Sara Foresti
Orcid: 0000-0002-1658-6734Affiliations:
- Università degli Studi di Milano
According to our database1,
Sara Foresti
authored at least 130 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
2023
SN Comput. Sci., September, 2023
SN Comput. Sci., July, 2023
IEEE Trans. Big Data, June, 2023
IEEE Trans. Parallel Distributed Syst., 2023
2022
Proceedings of the Advances in Computing, Informatics, Networking and Cybersecurity, 2022
2021
Proceedings of the Advancing Research in Information and Communication Technology, 2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Selective Owner-side Encryption in Digital Data Markets: Strategies for Key Derivation.
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Proceedings of the E-Business and Telecommunications - 18th International Conference, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020
2019
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019
2018
J. Comput. Secur., 2018
Proceedings of the From Database to Cyber Security, 2018
Proceedings of the From Database to Cyber Security, 2018
Proceedings of the From Database to Cyber Security, 2018
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018
2017
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
Proceedings of the Cloud Computing and Services Science - 6th International Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016
Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud.
Proceedings of the New Codebreakers, 2016
2015
Proceedings of the Handbook on Data Centers, 2015
ACM Trans. Storage, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the Data Management in Pervasive Systems, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014
Proceedings of the Secure Cloud Computing, 2014
Database Security and Privacy.
Proceedings of the Computing Handbook, 2014
2013
J. Comput. Secur., 2013
Proceedings of the Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, 2013
Proceedings of the Foundations of Security Analysis and Design VII, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
ACM Trans. Web, 2012
An OBDD approach to enforce confidentiality and visibility constraints in data publishing.
J. Comput. Secur., 2012
Modeling and preventing inferences from sensitive value distributions in data release.
J. Comput. Secur., 2012
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2012
Int. J. Inf. Priv. Secur. Integr., 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012
2011
Advances in Information Security 51, Springer, ISBN: 978-1-4419-7658-1, 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
it Inf. Technol., 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
Proceedings of the Foundations of Security Analysis and Design VI, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
2010
ACM Trans. Database Syst., 2010
ACM Trans. Inf. Syst. Secur., 2010
Proc. VLDB Endow., 2010
Comput. Secur., 2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010
2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the Privacy and Identity Management for Life, 2009
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
Proceedings of the Computer Security, 2009
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients.
Proceedings of the Data and Applications Security XXIII, 2009
2008
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the Computer Security, 2007
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006
2005
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005
Proceedings of the Secure Data Management, 2005