Data privacy: Definitions and techniques S De Capitani Di Vimercati, S Foresti, G Livraga, P Samarati International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems …, 2012 | 148 | 2012 |
Fragmentation in presence of data dependencies SDC Di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ... IEEE Transactions on Dependable and Secure Computing 11 (6), 510-523, 2014 | 66 | 2014 |
Enforcing dynamic write privileges in data outsourcing SDC Di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ... Computers & Security 39, 47-63, 2013 | 50 | 2013 |
Encryption and fragmentation for data confidentiality in the cloud S De Capitani di Vimercati, RF Erbacher, S Foresti, S Jajodia, G Livraga, ... Foundations of Security Analysis and Design VII: FOSAD 2012/2013 Tutorial …, 2014 | 44 | 2014 |
Practical techniques building on encryption for protecting and managing data in the cloud S De Capitani di Vimercati, S Foresti, G Livraga, P Samarati The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His …, 2016 | 37 | 2016 |
Protecting Privacy of User Information in Continuous Location-Based Services CA Ardagna, G Livraga, P Samarati Proc. of the 15th IEEE International Conference on Computational Science and …, 2012 | 36 | 2012 |
A fuzzy-based brokering service for cloud plan selection SDC di Vimercati, S Foresti, G Livraga, V Piuri, P Samarati IEEE Systems Journal 13 (4), 4101-4109, 2019 | 28 | 2019 |
Protecting privacy in data release S De Capitani di Vimercati, S Foresti, G Livraga, P Samarati Foundations of Security Analysis and Design VI: FOSAD Tutorial Lectures 11, 1-34, 2011 | 25 | 2011 |
Enforcing subscription-based authorization policies in cloud scenarios S De Capitani di Vimercati, S Foresti, S Jajodia, G Livraga Data and Applications Security and Privacy XXVI, 314-329, 2012 | 24 | 2012 |
Integrity for distributed queries SDC di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ... 2014 IEEE Conference on Communications and Network Security, 364-372, 2014 | 23 | 2014 |
Loose associations to increase utility in data publishing 1 S De Capitani di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ... Journal of Computer Security 23 (1), 59-88, 2015 | 20 | 2015 |
Extending loose associations to multiple fragments S De Capitani di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ... Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013 | 20 | 2013 |
An OBDD approach to enforce confidentiality and visibility constraints in data publishing V Ciriani, S De Capitani di Vimercati, S Foresti, G Livraga, P Samarati Journal of Computer Security 20 (5), 463-508, 2012 | 20 | 2012 |
Data confidentiality and information credibility in on-line ecosystems G Livraga, M Viviani Proceedings of the 11th international conference on management of digital …, 2019 | 19 | 2019 |
An authorization model for multi provider queries S De Capitani di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ... Proceedings of the VLDB Endowment 11 (3), 256-268, 2017 | 19 | 2017 |
Supporting user requirements and preferences in cloud plan selection SDC Di Vimercati, S Foresti, G Livraga, V Piuri, P Samarati IEEE Transactions on Services Computing 14 (1), 274-285, 2017 | 18 | 2017 |
Supporting application requirements in cloud-based IoT information processing SDC di Vimercati, G Livraga, V Piuri, P Samarati, GA Soares International Conference on Internet of Things and Big Data 2, 65-72, 2016 | 18 | 2016 |
Privacy and security in environmental monitoring systems: issues and solutions SDC di Vimercati, A Genovese, G Livraga, V Piuri, F Scotti Computer and Information Security Handbook, 835-853, 2013 | 17 | 2013 |
A consensus-based approach for selecting cloud plans A Arman, S Foresti, G Livraga, P Samarati 2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016 | 15 | 2016 |
Enforcing confidentiality and data visibility constraints: An OBDD approach V Ciriani, S De Capitani di Vimercati, S Foresti, G Livraga, P Samarati Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 …, 2011 | 15 | 2011 |