|
Search the dblp DataBase
Pierangela Samarati:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino
A Unified Framework for Enforcing Multiple Access Control Policies. [Citation Graph (3, 12)][DBLP] SIGMOD Conference, 1997, pp:474-485 [Conf]
- Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
A Temporal Access Control Mechanism for Database Systems. [Citation Graph (3, 10)][DBLP] IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:67-80 [Journal]
- Pierangela Samarati, Elisa Bertino, Sushil Jajodia
An Authorization Model for a Distributed Hypertext System. [Citation Graph (3, 13)][DBLP] IEEE Trans. Knowl. Data Eng., 1996, v:8, n:4, pp:555-562 [Journal]
- Elisa Bertino, Pierangela Samarati, Sushil Jajodia
Authorizations in Relational Database Management Systems. [Citation Graph (2, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:130-139 [Conf]
- Elisa Bertino, Claudio Bettini, Pierangela Samarati
A Temporal Authorization Model. [Citation Graph (2, 0)][DBLP] ACM Conference on Computer and Communications Security, 1994, pp:126-135 [Conf]
- Stefano Ceri, Maurice A. W. Houtsma, Arthur M. Keller, Pierangela Samarati
Independent Updates and Incremental Agreement in Replicated Databases. [Citation Graph (2, 0)][DBLP] Distributed and Parallel Databases, 1995, v:3, n:3, pp:225-246 [Journal]
- Elisa Bertino, Fabio Origgi, Pierangela Samarati
A new Authorization Model for Object-Oriented Databases. [Citation Graph (1, 0)][DBLP] DBSec, 1994, pp:199-222 [Conf]
- Steven Dawson, Sabrina De Capitani di Vimercati, Pierangela Samarati
Specification and Enforcement of Classification and Inference Constraints. [Citation Graph (1, 0)][DBLP] IEEE Symposium on Security and Privacy, 1999, pp:181-195 [Conf]
- Elena Ferrari, Elisa Bertino, Claudio Bettini, Alberto Motta, Pierangela Samarati
On Using Materialization Strategies for a Temporal Authorization Model. [Citation Graph (1, 0)][DBLP] VIEWS, 1996, pp:34-42 [Conf]
- Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control. [Citation Graph (1, 6)][DBLP] VLDB, 1996, pp:472-483 [Conf]
- Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
Decentralized Administration for a Temporal Access Control Model. [Citation Graph (1, 0)][DBLP] Inf. Syst., 1997, v:22, n:4, pp:223-248 [Journal]
- Elisa Bertino, Sushil Jajodia, Pierangela Samarati
Database Security: Research and Practice [Citation Graph (1, 0)][DBLP] Inf. Syst., 1995, v:20, n:7, pp:537-556 [Journal]
- Elisa Bertino, Sushil Jajodia, Pierangela Samarati
Access Control in Object-Oriented Database Systems - Some Approaches and Issues. [Citation Graph (1, 0)][DBLP] , 1993, v:, n:, pp:17-44 [Journal]
- Elisa Bertino, Pierangela Samarati, Sushil Jajodia
An Extended Authorization Model for Relational Databases. [Citation Graph (1, 16)][DBLP] IEEE Trans. Knowl. Data Eng., 1997, v:9, n:1, pp:85-101 [Journal]
- Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. [Citation Graph (1, 18)][DBLP] ACM Trans. Database Syst., 1998, v:23, n:3, pp:231-285 [Journal]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
An Open Digest-based Technique for Spam Detection. [Citation Graph (0, 0)][DBLP] ISCA PDCS, 2004, pp:559-564 [Conf]
- Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
A Component-Based Architecture for Secure Data Publication. [Citation Graph (0, 0)][DBLP] ACSAC, 2001, pp:309-318 [Conf]
- Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
Managing Privacy in LBAC Systems. [Citation Graph (0, 0)][DBLP] AINA Workshops (2), 2007, pp:7-12 [Conf]
- Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
The Architecture of a Privacy-Aware Access Control Decision Component. [Citation Graph (0, 0)][DBLP] CASSIS, 2005, pp:1-15 [Conf]
- Elisa Bertino, Pierangela Samarati, Sushil Jajodia
High Assurance Discretionary Access Control for Object Bases. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:140-150 [Conf]
- Piero A. Bonatti, Pierangela Samarati
Regulating service access and information release on the Web. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:134-143 [Conf]
- Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati
A modular approach to composing access control policies. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:164-173 [Conf]
- Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
Supporting location-based conditions in access control policies. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:212-222 [Conf]
- Elisa Bertino, Sushil Jajodia, Pierangela Samarati
A Non-Timestamped Authorization Model for Data Management Systems. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1996, pp:169-178 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
Balancing confidentiality and efficiency in untrusted relational DBMSs. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2003, pp:93-102 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Fabio Violante
A reputation-based approach for choosing reliable resources in peer-to-peer networks. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2002, pp:207-216 [Conf]
- Pierangela Samarati, Paul Ammann, Sushil Jajodia
Propagation of Authorizations in Distributed Database Systems. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1994, pp:136-147 [Conf]
- Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
Trust management services in relational databases. [Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:149-160 [Conf]
- Piero A. Bonatti, Pierangela Samarati
Logics for Authorization and Security. [Citation Graph (0, 0)][DBLP] Logics for Emerging Applications of Databases, 2003, pp:277-323 [Conf]
- Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
Towards Privacy-Enhanced Authorization Policies and Languages. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:16-27 [Conf]
- Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati
Enhancing User Privacy Through Data Handling Policies. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:224-236 [Conf]
- David Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani M. Thuraisingham
Privacy and Civil Liberties. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:331-346 [Conf]
- Marco Cremonini, Ernesto Damiani, Pierangela Samarati
Semantics-Aware Perimeter Protection. [Citation Graph (0, 0)][DBLP] DBSec, 2003, pp:229-242 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Eduardo Fernández-Medina, Pierangela Samarati
Access Control of SVG Documents. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:219-230 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
XML Access Control Systems: A Component-Based Approach. [Citation Graph (0, 0)][DBLP] DBSec, 2000, pp:39-50 [Conf]
- Sylvia L. Osborn, Bhavani M. Thuraisingham, Pierangela Samarati
Panel on XML and Security. [Citation Graph (0, 0)][DBLP] DBSec, 2001, pp:317-323 [Conf]
- Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting
Panel Discussion: Role-Based Access Control and Next-Generation Security Models. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:289-298 [Conf]
- Bhavani M. Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier
Security and Privacy Issues for the World Wide Web: Panel Discussion. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:269-284 [Conf]
- Bhavani M. Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton
Security Issues in Data Warehousing and Data Mining: Panel Discussion. [Citation Graph (0, 0)][DBLP] DBSec, 1997, pp:3-16 [Conf]
- Shalendra Chhabra, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
A Protocol for Reputation Management in Super-Peer Networks. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2004, pp:979-983 [Conf]
- Sabrina De Capitani di Vimercati, Pierangela Samarati, Sushil Jajodia
Policies, Models, and Languages for Access Control. [Citation Graph (0, 0)][DBLP] DNIS, 2005, pp:225-237 [Conf]
- Stefano Ceri, Maurice A. W. Houtsma, Arthur M. Keller, Pierangela Samarati
Achieving Incremental Consistency among Autonomous Replicated Databases. [Citation Graph (0, 0)][DBLP] DS-5, 1992, pp:223-237 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
Securing XML Documents. [Citation Graph (0, 8)][DBLP] EDBT, 2000, pp:121-135 [Conf]
- Sabrina De Capitani di Vimercati, Pierangela Samarati
An Authorization Model for Federated Systems. [Citation Graph (0, 0)][DBLP] ESORICS, 1996, pp:99-117 [Conf]
- Pierangela Samarati, Sabrina De Capitani di Vimercati
Access Control: Policies, Models, and Mechanisms. [Citation Graph (0, 0)][DBLP] FOSAD, 2000, pp:137-196 [Conf]
- Pierangela Samarati
Enriching Access Control to Support Credential-Based Specifications. [Citation Graph (0, 0)][DBLP] GI Jahrestagung, 2002, pp:114-119 [Conf]
- Pierangela Samarati
Enriching Access Control to Support Credential-Based Specificatons. [Citation Graph (0, 0)][DBLP] GI Jahrestagung, 2002, pp:431-431 [Conf]
- Paolo Ceravolo, Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati
Advanced Metadata for Privacy-Aware Representation of Credentials. [Citation Graph (0, 0)][DBLP] ICDE Workshops, 2005, pp:1199- [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati
Extending Context Descriptions in Semantics-Aware Access Control. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:162-176 [Conf]
- Sabrina De Capitani di Vimercati, Pierangela Samarati
Privacy in the Electronic Society. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:1-21 [Conf]
- Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati
Offline Expansion of XACML Policies Based on P3P Metadata. [Citation Graph (0, 0)][DBLP] ICWE, 2005, pp:363-374 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati
Extending Policy Languages to the Semantic Web. [Citation Graph (0, 0)][DBLP] ICWE, 2004, pp:330-343 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati
Modality conflicts in semantics aware access control. [Citation Graph (0, 0)][DBLP] ICWE, 2006, pp:249-256 [Conf]
- Sabrina De Capitani di Vimercati, Patrick Lincoln, Livio Ricciulli, Pierangela Samarati
PGRIP: PNNI Global Routing Infrastructure Protection. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Fabrizio Cornelli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
Implementing a Reputation-Aware Gnutella Servent. [Citation Graph (0, 0)][DBLP] NETWORKING Workshops, 2002, pp:321-334 [Conf]
- Elisa Bertino, Sushil Jajodia, Pierangela Samarati
Enforcing Mandatory Access Control in Object Bases. [Citation Graph (0, 0)][DBLP] Security for Object-Oriented Systems, 1993, pp:96-116 [Conf]
- Elisa Bertino, Pierangela Samarati
Research Issues in Discretionary Authorizations for Object Bases. [Citation Graph (0, 0)][DBLP] Security for Object-Oriented Systems, 1993, pp:183-199 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
P2P-Based Collaborative Spam Detection and Filtering. [Citation Graph (0, 0)][DBLP] Peer-to-Peer Computing, 2004, pp:176-183 [Conf]
- Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati
Minimal Data Upgrading to Prevent Inference and Association. [Citation Graph (0, 12)][DBLP] PODS, 1999, pp:114-125 [Conf]
- Pierangela Samarati, Latanya Sweeney
Generalizing Data to Provide Anonymity when Disclosing Information (Abstract). [Citation Graph (0, 0)][DBLP] PODS, 1998, pp:188- [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
Metadata Management in Outsourced Encrypted Databases. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2005, pp:16-32 [Conf]
- Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Fulvio Frati, Pierangela Samarati
CAS++: An Open Source Single Sign-On Solution for Secure e-Services. [Citation Graph (0, 0)][DBLP] SEC, 2006, pp:208-220 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
Regulating Access To Semistructured Information on the Web. [Citation Graph (0, 0)][DBLP] SEC, 2000, pp:351-360 [Conf]
- Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati
Classifying Information for External Release. [Citation Graph (0, 0)][DBLP] SEC, 2000, pp:151-160 [Conf]
- Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati
A decentralized temporal autoritzation model. [Citation Graph (0, 0)][DBLP] SEC, 1996, pp:271-280 [Conf]
- Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
An Access Control Model for Data Archives. [Citation Graph (0, 0)][DBLP] SEC, 2001, pp:261-276 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Mario Finetti, Stefano Paraboschi, Pierangela Samarati, Sushil Jajodia
Implementation of a Storage Mechanism for Untrusted DBMSs. [Citation Graph (0, 0)][DBLP] IEEE Security in Storage Workshop, 2003, pp:38-46 [Conf]
- Elisa Bertino, Sushil Jajodia, Pierangela Samarati
Supporting Multiple Access Control Policies in Database Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1996, pp:94-107 [Conf]
- Elena Ferrari, Pierangela Samarati, Elisa Bertino, Sushil Jajodia
Providing flexibility in information flow control for object oriented systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:130-140 [Conf]
- Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian
A Logical Language for Expressing Authorizations. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:31-42 [Conf]
- Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati
Towards Flexible Credential Negotiation Protocols. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2003, pp:19-23 [Conf]
- Pierangela Samarati
Towards Flexible Credential Negotiation Protocols (Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2003, pp:24-27 [Conf]
- Stefano Ceri, Maurice A. W. Houtsma, Arthur M. Keller, Pierangela Samarati
The Case for Independent Updates. [Citation Graph (0, 0)][DBLP] Workshop on the Management of Replicated Data, 1992, pp:17-19 [Conf]
- Fabrizio Cornelli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
Choosing reputable servents in a P2P network. [Citation Graph (0, 0)][DBLP] WWW, 2002, pp:376-386 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
Fine grained access control for SOAP E-services. [Citation Graph (0, 0)][DBLP] WWW, 2001, pp:504-513 [Conf]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Andrea Tironi, Luca Zaniboni
Spam attacks: p2p to the rescue. [Citation Graph (0, 0)][DBLP] WWW (Alternate Track Papers & Posters), 2004, pp:358-359 [Conf]
- Elisa Bertino, Elena Pagani, Gian Paolo Rossi, Pierangela Samarati
Protecting information on the Web. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:11es, pp:3- [Journal]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
Design and implementation of an access control processor for XML documents. [Citation Graph (0, 0)][DBLP] Computer Networks, 2000, v:33, n:1-6, pp:59-75 [Journal]
- Ravi S. Sandhu, Pierangela Samarati
Authetication, Access Control, and Audit. [Citation Graph (0, 0)][DBLP] ACM Comput. Surv., 1996, v:28, n:1, pp:241-243 [Journal]
- Silvana Castano, Giancarlo Martella, Pierangela Samarati
Analysis, Comparison and Design of Role-Based Security Specifications. [Citation Graph (0, 0)][DBLP] Data Knowl. Eng., 1996, v:21, n:1, pp:31-55 [Journal]
- Pierangela Samarati, Paul Ammann, Sushil Jajodia
Maintaining Replicated Authorizations in Distributed Database Systems. [Citation Graph (0, 0)][DBLP] Data Knowl. Eng., 1996, v:18, n:1, pp:55-84 [Journal]
- Vijayalakshmi Atluri, Pierangela Samarati
Security of Data and Transaction Processing - Guest Editor's Introduction. [Citation Graph (0, 0)][DBLP] Distributed and Parallel Databases, 2000, v:8, n:1, pp:5-6 [Journal]
- Steven Dawson, Shelly Qian, Pierangela Samarati
Providing Security and Interoperation of Heterogeneous Systems. [Citation Graph (0, 0)][DBLP] Distributed and Parallel Databases, 2000, v:8, n:1, pp:119-145 [Journal]
- Claudio Agostino Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
A Web Service Architecture for Enforcing Access Control Policies. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:47-62 [Journal]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati, Marco Viviani
A WOWA-based Aggregation Technique on Trust Values Connected to Metadata. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2006, v:157, n:3, pp:131-142 [Journal]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
Selective Data Encryption in Outsourced Dynamic Environments. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:127-142 [Journal]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
Securing SOAP e-services. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2002, v:1, n:2, pp:100-115 [Journal]
- Ernesto Damiani, Pierangela Samarati, Sabrina De Capitani di Vimercati, Stefano Paraboschi
XML access control systems: a component-based approach. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
- Ernesto Damiani, Pierangela Samarati, Sabrina De Capitani di Vimercati, Stefano Paraboschi
Controlling Access to XML Documents. [Citation Graph (0, 0)][DBLP] IEEE Internet Computing, 2001, v:5, n:6, pp:18-28 [Journal]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
Managing Multiple and Dependable Identities. [Citation Graph (0, 0)][DBLP] IEEE Internet Computing, 2003, v:7, n:6, pp:29-37 [Journal]
- Roberto Aringhieri, Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems. [Citation Graph (0, 0)][DBLP] JASIST, 2006, v:57, n:4, pp:528-537 [Journal]
- Elisa Bertino, Fabio Origgi, Pierangela Samarati
An Extended Authorization Model for Object Databases. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1995, v:3, n:2/3, pp:169-206 [Journal]
- Piero A. Bonatti, Pierangela Samarati
A Uniform Framework for Regulating Service Access and Information Release on the Web. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2002, v:10, n:3, pp:241-272 [Journal]
- Sabrina De Capitani di Vimercati, Patrick Lincoln, Livio Ricciulli, Pierangela Samarati
Global Infrastructure Protection System. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2001, v:9, n:4, pp:251-284 [Journal]
- Sabrina De Capitani di Vimercati, Pierangela Samarati
Authorization Specification and Enforcement in Federated Database Systems. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1997, v:5, n:2, pp:155-188 [Journal]
- Steven Dawson, Sabrina De Capitani di Vimercati, Patrick Lincoln, Pierangela Samarati
Maximizing Sharing of Protected Information. [Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 2002, v:64, n:3, pp:496-541 [Journal]
- Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
Access control: principles and solutions. [Citation Graph (0, 0)][DBLP] Softw., Pract. Exper., 2003, v:33, n:5, pp:397-421 [Journal]
- Elisa Bertino, Elena Ferrari, Pierangela Samarati
Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model. [Citation Graph (0, 0)][DBLP] TAPOS, 1998, v:4, n:3, pp:183-204 [Journal]
- Pierangela Samarati, Michael K. Reiter, Sushil Jajodia
An authorization model for a public key management service. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2001, v:4, n:4, pp:453-482 [Journal]
- Elisa Bertino, Sabrina De Capitani di Vimercati, Elena Ferrari, Pierangela Samarati
Exception-Based Information Flow Control in Object-Oriented Systems. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 1998, v:1, n:1, pp:26-65 [Journal]
- Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati
An algebra for composing access control policies. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:1, pp:1-35 [Journal]
- Alberto Ceselli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
Modeling and assessing inference exposure in encrypted databases. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:1, pp:119-152 [Journal]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
A fine-grained access control system for XML documents. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:2, pp:169-202 [Journal]
- Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati
Managing and Sharing Servents' Reputations in P2P Systems. [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 2003, v:15, n:4, pp:840-854 [Journal]
- Pierangela Samarati
Protecting Respondents' Identities in Microdata Release. [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 2001, v:13, n:6, pp:1010-1027 [Journal]
- Pierangela Samarati, Elisa Bertino, Alessandro Ciampichetti, Sushil Jajodia
Information Flow Control in Object-Oriented Systems. [Citation Graph (0, 9)][DBLP] IEEE Trans. Knowl. Data Eng., 1997, v:9, n:4, pp:524-538 [Journal]
- Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian
Flexible support for multiple access control policies. [Citation Graph (0, 0)][DBLP] ACM Trans. Database Syst., 2001, v:26, n:2, pp:214-260 [Journal]
- Elisa Bertino, Sushil Jajodia, Pierangela Samarati
A Flexible Authorization Mechanism for Relational Data Management Systems. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst., 1999, v:17, n:2, pp:101-140 [Journal]
- Claudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati
Location Privacy Protection Through Obfuscation-Based Techniques. [Citation Graph (0, 0)][DBLP] DBSec, 2007, pp:47-60 [Conf]
- Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
Fragmentation and Encryption to Enforce Privacy in Data Storage. [Citation Graph (0, 0)][DBLP] ESORICS, 2007, pp:171-186 [Conf]
- Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
Over-encryption: Management of Access Control Evolution on Outsourced Data. [Citation Graph (0, 0)][DBLP] VLDB, 2007, pp:123-134 [Conf]
- Ernesto Damiani, Antonella Esposito, Maurizio Mariotti, Pierangela Samarati, Daniela Scaccia, Nello Scarabottolo
SSRI online First experiences in a three-years course degree offered in e-learning at the University of Milan. [Citation Graph (0, 0)][DBLP] DMS, 2005, pp:65-70 [Conf]
- Ernesto Damiani, S. David, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati
Open WorldReasoning inSemantics-Aware AccessControl: aPreliminaryStudy. [Citation Graph (0, 0)][DBLP] SWAP, 2005, pp:- [Conf]
- Sandro Etalle, Pierangela Samarati
Preface. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:179, n:, pp:1-2 [Journal]
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML. [Citation Graph (, )][DBLP]
A data outsourcing architecture combining cryptography and access control. [Citation Graph (, )][DBLP]
Assessing query privileges via safe and efficient permission composition. [Citation Graph (, )][DBLP]
Data protection in outsourcing scenarios: issues and directions. [Citation Graph (, )][DBLP]
Regulating Exceptions in Healthcare Using Policy Spaces. [Citation Graph (, )][DBLP]
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. [Citation Graph (, )][DBLP]
Protecting data privacy in outsourcing scenarios: invited talk. [Citation Graph (, )][DBLP]
Providing Mobile Users' Anonymity in Hybrid Networks. [Citation Graph (, )][DBLP]
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks. [Citation Graph (, )][DBLP]
Keep a Few: Outsourcing Data While Maintaining Confidentiality. [Citation Graph (, )][DBLP]
Access Control in Location-Based Services. [Citation Graph (, )][DBLP]
Privacy Preservation over Untrusted Mobile Networks. [Citation Graph (, )][DBLP]
Controlled Information Sharing in Collaborative Distributed Query Processing. [Citation Graph (, )][DBLP]
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases. [Citation Graph (, )][DBLP]
Data Privacy - Problems and Solutions. [Citation Graph (, )][DBLP]
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy. [Citation Graph (, )][DBLP]
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing. [Citation Graph (, )][DBLP]
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. [Citation Graph (, )][DBLP]
Protecting Information Privacy in the Electronic Society. [Citation Graph (, )][DBLP]
Preserving confidentiality of security policies in data outsourcing. [Citation Graph (, )][DBLP]
Towards securing XML Web services. [Citation Graph (, )][DBLP]
An XML-based approach to combine firewalls and web services security specifications. [Citation Graph (, )][DBLP]
Key management for multi-user encrypted databases. [Citation Graph (, )][DBLP]
An access control model for querying XML data. [Citation Graph (, )][DBLP]
Fuzzy logic techniques for reputation management in anonymous peer-to-peer systems. [Citation Graph (, )][DBLP]
Editorial. [Citation Graph (, )][DBLP]
Managing key hierarchies for access control enforcement: Heuristic approaches. [Citation Graph (, )][DBLP]
Search in 0.020secs, Finished in 0.775secs
|