The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Pierangela Samarati: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino
    A Unified Framework for Enforcing Multiple Access Control Policies. [Citation Graph (3, 12)][DBLP]
    SIGMOD Conference, 1997, pp:474-485 [Conf]
  2. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
    A Temporal Access Control Mechanism for Database Systems. [Citation Graph (3, 10)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:67-80 [Journal]
  3. Pierangela Samarati, Elisa Bertino, Sushil Jajodia
    An Authorization Model for a Distributed Hypertext System. [Citation Graph (3, 13)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:4, pp:555-562 [Journal]
  4. Elisa Bertino, Pierangela Samarati, Sushil Jajodia
    Authorizations in Relational Database Management Systems. [Citation Graph (2, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:130-139 [Conf]
  5. Elisa Bertino, Claudio Bettini, Pierangela Samarati
    A Temporal Authorization Model. [Citation Graph (2, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:126-135 [Conf]
  6. Stefano Ceri, Maurice A. W. Houtsma, Arthur M. Keller, Pierangela Samarati
    Independent Updates and Incremental Agreement in Replicated Databases. [Citation Graph (2, 0)][DBLP]
    Distributed and Parallel Databases, 1995, v:3, n:3, pp:225-246 [Journal]
  7. Elisa Bertino, Fabio Origgi, Pierangela Samarati
    A new Authorization Model for Object-Oriented Databases. [Citation Graph (1, 0)][DBLP]
    DBSec, 1994, pp:199-222 [Conf]
  8. Steven Dawson, Sabrina De Capitani di Vimercati, Pierangela Samarati
    Specification and Enforcement of Classification and Inference Constraints. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:181-195 [Conf]
  9. Elena Ferrari, Elisa Bertino, Claudio Bettini, Alberto Motta, Pierangela Samarati
    On Using Materialization Strategies for a Temporal Authorization Model. [Citation Graph (1, 0)][DBLP]
    VIEWS, 1996, pp:34-42 [Conf]
  10. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
    Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control. [Citation Graph (1, 6)][DBLP]
    VLDB, 1996, pp:472-483 [Conf]
  11. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
    Decentralized Administration for a Temporal Access Control Model. [Citation Graph (1, 0)][DBLP]
    Inf. Syst., 1997, v:22, n:4, pp:223-248 [Journal]
  12. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    Database Security: Research and Practice [Citation Graph (1, 0)][DBLP]
    Inf. Syst., 1995, v:20, n:7, pp:537-556 [Journal]
  13. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    Access Control in Object-Oriented Database Systems - Some Approaches and Issues. [Citation Graph (1, 0)][DBLP]
    , 1993, v:, n:, pp:17-44 [Journal]
  14. Elisa Bertino, Pierangela Samarati, Sushil Jajodia
    An Extended Authorization Model for Relational Databases. [Citation Graph (1, 16)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1997, v:9, n:1, pp:85-101 [Journal]
  15. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
    An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. [Citation Graph (1, 18)][DBLP]
    ACM Trans. Database Syst., 1998, v:23, n:3, pp:231-285 [Journal]
  16. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    An Open Digest-based Technique for Spam Detection. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2004, pp:559-564 [Conf]
  17. Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
    A Component-Based Architecture for Secure Data Publication. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:309-318 [Conf]
  18. Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
    Managing Privacy in LBAC Systems. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:7-12 [Conf]
  19. Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
    The Architecture of a Privacy-Aware Access Control Decision Component. [Citation Graph (0, 0)][DBLP]
    CASSIS, 2005, pp:1-15 [Conf]
  20. Elisa Bertino, Pierangela Samarati, Sushil Jajodia
    High Assurance Discretionary Access Control for Object Bases. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:140-150 [Conf]
  21. Piero A. Bonatti, Pierangela Samarati
    Regulating service access and information release on the Web. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:134-143 [Conf]
  22. Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati
    A modular approach to composing access control policies. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:164-173 [Conf]
  23. Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
    Supporting location-based conditions in access control policies. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:212-222 [Conf]
  24. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    A Non-Timestamped Authorization Model for Data Management Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:169-178 [Conf]
  25. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Balancing confidentiality and efficiency in untrusted relational DBMSs. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:93-102 [Conf]
  26. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Fabio Violante
    A reputation-based approach for choosing reliable resources in peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:207-216 [Conf]
  27. Pierangela Samarati, Paul Ammann, Sushil Jajodia
    Propagation of Authorizations in Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:136-147 [Conf]
  28. Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Trust management services in relational databases. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:149-160 [Conf]
  29. Piero A. Bonatti, Pierangela Samarati
    Logics for Authorization and Security. [Citation Graph (0, 0)][DBLP]
    Logics for Emerging Applications of Databases, 2003, pp:277-323 [Conf]
  30. Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
    Towards Privacy-Enhanced Authorization Policies and Languages. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:16-27 [Conf]
  31. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati
    Enhancing User Privacy Through Data Handling Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:224-236 [Conf]
  32. David Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani M. Thuraisingham
    Privacy and Civil Liberties. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:331-346 [Conf]
  33. Marco Cremonini, Ernesto Damiani, Pierangela Samarati
    Semantics-Aware Perimeter Protection. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:229-242 [Conf]
  34. Ernesto Damiani, Sabrina De Capitani di Vimercati, Eduardo Fernández-Medina, Pierangela Samarati
    Access Control of SVG Documents. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:219-230 [Conf]
  35. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    XML Access Control Systems: A Component-Based Approach. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:39-50 [Conf]
  36. Sylvia L. Osborn, Bhavani M. Thuraisingham, Pierangela Samarati
    Panel on XML and Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:317-323 [Conf]
  37. Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting
    Panel Discussion: Role-Based Access Control and Next-Generation Security Models. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:289-298 [Conf]
  38. Bhavani M. Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier
    Security and Privacy Issues for the World Wide Web: Panel Discussion. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:269-284 [Conf]
  39. Bhavani M. Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton
    Security Issues in Data Warehousing and Data Mining: Panel Discussion. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:3-16 [Conf]
  40. Shalendra Chhabra, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    A Protocol for Reputation Management in Super-Peer Networks. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2004, pp:979-983 [Conf]
  41. Sabrina De Capitani di Vimercati, Pierangela Samarati, Sushil Jajodia
    Policies, Models, and Languages for Access Control. [Citation Graph (0, 0)][DBLP]
    DNIS, 2005, pp:225-237 [Conf]
  42. Stefano Ceri, Maurice A. W. Houtsma, Arthur M. Keller, Pierangela Samarati
    Achieving Incremental Consistency among Autonomous Replicated Databases. [Citation Graph (0, 0)][DBLP]
    DS-5, 1992, pp:223-237 [Conf]
  43. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    Securing XML Documents. [Citation Graph (0, 8)][DBLP]
    EDBT, 2000, pp:121-135 [Conf]
  44. Sabrina De Capitani di Vimercati, Pierangela Samarati
    An Authorization Model for Federated Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:99-117 [Conf]
  45. Pierangela Samarati, Sabrina De Capitani di Vimercati
    Access Control: Policies, Models, and Mechanisms. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2000, pp:137-196 [Conf]
  46. Pierangela Samarati
    Enriching Access Control to Support Credential-Based Specifications. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 2002, pp:114-119 [Conf]
  47. Pierangela Samarati
    Enriching Access Control to Support Credential-Based Specificatons. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 2002, pp:431-431 [Conf]
  48. Paolo Ceravolo, Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati
    Advanced Metadata for Privacy-Aware Representation of Credentials. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2005, pp:1199- [Conf]
  49. Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati
    Extending Context Descriptions in Semantics-Aware Access Control. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:162-176 [Conf]
  50. Sabrina De Capitani di Vimercati, Pierangela Samarati
    Privacy in the Electronic Society. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:1-21 [Conf]
  51. Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati
    Offline Expansion of XACML Policies Based on P3P Metadata. [Citation Graph (0, 0)][DBLP]
    ICWE, 2005, pp:363-374 [Conf]
  52. Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati
    Extending Policy Languages to the Semantic Web. [Citation Graph (0, 0)][DBLP]
    ICWE, 2004, pp:330-343 [Conf]
  53. Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati
    Modality conflicts in semantics aware access control. [Citation Graph (0, 0)][DBLP]
    ICWE, 2006, pp:249-256 [Conf]
  54. Sabrina De Capitani di Vimercati, Patrick Lincoln, Livio Ricciulli, Pierangela Samarati
    PGRIP: PNNI Global Routing Infrastructure Protection. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  55. Fabrizio Cornelli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    Implementing a Reputation-Aware Gnutella Servent. [Citation Graph (0, 0)][DBLP]
    NETWORKING Workshops, 2002, pp:321-334 [Conf]
  56. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    Enforcing Mandatory Access Control in Object Bases. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:96-116 [Conf]
  57. Elisa Bertino, Pierangela Samarati
    Research Issues in Discretionary Authorizations for Object Bases. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:183-199 [Conf]
  58. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    P2P-Based Collaborative Spam Detection and Filtering. [Citation Graph (0, 0)][DBLP]
    Peer-to-Peer Computing, 2004, pp:176-183 [Conf]
  59. Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati
    Minimal Data Upgrading to Prevent Inference and Association. [Citation Graph (0, 12)][DBLP]
    PODS, 1999, pp:114-125 [Conf]
  60. Pierangela Samarati, Latanya Sweeney
    Generalizing Data to Provide Anonymity when Disclosing Information (Abstract). [Citation Graph (0, 0)][DBLP]
    PODS, 1998, pp:188- [Conf]
  61. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Metadata Management in Outsourced Encrypted Databases. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:16-32 [Conf]
  62. Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Fulvio Frati, Pierangela Samarati
    CAS++: An Open Source Single Sign-On Solution for Secure e-Services. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:208-220 [Conf]
  63. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    Regulating Access To Semistructured Information on the Web. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:351-360 [Conf]
  64. Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati
    Classifying Information for External Release. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:151-160 [Conf]
  65. Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
    A decentralized temporal autoritzation model. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:271-280 [Conf]
  66. Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
    An Access Control Model for Data Archives. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:261-276 [Conf]
  67. Ernesto Damiani, Sabrina De Capitani di Vimercati, Mario Finetti, Stefano Paraboschi, Pierangela Samarati, Sushil Jajodia
    Implementation of a Storage Mechanism for Untrusted DBMSs. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2003, pp:38-46 [Conf]
  68. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    Supporting Multiple Access Control Policies in Database Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:94-107 [Conf]
  69. Elena Ferrari, Pierangela Samarati, Elisa Bertino, Sushil Jajodia
    Providing flexibility in information flow control for object oriented systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:130-140 [Conf]
  70. Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian
    A Logical Language for Expressing Authorizations. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:31-42 [Conf]
  71. Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati
    Towards Flexible Credential Negotiation Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:19-23 [Conf]
  72. Pierangela Samarati
    Towards Flexible Credential Negotiation Protocols (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:24-27 [Conf]
  73. Stefano Ceri, Maurice A. W. Houtsma, Arthur M. Keller, Pierangela Samarati
    The Case for Independent Updates. [Citation Graph (0, 0)][DBLP]
    Workshop on the Management of Replicated Data, 1992, pp:17-19 [Conf]
  74. Fabrizio Cornelli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    Choosing reputable servents in a P2P network. [Citation Graph (0, 0)][DBLP]
    WWW, 2002, pp:376-386 [Conf]
  75. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    Fine grained access control for SOAP E-services. [Citation Graph (0, 0)][DBLP]
    WWW, 2001, pp:504-513 [Conf]
  76. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Andrea Tironi, Luca Zaniboni
    Spam attacks: p2p to the rescue. [Citation Graph (0, 0)][DBLP]
    WWW (Alternate Track Papers & Posters), 2004, pp:358-359 [Conf]
  77. Elisa Bertino, Elena Pagani, Gian Paolo Rossi, Pierangela Samarati
    Protecting information on the Web. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:11es, pp:3- [Journal]
  78. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    Design and implementation of an access control processor for XML documents. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:33, n:1-6, pp:59-75 [Journal]
  79. Ravi S. Sandhu, Pierangela Samarati
    Authetication, Access Control, and Audit. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1996, v:28, n:1, pp:241-243 [Journal]
  80. Silvana Castano, Giancarlo Martella, Pierangela Samarati
    Analysis, Comparison and Design of Role-Based Security Specifications. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1996, v:21, n:1, pp:31-55 [Journal]
  81. Pierangela Samarati, Paul Ammann, Sushil Jajodia
    Maintaining Replicated Authorizations in Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1996, v:18, n:1, pp:55-84 [Journal]
  82. Vijayalakshmi Atluri, Pierangela Samarati
    Security of Data and Transaction Processing - Guest Editor's Introduction. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2000, v:8, n:1, pp:5-6 [Journal]
  83. Steven Dawson, Shelly Qian, Pierangela Samarati
    Providing Security and Interoperation of Heterogeneous Systems. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2000, v:8, n:1, pp:119-145 [Journal]
  84. Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
    A Web Service Architecture for Enforcing Access Control Policies. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:47-62 [Journal]
  85. Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati, Marco Viviani
    A WOWA-based Aggregation Technique on Trust Values Connected to Metadata. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:157, n:3, pp:131-142 [Journal]
  86. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Selective Data Encryption in Outsourced Dynamic Environments. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:127-142 [Journal]
  87. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    Securing SOAP e-services. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:2, pp:100-115 [Journal]
  88. Ernesto Damiani, Pierangela Samarati, Sabrina De Capitani di Vimercati, Stefano Paraboschi
    XML access control systems: a component-based approach. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  89. Ernesto Damiani, Pierangela Samarati, Sabrina De Capitani di Vimercati, Stefano Paraboschi
    Controlling Access to XML Documents. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2001, v:5, n:6, pp:18-28 [Journal]
  90. Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
    Managing Multiple and Dependable Identities. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2003, v:7, n:6, pp:29-37 [Journal]
  91. Roberto Aringhieri, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems. [Citation Graph (0, 0)][DBLP]
    JASIST, 2006, v:57, n:4, pp:528-537 [Journal]
  92. Elisa Bertino, Fabio Origgi, Pierangela Samarati
    An Extended Authorization Model for Object Databases. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1995, v:3, n:2/3, pp:169-206 [Journal]
  93. Piero A. Bonatti, Pierangela Samarati
    A Uniform Framework for Regulating Service Access and Information Release on the Web. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2002, v:10, n:3, pp:241-272 [Journal]
  94. Sabrina De Capitani di Vimercati, Patrick Lincoln, Livio Ricciulli, Pierangela Samarati
    Global Infrastructure Protection System. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2001, v:9, n:4, pp:251-284 [Journal]
  95. Sabrina De Capitani di Vimercati, Pierangela Samarati
    Authorization Specification and Enforcement in Federated Database Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:2, pp:155-188 [Journal]
  96. Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati
    Maximizing Sharing of Protected Information. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2002, v:64, n:3, pp:496-541 [Journal]
  97. Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    Access control: principles and solutions. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2003, v:33, n:5, pp:397-421 [Journal]
  98. Elisa Bertino, Elena Ferrari, Pierangela Samarati
    Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model. [Citation Graph (0, 0)][DBLP]
    TAPOS, 1998, v:4, n:3, pp:183-204 [Journal]
  99. Pierangela Samarati, Michael K. Reiter, Sushil Jajodia
    An authorization model for a public key management service. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:4, pp:453-482 [Journal]
  100. Elisa Bertino, Sabrina De Capitani di Vimercati, Elena Ferrari, Pierangela Samarati
    Exception-Based Information Flow Control in Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1998, v:1, n:1, pp:26-65 [Journal]
  101. Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati
    An algebra for composing access control policies. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:1, pp:1-35 [Journal]
  102. Alberto Ceselli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Modeling and assessing inference exposure in encrypted databases. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:1, pp:119-152 [Journal]
  103. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    A fine-grained access control system for XML documents. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:2, pp:169-202 [Journal]
  104. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
    Managing and Sharing Servents' Reputations in P2P Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2003, v:15, n:4, pp:840-854 [Journal]
  105. Pierangela Samarati
    Protecting Respondents' Identities in Microdata Release. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2001, v:13, n:6, pp:1010-1027 [Journal]
  106. Pierangela Samarati, Elisa Bertino, Alessandro Ciampichetti, Sushil Jajodia
    Information Flow Control in Object-Oriented Systems. [Citation Graph (0, 9)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1997, v:9, n:4, pp:524-538 [Journal]
  107. Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian
    Flexible support for multiple access control policies. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Database Syst., 2001, v:26, n:2, pp:214-260 [Journal]
  108. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    A Flexible Authorization Mechanism for Relational Data Management Systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst., 1999, v:17, n:2, pp:101-140 [Journal]
  109. Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
    Location Privacy Protection Through Obfuscation-Based Techniques. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:47-60 [Conf]
  110. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Fragmentation and Encryption to Enforce Privacy in Data Storage. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:171-186 [Conf]
  111. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Over-encryption: Management of Access Control Evolution on Outsourced Data. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:123-134 [Conf]
  112. Ernesto Damiani, Antonella Esposito, Maurizio Mariotti, Pierangela Samarati, Daniela Scaccia, Nello Scarabottolo
    SSRI online First experiences in a three-years course degree offered in e-learning at the University of Milan. [Citation Graph (0, 0)][DBLP]
    DMS, 2005, pp:65-70 [Conf]
  113. Ernesto Damiani, S. David, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati
    Open WorldReasoning inSemantics-Aware AccessControl: aPreliminaryStudy. [Citation Graph (0, 0)][DBLP]
    SWAP, 2005, pp:- [Conf]
  114. Sandro Etalle, Pierangela Samarati
    Preface. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:179, n:, pp:1-2 [Journal]

  115. Enabling Privacy-preserving Credential-based Access Control with XACML and SAML. [Citation Graph (, )][DBLP]


  116. A data outsourcing architecture combining cryptography and access control. [Citation Graph (, )][DBLP]


  117. Assessing query privileges via safe and efficient permission composition. [Citation Graph (, )][DBLP]


  118. Data protection in outsourcing scenarios: issues and directions. [Citation Graph (, )][DBLP]


  119. Regulating Exceptions in Healthcare Using Policy Spaces. [Citation Graph (, )][DBLP]


  120. Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. [Citation Graph (, )][DBLP]


  121. Protecting data privacy in outsourcing scenarios: invited talk. [Citation Graph (, )][DBLP]


  122. Providing Mobile Users' Anonymity in Hybrid Networks. [Citation Graph (, )][DBLP]


  123. A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks. [Citation Graph (, )][DBLP]


  124. Keep a Few: Outsourcing Data While Maintaining Confidentiality. [Citation Graph (, )][DBLP]


  125. Access Control in Location-Based Services. [Citation Graph (, )][DBLP]


  126. Privacy Preservation over Untrusted Mobile Networks. [Citation Graph (, )][DBLP]


  127. Controlled Information Sharing in Collaborative Distributed Query Processing. [Citation Graph (, )][DBLP]


  128. Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases. [Citation Graph (, )][DBLP]


  129. Data Privacy - Problems and Solutions. [Citation Graph (, )][DBLP]


  130. A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy. [Citation Graph (, )][DBLP]


  131. An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing. [Citation Graph (, )][DBLP]


  132. Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. [Citation Graph (, )][DBLP]


  133. Protecting Information Privacy in the Electronic Society. [Citation Graph (, )][DBLP]


  134. Preserving confidentiality of security policies in data outsourcing. [Citation Graph (, )][DBLP]


  135. Towards securing XML Web services. [Citation Graph (, )][DBLP]


  136. An XML-based approach to combine firewalls and web services security specifications. [Citation Graph (, )][DBLP]


  137. Key management for multi-user encrypted databases. [Citation Graph (, )][DBLP]


  138. An access control model for querying XML data. [Citation Graph (, )][DBLP]


  139. Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems. [Citation Graph (, )][DBLP]


  140. Editorial. [Citation Graph (, )][DBLP]


  141. Managing key hierarchies for access control enforcement: Heuristic approaches. [Citation Graph (, )][DBLP]


Search in 0.020secs, Finished in 0.775secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002