Pierangela Samarati
Orcid: 0000-0001-7395-4620Affiliations:
- University of Milan, Italy
According to our database1,
Pierangela Samarati
authored at least 294 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2021, "For contributions to data security and privacy".
IEEE Fellow
IEEE Fellow 2012, "For contributions to information security, data protection, and privacy".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on dti.unimi.it
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., August, 2024
Guest Editorial Special Section on Security, Privacy and Trust for Consumer Smart Devices.
IEEE Trans. Consumer Electron., February, 2024
IEEE Trans. Dependable Secur. Comput., 2024
CoRR, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Tasks Scheduling with Load Balancing in Fog Computing: a Bi-level Multi-Objective Optimization Approach.
Proceedings of the Genetic and Evolutionary Computation Conference, 2024
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
2023
SN Comput. Sci., September, 2023
SN Comput. Sci., July, 2023
IEEE Trans. Big Data, June, 2023
IEEE Trans. Parallel Distributed Syst., 2023
Proceedings of the Artificial Intelligence Applications and Innovations. AIAI 2023 IFIP WG 12.5 International Workshops, 2023
2022
Data Security and Privacy in Emerging Scenarios.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Advances in Computing, Informatics, Networking and Cybersecurity, 2022
2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Towards Machine-Learning-Based 5G and Beyond Intelligent Networks: The MARSAL Project Vision.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
2020
Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning.
IEEE Trans. Parallel Distributed Syst., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020
2019
A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade.
ACM Comput. Surv., 2019
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019
2018
J. Comput. Secur., 2018
IEEE Internet Things J., 2018
Proceedings of the From Database to Cyber Security, 2018
Proceedings of the From Database to Cyber Security, 2018
Proceedings of the From Database to Cyber Security, 2018
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018
2017
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016
Proceedings of the International Conference on Internet of Things and Big Data, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
Proceedings of the Cloud Computing and Services Science - 6th International Conference, 2016
Security and Privacy in the Cloud.
Proceedings of the CLOSER 2016, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016
Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud.
Proceedings of the New Codebreakers, 2016
2015
Proceedings of the Handbook on Data Centers, 2015
ACM Trans. Storage, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Proceedings of the Data Management in Pervasive Systems, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
IEEE Internet Things J., 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014
Proceedings of the Secure Cloud Computing, 2014
Access Control.
Proceedings of the Computing Handbook, 2014
Database Security and Privacy.
Proceedings of the Computing Handbook, 2014
2013
ACM Trans. Internet Techn., 2013
J. Comput. Secur., 2013
Proceedings of the Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, 2013
Proceedings of the Foundations of Security Analysis and Design VII, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
2012
ACM Trans. Web, 2012
An OBDD approach to enforce confidentiality and visibility constraints in data publishing.
J. Comput. Secur., 2012
Modeling and preventing inferences from sensitive value distributions in data release.
J. Comput. Secur., 2012
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2012
Int. J. Inf. Priv. Secur. Integr., 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012
2011
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IEEE Trans. Serv. Comput., 2011
IEEE Trans. Dependable Secur. Comput., 2011
it Inf. Technol., 2011
Int. J. Digit. Multim. Broadcast., 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
Proceedings of the Foundations of Security Analysis and Design VI, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
2010
ACM Trans. Database Syst., 2010
ACM Trans. Inf. Syst. Secur., 2010
Proc. VLDB Endow., 2010
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project.
J. Comput. Secur., 2010
Comput. Secur., 2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Proceedings of the Security and Trust Management - 6th International Workshop, 2010
Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
Proceedings of the Computer Security, 2010
Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Protecting Information Privacy in the Electronic Society.
Proceedings of the SECRYPT 2009, 2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
Proceedings of the Computer Security, 2009
Proceedings of the Privacy in Location-Based Applications, 2009
Proceedings of the Privacy in Location-Based Applications, 2009
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients.
Proceedings of the Data and Applications Security XXIII, 2009
2008
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the Information Systems Security, Third International Conference, 2007
Proceedings of the Computer Security, 2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems.
J. Assoc. Inf. Sci. Technol., 2006
Proceedings of the Second International Workshop on Security and Trust Management, 2006
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the 6th International Conference on Web Engineering, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the Data and Applications Security XX, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
ACM Trans. Inf. Syst. Secur., 2005
Proceedings of the First International Workshop on Security and Trust Management, 2005
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005
Proceedings of the SWAP 2005, 2005
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005
Proceedings of the Secure Data Management, 2005
Proceedings of the Web Engineering, 5th International Conference, 2005
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005
Proceedings of the Databases in Networked Information Systems, 4th International Workshop, 2005
SSRI online First experiences in a three-years course degree offered in e-learning at the University of Milan.
Proceedings of the 11th International Conference on Distributed Multimedia Systems, 2005
Proceedings of the Data and Applications Security XIX, 2005
Proceedings of the Construction and Analysis of Safe, 2005
2004
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004
Proceedings of the 13th international conference on World Wide Web, 2004
Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), 2004
Proceedings of the Web Engineering - 4th International Conference, 2004
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004
An Open Digest-based Technique for Spam Detection.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004
2003
IEEE Trans. Knowl. Data Eng., 2003
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003
Proceedings of the Security Protocols, 2003
Proceedings of the Security Protocols, 2003
Proceedings of the 2nd International IEEE Security in Storage Workshop (SISW 2003), 2003
Proceedings of the 3rd Conference of the European Society for Fuzzy Logic and Technology, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
Logics for Authorization and Security.
Proceedings of the Logics for Emerging Applications of Databases [outcome of a Dagstuhl seminar], 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
ACM Trans. Inf. Syst. Secur., 2002
A Uniform Framework for Regulating Service Access and Information Release on the Web.
J. Comput. Secur., 2002
XML access control systems: a component-based approach.
Informatica (Slovenia), 2002
Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, 2002
Proceedings of the Eleventh International World Wide Web Conference, 2002
Proceedings of the Web Engineering and Peer-to-Peer Computing, 2002
Proceedings of the 32. Jahrestagung der Gesellschaft für Informatik, Informatik bewegt, INFORMATIK 2002, Dortmund, Germany, September 30, 2002
Proceedings of the 32. Jahrestagung der Gesellschaft für Informatik, Informatik bewegt, INFORMATIK 2002, Dortmund, Germany, September 30, 2002
Access Control of SVG Documents.
Proceedings of the Research Directions in Data and Applications Security, 2002
Privacy and Civil Liberties.
Proceedings of the Research Directions in Data and Applications Security, 2002
A reputation-based approach for choosing reliable resources in peer-to-peer networks.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
ACM Trans. Database Syst., 2001
IEEE Trans. Knowl. Data Eng., 2001
ACM Trans. Inf. Syst. Secur., 2001
Proceedings of the Tenth International World Wide Web Conference, 2001
An Access Control Model for Data Archives.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Panel on XML and Security.
Proceedings of the Database and Application Security XV, 2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
2000
Distributed Parallel Databases, 2000
Distributed Parallel Databases, 2000
Comput. Networks, 2000
Classifying Information for External Release.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Regulating Access To Semistructured Information on the Web.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the Foundations of Security Analysis and Design, 2000
Proceedings of the CCS 2000, 2000
Proceedings of the CCS 2000, 2000
1999
ACM Trans. Inf. Syst., 1999
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
Proceedings of the Eighteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, May 31, 1999
Proceedings of the Network and Distributed System Security Symposium, 1999
1998
ACM Trans. Database Syst., 1998
ACM Trans. Inf. Syst. Secur., 1998
Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model.
Theory Pract. Object Syst., 1998
Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 1998
Security and Privacy Issues for the World Wide Web: Panel Discussion.
Proceedings of the Database Security XII: Status and Prospects, 1998
1997
IEEE Trans. Knowl. Data Eng., 1997
IEEE Trans. Knowl. Data Eng., 1997
J. Comput. Secur., 1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Proceedings of the SIGMOD 1997, 1997
Security Issues in Data Warehousing and Data Mining: Panel Discussion.
Proceedings of the Database Securty XI: Status and Prospects, 1997
Authentication, Access Controls, and Intrusion Detection.
Proceedings of the Computer Science and Engineering Handbook, 1997
1996
IEEE Trans. Knowl. Data Eng., 1996
IEEE Trans. Knowl. Data Eng., 1996
Data Knowl. Eng., 1996
Data Knowl. Eng., 1996
Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control.
Proceedings of the VLDB'96, 1996
On Using Materialization Strategies for a Temporal Authorization Model.
Proceedings of the Workshop on Materialized Views: Techniques and Applications, 1996
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
A decentralized temporal autoritzation model.
Proceedings of the Information Systems Security, 1996
Proceedings of the 1996 Workshop on New Security Paradigms, 1996
Proceedings of the Computer Security, 1996
Proceedings of the CCS '96, 1996
1995
Distributed Parallel Databases, 1995
Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, USA, 1995
Panel Discussion: Role-Based Access Control and Next-Generation Security Models.
Proceedings of the Database Security IX: Status and Prospects, 1995
Database Security.
Addison-Wesley & ACM Press, ISBN: 0-201-59375-0, 1995
1994
Proceedings of the 1994 Workshop on New Security Paradigms, 1994
Proceedings of the 1994 Workshop on New Security Paradigms, 1994
A new Authorization Model for Object-Oriented Databases.
Proceedings of the Database Security, 1994
Proceedings of the CCS '94, 1994
1993
Proceedings of the Advanced Database Systems, 1993
Research Issues in Discretionary Authorizations for Object Bases.
Proceedings of the Security for Object-Oriented Systems, 1993
Enforcing Mandatory Access Control in Object Bases.
Proceedings of the Security for Object-Oriented Systems, 1993
Proceedings of the CCS '93, 1993
Proceedings of the CCS '93, 1993
1992
The Case for Independent Updates.
Proceedings of the Second Workshop on the Management of Replicated Data, 1992
Achieving Incremental Consistency among Autonomous Replicated Databases.
Proceedings of the IFIP WG 2.6 Database Semantics Conference on Interoperable Database Systems (DS-5), 1992
1991
Object Orientation in the Analysis of Work Oranization and Agent Co-operation.
Proceedings of the Dynamic Modelling of Information Systems II, 1991