The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sara Foresti: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Metadata Management in Outsourced Encrypted Databases. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:16-32 [Conf]
  2. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Selective Data Encryption in Outsourced Dynamic Environments. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:127-142 [Journal]
  3. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Fragmentation and Encryption to Enforce Privacy in Data Storage. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:171-186 [Conf]
  4. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Over-encryption: Management of Access Control Evolution on Outsourced Data. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:123-134 [Conf]

  5. A data outsourcing architecture combining cryptography and access control. [Citation Graph (, )][DBLP]


  6. Assessing query privileges via safe and efficient permission composition. [Citation Graph (, )][DBLP]


  7. Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. [Citation Graph (, )][DBLP]


  8. Keep a Few: Outsourcing Data While Maintaining Confidentiality. [Citation Graph (, )][DBLP]


  9. Controlled Information Sharing in Collaborative Distributed Query Processing. [Citation Graph (, )][DBLP]


  10. Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases. [Citation Graph (, )][DBLP]


  11. An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing. [Citation Graph (, )][DBLP]


  12. Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. [Citation Graph (, )][DBLP]


  13. Preserving confidentiality of security policies in data outsourcing. [Citation Graph (, )][DBLP]


  14. Key management for multi-user encrypted databases. [Citation Graph (, )][DBLP]


  15. Managing key hierarchies for access control enforcement: Heuristic approaches. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002