Giovanni Livraga

Orcid: 0000-0003-2661-8573

According to our database1, Giovanni Livraga authored at least 53 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Supporting User Protection Requirements in Cloud-Based Data Outsourcing.
SN Comput. Sci., July, 2023

Scalable Distributed Data Anonymization for Large Datasets.
IEEE Trans. Big Data, June, 2023

Distributed query execution under access restrictions.
Comput. Secur., April, 2023

k-Anonymity: From Theory to Applications.
Trans. Data Priv., January, 2023

Explainability of the Effects of Non-Perturbative Data Protection in Supervised Classification.
Proceedings of the IEEE International Conference on Web Intelligence and Intelligent Agent Technology, 2023

Unveiling the Privacy Risk: A Trade-Off Between User Behavior and Information Propagation in Social Media.
Proceedings of the Complex Networks & Their Applications XII, 2023

2022
An authorization model for query execution in the cloud.
VLDB J., 2022

Assessing User Privacy on Social Media: The Twitter Case Study.
Proceedings of the OASIS@HT 2022: Open Challenges in Online Social Networks, 2022

Towards Owner-Controlled Data Sharing.
Proceedings of the Advances in Computing, Informatics, Networking and Cybersecurity, 2022

2021

Supporting User Requirements and Preferences in Cloud Plan Selection.
IEEE Trans. Serv. Comput., 2021

Security-Aware Data Allocation in Multicloud Scenarios.
IEEE Trans. Dependable Secur. Comput., 2021

Toward Owners' Control in Digital Data Markets.
IEEE Syst. J., 2021

Selective Owner-side Encryption in Digital Data Markets: Strategies for Key Derivation.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Selective Encryption for Owners' Control in Digital Data Markets.
Proceedings of the E-Business and Telecommunications - 18th International Conference, 2021

Distributed Query Evaluation over Encrypted Data.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

2019
A Fuzzy-Based Brokering Service for Cloud Plan Selection.
IEEE Syst. J., 2019

Multi-Provider Secure Processing of Sensors Data.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Data Confidentiality and Information Credibility in On-line Ecosystems.
Proceedings of the 11th International Conference on Management of Digital EcoSystems, 2019

Empowering Owners with Control in Digital Data Markets.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

2018
Cloud plan selection under requirements of multiple applications.
Secur. Priv., 2018

Supporting Users in Cloud Plan Selection.
Proceedings of the From Database to Cyber Security, 2018

Confidentiality Protection in Large Databases.
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018

2017
An Authorization Model for Multi-Provider Queries.
Proc. VLDB Endow., 2017

2016
Application requirements with preferences in cloud-based information processing.
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016

A consensus-based approach for selecting cloud plans.
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016

Supporting Application Requirements in Cloud-based IoT Information Processing.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

Supporting Users in Data Outsourcing and Protection in the Cloud.
Proceedings of the Cloud Computing and Services Science - 6th International Conference, 2016

Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud.
Proceedings of the New Codebreakers, 2016

2015
Protecting Privacy in Data Release
Advances in Information Security 57, Springer, ISBN: 978-3-319-16109-9, 2015

Selective and Private Access to Outsourced Data Centers.
Proceedings of the Handbook on Data Centers, 2015

Loose associations to increase utility in data publishing.
J. Comput. Secur., 2015

Privacy in Pervasive Systems: Social and Legal Aspects and Technical Solutions.
Proceedings of the Data Management in Pervasive Systems, 2015

2014
Fragmentation in Presence of Data Dependencies.
IEEE Trans. Dependable Secur. Comput., 2014

Integrity for distributed queries.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Enforcing dynamic write privileges in data outsourcing.
Comput. Secur., 2013

Encryption and Fragmentation for Data Confidentiality in the Cloud.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

Extending Loose Associations to Multiple Fragments.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

2012
An OBDD approach to enforce confidentiality and visibility constraints in data publishing.
J. Comput. Secur., 2012

Modeling and preventing inferences from sensitive value distributions in data release.
J. Comput. Secur., 2012

Data Privacy: Definitions and Techniques.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2012

Enforcing Subscription-Based Authorization Policies in Cloud Scenarios.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Protecting Privacy of User Information in Continuous Location-Based Services.
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012

2011
SQL Access Control Model.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Privileges in SQL.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Grant Option.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Multilevel Database.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Anonymization of Statistical Data (Anonymisierung von statistischen Daten).
it Inf. Technol., 2011

Protecting Privacy in Data Release.
Proceedings of the Foundations of Security Analysis and Design VI, 2011

Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Data Privacy.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
Protecting Privacy of Sensitive Value Distributions in Data Release.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Privacy in Data Publishing.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010


  Loading...