Sabrina De Capitani di Vimercati

According to our database1, Sabrina De Capitani di Vimercati authored at least 207 papers between 1996 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Three-Server Swapping for Access Confidentiality.
IEEE Trans. Cloud Computing, 2018

Enforcing authorizations while protecting access confidentiality.
Journal of Computer Security, 2018

Confidentiality Protection in Large Databases.
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018

2017
An Authorization Model for Multi-Provider Queries.
PVLDB, 2017

A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade.
CoRR, 2017

Distributed Shuffle Index in the Cloud: Implementation and Evaluation.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

Distributed shuffle index: Analysis and implementation in an industrial testbed.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Efficient integrity checks for join queries in the cloud.
Journal of Computer Security, 2016

Access Control Management for Secure Cloud Storage.
Proceedings of the Security and Privacy in Communication Networks, 2016

Application requirements with preferences in cloud-based information processing.
Proceedings of the IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016

Supporting Application Requirements in Cloud-based IoT Information Processing.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

Access Control for the Shuffle Index.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

Supporting Users in Data Outsourcing and Protection in the Cloud.
Proceedings of the Cloud Computing and Services Science - 6th International Conference, 2016

15th Workshop on Privacy in the Electronic Society (WPES 2016).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Mix&Slice: Efficient Access Revocation in the Cloud.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Managing Data Sharing in OpenStack Swift with Over-Encryption.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud.
Proceedings of the New Codebreakers, 2016

2015
Selective and Private Access to Outsourced Data Centers.
Proceedings of the Handbook on Data Centers, 2015

Shuffle Index: Efficient and Private Access to Outsourced Data.
TOS, 2015

Loose associations to increase utility in data publishing.
Journal of Computer Security, 2015

Integrity for Approximate Joins on Untrusted Computational Servers.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Data Security Issues in Cloud Scenarios.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Data Protection in Cloud Scenarios.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Privacy in Pervasive Systems: Social and Legal Aspects and Technical Solutions.
Proceedings of the Data Management in Pervasive Systems, 2015

2014
Fragmentation in Presence of Data Dependencies.
IEEE Trans. Dependable Sec. Comput., 2014

Optimizing Integrity Checks for Join Queries in the Cloud.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Integrity for distributed queries.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Protecting Access Confidentiality with Data Distribution and Swapping.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

Selective and Fine-Grained Access to Data in the Cloud.
Proceedings of the Secure Cloud Computing, 2014

Access Control.
Proceedings of the Computing Handbook, 2014

Database Security and Privacy.
Proceedings of the Computing Handbook, 2014

2013
Integrity for Join Queries in the Cloud.
IEEE Trans. Cloud Computing, 2013

Supporting concurrency and multiple indexes in private access to outsourced data.
Journal of Computer Security, 2013

Enforcing dynamic write privileges in data outsourcing.
Computers & Security, 2013

On information leakage by indexes over data fragments.
Proceedings of the Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Encryption and Fragmentation for Data Confidentiality in the Cloud.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

Distributed Shuffling for Preserving Access Confidentiality.
Proceedings of the Computer Security - ESORICS 2013, 2013

Extending Loose Associations to Multiple Fragments.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

2012
Integrating trust management and access control in data-intensive Web applications.
TWEB, 2012

An OBDD approach to enforce confidentiality and visibility constraints in data publishing.
Journal of Computer Security, 2012

Modeling and preventing inferences from sensitive value distributions in data release.
Journal of Computer Security, 2012

Data Privacy: Definitions and Techniques.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2012

Minimising disclosure of client information in credential-based interactions.
IJIPSI, 2012

Support for Write Privileges on Outsourced Data.
Proceedings of the Information Security and Privacy Research, 2012

Enforcing Subscription-Based Authorization Policies in Cloud Scenarios.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Managing and accessing data in the cloud: Privacy risks and approaches.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
Privacy Models and Languages: Access Control and Data Handling Policies.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Privacy-Aware Access Control System: Evaluation and Decision.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Polyinstantiation.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Mandatory Access Control Policy (MAC).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Clark and Wilson Model.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Chinese Wall.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

SQL Access Control Model.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Privileges in SQL.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Grant Option.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Quasi-Identifier.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Privacy-Aware Access Control Policies.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Policy Composition.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Least Privilege.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Discretionary Access Control Policies (DAC).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Authorizations.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Access Matrix.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Access Control Policies, Models, and Mechanisms.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Expressive and Deployable Access Control in Open Web Service Applications.
IEEE Trans. Services Computing, 2011

An Obfuscation-Based Approach for Protecting Location Privacy.
IEEE Trans. Dependable Sec. Comput., 2011

Authorization enforcement in distributed query evaluation.
Journal of Computer Security, 2011

Selective data outsourcing for enforcing privacy.
Journal of Computer Security, 2011

Anonymization of Statistical Data (Anonymisierung von statistischen Daten).
it - Information Technology, 2011

Secure Architectures in the Cloud (Dagstuhl Seminar 11492).
Dagstuhl Reports, 2011

Private data indexes for selective access to outsourced data.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Foreword from the Conference Chairs.
Proceedings of the 5th International Conference on Network and System Security, 2011

Efficient and Private Access to Outsourced Data.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Protecting Privacy in Data Release.
Proceedings of the Foundations of Security Analysis and Design VI, 2011

Supporting Concurrency in Private Data Outsourcing.
Proceedings of the Computer Security - ESORICS 2011, 2011

Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Selective Exchange of Confidential Data in the Outsourcing Scenario.
Proceedings of the Privacy and Identity Management for Life, 2011

Data Privacy.
Proceedings of the Privacy and Identity Management for Life, 2011

Advances in Access Control Policies.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
Encryption policies for regulating access to outsourced data.
ACM Trans. Database Syst., 2010

Guest editorial: Special issue on computer and communications security.
ACM Trans. Inf. Syst. Secur., 2010

Combining fragmentation and encryption to protect privacy in data storage.
ACM Trans. Inf. Syst. Secur., 2010

Fragments and Loose Associations: Respecting Privacy in Data Publishing.
PVLDB, 2010

Editorial.
Computers & Security, 2010

Managing key hierarchies for access control enforcement: Heuristic approaches.
Computers & Security, 2010

Access control for smarter healthcare using policy spaces.
Computers & Security, 2010

Supporting privacy preferences in credential-based interactions.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Protecting Privacy of Sensitive Value Distributions in Data Release.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Fine-Grained Disclosure of Access Policies.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Encryption-Based Policy Enforcement for Cloud Storage.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Privacy in Data Publishing.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

Data protection in outsourcing scenarios: issues and directions.
Proceedings of the 5th ACM Symposium on Information, 2010

Enabling Privacy-preserving Credential-based Access Control with XACML and SAML.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios.
Proceedings of the Emerging Challenges for Security, 2009

Privacy of Outsourced Data.
Proceedings of the Privacy and Identity Management for Life, 2009

Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

Keep a Few: Outsourcing Data While Maintaining Confidentiality.
Proceedings of the Computer Security, 2009

Access Control in Location-Based Services.
Proceedings of the Privacy in Location-Based Applications, 2009

Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients.
Proceedings of the Data and Applications Security XXIII, 2009

2008
k -Anonymous Data Mining: A Survey.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

Data Security.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Recent Advances in Access Control.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Access Control Models for XML.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Privacy-enhanced Location-based Access Control.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Guest Editorial: Special Issue on Computer and Communications Security.
ACM Trans. Inf. Syst. Secur., 2008

A privacy-aware access control system.
Journal of Computer Security, 2008

Preserving confidentiality of security policies in data outsourcing.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Controlled Information Sharing in Collaborative Distributed Query Processing.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Regulating Exceptions in Healthcare Using Policy Spaces.
Proceedings of the Data and Applications Security XXII, 2008

Assessing query privileges via safe and efficient permission composition.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Access Control Policies and Languages in Open Environments.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

k-Anonymity.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Microdata Protection.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Access control policies and languages.
IJCSE, 2007

Selective Data Encryption in Outsourced Dynamic Environments.
Electr. Notes Theor. Comput. Sci., 2007

Over-encryption: Management of Access Control Evolution on Outsourced Data.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing.
Proceedings of the New Approaches for Security, 2007

A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy.
Proceedings of the New Approaches for Security, 2007

Data Privacy - Problems and Solutions.
Proceedings of the Information Systems Security, Third International Conference, 2007

Fragmentation and Encryption to Enforce Privacy in Data Storage.
Proceedings of the Computer Security, 2007

Location Privacy Protection Through Obfuscation-Based Techniques.
Proceedings of the Data and Applications Security XXI, 2007

Trust management services in relational databases.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

A data outsourcing architecture combining cryptography and access control.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

Managing Privacy in LBAC Systems.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Authorization and Access Control.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

XML Security.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

Trust Management.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
Measuring Inference Exposure in Outsourced Encrypted Databases.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Mobile Agent Technology for Remote Measurements.
IEEE Trans. Instrumentation and Measurement, 2006

Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems.
JASIST, 2006

A WOWA-based Aggregation Technique on Trust Values Connected to Metadata.
Electr. Notes Theor. Comput. Sci., 2006

A Web Service Architecture for Enforcing Access Control Policies.
Electr. Notes Theor. Comput. Sci., 2006

CAS++: An Open Source Single Sign-On Solution for Secure e-Services.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Modality conflicts in semantics aware access control.
Proceedings of the 6th International Conference on Web Engineering, 2006

Privacy in the Electronic Society.
Proceedings of the Information Systems Security, Second International Conference, 2006

Extending Context Descriptions in Semantics-Aware Access Control.
Proceedings of the Information Systems Security, Second International Conference, 2006

Enhancing User Privacy Through Data Handling Policies.
Proceedings of the Data and Applications Security XX, 2006

Supporting location-based conditions in access control policies.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Modeling and assessing inference exposure in encrypted databases.
ACM Trans. Inf. Syst. Secur., 2005

An access control model for querying XML data.
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005

Open WorldReasoning inSemantics-Aware AccessControl: aPreliminaryStudy.
Proceedings of the SWAP 2005, 2005

Key management for multi-user encrypted databases.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

Metadata Management in Outsourced Encrypted Databases.
Proceedings of the Secure Data Management, 2005

Offline Expansion of XACML Policies Based on P3P Metadata.
Proceedings of the Web Engineering, 5th International Conference, 2005

Advanced Metadata for Privacy-Aware Representation of Credentials.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

Policies, Models, and Languages for Access Control.
Proceedings of the Databases in Networked Information Systems, 4th International Workshop, 2005

Towards Privacy-Enhanced Authorization Policies and Languages.
Proceedings of the Data and Applications Security XIX, 2005

The Architecture of a Privacy-Aware Access Control Decision Component.
Proceedings of the Construction and Analysis of Safe, 2005

2004
XML-based access control languages.
Inf. Sec. Techn. Report, 2004

A comparison of modeling strategies in defining XML-based access control languages.
Comput. Syst. Sci. Eng., 2004

Spam attacks: p2p to the rescue.
Proceedings of the 13th international conference on World Wide Web, 2004

P2P-Based Collaborative Spam Detection and Filtering.
Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), 2004

Extending Policy Languages to the Semantic Web.
Proceedings of the Web Engineering - 4th International Conference, 2004

A Protocol for Reputation Management in Super-Peer Networks.
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004

Invited Talk - Towards Semantics-Aware Access Control.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

An Open Digest-based Technique for Spam Detection.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
Managing and Sharing Servents' Reputations in P2P Systems.
IEEE Trans. Knowl. Data Eng., 2003

Access control: principles and solutions.
Softw., Pract. Exper., 2003

Managing Multiple and Dependable Identities.
IEEE Internet Computing, 2003

An XML-based approach to combine firewalls and web services security specifications.
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003

Towards Flexible Credential Negotiation Protocols.
Proceedings of the Security Protocols, 2003

Implementation of a Storage Mechanism for Untrusted DBMSs.
Proceedings of the 2nd International IEEE Security in Storage Workshop (SISW 2003), 2003

Securing XML-based Multimedia Content.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Implementing an Access Control System for SVG Documents.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems.
Proceedings of the 3rd Conference of the European Society for Fuzzy Logic and Technology, 2003

Balancing confidentiality and efficiency in untrusted relational DBMSs.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
A fine-grained access control system for XML documents.
ACM Trans. Inf. Syst. Secur., 2002

An algebra for composing access control policies.
ACM Trans. Inf. Syst. Secur., 2002

Maximizing Sharing of Protected Information.
J. Comput. Syst. Sci., 2002

XML access control systems: a component-based approach.
Informatica (Slovenia), 2002

Securing SOAP e-services.
Int. J. Inf. Sec., 2002

Towards securing XML Web services.
Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, 2002

Choosing reputable servents in a P2P network.
Proceedings of the Eleventh International World Wide Web Conference, 2002

An authorization model for temporal XML documents.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

Implementing a Reputation-Aware Gnutella Servent.
Proceedings of the Web Engineering and Peer-to-Peer Computing, 2002

Semi-Automated Extraction of Ontological Knowledge from XML Datasources.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

Access Control of SVG Documents.
Proceedings of the Research Directions in Data and Applications Security, 2002

A reputation-based approach for choosing reliable resources in peer-to-peer networks.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Global Viewing of Heterogeneous Data Sources.
IEEE Trans. Knowl. Data Eng., 2001

Global Infrastructure Protection System.
Journal of Computer Security, 2001

An XML-based Integration Scheme for Web Data Sources.
Ingénierie des Systèmes d'Information, 2001

Controlling Access to XML Documents.
IEEE Internet Computing, 2001

Fine grained access control for SOAP E-services.
Proceedings of the Tenth International World Wide Web Conference, 2001

An Access Control Model for Data Archives.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

An Interorganizational Knowledge Mediation Scheme for Information Sources over the Web.
Proceedings of the Nono Convegno Nazionale Sistemi Evoluti per Basi di Dati, 2001

An XML-based Interorganizational Knowledge Mediation Scheme to Support B2B Solution.
Proceedings of the Semantic Issues in E-Commerce Systems, 2001

Designing a Three-Layer Ontology in a Web-based Interconnection Scenario.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

A Component-Based Architecture for Secure Data Publication.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Design and implementation of an access control processor for XML documents.
Computer Networks, 2000

Classifying Information for External Release.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Regulating Access To Semistructured Information on the Web.
Proceedings of the Information Security for Global Information Infrastructures, 2000

A uniform framework for Web data modeling and integration.
Proceedings of the Ottavo Convegno Nazionale su Sistemi Evoluti per Basi di Dati, 2000

Access Control: Policies, Models, and Mechanisms.
Proceedings of the Foundations of Security Analysis and Design, 2000

Securing XML Documents.
Proceedings of the Advances in Database Technology, 2000

XML Access Control Systems: A Component-Based Approach.
Proceedings of the Data and Application Security, 2000

A modular approach to composing access control policies.
Proceedings of the CCS 2000, 2000

1999
Specification and Enforcement of Classification and Inference Constraints.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

Minimal Data Upgrading to Prevent Inference and Association.
Proceedings of the Eighteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, May 31, 1999

PGRIP: PNNI Global Routing Infrastructure Protection.
Proceedings of the Network and Distributed System Security Symposium, 1999

1998
Exception-Based Information Flow Control in Object-Oriented Systems.
ACM Trans. Inf. Syst. Secur., 1998

Information Integration on Multiple Heterogeneous Data Sources.
Proceedings of the Atti del Sesto Convegno Nazionale Sistemi Evolluti per Basi di Dati, 1998

Exploiting Schema Knowledge for the Integration of Heterogeneous Sorces.
Proceedings of the Atti del Sesto Convegno Nazionale Sistemi Evolluti per Basi di Dati, 1998

1997
Authorization Specification and Enforcement in Federated Database Systems.
Journal of Computer Security, 1997

Automated Derivation of Global Authorizations for Database Federations.
Journal of Computer Security, 1997

1996
Access control in federated systems.
Proceedings of the 1996 Workshop on New Security Paradigms, 1996

An Authorization Model for Federated Systems.
Proceedings of the Computer Security, 1996


  Loading...