2013
196Guest Editorial. Darrell Conklin, Tadeusz A. Wysocki, Hamid Sharif, L. C. Gundersen, P. P. Leahy, W. Hill, Jyh-Horng Wen, Shiuh-Jeng Wang, Yuh-Ren Tsai, Keh-Ming Lu. IEEE Systems Journal (7): 178 (2013). Cited by 2Web SearchBibTeXDownload
2012
195Managing and accessing data in the cloud: Privacy risks and approaches. Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati. CRiSIS 2012, 1-9. Web SearchBibTeXDownload
194Supporting Security Requirements for Resource Management in Cloud Computing. Ravi Jhawar, Vincenzo Piuri, Pierangela Samarati. CSE 2012, 170-177. Web SearchBibTeXDownload
193Protecting Privacy of User Information in Continuous Location-Based Services. Claudio Agostino Ardagna, Giovanni Livraga, Pierangela Samarati. CSE 2012, 162-169. Web SearchBibTeXDownload
192Minimising disclosure of client information in credential-based interactions. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Pierangela Samarati. IJIPSI (1): 205-233 (2012). Web SearchBibTeXDownload
191Data Privacy: Definitions and Techniques. Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (20): 793-818 (2012). Web SearchBibTeXDownload
190Modeling and preventing inferences from sensitive value distributions in data release. Michele Bezzi, Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati, Roberto Sassi. Journal of Computer Security (20): 393-436 (2012). Web SearchBibTeXDownload
189An OBDD approach to enforce confidentiality and visibility constraints in data publishing. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati. Journal of Computer Security (20): 463-508 (2012). Web SearchBibTeXDownload
188Support for Write Privileges on Outsourced Data. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. SEC 2012, 199-210. Web SearchBibTeXDownload
187Integrating trust management and access control in data-intensive Web applications. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Giuseppe Psaila, Pierangela Samarati. TWEB (6): 6 (2012). Web SearchBibTeXDownload
2011
186Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati. DBSec 2011, 44-59. Web SearchBibTeXDownload
185Privacy Models and Languages: Access Control and Data Handling Policies. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati. Digital Privacy - PRIME 2011, 309-329. Web SearchBibTeXDownload
184Privacy-Aware Access Control System: Evaluation and Decision. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Eros Pedrini, Pierangela Samarati. Digital Privacy - PRIME 2011, 377-395. Web SearchBibTeXDownload
183Mandatory Access Control Policy (MAC). Sabrina De Capitani di Vimercati, Pierangela Samarati. Encyclopedia of Cryptography and Security (2nd Ed.) 2011, 758. Web SearchBibTeXDownload
182Recursive Revoke. Pierangela Samarati. Encyclopedia of Cryptography and Security (2nd Ed.) 2011, 1035-1037. Web SearchBibTeXDownload
181Multilevel Database. Pierangela Samarati, Giovanni Livraga. Encyclopedia of Cryptography and Security (2nd Ed.) 2011, 809-811. Web SearchBibTeXDownload
180Administrative Policies. Pierangela Samarati. Encyclopedia of Cryptography and Security (2nd Ed.) 2011, 21-23. Web SearchBibTeXDownload
179Chinese Wall. Sabrina De Capitani di Vimercati, Pierangela Samarati. Encyclopedia of Cryptography and Security (2nd Ed.) 2011, 202-203. Web SearchBibTeXDownload
178Flexible Authorization Framework (FAF). Pierangela Samarati. Encyclopedia of Cryptography and Security (2nd Ed.) 2011, 486-489. Web SearchBibTeXDownload
177Clark and Wilson Model. Sabrina De Capitani di Vimercati, Pierangela Samarati. Encyclopedia of Cryptography and Security (2nd Ed.) 2011, 208-209. Web SearchBibTeXDownload
176Supporting Concurrency in Private Data Outsourcing. Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati. ESORICS 2011, 648-664. Web SearchBibTeXDownload
175Protecting Privacy in Data Release. Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati. FOSAD 2011, 1-34. Web SearchBibTeXDownload
174Efficient and Private Access to Outsourced Data. Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati. ICDCS 2011, 710-719. Web SearchBibTeXDownload
173An Obfuscation-Based Approach for Protecting Location Privacy. Claudio Agostino Ardagna, Marco Cremonini, Sabrina De Capitani di Vimercati, Pierangela Samarati. IEEE Trans. Dependable Sec. Comput. (8): 13-27 (2011). Web SearchBibTeXDownload
172Expressive and Deployable Access Control in Open Web Service Applications. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Eros Pedrini, Pierangela Samarati, Mario Verdicchio. IEEE T. Services Computing (4): 96-109 (2011). Web SearchBibTeXDownload
171Anonymization of Statistical Data (Anonymisierung von statistischen Daten). Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati. it - Information Technology (53): 18-25 (2011). Web SearchBibTeXDownload
170Selective data outsourcing for enforcing privacy. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. Journal of Computer Security (19): 531-566 (2011). Web SearchBibTeXDownload
169Authorization enforcement in distributed query evaluation. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. Journal of Computer Security (19): 751-794 (2011). Web SearchBibTeXDownload
168Foreword from the Conference Chairs. Sabrina De Capitani di Vimercati, Pierangela Samarati, Sara Foresti, Jiankun Hu. NSS 2011. Web SearchBibTeXDownload
167Private data indexes for selective access to outsourced data. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. WPES 2011, 69-80. Web SearchBibTeXDownload
2010
166Encryption policies for regulating access to outsourced data. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. ACM Trans. Database Syst. (35) (2010). Web SearchBibTeXDownload
165Combining fragmentation and encryption to protect privacy in data storage. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. ACM Trans. Inf. Syst. Secur. (13) (2010). Web SearchBibTeXDownload
164Data protection in outsourcing scenarios: issues and directions. Pierangela Samarati, Sabrina De Capitani di Vimercati. ASIACCS 2010, 1-14. Web SearchBibTeXDownload
163Enabling Privacy-preserving Credential-based Access Control with XACML and SAML. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Gregory Neven, Stefano Paraboschi, Franz-Stefan Preiss, Pierangela Samarati, Mario Verdicchio. CIT 2010, 1090-1095. Web SearchBibTeXDownload
162Managing key hierarchies for access control enforcement: Heuristic approaches. Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati. Computers & Security (29): 533-547 (2010). Web SearchBibTeXDownload
161Access control for smarter healthcare using policy spaces. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati. Computers & Security (29): 848-858 (2010). Web SearchBibTeXDownload
160Protecting data privacy in outsourcing scenarios: invited talk. Pierangela Samarati. EDBT/ICDT Workshops 2010. Web SearchBibTeXDownload
159Providing Mobile Users' Anonymity in Hybrid Networks. Claudio Agostino Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou. ESORICS 2010, 540-557. Web SearchBibTeXDownload
158Protecting Privacy in Data Release. Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati. FOSAD 2010, 1-34. Web SearchBibTeXDownload
157Encryption-Based Policy Enforcement for Cloud Storage. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati. ICDCS Workshops 2010, 42-51. Web SearchBibTeXDownload
156Fine-Grained Disclosure of Access Policies. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Gregory Neven, Stefano Paraboschi, Franz-Stefan Preiss, Pierangela Samarati, Mario Verdicchio. ICICS 2010, 16-30. Web SearchBibTeXDownload
155Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project. Claudio Agostino Ardagna, Jan Camenisch, Markulf Kohlweiss, Ronald Leenes, Gregory Neven, Bart Priem, Pierangela Samarati, Dieter Sommer, Mario Verdicchio. Journal of Computer Security (18): 123-160 (2010). Web SearchBibTeXDownload
154Fragments and Loose Associations: Respecting Privacy in Data Publishing. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. PVLDB (3): 1370-1381 (2010). Web SearchBibTeXDownload
153Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Pierangela Samarati. SocialCom/PASSAT 2010, 743-750. Web SearchBibTeXDownload
152Protecting Privacy of Sensitive Value Distributions in Data Release. Michele Bezzi, Sabrina De Capitani di Vimercati, Giovanni Livraga, Pierangela Samarati. STM 2010, 255-270. Web SearchBibTeXDownload
151Supporting privacy preferences in credential-based interactions. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Pierangela Samarati. WPES 2010, 83-92. Web SearchBibTeXDownload
2009
150Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. DBSec 2009, 225-239. Web SearchBibTeXDownload
149Keep a Few: Outsourcing Data While Maintaining Confidentiality. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. ESORICS 2009, 440-455. Web SearchBibTeXDownload
148Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. ICDCS 2009, 32-39. Cited by 3Web SearchBibTeXDownload
147Privacy Preservation over Untrusted Mobile Networks. Claudio Agostino Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou. Privacy in Location-Based Applications 2009, 84-105. Web SearchBibTeXDownload
146Access Control in Location-Based Services. Claudio Agostino Ardagna, Marco Cremonini, Sabrina De Capitani di Vimercati, Pierangela Samarati. Privacy in Location-Based Applications 2009, 106-126. Web SearchBibTeXDownload
145Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati. SEC 2009, 364-375. Cited by 3Web SearchBibTeXDownload
144Protecting Information Privacy in the Electronic Society. Pierangela Samarati. SECRYPT 2009, 19-19. Web SearchBibTeX
2008
143Assessing query privileges via safe and efficient permission composition. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. ACM Conference on Computer and Communications Security 2008, 311-322. Cited by 1Web SearchBibTeXDownload
142Regulating Exceptions in Healthcare Using Policy Spaces. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati. DBSec 2008, 254-267. Web SearchBibTeXDownload
141Privacy-enhanced Location-based Access Control. Claudio Agostino Ardagna, Marco Cremonini, Sabrina De Capitani di Vimercati, Pierangela Samarati. Handbook of Database Security 2008, 531-552. Web SearchBibTeXDownload
140Access Control Models for XML. Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Pierangela Samarati. Handbook of Database Security 2008, 27-53. Web SearchBibTeXDownload
139Recent Advances in Access Control. Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati. Handbook of Database Security 2008, 1-26. Web SearchBibTeXDownload
138Controlled Information Sharing in Collaborative Distributed Query Processing. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. ICDCS 2008, 303-310. Cited by 2Web SearchBibTeXDownload
137A privacy-aware access control system. Claudio Agostino Ardagna, Marco Cremonini, Sabrina De Capitani di Vimercati, Pierangela Samarati. Journal of Computer Security (16): 369-397 (2008). Cited by 12Web SearchBibTeXDownload
136A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks. Claudio Agostino Ardagna, Angelos Stavrou, Sushil Jajodia, Pierangela Samarati, Rhandi Martin. PiLBA 2008. Cited by 2Web SearchBibTeXDownload
135k -Anonymous Data Mining: A Survey. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati. Privacy-Preserving Data Mining 2008, 105-136. Web SearchBibTeXDownload
134Data Security. Dorothy E. Denning, Peter J. Denning, Sushil Jajodia. Wiley Encyclopedia of Computer Science and Engineering 2008. Cited by 43Web SearchBibTeXDownload
133Preserving confidentiality of security policies in data outsourcing. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati. WPES 2008, 75-84. Cited by 3Web SearchBibTeXDownload
2007
132Managing Privacy in LBAC Systems. Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. AINA Workshops (2) 2007, 7-12. Cited by 7Web SearchBibTeXDownload
131Trust management services in relational databases. Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. ASIACCS 2007, 149-160. Cited by 3Web SearchBibTeXDownload
130A data outsourcing architecture combining cryptography and access control. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. CSAW 2007, 63-69. Cited by 8Web SearchBibTeXDownload
129Location Privacy Protection Through Obfuscation-Based Techniques. Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. DBSec 2007, 47-60. Cited by 33Web SearchBibTeXDownload
128Selective Data Encryption in Outsourced Dynamic Environments. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. Electr. Notes Theor. Comput. Sci. (168): 127-142 (2007). Cited by 10Web SearchBibTeXDownload
127Fragmentation and Encryption to Enforce Privacy in Data Storage. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. ESORICS 2007, 171-186. Cited by 10Web SearchBibTeXDownload
126Data Privacy - Problems and Solutions. Sabrina De Capitani di Vimercati, Pierangela Samarati. ICISS 2007, 180-192. Web SearchBibTeXDownload
125Access control policies and languages. Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati, Sushil Jajodia. IJCSE (3): 94-102 (2007). Web SearchBibTeXDownload
124An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. SEC 2007, 385-396. Cited by 7Web SearchBibTeXDownload
123A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy. Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. SEC 2007, 313-324. Cited by 7Web SearchBibTeXDownload
122Microdata Protection. Sara Foresti, Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati. Secure Data Management in Decentralized Systems 2007, 291-321. Cited by 8Web SearchBibTeXDownload
121Access Control Policies and Languages in Open Environments. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Pierangela Samarati. Secure Data Management in Decentralized Systems 2007, 21-58. Cited by 5Web SearchBibTeXDownload
120Over-encryption: Management of Access Control Evolution on Outsourced Data. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. VLDB 2007, 123-134. Cited by 16Web SearchBibTeXDownload
2006
119Supporting location-based conditions in access control policies. Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. ASIACCS 2006, 212-222. Cited by 66Web SearchBibTeXDownload
118Enhancing User Privacy Through Data Handling Policies. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati. DBSec 2006, 224-236. Cited by 13Web SearchBibTeXDownload
117A WOWA-based Aggregation Technique on Trust Values Connected to Metadata. Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati, Marco Viviani. Electr. Notes Theor. Comput. Sci. (157): 131-142 (2006). Cited by 11Web SearchBibTeXDownload
116A Web Service Architecture for Enforcing Access Control Policies. Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. Electr. Notes Theor. Comput. Sci. (142): 47-62 (2006). Cited by 27Web SearchBibTeXDownload
115Privacy in the Electronic Society. Sabrina De Capitani di Vimercati, Pierangela Samarati. ICISS 2006, 1-21. Cited by 1Web SearchBibTeXDownload
114Extending Context Descriptions in Semantics-Aware Access Control. Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati. ICISS 2006, 162-176. Cited by 3Web SearchBibTeXDownload
113Modality conflicts in semantics aware access control. Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati. ICWE 2006, 249-256. Cited by 5Web SearchBibTeXDownload
112Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems. Roberto Aringhieri, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati. JASIST (57): 528-537 (2006). Cited by 45Web SearchBibTeXDownload
111Measuring Inference Exposure in Outsourced Encrypted Databases. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati, Marco Viviani. Quality of Protection 2006, 185-195. Web SearchBibTeXDownload
110CAS++: An Open Source Single Sign-On Solution for Secure e-Services. Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Fulvio Frati, Pierangela Samarati. SEC 2006, 208-220. Cited by 4Web SearchBibTeXDownload
2005
109Modeling and assessing inference exposure in encrypted databases. Alberto Ceselli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. ACM Trans. Inf. Syst. Secur. (8): 119-152 (2005). Cited by 36Web SearchBibTeXDownload
108The Architecture of a Privacy-Aware Access Control Decision Component. Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. CASSIS 2005, 1-15. Cited by 4Web SearchBibTeXDownload
107Towards Privacy-Enhanced Authorization Policies and Languages. Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. DBSec 2005, 16-27. Cited by 20Web SearchBibTeXDownload
106SSRI online First experiences in a three-years course degree offered in e-learning at the University of Milan. Ernesto Damiani, Antonella Esposito, Maurizio Mariotti, Pierangela Samarati, Daniela Scaccia, Nello Scarabottolo. DMS 2005, 65-70. Web SearchBibTeX
105Policies, Models, and Languages for Access Control. Sabrina De Capitani di Vimercati, Pierangela Samarati, Sushil Jajodia. DNIS 2005, 225-237. Cited by 21Web SearchBibTeXDownload
104Advanced Metadata for Privacy-Aware Representation of Credentials. Paolo Ceravolo, Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati. ICDE Workshops 2005, 1199. Cited by 7Web SearchBibTeXDownload
103Offline Expansion of XACML Policies Based on P3P Metadata. Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati. ICWE 2005, 363-374. Cited by 10Web SearchBibTeXDownload
102Metadata Management in Outsourced Encrypted Databases. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. Secure Data Management 2005, 16-32. Cited by 10Web SearchBibTeXDownload
101Key management for multi-user encrypted databases. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. StorageSS 2005, 74-83. Cited by 17Web SearchBibTeXDownload
100Open WorldReasoning inSemantics-Aware AccessControl: aPreliminaryStudy. Ernesto Damiani, S. David, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati. SWAP 2005. Web SearchBibTeXDownload
99An access control model for querying XML data. Sabrina De Capitani di Vimercati, Stefania Marrara, Pierangela Samarati. SWS 2005, 36-42. Cited by 6Web SearchBibTeXDownload
2004
98A Protocol for Reputation Management in Super-Peer Networks. Shalendra Chhabra, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati. DEXA Workshops 2004, 979-983. Cited by 11Web SearchBibTeXDownload
97Extending Policy Languages to the Semantic Web. Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati. ICWE 2004, 330-343. Cited by 49Web SearchBibTeXDownload
96XML-based access control languages. Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. Inf. Sec. Techn. Report (9): 35-46 (2004). Web SearchBibTeXDownload
95An Open Digest-based Technique for Spam Detection. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati. ISCA PDCS 2004, 559-564. Cited by 39Web SearchBibTeX
94P2P-Based Collaborative Spam Detection and Filtering. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati. Peer-to-Peer Computing 2004, 176-183. Cited by 66Web SearchBibTeXDownload
93Spam attacks: p2p to the rescue. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Andrea Tironi, Luca Zaniboni. WWW (Alternate Track Papers & Posters) 2004, 358-359. Cited by 7Web SearchBibTeXDownload
2003
92Balancing confidentiality and efficiency in untrusted relational DBMSs. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. ACM Conference on Computer and Communications Security 2003, 93-102. Cited by 115Web SearchBibTeXDownload
91Semantics-Aware Perimeter Protection. Marco Cremonini, Ernesto Damiani, Pierangela Samarati. DBSec 2003, 229-242. Cited by 1Web SearchBibTeX
90Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Marco Pesenti, Pierangela Samarati, Sergio Zara. EUSFLAT Conf. 2003, 43-48. Cited by 5Web SearchBibTeXDownload
89Managing Multiple and Dependable Identities. Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. IEEE Internet Computing (7): 29-37 (2003). Cited by 41Web SearchBibTeXDownload
88Implementation of a Storage Mechanism for Untrusted DBMSs. Ernesto Damiani, Sabrina De Capitani di Vimercati, Mario Finetti, Stefano Paraboschi, Pierangela Samarati, Sushil Jajodia. IEEE Security in Storage Workshop 2003, 38-46. Cited by 21Web SearchBibTeXDownload
87Managing and Sharing Servents' Reputations in P2P Systems. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati. IEEE Trans. Knowl. Data Eng. (15): 840-854 (2003). Cited by 133Web SearchBibTeXDownload
86Logics for Authorization and Security. Piero A. Bonatti, Pierangela Samarati. Logics for Emerging Applications of Databases 2003, 277-323. Web SearchBibTeX
85Towards Flexible Credential Negotiation Protocols (Discussion). Pierangela Samarati. Security Protocols Workshop 2003, 24-27. Web SearchBibTeXDownload
84Towards Flexible Credential Negotiation Protocols. Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati. Security Protocols Workshop 2003, 19-23. Web SearchBibTeXDownload
83Access control: principles and solutions. Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati. Softw., Pract. Exper. (33): 397-421 (2003). Cited by 42Web SearchBibTeXDownload
82An XML-based approach to combine firewalls and web services security specifications. Marco Cremonini, Sabrina De Capitani di Vimercati, Ernesto Damiani, Pierangela Samarati. XML Security 2003, 69-78. Cited by 14Web SearchBibTeXDownload
2002
81A reputation-based approach for choosing reliable resources in peer-to-peer networks. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Fabio Violante. ACM Conference on Computer and Communications Security 2002, 207-216. Cited by 467Web SearchBibTeXDownload
80An algebra for composing access control policies. Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati. ACM Trans. Inf. Syst. Secur. (5): 1-35 (2002). Cited by 141Web SearchBibTeXDownload
79A fine-grained access control system for XML documents. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati. ACM Trans. Inf. Syst. Secur. (5): 169-202 (2002). Cited by 376Web SearchBibTeXDownload
78Access Control of SVG Documents. Ernesto Damiani, Sabrina De Capitani di Vimercati, Eduardo Fernández-Medina, Pierangela Samarati. DBSec 2002, 219-230. Cited by 19Web SearchBibTeX
77Privacy and Civil Liberties. David Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani M. Thuraisingham. DBSec 2002, 331-346. Web SearchBibTeX
76Enriching Access Control to Support Credential-Based Specificatons. Pierangela Samarati. GI Jahrestagung 2002, 431. Web SearchBibTeXDownload
75Enriching Access Control to Support Credential-Based Specifications. Pierangela Samarati. GI Jahrestagung 2002, 114-119. Cited by 8Web SearchBibTeXDownload
74XML access control systems: a component-based approach. Ernesto Damiani, Pierangela Samarati, Sabrina De Capitani di Vimercati, Stefano Paraboschi. Informatica (Slovenia) (26) (2002). Cited by 38Web SearchBibTeX
73Securing SOAP e-services. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati. Int. J. Inf. Sec. (1): 100-115 (2002). Cited by 37Web SearchBibTeXDownload
72Maximizing Sharing of Protected Information. Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati. J. Comput. Syst. Sci. (64): 496-541 (2002). Cited by 17Web SearchBibTeXDownload
71A Uniform Framework for Regulating Service Access and Information Release on the Web. Piero A. Bonatti, Pierangela Samarati. Journal of Computer Security (10): 241-272 (2002). Cited by 70Web SearchBibTeXDownload
70Implementing a Reputation-Aware Gnutella Servent. Fabrizio Cornelli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati. NETWORKING Workshops 2002, 321-334. Cited by 35Web SearchBibTeXDownload
69Choosing reputable servents in a P2P network. Fabrizio Cornelli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati. WWW 2002, 376-386. Cited by 325Web SearchBibTeXDownload
68Towards securing XML Web services. Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. XML Security 2002, 90-96. Cited by 47Web SearchBibTeXDownload
2001
67Flexible support for multiple access control policies. Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian. ACM Trans. Database Syst. (26): 214-260 (2001). Cited by 397Web SearchBibTeXDownload
66An authorization model for a public key management service. Pierangela Samarati, Michael K. Reiter, Sushil Jajodia. ACM Trans. Inf. Syst. Secur. (4): 453-482 (2001). Cited by 19Web SearchBibTeXDownload
65A Component-Based Architecture for Secure Data Publication. Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. ACSAC 2001, 309-318. Cited by 32Web SearchBibTeXDownload
64Panel on XML and Security. Sylvia L. Osborn, Bhavani M. Thuraisingham, Pierangela Samarati. DBSec 2001, 317-323. Cited by 1Web SearchBibTeX
63Controlling Access to XML Documents. Ernesto Damiani, Pierangela Samarati, Sabrina De Capitani di Vimercati, Stefano Paraboschi. IEEE Internet Computing (5): 18-28 (2001). Cited by 54Web SearchBibTeXDownload
62Protecting Respondents' Identities in Microdata Release. Pierangela Samarati. IEEE Trans. Knowl. Data Eng. (13): 1010-1027 (2001). Cited by 443Web SearchBibTeXDownload
61Global Infrastructure Protection System. Sabrina De Capitani di Vimercati, Patrick Lincoln, Livio Ricciulli, Pierangela Samarati. Journal of Computer Security (9): 251-284 (2001). Cited by 1Web SearchBibTeXDownload
60An Access Control Model for Data Archives. Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. SEC 2001, 261-276. Cited by 8Web SearchBibTeX
59Fine grained access control for SOAP E-services. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati. WWW 2001, 504-513. Cited by 65Web SearchBibTeXDownload
2000
58A modular approach to composing access control policies. Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati. ACM Conference on Computer and Communications Security 2000, 164-173. Cited by 58Web SearchBibTeXDownload
57Regulating service access and information release on the Web. Piero A. Bonatti, Pierangela Samarati. ACM Conference on Computer and Communications Security 2000, 134-143. Cited by 167Web SearchBibTeXDownload
56Protecting information on the Web. Elisa Bertino, Elena Pagani, Gian Paolo Rossi, Pierangela Samarati. Commun. ACM (43): 3 (2000). Web SearchBibTeXDownload
55Design and implementation of an access control processor for XML documents. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati. Computer Networks (33): 59-75 (2000). Cited by 159Web SearchBibTeXDownload
54XML Access Control Systems: A Component-Based Approach. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati. DBSec 2000, 39-50. Web SearchBibTeX
53Security of Data and Transaction Processing - Guest Editor's Introduction. Vijayalakshmi Atluri, Pierangela Samarati. Distributed and Parallel Databases (8): 5-6 (2000). Web SearchBibTeXDownload
52Providing Security and Interoperation of Heterogeneous Systems. Steven Dawson, Shelly Qian, Pierangela Samarati. Distributed and Parallel Databases (8): 119-145 (2000). Cited by 67Web SearchBibTeXDownload
51Securing XML Documents. Charles A. Shoniregun, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati. EDBT 2000, 121-135. Cited by 214Web SearchBibTeXDownload
50Access Control: Policies, Models, and Mechanisms. Pierangela Samarati, Sabrina De Capitani di Vimercati. FOSAD 2000, 137-196. Cited by 243Web SearchBibTeXDownload
49Classifying Information for External Release. Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati. SEC 2000, 151-160. Web SearchBibTeX
48Regulating Access To Semistructured Information on the Web. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati. SEC 2000, 351-360. Cited by 5Web SearchBibTeX
1999
47A Flexible Authorization Mechanism for Relational Data Management Systems. Elisa Bertino, Sushil Jajodia, Pierangela Samarati. ACM Trans. Inf. Syst. (17): 101-140 (1999). Cited by 102Web SearchBibTeXDownload
46Specification and Enforcement of Classification and Inference Constraints. Steven Dawson, Sabrina De Capitani di Vimercati, Pierangela Samarati. IEEE Symposium on Security and Privacy 1999, 181-195. Cited by 22Web SearchBibTeXDownload
45PGRIP: PNNI Global Routing Infrastructure Protection. Sabrina De Capitani di Vimercati, Patrick Lincoln, Livio Ricciulli, Pierangela Samarati. NDSS 1999. Cited by 1Web SearchBibTeXDownload
44Minimal Data Upgrading to Prevent Inference and Association. Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati. PODS 1999, 114-125. Cited by 24Web SearchBibTeXDownload
1998
43An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati. ACM Trans. Database Syst. (23): 231-285 (1998). Cited by 181Web SearchBibTeXDownload
42Exception-Based Information Flow Control in Object-Oriented Systems. Elisa Bertino, Sabrina De Capitani di Vimercati, Elena Ferrari, Pierangela Samarati. ACM Trans. Inf. Syst. Secur. (1): 26-65 (1998). Cited by 31Web SearchBibTeXDownload
41Security and Privacy Issues for the World Wide Web: Panel Discussion. Bhavani M. Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier. DBSec 1998, 269-284. Cited by 7Web SearchBibTeX
40Generalizing Data to Provide Anonymity when Disclosing Information (Abstract). Pierangela Samarati, Latanya Sweeney. PODS 1998, 188. Cited by 189Web SearchBibTeXDownload
39Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model. Elisa Bertino, Elena Ferrari, Pierangela Samarati. TAPOS (4): 183-204 (1998). Cited by 5Web SearchBibTeX
1997
38Security Issues in Data Warehousing and Data Mining: Panel Discussion. Bhavani M. Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton. DBSec 1997, 3-16. Cited by 5Web SearchBibTeX
37A Logical Language for Expressing Authorizations. Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian. IEEE Symposium on Security and Privacy 1997, 31-42. Cited by 420Web SearchBibTeXDownload
36Providing flexibility in information flow control for object oriented systems. Elena Ferrari, Pierangela Samarati, Elisa Bertino, Sushil Jajodia. IEEE Symposium on Security and Privacy 1997, 130-140. Cited by 77Web SearchBibTeXDownload
35An Extended Authorization Model for Relational Databases. Elisa Bertino, Pierangela Samarati, Sushil Jajodia. IEEE Trans. Knowl. Data Eng. (9): 85-101 (1997). Cited by 69Web SearchBibTeXDownload
34Information Flow Control in Object-Oriented Systems. Pierangela Samarati, Elisa Bertino, Alessandro Ciampichetti, Sushil Jajodia. IEEE Trans. Knowl. Data Eng. (9): 524-538 (1997). Cited by 69Web SearchBibTeXDownload
33Decentralized Administration for a Temporal Access Control Model. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati. Inf. Syst. (22): 223-248 (1997). Cited by 5Web SearchBibTeXDownload
32Authorization Specification and Enforcement in Federated Database Systems. Sabrina De Capitani di Vimercati, Pierangela Samarati. Journal of Computer Security (5): 155-188 (1997). Cited by 47Web SearchBibTeXDownload
31A Unified Framework for Enforcing Multiple Access Control Policies. Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino. SIGMOD Conference 1997, 474-485. Cited by 277Web SearchBibTeXDownload
30Authentication, Access Controls, and Intrusion Detection. Ravi S. Sandhu, Pierangela Samarati. The Computer Science and Engineering Handbook 1997, 1929-1948. Cited by 64Web SearchBibTeX
1996
29Authetication, Access Control, and Audit. Ravi S. Sandhu, Pierangela Samarati. ACM Comput. Surv. (28): 241-243 (1996). Cited by 85Web SearchBibTeXDownload
28A Non-Timestamped Authorization Model for Data Management Systems. Elisa Bertino, Sushil Jajodia, Pierangela Samarati. ACM Conference on Computer and Communications Security 1996, 169-178. Cited by 4Web SearchBibTeXDownload
27Maintaining Replicated Authorizations in Distributed Database Systems. Pierangela Samarati, Paul Ammann, Sushil Jajodia. Data Knowl. Eng. (18): 55-84 (1996). Cited by 12Web SearchBibTeXDownload
26Analysis, Comparison and Design of Role-Based Security Specifications. Silvana Castano, Giancarlo Martella, Pierangela Samarati. Data Knowl. Eng. (21): 31-55 (1996). Cited by 9Web SearchBibTeXDownload
25An Authorization Model for Federated Systems. Sabrina De Capitani di Vimercati, Pierangela Samarati. ESORICS 1996, 99-117. Cited by 12Web SearchBibTeXDownload
24Supporting Multiple Access Control Policies in Database Systems. Elisa Bertino, Sushil Jajodia, Pierangela Samarati. IEEE Symposium on Security and Privacy 1996, 94-107. Cited by 94Web SearchBibTeXDownload
23A Temporal Access Control Mechanism for Database Systems. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati. IEEE Trans. Knowl. Data Eng. (8): 67-80 (1996). Cited by 106Web SearchBibTeXDownload
22An Authorization Model for a Distributed Hypertext System. Pierangela Samarati, Elisa Bertino, Sushil Jajodia. IEEE Trans. Knowl. Data Eng. (8): 555-562 (1996). Cited by 87Web SearchBibTeXDownload
21Access control in federated systems. Sabrina De Capitani di Vimercati, Pierangela Samarati. NSPW 1996, 87-99. Web SearchBibTeXDownload
20A decentralized temporal autoritzation model. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati. SEC 1996, 271-280. Cited by 3Web SearchBibTeX
19On Using Materialization Strategies for a Temporal Authorization Model. Elena Ferrari, Elisa Bertino, Claudio Bettini, Alberto Motta, Pierangela Samarati. VIEWS 1996, 34-42. Cited by 4Web SearchBibTeX
18Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati. VLDB 1996, 472-483. Cited by 19Web SearchBibTeXDownload
1995
17Panel Discussion: Role-Based Access Control and Next-Generation Security Models. Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting. DBSec 1995, 289-298. Web SearchBibTeX
16Independent Updates and Incremental Agreement in Replicated Databases. Stefano Ceri, Maurice A. W. Houtsma, Arthur M. Keller, Pierangela Samarati. Distributed and Parallel Databases (3): 225-246 (1995). Cited by 33Web SearchBibTeXDownload
15Database Security: Research and Practice. Elisa Bertino, Sushil Jajodia, Pierangela Samarati. Inf. Syst. (20): 537-556 (1995). Cited by 33Web SearchBibTeXDownload
14An Extended Authorization Model for Object Databases. Elisa Bertino, Fabio Origgi, Pierangela Samarati. Journal of Computer Security (3): 169-206 (1995). Cited by 1Web SearchBibTeXDownload
13Research issues in authorization models for hypertext systems. Elisa Bertino, Pierangela Samarati. NSPW 1995, 22-28. Web SearchBibTeXDownload
1994
12A Temporal Authorization Model. Elisa Bertino, Claudio Bettini, Pierangela Samarati. ACM Conference on Computer and Communications Security 1994, 126-135. Cited by 54Web SearchBibTeXDownload
11Propagation of Authorizations in Distributed Database Systems. Pierangela Samarati, Paul Ammann, Sushil Jajodia. ACM Conference on Computer and Communications Security 1994, 136-147. Cited by 6Web SearchBibTeXDownload
10A new Authorization Model for Object-Oriented Databases. Elisa Bertino, Fabio Origgi, Pierangela Samarati. DBSec 1994, 199-222. Cited by 14Web SearchBibTeX
9A new approach to security system development. Silvana Castano, Giancarlo Martella, Pierangela Samarati. NSPW 1994, 82-88. Web SearchBibTeXDownload
8A discretionary access control model with temporal authorizations. Elisa Bertino, Claudio Bettini, Pierangela Samarati. NSPW 1994, 102-107. Web SearchBibTeXDownload
1993
7High Assurance Discretionary Access Control for Object Bases. Elisa Bertino, Pierangela Samarati, Sushil Jajodia. ACM Conference on Computer and Communications Security 1993, 140-150. Cited by 32Web SearchBibTeXDownload
6Authorizations in Relational Database Management Systems. Elisa Bertino, Pierangela Samarati, Sushil Jajodia. ACM Conference on Computer and Communications Security 1993, 130-139. Cited by 52Web SearchBibTeXDownload
5Access Control in Object-Oriented Database Systems - Some Approaches and Issues. Elisa Bertino, Sushil Jajodia, Pierangela Samarati. Advanced Database Systems 1993, 17-44. Cited by 21Web SearchBibTeXDownload
4Research Issues in Discretionary Authorizations for Object Bases. Elisa Bertino, Pierangela Samarati. Security for Object-Oriented Systems 1993, 183-199. Cited by 12Web SearchBibTeX
3Enforcing Mandatory Access Control in Object Bases. Elisa Bertino, Sushil Jajodia, Pierangela Samarati. Security for Object-Oriented Systems 1993, 96-116. Cited by 1Web SearchBibTeX
1992
2Achieving Incremental Consistency among Autonomous Replicated Databases. Stefano Ceri, Maurice A. W. Houtsma, Arthur M. Keller, Pierangela Samarati. DS-5 1992, 223-237. Cited by 12Web SearchBibTeX
1The Case for Independent Updates. Stefano Ceri, Maurice A. W. Houtsma, Arthur M. Keller, Pierangela Samarati. Workshop on the Management of Replicated Data 1992, 17-19. Cited by 10Web SearchBibTeX
from DBLP and Google Scholar
References
1. ^ The 2010 ACM SIGMOD/PODS Conference: Indianapolis, Indiana, USA - Organization: SIGMOD Program Committee - Retrieved 2011-03-19 - details
Developed by the Database Group at the University of Wisconsin and Yahoo! Research