Sara Foresti

According to our database1, Sara Foresti authored at least 103 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Multi-Provider Secure Processing of Sensors Data.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Empowering Owners with Control in Digital Data Markets.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

2018
Three-Server Swapping for Access Confidentiality.
IEEE Trans. Cloud Computing, 2018

Enforcing authorizations while protecting access confidentiality.
Journal of Computer Security, 2018

Access Privacy in the Cloud.
Proceedings of the From Database to Cyber Security, 2018

Supporting Users in Cloud Plan Selection.
Proceedings of the From Database to Cyber Security, 2018

Protecting Resources and Regulating Access in Cloud-Based Object Storage.
Proceedings of the From Database to Cyber Security, 2018

Confidentiality Protection in Large Databases.
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018

2017
An Authorization Model for Multi-Provider Queries.
PVLDB, 2017

Distributed Shuffle Index in the Cloud: Implementation and Evaluation.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

Selective access for supply chain management in the cloud.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Distributed shuffle index: Analysis and implementation in an industrial testbed.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Efficient integrity checks for join queries in the cloud.
Journal of Computer Security, 2016

Access Control Management for Secure Cloud Storage.
Proceedings of the Security and Privacy in Communication Networks, 2016

A consensus-based approach for selecting cloud plans.
Proceedings of the IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016

Access Control for the Shuffle Index.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

Supporting Users in Data Outsourcing and Protection in the Cloud.
Proceedings of the Cloud Computing and Services Science - 6th International Conference, 2016

Mix&Slice: Efficient Access Revocation in the Cloud.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Managing Data Sharing in OpenStack Swift with Over-Encryption.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud.
Proceedings of the New Codebreakers, 2016

2015
Selective and Private Access to Outsourced Data Centers.
Proceedings of the Handbook on Data Centers, 2015

Shuffle Index: Efficient and Private Access to Outsourced Data.
TOS, 2015

Loose associations to increase utility in data publishing.
Journal of Computer Security, 2015

Integrity for Approximate Joins on Untrusted Computational Servers.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Data Security Issues in Cloud Scenarios.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Data Protection in Cloud Scenarios.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

On the use of fuzzy logic in dependable cloud management.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Privacy in Pervasive Systems: Social and Legal Aspects and Technical Solutions.
Proceedings of the Data Management in Pervasive Systems, 2015

2014
Fragmentation in Presence of Data Dependencies.
IEEE Trans. Dependable Sec. Comput., 2014

Privacy-aware electronic society.
Annales des Télécommunications, 2014

Optimizing Integrity Checks for Join Queries in the Cloud.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Integrity for distributed queries.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Protecting Access Confidentiality with Data Distribution and Swapping.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

Selective and Fine-Grained Access to Data in the Cloud.
Proceedings of the Secure Cloud Computing, 2014

Database Security and Privacy.
Proceedings of the Computing Handbook, 2014

2013
Integrity for Join Queries in the Cloud.
IEEE Trans. Cloud Computing, 2013

Supporting concurrency and multiple indexes in private access to outsourced data.
Journal of Computer Security, 2013

Enforcing dynamic write privileges in data outsourcing.
Computers & Security, 2013

On information leakage by indexes over data fragments.
Proceedings of the Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Encryption and Fragmentation for Data Confidentiality in the Cloud.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

Distributed Shuffling for Preserving Access Confidentiality.
Proceedings of the Computer Security - ESORICS 2013, 2013

Extending Loose Associations to Multiple Fragments.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

12th workshop on privacy in the electronic society (WPES 2013).
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Integrating trust management and access control in data-intensive Web applications.
TWEB, 2012

An OBDD approach to enforce confidentiality and visibility constraints in data publishing.
Journal of Computer Security, 2012

Modeling and preventing inferences from sensitive value distributions in data release.
Journal of Computer Security, 2012

Data Privacy: Definitions and Techniques.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2012

Minimising disclosure of client information in credential-based interactions.
IJIPSI, 2012

Support for Write Privileges on Outsourced Data.
Proceedings of the Information Security and Privacy Research, 2012

Enforcing Subscription-Based Authorization Policies in Cloud Scenarios.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Managing and accessing data in the cloud: Privacy risks and approaches.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
Preserving Privacy in Data Outsourcing
Advances in Information Security 51, Springer, ISBN: 978-1-4419-7658-1, 2011

Quasi-Identifier.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Microdata Protection.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Macrodata Protection.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Authorization enforcement in distributed query evaluation.
Journal of Computer Security, 2011

Selective data outsourcing for enforcing privacy.
Journal of Computer Security, 2011

Anonymization of Statistical Data (Anonymisierung von statistischen Daten).
it - Information Technology, 2011

Private data indexes for selective access to outsourced data.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Foreword from the Conference Chairs.
Proceedings of the 5th International Conference on Network and System Security, 2011

Efficient and Private Access to Outsourced Data.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Protecting Privacy in Data Release.
Proceedings of the Foundations of Security Analysis and Design VI, 2011

Supporting Concurrency in Private Data Outsourcing.
Proceedings of the Computer Security - ESORICS 2011, 2011

Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Selective Exchange of Confidential Data in the Outsourcing Scenario.
Proceedings of the Privacy and Identity Management for Life, 2011

Data Privacy.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
Encryption policies for regulating access to outsourced data.
ACM Trans. Database Syst., 2010

Combining fragmentation and encryption to protect privacy in data storage.
ACM Trans. Inf. Syst. Secur., 2010

Fragments and Loose Associations: Respecting Privacy in Data Publishing.
PVLDB, 2010

Managing key hierarchies for access control enforcement: Heuristic approaches.
Computers & Security, 2010

Access control for smarter healthcare using policy spaces.
Computers & Security, 2010

Supporting privacy preferences in credential-based interactions.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Fine-Grained Disclosure of Access Policies.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Encryption-Based Policy Enforcement for Cloud Storage.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Privacy in Data Publishing.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

2009
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios.
Proceedings of the Emerging Challenges for Security, 2009

Privacy of Outsourced Data.
Proceedings of the Privacy and Identity Management for Life, 2009

Protecting Information Privacy in the Electronic Society.
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009

Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

Keep a Few: Outsourcing Data While Maintaining Confidentiality.
Proceedings of the Computer Security, 2009

Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients.
Proceedings of the Data and Applications Security XXIII, 2009

2008
k -Anonymous Data Mining: A Survey.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

Recent Advances in Access Control.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Access Control Models for XML.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Preserving confidentiality of security policies in data outsourcing.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Controlled Information Sharing in Collaborative Distributed Query Processing.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Assessing query privileges via safe and efficient permission composition.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Access Control Policies and Languages in Open Environments.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

k-Anonymity.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Microdata Protection.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Access control policies and languages.
IJCSE, 2007

Selective Data Encryption in Outsourced Dynamic Environments.
Electr. Notes Theor. Comput. Sci., 2007

Over-encryption: Management of Access Control Evolution on Outsourced Data.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing.
Proceedings of the New Approaches for Security, 2007

Fragmentation and Encryption to Enforce Privacy in Data Storage.
Proceedings of the Computer Security, 2007

A data outsourcing architecture combining cryptography and access control.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

Authorization and Access Control.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

Trust Management.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
Measuring Inference Exposure in Outsourced Encrypted Databases.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

2005
Key management for multi-user encrypted databases.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

Metadata Management in Outsourced Encrypted Databases.
Proceedings of the Secure Data Management, 2005


  Loading...