Seguir
Sara Foresti
Sara Foresti
Dirección de correo verificada de unimi.it - Página principal
Título
Citado por
Citado por
Año
Over-encryption: Management of access control evolution on outsourced data
SDC Di Vimercati, S Foresti, S Jajodia, S Paraboschi, P Samarati
Proceedings of the 33rd international conference on Very large data bases …, 2007
5992007
k-anonymity
V Ciriani, S Capitani di Vimercati, S Foresti, P Samarati
Secure Data Management in Decentralized Systems, 323-353, 2007
293*2007
Combining fragmentation and encryption to protect privacy in data storage
V Ciriani, SDCD Vimercati, S Foresti, S Jajodia, S Paraboschi, P Samarati
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-33, 2010
2672010
Encryption policies for regulating access to outsourced data
SDCD Vimercati, S Foresti, S Jajodia, S Paraboschi, P Samarati
ACM Transactions on Database Systems (TODS) 35 (2), 1-46, 2010
2052010
A data outsourcing architecture combining cryptography and access control
SDC Di Vimercati, S Foresti, S Jajodia, S Paraboschi, P Samarati
Proceedings of the 2007 ACM workshop on Computer security architecture, 63-69, 2007
1662007
Key management for multi-user encrypted databases
E Damiani, S di Vimercati, S Foresti, S Jajodia, S Paraboschi, P Samarati
Proceedings of the 2005 ACM workshop on Storage security and survivability …, 2005
1392005
Data privacy: Definitions and techniques
S De Capitani Di Vimercati, S Foresti, G Livraga, P Samarati
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems …, 2012
1372012
Keep a few: Outsourcing data while maintaining confidentiality
V Ciriani, S De Capitani di Vimercati, S Foresti, S Jajodia, S Paraboschi, ...
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
1312009
Efficient and private access to outsourced data
SDC di Vimercati, S Foresti, S Paraboschi, G Pelosi, P Samarati
2011 31st International Conference on Distributed Computing Systems, 710-719, 2011
1302011
Fragmentation and encryption to enforce privacy in data storage
V Ciriani, S De Capitani di Vimercati, S Foresti, S Jajodia, S Paraboschi, ...
Computer Security–ESORICS 2007, 171-186, 2007
1272007
Microdata protection
V Ciriani, S Capitani di Vimercati, S Foresti, P Samarati
Secure Data Management in Decentralized Systems, 291-321, 2007
1242007
k-Anonymous Data Mining: A Survey
V Ciriani, SDC Di Vimercati, S Foresti, P Samarati
Privacy-preserving data mining: models and algorithms, 105-136, 2008
113*2008
Managing and accessing data in the cloud: Privacy risks and approaches
SDC di Vimercati, S Foresti, P Samarati
2012 7th International Conference on Risks and Security of Internet and …, 2012
1122012
Access control policies and languages
S De Capitani Di Vimercati, S Foresti, P Samarati, S Jajodia
International Journal of Computational Science and Engineering 3 (2), 94-102, 2007
1002007
Access control for smarter healthcare using policy spaces
CA Ardagna, SDC Di Vimercati, S Foresti, TW Grandison, S Jajodia, ...
Computers & Security 29 (8), 848-858, 2010
892010
Preserving confidentiality of security policies in data outsourcing
S De Capitani di Vimercati, S Foresti, S Jajodia, S Paraboschi, G Pelosi, ...
Proceedings of the 7th ACM workshop on Privacy in the electronic society, 75-84, 2008
712008
Selective data encryption in outsourced dynamic environments
E Damiani, SDC Di Vimercati, S Foresti, S Jajodia, S Paraboschi, ...
Electronic Notes in Theoretical Computer Science 168, 127-142, 2007
692007
Encryption-based policy enforcement for cloud storage
SDC Di Vimercati, S Foresti, S Jajodia, S Paraboschi, G Pelosi, ...
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
662010
Fragmentation design for efficient query execution over sensitive distributed databases
V Ciriani, SDC di Vimercati, S Foresti, S Jajodia, S Paraboschi, ...
2009 29th IEEE International Conference on Distributed Computing Systems, 32-39, 2009
662009
Mix&Slice: Efficient access revocation in the cloud
E Bacis, S De Capitani di Vimercati, S Foresti, S Paraboschi, M Rosa, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
632016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20