Stefano Paraboschi
Orcid: 0000-0003-0399-1738
According to our database1,
Stefano Paraboschi
authored at least 166 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on cs.unibg.it
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the IEEE International Conference on Communications, 2024
2023
IEEE Trans. Big Data, June, 2023
IEEE Trans. Parallel Distributed Syst., 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Proceedings of the 13th IEEE International Conference on Cloud Computing, 2020
2019
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
2018
J. Comput. Secur., 2018
Proceedings of the From Database to Cyber Security, 2018
Proceedings of the From Database to Cyber Security, 2018
Proceedings of the A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years., 2018
2017
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
Tiny Trans. Comput. Sci., 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016
2015
ACM Trans. Storage, 2015
A cache-aware mechanism to enforce confidentiality, trackability and access policy evolution in Content-Centric Networks.
Comput. Networks, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
Proceedings of the Data Management in Pervasive Systems, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014
2013
J. Comput. Secur., 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
2012
ACM Trans. Web, 2012
Int. J. Inf. Priv. Secur. Integr., 2012
Proceedings of the Information Security and Privacy Research, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IEEE Trans. Serv. Comput., 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
2010
ACM Trans. Database Syst., 2010
ACM Trans. Inf. Syst. Secur., 2010
Proc. VLDB Endow., 2010
Comput. Secur., 2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Proceedings of the Emerging Challenges for Security, 2009
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
Proceedings of the Computer Security, 2009
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients.
Proceedings of the Data and Applications Security XXIII, 2009
2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Bayesian-Networks-Based Misuse and Anomaly Prevention System.
Proceedings of the ICEIS 2008, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the Computer Security, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
2006
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems.
J. Assoc. Inf. Sci. Technol., 2006
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006
2005
ACM Trans. Inf. Syst. Secur., 2005
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005
Proceedings of the Secure Data Management, 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
2004
Proceedings of the 13th international conference on World Wide Web, 2004
Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), 2004
Proceedings of the 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August, 2004
An Open Digest-based Technique for Spam Detection.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004
Active XQuery.
Proceedings of the Web Dynamics - Adapting to Change in Content, Size, Topology and Use, 2004
2003
IEEE Trans. Knowl. Data Eng., 2003
IEEE Trans. Knowl. Data Eng., 2003
Proceedings of the 2nd International IEEE Security in Storage Workshop (SISW 2003), 2003
Proceedings of the 3rd Conference of the European Society for Fuzzy Logic and Technology, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Proceedings of the Multidimensional Databases: Problems and Solutions, 2003
2002
ACM Trans. Inf. Syst. Secur., 2002
XML access control systems: a component-based approach.
Informatica (Slovenia), 2002
Comput. Networks, 2002
Proceedings of the Eleventh International World Wide Web Conference, 2002
Proceedings of the Web Engineering and Peer-to-Peer Computing, 2002
A reputation-based approach for choosing reliable resources in peer-to-peer networks.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
Proceedings of the Tenth International World Wide Web Conference, 2001
2000
Comput. Networks, 2000
Regulating Access To Semistructured Information on the Web.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the Advances in Database Technology, 2000
1999
ACM Trans. Database Syst., 1999
Comput. Networks, 1999
Proceedings of the ACM SIGMOD Workshop on The Web and Databases, 1999
Proceedings of the VLDB'99, 1999
Proceedings of the Active Rules in Database Systems, 1999
McGraw-Hill Book Company, ISBN: 0-07-709500-6, 1999
1998
IEEE Trans. Knowl. Data Eng., 1998
Proceedings of the Query Languages Workshop, Boston, 1998
1997
Ordering and Selecting Production Rules for Constraint Maintenance: Complexity and Heuristic Solution.
IEEE Trans. Knowl. Data Eng., 1997
Proceedings of the VLDB'97, 1997
Proceedings of the Thirteenth International Conference on Data Engineering, 1997
Proceedings of the Deductive and Object-Oriented Databases, 5th International Conference, 1997
1996
Conservative Timestamp Revisited for Materialized View Maintenance in a Data Warehouse.
Proceedings of the Workshop on Materialized Views: Techniques and Applications, 1996
Active Rule Management in Chimera
Proceedings of the Active Database Systems: Triggers and Rules For Advanced Database Processing., 1996
1995
Addendum to "Automatic Generation of Production Rules for Integrity Maintenance".
ACM Trans. Database Syst., 1995
Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, 1995
Proceedings of the Rules in Database Systems, Second International Workshop, 1995
Proceedings of the Deductive and Object-Oriented Databases, 1995
Proceedings of the Deductive and Object-Oriented Databases, 1995
1994
ACM Trans. Database Syst., 1994
Proceedings of the Entity-Relationship Approach, 1994
Proceedings of the Applications of Databases, First International Conference, 1994
1993
Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, 1993
Automatic Rule Generation for Constraint Enforcement in Active Databases.
Proceedings of the Convegno SEBD'93, 1993
Proceedings of the Rules in Database Systems. Proceedings of the 1st International Workshop on Rules in Database Systems, Edinburgh, Scotland, 30 August, 1993
1992
IEEE Data Eng. Bull., 1992
Proceedings of the Modelling Database Dynamics, 1992
Integrity Maintenance Systems: An Architecture.
Proceedings of the Third International Workshop on the Deductive Approach to Information Systems and Databases, 1992