Pierangela Samarati

According to our database1, Pierangela Samarati authored at least 255 papers between 1991 and 2018.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2012, "For contributions to information security, data protection, and privacy".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Three-Server Swapping for Access Confidentiality.
IEEE Trans. Cloud Computing, 2018

Enforcing authorizations while protecting access confidentiality.
Journal of Computer Security, 2018

Access Privacy in the Cloud.
Proceedings of the From Database to Cyber Security, 2018

Supporting Users in Cloud Plan Selection.
Proceedings of the From Database to Cyber Security, 2018

Protecting Resources and Regulating Access in Cloud-Based Object Storage.
Proceedings of the From Database to Cyber Security, 2018

Confidentiality Protection in Large Databases.
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018

2017
An Authorization Model for Multi-Provider Queries.
PVLDB, 2017

Distributed Shuffle Index in the Cloud: Implementation and Evaluation.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

Distributed shuffle index: Analysis and implementation in an industrial testbed.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Efficient integrity checks for join queries in the cloud.
Journal of Computer Security, 2016

Access Control Management for Secure Cloud Storage.
Proceedings of the Security and Privacy in Communication Networks, 2016

A consensus-based approach for selecting cloud plans.
Proceedings of the IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016

Supporting Application Requirements in Cloud-based IoT Information Processing.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

Access Control for the Shuffle Index.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

Supporting Users in Data Outsourcing and Protection in the Cloud.
Proceedings of the Cloud Computing and Services Science - 6th International Conference, 2016

Security and Privacy in the Cloud.
Proceedings of the CLOSER 2016, 2016

Mix&Slice: Efficient Access Revocation in the Cloud.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Managing Data Sharing in OpenStack Swift with Over-Encryption.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud.
Proceedings of the New Codebreakers, 2016

2015
Selective and Private Access to Outsourced Data Centers.
Proceedings of the Handbook on Data Centers, 2015

Shuffle Index: Efficient and Private Access to Outsourced Data.
TOS, 2015

Loose associations to increase utility in data publishing.
Journal of Computer Security, 2015

Integrity for Approximate Joins on Untrusted Computational Servers.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Data Security Issues in Cloud Scenarios.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Data Protection in Cloud Scenarios.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Privacy in Pervasive Systems: Social and Legal Aspects and Technical Solutions.
Proceedings of the Data Management in Pervasive Systems, 2015

2014
Fragmentation in Presence of Data Dependencies.
IEEE Trans. Dependable Sec. Comput., 2014

Guest Editorial Special Issue on Security for IoT: The State of the Art.
IEEE Internet of Things Journal, 2014

Data Security and Privacy in the Cloud.
Proceedings of the Information Security Practice and Experience, 2014

Optimizing Integrity Checks for Join Queries in the Cloud.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Integrity for distributed queries.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Protecting Access Confidentiality with Data Distribution and Swapping.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

Selective and Fine-Grained Access to Data in the Cloud.
Proceedings of the Secure Cloud Computing, 2014

Access Control.
Proceedings of the Computing Handbook, 2014

Database Security and Privacy.
Proceedings of the Computing Handbook, 2014

2013
Providing Users' Anonymity in Mobile Hybrid Networks.
ACM Trans. Internet Techn., 2013

Integrity for Join Queries in the Cloud.
IEEE Trans. Cloud Computing, 2013

Guest Editorial.
IEEE Systems Journal, 2013

Guest Editorial.
IEEE Systems Journal, 2013

Supporting concurrency and multiple indexes in private access to outsourced data.
Journal of Computer Security, 2013

Enforcing dynamic write privileges in data outsourcing.
Computers & Security, 2013

On information leakage by indexes over data fragments.
Proceedings of the Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Encryption and Fragmentation for Data Confidentiality in the Cloud.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

Distributed Shuffling for Preserving Access Confidentiality.
Proceedings of the Computer Security - ESORICS 2013, 2013

Extending Loose Associations to Multiple Fragments.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

2012
Integrating trust management and access control in data-intensive Web applications.
TWEB, 2012

An OBDD approach to enforce confidentiality and visibility constraints in data publishing.
Journal of Computer Security, 2012

Modeling and preventing inferences from sensitive value distributions in data release.
Journal of Computer Security, 2012

Data Privacy: Definitions and Techniques.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2012

Minimising disclosure of client information in credential-based interactions.
IJIPSI, 2012

Support for Write Privileges on Outsourced Data.
Proceedings of the Information Security and Privacy Research, 2012

Supporting Security Requirements for Resource Management in Cloud Computing.
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012

Protecting Privacy of User Information in Continuous Location-Based Services.
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012

Managing and accessing data in the cloud: Privacy risks and approaches.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
Privacy Models and Languages: Access Control and Data Handling Policies.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Privacy-Aware Access Control System: Evaluation and Decision.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Polyinstantiation.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Mandatory Access Control Policy (MAC).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Clark and Wilson Model.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Chinese Wall.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Multilevel Database.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Recursive Revoke.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

k-Anonymity.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Flexible Authorization Framework (FAF).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Administrative Policies.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Expressive and Deployable Access Control in Open Web Service Applications.
IEEE Trans. Services Computing, 2011

An Obfuscation-Based Approach for Protecting Location Privacy.
IEEE Trans. Dependable Sec. Comput., 2011

Authorization enforcement in distributed query evaluation.
Journal of Computer Security, 2011

Selective data outsourcing for enforcing privacy.
Journal of Computer Security, 2011

Anonymization of Statistical Data (Anonymisierung von statistischen Daten).
it - Information Technology, 2011

Communications and Networking for Smart Grid: Technology and Practice.
Int. J. Digital Multimedia Broadcasting, 2011

Private data indexes for selective access to outsourced data.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Foreword from the Conference Chairs.
Proceedings of the 5th International Conference on Network and System Security, 2011

Efficient and Private Access to Outsourced Data.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Protecting Privacy in Data Release.
Proceedings of the Foundations of Security Analysis and Design VI, 2011

Supporting Concurrency in Private Data Outsourcing.
Proceedings of the Computer Security - ESORICS 2011, 2011

Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Selective Exchange of Confidential Data in the Outsourcing Scenario.
Proceedings of the Privacy and Identity Management for Life, 2011

Open Source Contributions.
Proceedings of the Privacy and Identity Management for Life, 2011

Data Privacy.
Proceedings of the Privacy and Identity Management for Life, 2011

Advances in Access Control Policies.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
Encryption policies for regulating access to outsourced data.
ACM Trans. Database Syst., 2010

Combining fragmentation and encryption to protect privacy in data storage.
ACM Trans. Inf. Syst. Secur., 2010

Fragments and Loose Associations: Respecting Privacy in Data Publishing.
PVLDB, 2010

Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project.
Journal of Computer Security, 2010

Editorial.
Computers & Security, 2010

Managing key hierarchies for access control enforcement: Heuristic approaches.
Computers & Security, 2010

Access control for smarter healthcare using policy spaces.
Computers & Security, 2010

Supporting privacy preferences in credential-based interactions.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Protecting Privacy of Sensitive Value Distributions in Data Release.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Fine-Grained Disclosure of Access Policies.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Encryption-Based Policy Enforcement for Cloud Storage.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Providing Mobile Users' Anonymity in Hybrid Networks.
Proceedings of the Computer Security, 2010

Protecting data privacy in outsourcing scenarios: invited talk.
Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010

Data protection in outsourcing scenarios: issues and directions.
Proceedings of the 5th ACM Symposium on Information, 2010

Enabling Privacy-preserving Credential-based Access Control with XACML and SAML.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Protecting Information Privacy in the Electronic Society.
Proceedings of the SECRYPT 2009, 2009

Efficient Key Management for Enforcing Access Control in Outsourced Scenarios.
Proceedings of the Emerging Challenges for Security, 2009

Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

Keep a Few: Outsourcing Data While Maintaining Confidentiality.
Proceedings of the Computer Security, 2009

Privacy Preservation over Untrusted Mobile Networks.
Proceedings of the Privacy in Location-Based Applications, 2009

Access Control in Location-Based Services.
Proceedings of the Privacy in Location-Based Applications, 2009

Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients.
Proceedings of the Data and Applications Security XXIII, 2009

2008
k -Anonymous Data Mining: A Survey.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

Data Security.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Recent Advances in Access Control.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Access Control Models for XML.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Privacy-enhanced Location-based Access Control.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

A privacy-aware access control system.
Journal of Computer Security, 2008

Preserving confidentiality of security policies in data outsourcing.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Controlled Information Sharing in Collaborative Distributed Query Processing.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

Regulating Exceptions in Healthcare Using Policy Spaces.
Proceedings of the Data and Applications Security XXII, 2008

Assessing query privileges via safe and efficient permission composition.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Access Control Policies and Languages in Open Environments.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

k-Anonymity.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Microdata Protection.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Access control policies and languages.
IJCSE, 2007

Preface.
Electr. Notes Theor. Comput. Sci., 2007

Selective Data Encryption in Outsourced Dynamic Environments.
Electr. Notes Theor. Comput. Sci., 2007

Over-encryption: Management of Access Control Evolution on Outsourced Data.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing.
Proceedings of the New Approaches for Security, 2007

A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy.
Proceedings of the New Approaches for Security, 2007

Data Privacy - Problems and Solutions.
Proceedings of the Information Systems Security, Third International Conference, 2007

Fragmentation and Encryption to Enforce Privacy in Data Storage.
Proceedings of the Computer Security, 2007

Location Privacy Protection Through Obfuscation-Based Techniques.
Proceedings of the Data and Applications Security XXI, 2007

Trust management services in relational databases.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

A data outsourcing architecture combining cryptography and access control.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

Managing Privacy in LBAC Systems.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Authorization and Access Control.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

XML Security.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

Trust Management.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
Measuring Inference Exposure in Outsourced Encrypted Databases.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems.
JASIST, 2006

A WOWA-based Aggregation Technique on Trust Values Connected to Metadata.
Electr. Notes Theor. Comput. Sci., 2006

A Web Service Architecture for Enforcing Access Control Policies.
Electr. Notes Theor. Comput. Sci., 2006

CAS++: An Open Source Single Sign-On Solution for Secure e-Services.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Modality conflicts in semantics aware access control.
Proceedings of the 6th International Conference on Web Engineering, 2006

Privacy in the Electronic Society.
Proceedings of the Information Systems Security, Second International Conference, 2006

Extending Context Descriptions in Semantics-Aware Access Control.
Proceedings of the Information Systems Security, Second International Conference, 2006

Enhancing User Privacy Through Data Handling Policies.
Proceedings of the Data and Applications Security XX, 2006

Supporting location-based conditions in access control policies.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Modeling and assessing inference exposure in encrypted databases.
ACM Trans. Inf. Syst. Secur., 2005

An access control model for querying XML data.
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005

Open WorldReasoning inSemantics-Aware AccessControl: aPreliminaryStudy.
Proceedings of the SWAP 2005, 2005

Key management for multi-user encrypted databases.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

Metadata Management in Outsourced Encrypted Databases.
Proceedings of the Secure Data Management, 2005

Offline Expansion of XACML Policies Based on P3P Metadata.
Proceedings of the Web Engineering, 5th International Conference, 2005

Advanced Metadata for Privacy-Aware Representation of Credentials.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

Policies, Models, and Languages for Access Control.
Proceedings of the Databases in Networked Information Systems, 4th International Workshop, 2005

SSRI online First experiences in a three-years course degree offered in e-learning at the University of Milan.
Proceedings of the 11th International Conference on Distributed Multimedia Systems, 2005

Towards Privacy-Enhanced Authorization Policies and Languages.
Proceedings of the Data and Applications Security XIX, 2005

The Architecture of a Privacy-Aware Access Control Decision Component.
Proceedings of the Construction and Analysis of Safe, 2005

2004
XML-based access control languages.
Inf. Sec. Techn. Report, 2004

Spam attacks: p2p to the rescue.
Proceedings of the 13th international conference on World Wide Web, 2004

P2P-Based Collaborative Spam Detection and Filtering.
Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), 2004

Extending Policy Languages to the Semantic Web.
Proceedings of the Web Engineering - 4th International Conference, 2004

A Protocol for Reputation Management in Super-Peer Networks.
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004

An Open Digest-based Technique for Spam Detection.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
Managing and Sharing Servents' Reputations in P2P Systems.
IEEE Trans. Knowl. Data Eng., 2003

Access control: principles and solutions.
Softw., Pract. Exper., 2003

Managing Multiple and Dependable Identities.
IEEE Internet Computing, 2003

An XML-based approach to combine firewalls and web services security specifications.
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003

Towards Flexible Credential Negotiation Protocols (Discussion).
Proceedings of the Security Protocols, 2003

Towards Flexible Credential Negotiation Protocols.
Proceedings of the Security Protocols, 2003

Implementation of a Storage Mechanism for Untrusted DBMSs.
Proceedings of the 2nd International IEEE Security in Storage Workshop (SISW 2003), 2003

Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems.
Proceedings of the 3rd Conference of the European Society for Fuzzy Logic and Technology, 2003

Semantics-Aware Perimeter Protection.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Logics for Authorization and Security.
Proceedings of the Logics for Emerging Applications of Databases [outcome of a Dagstuhl seminar], 2003

Balancing confidentiality and efficiency in untrusted relational DBMSs.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
A fine-grained access control system for XML documents.
ACM Trans. Inf. Syst. Secur., 2002

An algebra for composing access control policies.
ACM Trans. Inf. Syst. Secur., 2002

Maximizing Sharing of Protected Information.
J. Comput. Syst. Sci., 2002

A Uniform Framework for Regulating Service Access and Information Release on the Web.
Journal of Computer Security, 2002

XML access control systems: a component-based approach.
Informatica (Slovenia), 2002

Securing SOAP e-services.
Int. J. Inf. Sec., 2002

Towards securing XML Web services.
Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, 2002

Choosing reputable servents in a P2P network.
Proceedings of the Eleventh International World Wide Web Conference, 2002

Implementing a Reputation-Aware Gnutella Servent.
Proceedings of the Web Engineering and Peer-to-Peer Computing, 2002

Enriching Access Control to Support Credential-Based Specificatons.
Proceedings of the Informatik bewegt: Informatik 2002 - 32. Jahrestagung der Gesellschaft für Informatik e.v. (GI), 30. September, 2002

Enriching Access Control to Support Credential-Based Specifications.
Proceedings of the Informatik bewegt: Informatik 2002 - 32. Jahrestagung der Gesellschaft für Informatik e.v. (GI), 30. September, 2002

Access Control of SVG Documents.
Proceedings of the Research Directions in Data and Applications Security, 2002

Privacy and Civil Liberties.
Proceedings of the Research Directions in Data and Applications Security, 2002

A reputation-based approach for choosing reliable resources in peer-to-peer networks.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Flexible support for multiple access control policies.
ACM Trans. Database Syst., 2001

Protecting Respondents' Identities in Microdata Release.
IEEE Trans. Knowl. Data Eng., 2001

An authorization model for a public key management service.
ACM Trans. Inf. Syst. Secur., 2001

Global Infrastructure Protection System.
Journal of Computer Security, 2001

Controlling Access to XML Documents.
IEEE Internet Computing, 2001

Fine grained access control for SOAP E-services.
Proceedings of the Tenth International World Wide Web Conference, 2001

An Access Control Model for Data Archives.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Panel on XML and Security.
Proceedings of the Database and Application Security XV, 2001

A Component-Based Architecture for Secure Data Publication.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Providing Security and Interoperation of Heterogeneous Systems.
Distributed and Parallel Databases, 2000

Security of Data and Transaction Processing - Guest Editor's Introduction.
Distributed and Parallel Databases, 2000

Design and implementation of an access control processor for XML documents.
Computer Networks, 2000

Protecting information on the Web.
Commun. ACM, 2000

Classifying Information for External Release.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Regulating Access To Semistructured Information on the Web.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Access Control: Policies, Models, and Mechanisms.
Proceedings of the Foundations of Security Analysis and Design, 2000

Securing XML Documents.
Proceedings of the Advances in Database Technology, 2000

XML Access Control Systems: A Component-Based Approach.
Proceedings of the Data and Application Security, 2000

A modular approach to composing access control policies.
Proceedings of the CCS 2000, 2000

Regulating service access and information release on the Web.
Proceedings of the CCS 2000, 2000

1999
A Flexible Authorization Mechanism for Relational Data Management Systems.
ACM Trans. Inf. Syst., 1999

Specification and Enforcement of Classification and Inference Constraints.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

Minimal Data Upgrading to Prevent Inference and Association.
Proceedings of the Eighteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, May 31, 1999

PGRIP: PNNI Global Routing Infrastructure Protection.
Proceedings of the Network and Distributed System Security Symposium, 1999

1998
An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning.
ACM Trans. Database Syst., 1998

Exception-Based Information Flow Control in Object-Oriented Systems.
ACM Trans. Inf. Syst. Secur., 1998

Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model.
TAPOS, 1998

Generalizing Data to Provide Anonymity when Disclosing Information (Abstract).
Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 1998

Security and Privacy Issues for the World Wide Web: Panel Discussion.
Proceedings of the Database Security XII: Status and Prospects, 1998

1997
Information Flow Control in Object-Oriented Systems.
IEEE Trans. Knowl. Data Eng., 1997

An Extended Authorization Model for Relational Databases.
IEEE Trans. Knowl. Data Eng., 1997

Authorization Specification and Enforcement in Federated Database Systems.
Journal of Computer Security, 1997

Decentralized Administration for a Temporal Access Control Model.
Inf. Syst., 1997

A Logical Language for Expressing Authorizations.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

Providing flexibility in information flow control for object oriented systems.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

A Unified Framework for Enforcing Multiple Access Control Policies.
Proceedings of the SIGMOD 1997, 1997

Security Issues in Data Warehousing and Data Mining: Panel Discussion.
Proceedings of the Database Securty XI: Status and Prospects, 1997

Authentication, Access Controls, and Intrusion Detection.
Proceedings of the Computer Science and Engineering Handbook, 1997

1996
An Authorization Model for a Distributed Hypertext System.
IEEE Trans. Knowl. Data Eng., 1996

A Temporal Access Control Mechanism for Database Systems.
IEEE Trans. Knowl. Data Eng., 1996

Maintaining Replicated Authorizations in Distributed Database Systems.
Data Knowl. Eng., 1996

Analysis, Comparison and Design of Role-Based Security Specifications.
Data Knowl. Eng., 1996

Authetication, Access Control, and Audit.
ACM Comput. Surv., 1996

Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control.
Proceedings of the VLDB'96, 1996

On Using Materialization Strategies for a Temporal Authorization Model.
VIEWS, 1996

Supporting Multiple Access Control Policies in Database Systems.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

A decentralized temporal autoritzation model.
Proceedings of the Information Systems Security, 1996

Access control in federated systems.
Proceedings of the 1996 Workshop on New Security Paradigms, 1996

An Authorization Model for Federated Systems.
Proceedings of the Computer Security, 1996

A Non-Timestamped Authorization Model for Data Management Systems.
Proceedings of the CCS '96, 1996

1995
An Extended Authorization Model for Object Databases.
Journal of Computer Security, 1995

Database Security: Research and Practice
Inf. Syst., 1995

Independent Updates and Incremental Agreement in Replicated Databases.
Distributed and Parallel Databases, 1995

Research issues in authorization models for hypertext systems.
Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, USA, 1995

Panel Discussion: Role-Based Access Control and Next-Generation Security Models.
Proceedings of the Database Security IX: Status and Prospects, 1995

Database Security.
Addison-Wesley & ACM Press, ISBN: 0-201-59375-0, 1995

1994
A new approach to security system development.
Proceedings of the 1994 Workshop on New Security Paradigms, 1994

A discretionary access control model with temporal authorizations.
Proceedings of the 1994 Workshop on New Security Paradigms, 1994

A new Authorization Model for Object-Oriented Databases.
Proceedings of the Database Security, 1994

Propagation of Authorizations in Distributed Database Systems.
Proceedings of the CCS '94, 1994

A Temporal Authorization Model.
Proceedings of the CCS '94, 1994

1993
Access Control in Object-Oriented Database Systems - Some Approaches and Issues.
Proceedings of the Advanced Database Systems, 1993

Research Issues in Discretionary Authorizations for Object Bases.
Proceedings of the Security for Object-Oriented Systems, 1993

Enforcing Mandatory Access Control in Object Bases.
Proceedings of the Security for Object-Oriented Systems, 1993

High Assurance Discretionary Access Control for Object Bases.
Proceedings of the CCS '93, 1993

Authorizations in Relational Database Management Systems.
Proceedings of the CCS '93, 1993

1992
The Case for Independent Updates.
Workshop on the Management of Replicated Data, 1992

Achieving Incremental Consistency among Autonomous Replicated Databases.
Proceedings of the IFIP WG 2.6 Database Semantics Conference on Interoperable Database Systems (DS-5), 1992

1991
Object Orientation in the Analysis of Work Oranization and Agent Co-operation.
Proceedings of the Dynamic Modelling of Information Systems II, 1991


  Loading...