Stefano Paraboschi

Orcid: 0000-0003-0399-1738

According to our database1, Stefano Paraboschi authored at least 163 papers between 1992 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Scalable Distributed Data Anonymization for Large Datasets.
IEEE Trans. Big Data, June, 2023

Distributed query execution under access restrictions.
Comput. Secur., April, 2023

Sentinels and Twins: Effective Integrity Assessment for Distributed Computation.
IEEE Trans. Parallel Distributed Syst., 2023

NatiSand: Native Code Sandboxing for JavaScript Runtimes.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Lightweight Cloud Application Sandboxing.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

Cage4Deno: A Fine-Grained Sandbox for Deno Subprocesses.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

POSTER: Leveraging eBPF to enhance sandboxing of WebAssembly runtimes.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
An authorization model for query execution in the cloud.
VLDB J., 2022

2021
SEApp: Bringing Mandatory Access Control to Android Apps.
Proceedings of the 30th USENIX Security Symposium, 2021

Artifact: Scalable Distributed Data Anonymization.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

Scalable Distributed Data Anonymization.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

Multi-dimensional indexes for point and range queries on outsourced encrypted data.
Proceedings of the IEEE Global Communications Conference, 2021

Distributed Query Evaluation over Encrypted Data.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

I Told You Tomorrow: Practical Time-Locked Secrets using Smart Contracts.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Securing Resources in Decentralized Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2020

Enforcing Corporate Governance's Internal Controls and Audit in the Cloud.
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020

2019
Multi-Provider Secure Processing of Sensors Data.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Dynamic Allocation for Resource Protection in Decentralized Cloud Storage.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Three-Server Swapping for Access Confidentiality.
IEEE Trans. Cloud Comput., 2018

Enforcing authorizations while protecting access confidentiality.
J. Comput. Secur., 2018

Access Privacy in the Cloud.
Proceedings of the From Database to Cyber Security, 2018

Protecting Resources and Regulating Access in Cloud-Based Object Storage.
Proceedings of the From Database to Cyber Security, 2018

Confidentiality Protection in Large Databases.
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018

2017
An Authorization Model for Multi-Provider Queries.
Proc. VLDB Endow., 2017

Distributed Shuffle Index in the Cloud: Implementation and Evaluation.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

Distributed shuffle index: Analysis and implementation in an industrial testbed.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Improving Android security by widening the role of Mandatory Access Control.
Tiny Trans. Comput. Sci., 2016

Efficient integrity checks for join queries in the cloud.
J. Comput. Secur., 2016

Access Control Management for Secure Cloud Storage.
Proceedings of the Security and Privacy in Communication Networks, 2016

Access Control for the Shuffle Index.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

Mix&Slice: Efficient Access Revocation in the Cloud.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Managing Data Sharing in OpenStack Swift with Over-Encryption.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

2015
Shuffle Index: Efficient and Private Access to Outsourced Data.
ACM Trans. Storage, 2015

Loose associations to increase utility in data publishing.
J. Comput. Secur., 2015

A cache-aware mechanism to enforce confidentiality, trackability and access policy evolution in Content-Centric Networks.
Comput. Networks, 2015

Integrity for Approximate Joins on Untrusted Computational Servers.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Policy Specialization to Support Domain Isolation.
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015

Extending Mandatory Access Control Policies in Android.
Proceedings of the Information Systems Security - 11th International Conference, 2015

An SELinux-based intent manager for Android.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

DockerPolicyModules: Mandatory Access Control for Docker containers.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

AppPolicyModules: Mandatory Access Control for Third-Party Apps.
Proceedings of the 10th ACM Symposium on Information, 2015

SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Privacy in Pervasive Systems: Social and Legal Aspects and Technical Solutions.
Proceedings of the Data Management in Pervasive Systems, 2015

2014
Fragmentation in Presence of Data Dependencies.
IEEE Trans. Dependable Secur. Comput., 2014

Optimizing Integrity Checks for Join Queries in the Cloud.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Integrity for distributed queries.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Protecting Access Confidentiality with Data Distribution and Swapping.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

2013
Integrity for Join Queries in the Cloud.
IEEE Trans. Cloud Comput., 2013

Supporting concurrency and multiple indexes in private access to outsourced data.
J. Comput. Secur., 2013

Enforcing dynamic write privileges in data outsourcing.
Comput. Secur., 2013

A Model-driven Approach for Securing Software Architectures.
Proceedings of the SECRYPT 2013, 2013

On information leakage by indexes over data fragments.
Proceedings of the Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Distributed Shuffling for Preserving Access Confidentiality.
Proceedings of the Computer Security - ESORICS 2013, 2013

Extending Loose Associations to Multiple Fragments.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

2012
Integrating trust management and access control in data-intensive Web applications.
ACM Trans. Web, 2012

Minimising disclosure of client information in credential-based interactions.
Int. J. Inf. Priv. Secur. Integr., 2012

Support for Write Privileges on Outsourced Data.
Proceedings of the Information Security and Privacy Research, 2012

The PoSecCo Security Decision Support System.
Proceedings of the ISSE 2012, 2012

2011
Administrative Policies in SQL.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Expressive and Deployable Access Control in Open Web Service Applications.
IEEE Trans. Serv. Comput., 2011

Authorization enforcement in distributed query evaluation.
J. Comput. Secur., 2011

Selective data outsourcing for enforcing privacy.
J. Comput. Secur., 2011

Private data indexes for selective access to outsourced data.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Efficient and Private Access to Outsourced Data.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Supporting Concurrency in Private Data Outsourcing.
Proceedings of the Computer Security - ESORICS 2011, 2011

Integrated Management of Security Policies.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Selective Exchange of Confidential Data in the Outsourcing Scenario.
Proceedings of the Privacy and Identity Management for Life, 2011

Open Source Contributions.
Proceedings of the Privacy and Identity Management for Life, 2011

Data Privacy.
Proceedings of the Privacy and Identity Management for Life, 2011

Advances in Access Control Policies.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
Encryption policies for regulating access to outsourced data.
ACM Trans. Database Syst., 2010

Combining fragmentation and encryption to protect privacy in data storage.
ACM Trans. Inf. Syst. Secur., 2010

Fragments and Loose Associations: Respecting Privacy in Data Publishing.
Proc. VLDB Endow., 2010

Managing key hierarchies for access control enforcement: Heuristic approaches.
Comput. Secur., 2010

Supporting privacy preferences in credential-based interactions.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Fine-Grained Disclosure of Access Policies.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Encryption-Based Policy Enforcement for Cloud Storage.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Enabling Privacy-preserving Credential-based Access Control with XACML and SAML.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios.
Proceedings of the Emerging Challenges for Security, 2009

Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

Keep a Few: Outsourcing Data While Maintaining Confidentiality.
Proceedings of the Computer Security, 2009

Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients.
Proceedings of the Data and Applications Security XXIII, 2009

2008
Access Control Models for XML.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Preserving confidentiality of security policies in data outsourcing.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Bayesian-Networks-Based Misuse and Anomaly Prevention System.
Proceedings of the ICEIS 2008, 2008

Controlled Information Sharing in Collaborative Distributed Query Processing.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Assessing query privileges via safe and efficient permission composition.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Over-encryption: Management of Access Control Evolution on Outsourced Data.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing.
Proceedings of the New Approaches for Security, 2007

Fragmentation and Encryption to Enforce Privacy in Data Storage.
Proceedings of the Computer Security, 2007

Trust management services in relational databases.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

A data outsourcing architecture combining cryptography and access control.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

2006
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems.
J. Assoc. Inf. Sci. Technol., 2006

Selective Data Encryption in Outsourced Dynamic Environments.
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006

2005
Modeling and assessing inference exposure in encrypted databases.
ACM Trans. Inf. Syst. Secur., 2005

Event Trace Independence of active behavior.
Inf. Process. Lett., 2005

Key management for multi-user encrypted databases.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

Metadata Management in Outsourced Encrypted Databases.
Proceedings of the Secure Data Management, 2005

ID mapping attacks in P2P networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Spam attacks: p2p to the rescue.
Proceedings of the 13th international conference on World Wide Web, 2004

P2P-Based Collaborative Spam Detection and Filtering.
Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), 2004

A Protocol for Reputation Management in Super-Peer Networks.
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004

An Open Digest-based Technique for Spam Detection.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

Active XQuery.
Proceedings of the Web Dynamics - Adapting to Change in Content, Size, Topology and Use, 2004

2003
Managing and Sharing Servents' Reputations in P2P Systems.
IEEE Trans. Knowl. Data Eng., 2003

Effective Scheduling of Detached Rules in Active Databases.
IEEE Trans. Knowl. Data Eng., 2003

Access control: principles and solutions.
Softw. Pract. Exp., 2003

Implementation of a Storage Mechanism for Untrusted DBMSs.
Proceedings of the 2nd International IEEE Security in Storage Workshop (SISW 2003), 2003

Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems.
Proceedings of the 3rd Conference of the European Society for Fuzzy Logic and Technology, 2003

Balancing confidentiality and efficiency in untrusted relational DBMSs.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

Materialized Views in Multidimensional Databases.
Proceedings of the Multidimensional Databases: Problems and Solutions, 2003

2002
A fine-grained access control system for XML documents.
ACM Trans. Inf. Syst. Secur., 2002

XML access control systems: a component-based approach.
Informatica (Slovenia), 2002

Securing SOAP e-services.
Int. J. Inf. Sec., 2002

Pushing reactive services to XML repositories using active rules.
Comput. Networks, 2002

Choosing reputable servents in a P2P network.
Proceedings of the Eleventh International World Wide Web Conference, 2002

Implementing a Reputation-Aware Gnutella Servent.
Proceedings of the Web Engineering and Peer-to-Peer Computing, 2002

A reputation-based approach for choosing reliable resources in peer-to-peer networks.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Active rules for XML: A new paradigm for E-services.
VLDB J., 2001

Designing data marts for data warehouses.
ACM Trans. Softw. Eng. Methodol., 2001

Controlling Access to XML Documents.
IEEE Internet Comput., 2001

Fine grained access control for SOAP E-services.
Proceedings of the Tenth International World Wide Web Conference, 2001

2000
Design and implementation of an access control processor for XML documents.
Comput. Networks, 2000

Regulating Access To Semistructured Information on the Web.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Securing XML Documents.
Proceedings of the Advances in Database Technology, 2000

XML: Current Developments and Future Challenges for the Database Community.
Proceedings of the Advances in Database Technology, 2000

1999
Specification and Implementation of Exceptions in Workflow Management Systems.
ACM Trans. Database Syst., 1999

Design Principles for Data-Intensive Web Sites.
SIGMOD Rec., 1999

XML-GL: A Graphical Language for Querying and Restructuring XML Documents.
Comput. Networks, 1999

One-to-One Personalization of Data-Intensive Web Sites.
Proceedings of the ACM SIGMOD Workshop on The Web and Databases, 1999

Data-Driven, One-To-One Web Site Generation for Data-Intensive Applications.
Proceedings of the VLDB'99, 1999

Chimera: A Language for Designing Rule Applications.
Proceedings of the Active Rules in Database Systems, 1999

Database Systems - Concepts, Languages and Architectures
McGraw-Hill Book Company, ISBN: 0-07-709500-6, 1999

1998
Compile-Time and Runtime Analysis of Active Behaviors.
IEEE Trans. Knowl. Data Eng., 1998

Building a Database Design Laboratory on the Internet.
IEEE Internet Comput., 1998

XML-GL: A Graphical Language for Querying and Reshaping XML Documents.
Proceedings of the Query Languages Workshop, Boston, 1998

The IDEA Web Lab.
Proceedings of the SIGMOD 1998, 1998

1997
Ordering and Selecting Production Rules for Constraint Maintenance: Complexity and Heuristic Solution.
IEEE Trans. Knowl. Data Eng., 1997

Debugging and Run-time Monitoring of Active Rules.
J. Syst. Integr., 1997

Materialized Views Selection in a Multidimensional Database.
Proceedings of the VLDB'97, 1997

The IDEA Tool Set.
Proceedings of the Thirteenth International Conference on Data Engineering, 1997

Sharing Software Tools on the WEB: The IDEA Web Lab.
Proceedings of the Deductive and Object-Oriented Databases, 5th International Conference, 1997

1996
Modularization Techniques for Active Rules Design.
ACM Trans. Database Syst., 1996

Support Environment for Active Rule Design.
J. Intell. Inf. Syst., 1996

Conservative Timestamp Revisited for Materialized View Maintenance in a Data Warehouse.
Proceedings of the Workshop on Materialized Views: Techniques and Applications, 1996

Active Rule Management in Chimera
Proceedings of the Active Database Systems: Triggers and Rules For Advanced Database Processing., 1996

1995
Addendum to "Automatic Generation of Production Rules for Integrity Maintenance".
ACM Trans. Database Syst., 1995

The Algres Testbed of CHIMERA: An Active Object-Oriented Database System.
Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, 1995

Improving Rule Analysis by Means of Triggering and Activation Graphs.
Proceedings of the Rules in Database Systems, Second International Workshop, 1995

Design of Active Rule Applications: Issues and Approaches.
Proceedings of the Deductive and Object-Oriented Databases, 1995

Run-time Detection of Non-Terminating Active Rule Systems.
Proceedings of the Deductive and Object-Oriented Databases, 1995

1994
Automatic Generation of Production Rules for Integrity Maintenance.
ACM Trans. Database Syst., 1994

Constraint Management in Chimera.
IEEE Data Eng. Bull., 1994

Declarative Specification of Constraint Maintenance.
Proceedings of the Entity-Relationship Approach, 1994

An Intelligent Database System Application: The Design of EMS.
Proceedings of the Applications of Databases, First International Conference, 1994

1993
The LOGRES prototype.
Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, 1993

Automatic Rule Generation for Constraint Enforcement in Active Databases.
Proceedings of the Convegno SEBD'93, 1993

A Review of Repairing Techniques for Integrity Maintenance.
Proceedings of the Rules in Database Systems. Proceedings of the 1st International Workshop on Rules in Database Systems, Edinburgh, Scotland, 30 August, 1993

1992
Constraint Enforcement Through Production Rules: Putting Active Databases at Work.
IEEE Data Eng. Bull., 1992

Automatic Rule Generation for Constraint Enforcement in Active Databases.
Proceedings of the Modelling Database Dynamics, 1992

Integrity Maintenance Systems: An Architecture.
Proceedings of the Third International Workshop on the Deductive Approach to Information Systems and Databases, 1992


  Loading...