Pierangela Samarati
Pierangela Samarati
Dirección de correo verificada de unimi.it - Página principal
Título
Citado por
Citado por
Año
Protecting respondents identities in microdata release
P Samarati
IEEE transactions on Knowledge and Data Engineering 13 (6), 1010-1027, 2001
24092001
Access control: Principles and practice
RS Sandhu, P Samarati
IEEE Communications Magazine 1 (994), 40-48, 1994
16321994
Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression
P Samarati, L Sweeney
technical report, SRI International, 1998
14181998
Access control: Policies, models, and mechanisms
P Samarati, S De Capitani di Vimercati
Foundations of Security Analysis and Design, 137-196, 2001
9422001
A reputation-based approach for choosing reliable resources in peer-to-peer networks
E Damiani, S De Capitani di Vimercati, S Paraboschi, P Samarati, ...
Proceedings of the 9th ACM conference on Computer and communications …, 2002
9372002
Generalizing data to provide anonymity when disclosing information
P Samarati, L Sweeney
PODS 98 (10.1145), 275487.275508, 1998
8901998
Database security
S Castano, MG Fugini, G Martella, P Samarati
Addison-Wesley, ACM Press Books, 1995
844*1995
Flexible support for multiple access control policies
S Jajodia, P Samarati, ML Sapino, VS Subrahmanian
ACM Transactions on Database Systems (TODS) 26 (2), 214-260, 2001
8362001
A fine-grained access control system for XML documents
E Damiani, S De Capitani di Vimercati, S Paraboschi, P Samarati
ACM Transactions on Information and System Security (TISSEC), 5 (2), 2002
7112002
A logical language for expressing authorizations
S Jajodia, P Samarati, VS Subrahmanian
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
6521997
Choosing reputable servents in a P2P network
F Cornelli, E Damiani, S De Capitani di Vimercati, S Paraboschi, ...
Proceedings of the 11th international conference on World Wide Web, 376-386, 2002
6502002
Over-encryption: management of access control evolution on outsourced data
S De Capitani di Vimercati, S Foresti, S Jajodia, S Paraboschi, P Samarati
Proceedings of the 33rd international conference on Very large data bases …, 2007
5262007
Balancing confidentiality and efficiency in untrusted relational DBMSs
E Damiani, S De Capitani di Vimercati, S Jajodia, S Paraboschi, ...
Proceedings of the 10th ACM conference on Computer and communications …, 2003
4652003
A Unified Framework for Enforcing Multiple Access Control Policies
S Jajodia, P Samarati, V Subrahmanian, E Bertino
Proc. of ACM SIGMOD Conference, 1997
4171997
An algebra for composing access control policies
P Bonatti, S De Capitani di Vimercati, P Samarati
ACM Transactions on Information and System Security (TISSEC) 5 (1), 1-35, 2002
4122002
Location privacy protection through obfuscation-based techniques
CA Ardagna, M Cremonini, E Damiani, S De Capitani di Vimercati, ...
Data and Applications Security XXI, 47-60, 2007
3482007
Securing XML documents
E Damiani, S De Capitani di Vimercati, S Paraboschi, P Samarati
Advances in Database Technology—EDBT 2000, 121-135, 2000
3272000
An access control model supporting periodicity constraints and temporal reasoning
E Bertino, C Bettini, E Ferrari, P Samarati
ACM Transactions on Database Systems (TODS) 23 (3), 231-285, 1998
3141998
Managing and sharing servents' reputations in P2P systems
E Damiani, S De Capitani di Vimercati, S Paraboschi, P Samarati
Knowledge and Data Engineering, IEEE Transactions on 15 (4), 840-854, 2003
2882003
A uniform framework for regulating service access and information release on the web
PA Bonatti, P Samarati
Journal of Computer Security 10 (3), 241-271, 2002
2702002
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20