Sabrina De Capitani di Vimercati
Orcid: 0000-0003-0793-3551Affiliations:
- University of Milan, Italy
According to our database1,
Sabrina De Capitani di Vimercati
authored at least 237 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on dti.unimi.it
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
2023
SN Comput. Sci., September, 2023
SN Comput. Sci., July, 2023
IEEE Trans. Big Data, June, 2023
IEEE Trans. Parallel Distributed Syst., 2023
2022
Proceedings of the Artificial Intelligence Applications and Innovations. AIAI 2022 IFIP WG 12.5 International Workshops, 2022
Proceedings of the Advances in Computing, Informatics, Networking and Cybersecurity, 2022
2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Proceedings of the Artificial Intelligence Applications and Innovations. AIAI 2021 IFIP WG 12.5 International Workshops, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020
2019
A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade.
ACM Comput. Surv., 2019
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019
2018
J. Comput. Secur., 2018
Proceedings of the From Database to Cyber Security, 2018
Proceedings of the From Database to Cyber Security, 2018
Proceedings of the From Database to Cyber Security, 2018
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018
2017
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 2nd IEEE International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow, 2016
Proceedings of the International Conference on Internet of Things and Big Data, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
Proceedings of the Cloud Computing and Services Science - 6th International Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016
Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud.
Proceedings of the New Codebreakers, 2016
2015
Proceedings of the Handbook on Data Centers, 2015
ACM Trans. Storage, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Proceedings of the Data Management in Pervasive Systems, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014
Proceedings of the Secure Cloud Computing, 2014
Access Control.
Proceedings of the Computing Handbook, 2014
Database Security and Privacy.
Proceedings of the Computing Handbook, 2014
2013
J. Comput. Secur., 2013
Proceedings of the Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, 2013
Proceedings of the Foundations of Security Analysis and Design VII, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
2012
ACM Trans. Web, 2012
An OBDD approach to enforce confidentiality and visibility constraints in data publishing.
J. Comput. Secur., 2012
Modeling and preventing inferences from sensitive value distributions in data release.
J. Comput. Secur., 2012
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2012
Int. J. Inf. Priv. Secur. Integr., 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012
2011
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IEEE Trans. Serv. Comput., 2011
IEEE Trans. Dependable Secur. Comput., 2011
it Inf. Technol., 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
Proceedings of the Foundations of Security Analysis and Design VI, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
2010
ACM Trans. Database Syst., 2010
ACM Trans. Inf. Syst. Secur., 2010
ACM Trans. Inf. Syst. Secur., 2010
Proc. VLDB Endow., 2010
Comput. Secur., 2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Proceedings of the Security and Trust Management - 6th International Workshop, 2010
Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the Privacy and Identity Management for Life, 2009
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
Proceedings of the Computer Security, 2009
Proceedings of the Privacy in Location-Based Applications, 2009
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients.
Proceedings of the Data and Applications Security XXIII, 2009
2008
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
ACM Trans. Inf. Syst. Secur., 2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the Information Systems Security, Third International Conference, 2007
Proceedings of the Computer Security, 2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
2006
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems.
J. Assoc. Inf. Sci. Technol., 2006
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the 6th International Conference on Web Engineering, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the Data and Applications Security XX, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
ACM Trans. Inf. Syst. Secur., 2005
Proceedings of the First International Workshop on Security and Trust Management, 2005
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005
Proceedings of the SWAP 2005, 2005
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005
Proceedings of the Secure Data Management, 2005
Proceedings of the Web Engineering, 5th International Conference, 2005
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005
Proceedings of the Databases in Networked Information Systems, 4th International Workshop, 2005
Proceedings of the Data and Applications Security XIX, 2005
Proceedings of the Construction and Analysis of Safe, 2005
2004
Proceedings of the First International Workshop on Views on Designing Complex Architectures, 2004
A comparison of modeling strategies in defining XML-based access control languages.
Comput. Syst. Sci. Eng., 2004
Proceedings of the 13th international conference on World Wide Web, 2004
Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), 2004
Proceedings of the Web Engineering - 4th International Conference, 2004
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
An Open Digest-based Technique for Spam Detection.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004
2003
IEEE Trans. Knowl. Data Eng., 2003
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003
Proceedings of the Security Protocols, 2003
Proceedings of the 2nd International IEEE Security in Storage Workshop (SISW 2003), 2003
Securing XML-based Multimedia Content.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003
Proceedings of the 3rd Conference of the European Society for Fuzzy Logic and Technology, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
ACM Trans. Inf. Syst. Secur., 2002
XML access control systems: a component-based approach.
Informatica (Slovenia), 2002
Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, 2002
Proceedings of the Eleventh International World Wide Web Conference, 2002
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002
Proceedings of the Web Engineering and Peer-to-Peer Computing, 2002
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002
Access Control of SVG Documents.
Proceedings of the Research Directions in Data and Applications Security, 2002
A reputation-based approach for choosing reliable resources in peer-to-peer networks.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
Ingénierie des Systèmes d Inf., 2001
Proceedings of the Tenth International World Wide Web Conference, 2001
An Access Control Model for Data Archives.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
An Interorganizational Knowledge Mediation Scheme for Information Sources over the Web.
Proceedings of the Nono Convegno Nazionale Sistemi Evoluti per Basi di Dati, 2001
An XML-based Interorganizational Knowledge Mediation Scheme to Support B2B Solution.
Proceedings of the Semantic Issues in E-Commerce Systems, 2001
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
2000
Comput. Networks, 2000
Classifying Information for External Release.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Regulating Access To Semistructured Information on the Web.
Proceedings of the Information Security for Global Information Infrastructures, 2000
A uniform framework for Web data modeling and integration.
Proceedings of the Ottavo Convegno Nazionale su Sistemi Evoluti per Basi di Dati, 2000
Proceedings of the Foundations of Security Analysis and Design, 2000
Proceedings of the CCS 2000, 2000
1999
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
Proceedings of the Eighteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, May 31, 1999
Proceedings of the Network and Distributed System Security Symposium, 1999
1998
ACM Trans. Inf. Syst. Secur., 1998
Information Integration on Multiple Heterogeneous Data Sources.
Proceedings of the Atti del Sesto Convegno Nazionale Sistemi Evolluti per Basi di Dati, 1998
Exploiting Schema Knowledge for the Integration of Heterogeneous Sorces.
Proceedings of the Atti del Sesto Convegno Nazionale Sistemi Evolluti per Basi di Dati, 1998
1997
J. Comput. Secur., 1997
J. Comput. Secur., 1997
1996
Proceedings of the 1996 Workshop on New Security Paradigms, 1996
Proceedings of the Computer Security, 1996