiality in the Cloud.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

Extending Loose Associations to Multiple Fragments.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

2012
An OBDD approach to enforce confidentiality and visibility constraints in data publishing.
Journal of Computer Security, 2012

Modeling and preventing inferences from sensitive value distributions in data release.
Journal of Computer Security, 2012

Data Privacy: Definitions and Techniques.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2012

Enforcing Subscription-Based Authorization Policies in Cloud Scenarios.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Protecting Privacy of User Information in Continuous Location-Based Services.
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012

2011
SQL Access Control Model.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Privileges in SQL.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Grant Option.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Multilevel Database.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Anonymization of Statistical Data (Anonymisierung von statistischen Daten).
it - Information Technology, 2011

Protecting Privacy in Data Release.
Proceedings of the Foundations of Security Analysis and Design VI, 2011

Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Data Privacy.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
Protecting Privacy of Sensitive Value Distributions in Data Release.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Privacy in Data Publishing.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010


  Loading...