Access control: Policies, models, and mechanisms P Samarati, S De Capitani di Vimercati Foundations of Security Analysis and Design, 137-196, 2001 | 1214 | 2001 |
A reputation-based approach for choosing reliable resources in peer-to-peer networks E Damiani, S De Capitani di Vimercati, S Paraboschi, P Samarati, ... Proceedings of the 9th ACM conference on Computer and communications …, 2002 | 1040 | 2002 |
A Fine-Grained Access Control System for XML Documents E Damiani, S De Capitani di Vimercati, S Paraboschi, P Samarati ACM Transactions on Information and System Security 5, 2002 | 770 | 2002 |
Choosing Reputable Servents in a P2P Network F Cornelli, E Damiani, S De Capitani di Vimercati, S Paraboschi, ... | 705 | 2002 |
Over-encryption: management of access control evolution on outsourced data S De Capitani di Vimercati, S Foresti, S Jajodia, S Paraboschi, P Samarati Proceedings of the 33rd international conference on Very large data bases …, 2007 | 599 | 2007 |
Balancing confidentiality and efficiency in untrusted relational DBMSs E Damiani, S De Capitani di Vimercati, S Jajodia, S Paraboschi, ... Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 528 | 2003 |
Global viewing of heterogeneous data sources S Castano, V De Antonellis, S De Capitani di Vimercati Knowledge and Data Engineering, IEEE Transactions on 13 (2), 277-297, 2001 | 465 | 2001 |
Location-privacy protection through obfuscation-based techniques C Ardagna, M Cremonini, E Damiani, S De Capitani di Vimercati, ... Proceedings of the 21st Annual IFIP WG 11, 2007 | 460 | 2007 |
An algebra for composing access control policies P Bonatti, S De Capitani di Vimercati, P Samarati ACM Transactions on Information and System Security (TISSEC) 5 (1), 1-35, 2002 | 454 | 2002 |
A manifesto for future generation cloud computing: Research directions for the next decade R Buyya, SN Srirama, G Casale, R Calheiros, Y Simmhan, B Varghese, ... ACM computing surveys (CSUR) 51 (5), 1-38, 2018 | 431 | 2018 |
Securing XML documents E Damiani, S De Capitani di Vimercati, S Paraboschi, P Samarati Advances in Database Technology—EDBT 2000, 121-135, 2000 | 342 | 2000 |
An obfuscation-based approach for protecting location privacy CA Ardagna, M Cremonini, SDC di Vimercati, P Samarati IEEE Transactions on Dependable and Secure Computing 8 (1), 13-27, 2009 | 325 | 2009 |
k-Anonymity V Ciriani, S De Capitani di Vimercati, S Foresti, P Samarati Secure Data Management in Decentralized Systems, 323-353, 2007 | 308* | 2007 |
Managing and sharing servants' reputations in P2P systems E Damiani, SDC Di Vimercati, S Paraboschi, P Samarati IEEE Transactions on Knowledge and Data Engineering 15 (4), 840-854, 2003 | 285 | 2003 |
Combining fragmentation and encryption to protect privacy in data storage V Ciriani, S De Capitani di Vimercati, S Foresti, S Jajodia, S Paraboschi, ... ACM Transactions on Information and System Security (TISSEC) 13 (3), 22, 2010 | 269 | 2010 |
Design and implementation of an access control processor for XML documents E Damiani, SDC Di Vimercati, S Paraboschi, P Samarati Computer Networks 33 (1-6), 59-75, 2000 | 269 | 2000 |
Supporting location-based conditions in access control policies CA Ardagna, M Cremonini, E Damiani, S De Capitani di Vimercati, ... Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006 | 225 | 2006 |
Data protection in outsourcing scenarios: issues and directions P Samarati, S De Capitani di Vimercati Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 212 | 2010 |
Encryption policies for regulating access to outsourced data S De Capitani di Vimercati, S Foresti, S Jajodia, S Paraboschi, P Samarati ACM Transactions on Database Systems (TODS) 35 (2), 12, 2010 | 206* | 2010 |
Fuzzy techniques for trust and reputation management in anonymous peer‐to‐peer systems R Aringhieri, E Damiani, S De Capitani di Vimercati, S Paraboschi, ... Journal of the American Society for Information Science and Technology 57 (4 …, 2006 | 200 | 2006 |