The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author s copyright. These works may not be reposted without the explicit permission of the copyright holder.

Publications

Books

Edited Books

  • G. Barte, E.P. Markatos, P. Samarati (eds.), Proc. of the 12th International Workshop on Security and Trust Management (STM 2016), Springer, 2016 [BibTex]
  • C. Callegari, M. van Sinderen, P.G. Sarigiannidis, P. Samarati, E. Cabello, P. Lorenz, M.S. Obaidat (eds.), Proc. of the 13th International Conference on Security and Cryptography (SECRYT 2016), SciTePress, 2016 [BibTex]
  • S. De Capitani di Vimercati (ed.), Proc. of the 15th Workshop on Privacy in the Electronic Society (WPES 2016), Vienna, Austria, October 24, 2016 [BibTex]
  • S. Foresti, G. Persiano (eds.), Cryptology and Network Security, Lecture Notes in Computer Science 10052, Springer, November 2016 [BibTex]
  • S. Foresti, J. Lopez (eds.), Information Security Theory and Practice, Lecture Notes in Computer Science 9895, Springer, September 2016 [BibTex]
  • G. Livraga, V. Torra, A. Aldini, F. Martinelli and N Suri (eds.), Data Privacy Management and Security Assurance (Proc. of DPM 2016 and QASA 2016), Springer, Heraklion, Crete, Greece, September 26-27, 2016 [BibTex]
  • S. Foresti (ed.), Security and Trust Management, Lecture Notes of Computer Science 9331, Springer, 2015 [BibTex]
  • M.S. Obaidat, P. Lorenz, P. Samarati (eds.), Proc. of the 12th International Conference on Security and Cryptography (SECRYT 2015), SciTePress, 2015 [BibTex]
  • P. Samarati (ed.), Proc. of the 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2015), Springer, 2015 [BibTex]
  • S. Jajodia, K. Kant, P. Samarati, A. Singhal, V. Swarup, C. Wang (eds.), Secure Cloud Computing, Springer, 2014 [BibTex]
  • M.S. Obaidat, A. Holzinger, P. Samarati (eds.), Proc. of International Conference on Security and Cryptography (SECRYPT 2014), SciTePress, 2014 [BibTex]
  • A.-R. Sadeghi, S. Foresti (eds.), Proc. of the 12th ACM Workshop on Privacy in the Electronic Society (WPES 2013), ACM, November 2013 [BibTex]
  • P. Samarati (ed.), Proc. of International Conference on Security and Cryptography (SECRYPT 2013), SciTePress, 2013 [BibTex]
  • S. Foresti, M. Yung, F. Martinelli (eds.), Computer Security - ESORICS 2012, Lecture Notes of Computer Science 7459, Springer, 2012 [BibTex]
  • F. Bao, P. Samarati, J. Zhou (eds.), Proc. of the 10th International Conference on Applied Cryptography and Network Security (ACNS 2012), Springer, 2012 [BibTex]
  • A. Josang, P. Samarati, M. Petrocchi (eds.), Proc. of the 8th International Workshop on Security and Trust Management (STM 2012), Springer, 2012 [BibTex]
  • P. Samarati, W. Lou, J. Zhou (eds.), Proc. of International Conference on Security and Cryptography (SECRYPT 2012), SciTePress, 2012 [BibTex]
  • C.A. Ardagna, J. Zhou (eds.), Proc.of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practice (WISTP 2011), Springer, June 1-3, 2011 [BibTex]
  • M. Li, G. Livraga (eds.), Proc. of the 2011 Workshop on Mobile and Online Social Networks (MOSN 2011), IEEE, Milan, Italy, September 8, 2011 [BibTex]
  • J. Lopez, P. Samarati (eds.), Proc. of International Conference on Security and Cryptography (SECRYPT 2011), SciTePress, 2011 [BibTex]
  • P. Samarati, S. Foresti, J. Hu, G. Livraga (eds.), Proc. of the 5th International Conference on Network and System Security (NSS 2011), IEEE, Milan, Italy, September 6-8, 2011 [BibTex]
  • J. Zhang, G. Livraga (eds.), Proc. of the 2011 International Conference on Data and Knowledge Engineering (ICDKE 2011), IEEE, Milan, Italy, September 6, 2011 [BibTex]
  • C. C. Zou, Y. Xiang, G. Livraga (eds.), Proc. of the 3rd International Workshop on Cyberspace Safety and Security (CSS 2011), IEEE, Milan, Italy, September 8, 2011 [BibTex]
  • S. Foresti, S. Jajodia (eds.), Data and Applications Security and Privacy XXIV, Lecture Notes of Computer Science 6166, Springer, 2010 [BibTex]
  • S.K. Katsikas, P. Samarati (eds.), Proc. of International Conference on Security and Cryptography (SECRYPT 2010), SciTePress, 2010 [BibTex]
  • C. Bettini, S. Jajodia, P. Samarati, X. Sean Wang (eds.), Privacy in Location-Based Applications: Research Issues and Emerging Trends, Springer, 2009 [BibTex]
  • P. Samarati, M. Yung, F. Martinelli, C.A. Ardagna (eds.), Proc. of the 12th Information Security Conference (ISC 2009), Springer, September 7-9, 2009 [BibTex]
  • S. Cimato, S. Jajodia, P. Samarati (eds.), Proceedings of the IFIP TC11 23rd International Information Security Conference (SEC 2008), Springer, Milano, Italy, September 8 - 10, 2008 [BibTex]
  • S. De Capitani di Vimercati, P. Syverson, D. Evans (eds.), Proc. of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, October 29 - November 2 2007 [BibTex]
  • J. Lopez, P. Samarati, J.L. Ferrer (eds.), Proc. of the 4th European PKI Workshop: Theory and Practice, Palma de Mallorca, Spain, June 28-30, 2007 [BibTex]
  • S. Etalle, P. Samarati (eds.), Proc. of the Second International Workshop on Security and Trust Management (STM 2006), Elsevier, Hamburg, Germany, September 20-21, 2006 [BibTex]
  • R.N. Wright, S. De Capitani di Vimercati, V. Shmatikov (eds.), Proc. of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, October 30 - November 3 2006 [BibTex]
  • S. De Capitani di Vimercati, R. Dingledine (eds.), Proc. of the ACM Workshop on Privacy in the Electronic Society, Alexandria, VA, USA, November 7, 2005 [BibTex]
  • S. De Capitani di Vimercati, P. Syverson, D. Gollmann (eds.), Computer Security - ESORICS 2005, Springer, 2005 [BibTex]
  • S. De Capitani di Vimercati, I. Ray, I. Ray (eds.), Data and Applications Security XVII - Status and Prospects, Kluwer Academic Publisher, 2004 [BibTex]
  • S. De Capitani di Vimercati, P. Syverson (eds.), Proc. of the ACM Workshop on Privacy in the Electronic Society, Washington, DC, USA, October 28, 2004 [BibTex]
  • C. Farkas, P. Samarati (eds.), "Research Directions in Data and Applications Security XVIII," in Proc. of the 18th IFIP WG11.3 Working Conference on Data and Applications Security, Sitges, Spain, 2004 [BibTex]
  • P. Samarati, P. Ryan, D. Gollmann, R. Molva (eds.), Computer Security - ESORICS 2004, Sophia Antipolis, France, September 2004 [BibTex]
  • D. Gritzalis, S. De Capitani di Vimercati, P. Samarati, S. Katsikas (eds.), Security and Privacy in the Age of Uncertainty, Kluwer, 2003 [BibTex]
  • P. Samarati, P. Syverson (eds.), Proc. of the Second ACM Workshop on Privacy in the Electronic Society, Washington, USA, October 30, 2003 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati (eds.), Proc. of the First ACM Workshop on Privacy in the Electronic Society, Washington, USA, November 21, 2002 [BibTex]
  • P. Samarati (ed.), Proc. of the Eighth ACM Conference on Computer and Communications Security, Philadelphia, PA (USA), November 5-8, 2001 [BibTex]
  • V. Atluri, P. Samarati (eds.), Security of Data and Transaction Processing, Kluwer, 2000 [BibTex]
  • D. Gritzalis, S. Jajodia, P. Samarati (eds.), Proc. of the Seventh ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000 [BibTex]
  • P. Samarati, R. Sandhu (eds.), Database Security X: Status and Prospects, Chapman and Hall, 1997 [BibTex]

International Journals Articles

Papers in Proceedings of International Conferences and Workshops

  • E. Bacis, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, M. Rosa, P. Samarati, "Distributed Shuffle Index in the Cloud: Implementation and Evaluation," in Proc. of the 4th IEEE International Conference on Cyber Security and Cloud Computing (IEEE CSCloud 2017), New York, USA, June 26-28, 2017 [BibTex]
  • A. Arman, S. Foresti, G. Livraga, P. Samarati, "A Consensus-based Approach for Selecting Cloud Plans," in Proc. of the 2nd International Forum on Research and Technologies for Society and Industry (RTSI 2016), Bologna, Italy, September 7-9, 2016 [BibTex]
  • E. Bacis, S. De Capitani di Vimercati, S. Foresti, D. Guttadoro, S. Paraboschi, M. Rosa, P. Samarati, A. Saullo, "Managing Data Sharing in OpenStack Swift with Over-Encryption," in Proc. of the 3rd ACM Workshop on Information Sharing and Collaborative Security (WISCS 2016), Vienna, Austria, October 24, 2016 [BibTex]
  • E. Bacis, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, M. Rosa, P. Samarati, "Mix&Slice: Efficient Access Revocation in the Cloud," in Proc. of the 23rd ACM Conference on Computer and Communication Security (CCS 2016), Vienna, Austria, October 24-28, 2016 [BibTex]
  • E. Bacis, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, M. Rosa, P. Samarati, "Access Control Management for Secure Cloud Storage," in Proc. of the 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, October 10-12, 2016 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, R. Moretti, S. Paraboschi, G. Pelosi, P. Samarati, "A Dynamic Tree-based Data Structure for Access Privacy in the Cloud," in Proc. of the 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016), Luxembourg, Luxembourg, December 12-15, 2016 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Access Control for the Shuffle Index," in Proc. of the 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016), Trento, Italy, July 18-21, 2016 [BibTex]
  • S. De Capitani di Vimercati, G. Livraga, V. Piuri, "Application Requirements with Preferences in Cloud-based Information Processing," in Proc. of the 2nd International Forum on Research and Technologies for Society and Industry (RTSI 2016), Bologna, Italy, September 7-9, 2016 [BibTex]
  • S. De Capitani di Vimercati, G. Livraga, V. Piuri and P. Samarati, G.A. Soares, "Supporting Application Requirements in Cloud-based IoT Information Processing," in Proc. of the International Conference on Internet of Things and Big Data (IoTBD 2016), Rome, Italy, April 23-25, 2016 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Integrity for Approximate Joins on Untrusted Computational Servers," in Proc. of the 30th International Information Security and Privacy Conference (SEC 2015), Hamburg, Germany, May 26-28, 2015 [BibTex]
  • S. Foresti, V. Piuri, G.A. Soares, "On the Use of Fuzzy Logic in Dependable Cloud Management," in Proc. of the 3rd IEEE Conference on Communications and Network Security (CNS 2015), Florence, Italy, September 28-30, 2015 (poster) [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, "Integrity for Distributed Queries," in Proc. of the 2nd IEEE Conference on Communications and Network Security (CNS 2014), San Francisco, CA, USA, October 29-31, 2014 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Optimizing Integrity Checks for Join Queries in the Cloud," in Proc. of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria, July 14-16, 2014 (best paper award) [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Protecting Access Confidentiality with Data Distribution and Swapping," in Proc. of the 4th IEEE International Conference on Big Data and Cloud Computing (BDCloud 2014), Sydney, Australia, December 3-5, 2014 [BibTex]
  • P. Samarati, "Data Security and Privacy in the Cloud," in Proc. of 10th International Conference on Information Security Practice and Experience (ISPEC 2014), Fuzhou, China, May 5-8, 2014 [BibTex]
  • M. Albanese, S. Jajodia, R. Jhawar, V. Piuri, "Reliable Mission Deployment in Vulnerable Distributed Systems," in Proc. of the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-RSDA 2013), Budapest, Hungary, June 24-27, 2013 [BibTex]
  • R. Jhawar, V. Piuri, "Adaptive Resource Management for Balancing Availability and Performance in Cloud Computing," in Proc. of the 10th International Conference on Security and Cryptography (SECRYPT 2013), Reykjavik, Iceland, July 29-31, 2013 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, "Extending Loose Associations to Multiple Fragments," in Proc. of the 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2013), Newark, NJ, USA, July 15-17, 2013 (best paper runner-up award) [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "On Information Leakage by Indexes over Data Fragments," in Proc. of the 1st International Workshop on Privacy-Preserving Data Publication and Analysis (PrivDB 2013), Brisbane, Australia, April 8, 2013 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Distributed Shuffling for Preserving Access Confidentiality," in Proc. of the 18th European Symposium on Research in Computer Security (ESORICS 2013), Egham, U.K., September 9-11, 2013 [BibTex]
  • C.A. Ardagna, E. Damiani, R. Jhawar, V. Piuri, "A Model-Based Approach to Reliability Certification of Services," in Proc. of the 6th IEEE International Conference on Digital Ecosystem Technologies - Complex Environment Engineering (DEST-CEE 2012), Campione d'Italia, Italy, June 2012 [BibTex]
  • R. Jhawar, V. Piuri, "Fault Tolerance Management in IaaS Clouds," in Proc. of the 1st IEEE-AESS Conference in Europe about Space and Satellite Telecommunications (ESTEL 2012), Rome, Italy, October 2-5, 2012 [BibTex]
  • R. Jhawar, V. Piuri, M. Santambrogio, "A Comprehensive Conceptual System-Level Approach to Fault Tolerance in Cloud Computing," in 2012 IEEE International Systems Conference (SysCon 2012), Vancouver, BC, Canada, March 19-22, 2012 [BibTex]
  • C.A. Ardagna, G. Livraga, P. Samarati, "Protecting Privacy of User Information in Continuous Location-Based Services," in Proc. of the 15th IEEE International Conference on Computational Science and Engineering (CSE 2012), Paphos, Cyprus, December 5-7, 2012 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, "Enforcing Subscription-based Authorization Policies in Cloud Scenarios," in Proc. of the 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2012), Paris, France, July 11-13, 2012 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Support for Write Privileges on Outsourced Data," in Proc. of the 27th IFIP TC-11 International Information Security and Privacy Conference (SEC 2012), Heraklion, Crete, Greece, June 4-6, 2012 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Managing and Accessing Data in the Cloud: Privacy Risks and Approaches," in Proc. of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012), Cork, Ireland, October 10-12, 2012 [BibTex]
  • S. De Capitani di Vimercati, G. Livraga, V. Piuri, F. Scotti, "Privacy and Security in Environmental Monitoring Systems," in Proc. of the 1st IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL 2012), Rome, Italy, October 2-5, 2012 [BibTex]
  • R. Jhawar, V. Piuri, P. Samarati, "Supporting Security Requirements for Resource Management in Cloud Computing," in Proc. of the 15th IEEE International Conference on Computational Science and Engineering (CSE 2012), Paphos, Cyprus, December 5-7, 2012 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, "Privacy in Data Publishing," in Data Privacy Management and Autonomous Spontaneous Security, J. Garcia-Alfaro, G. Navarro-Arribas, A. Cavalli and J. Leneutre (eds.), Springer, 2011 (invited) [BibTex]
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach," in Proc. of the 25th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2011), Richmond, VA, USA, July 11-13, 2011 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Private Data Indexes for Selective Access to Outsourced Data," in Proc. of the 10th Workshop on Privacy in the Electronic Society (WPES 2011), Chicago, Illinois, USA, October 17, 2011 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Supporting Concurrency in Private Data Outsourcing," in Proc. of the 16th European Symposium on Research in Computer Security (ESORICS 2011), Leuven, Belgium, September 12-14, 2011 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Efficient and Private Access to Outsourced Data," in Proc. of the 31st International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, Minnesota, USA, June 20-24, 2011 [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, S. Foresti, G. Neven, S. Paraboschi, F.-S. Preiss, P. Samarati, M. Verdicchio, "Fine-Grained Disclosure of Access Policies," in Proc. of the 12th International Conference on Information and Communications Security (ICICS 2010), Barcelona, Spain, December 15-17, 2010 [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Minimizing Disclosure of Private Information in Credential-Based Interactions: A Graph-Based Approach," in Proc. of the 2nd IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2010), Minneapolis, Minnesota, USA, August 20-22, 2010 [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Supporting User Privacy Preferences on Information Release in Open Scenarios," in Proc. of the W3C Workshop on Privacy and Data Usage Control, Cambridge, Massachusetts, USA, October 4-5, 2010 [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Supporting Privacy Preferences in Credential-Based Interactions," in Proc. of the Workshop on Privacy in the Electronic Society (WPES 2010), Chicago, Illinois, USA, October 4, 2010 [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, G. Neven, S. Paraboschi, F.-S. Preiss, P. Samarati, M. Verdicchio, "Enabling Privacy-Preserving Credential-Based Access Control with XACML and SAML," in Proc. of the 3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2010), Bradford, UK, June-July 2010 [BibTex]
  • C.A. Ardagna, S. Jajodia, P. Samarati, A. Stavrou, "Providing mobile users' anonymity in hybrid networks," in Proc. 15th European Symposium on Research in Computer Security (ESORICS 2010), Athens, Greece, September 2010 [BibTex]
  • M. Bezzi, S. De Capitani di Vimercati, G. Livraga, P. Samarati, "Protecting Privacy of Sensitive Value Distributions in Data Release," in Proc. of the 6th Workshop on Security and Trust Management (STM 2010), Athens, Greece, September 23-24, 2010 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Pelosi, P. Samarati, "Encryption-based Policy Enforcement for Cloud Storage," in Proc. of the 1st ICDCS Workshop on Security and Privacy in Cloud Computing (SPCC 2010), Genova, Italy, June 25, 2010 [BibTex]
  • P. Samarati, S. De Capitani di Vimercati, "Data Protection in Outsourcing Scenarios: Issues and Directions," in Proc. of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, April 2010 (invited paper) [BibTex]
  • C.A. Ardagna, L. Bussard, S. De Capitani di Vimercati, G. Neven, E. Pedrini, S. Paraboschi, F. Preiss, P. Samarati, S. Trabelsi, M. Verdicchio, "PrimeLife Policy Language," in Proc. of the W3C Workshop on Access Control Application Scenarios, Luxembourg, November 17-18, 2009 [BibTex]
  • C. A. Ardagna, S. De Capitani di Vimercati, S. Paraboschi, E. Pedrini, P. Samarati, "An XACML-Based Privacy-Centered Access Control System," in Proc. of the 1st ACM Workshop on Information Security Governance (WISG 2009), Chicago, Illinois, USA, November 13, 2009 [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, E. Pedrini, S. Paraboschi, P. Samarati, M. Verdicchio, "Extending XACML for Open Web-based Scenarios," in Proc. of the W3C Workshop on Access Control Application Scenarios, Luxembourg, November 17-18, 2009 [BibTex]
  • C. Blundo, S. Cimato, S. De Capitani di Vimercati, A. De Santis, S. Foresti, S. Paraboschi, P. Samarati, "Efficient Key Management for Enforcing Access Control in Outsourced Scenarios," in Proc. of the 24th IFIP TC-11 International Information Security Conference (SEC 2009), Cyprus, Greece, May 18-20, 2009 [BibTex]
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients," in Proc. of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2009), Montreal, Quebec, Canada, July 12-15, 2009 [BibTex]
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Keep a Few: Outsourcing Data while Maintaining Confidentiality," in Proc. of the 14th European Symposium On Research In Computer Security (ESORICS 2009), Saint Malo, France, September 21-25, 2009 [BibTex]
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases," in Proc. of the 29th International Conference on Distributed Computing Systems (ICDCS 2009), Montreal, Quebec, Canada, June 22-26, 2009 [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, T. Grandison, S. Jajodia, P. Samarati, "Regulating Exceptions in Healthcare using Policy Spaces," in Proc. of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2008), London, U.K., July 13-16, 2008 [BibTex]
  • C.A. Ardagna, A.Stavrou, S.Jajodia, P.Samarati, R. Martin, "A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks," in Proc. of the International Workshop on Privacy in Location-Based Applications (PILBA 2008), Malaga, Spain, October 9, 2008 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Pelosi, P. Samarati, "Preserving Confidentiality of Security Policies in Data Outsourcing," in Proc. of the Workshop on Privacy in the Electronic Society (WPES 2008), Alexandria, Virginia, USA, October 27, 2008 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Assessing Query Privileges via Safe and Efficient Permission Composition," in Proc. of the 15th ACM Conference Conference on Computer and Communications Security (CCS 2008), Alexandria, Virginia, USA, October 27-31, 2008 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Controlled Information Sharing in Collaborative Distributed Query Processing," in Proc. of the 28th International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China, June 17-20, 2008 [BibTex]
  • C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Location Privacy Protection Through Obfuscation-based Techniques," in Proc. of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2007), Redondo Beach, CA, USA, July 8-11, 2007 [BibTex]
  • C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Managing Privacy in LBAC Systems," in Proc. of the Second IEEE International Symposium on Pervasive Computing and Ad Hoc Communications (PCAC 2007), Niagara Falls, Canada, May 2007 [BibTex]
  • C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy," in Proc. of the 22nd IFIP TC-11 International Information Security Conference (SEC 2007), Sandton, South Africa, May 14-16, 2007 [BibTex]
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Fragmentation and Encryption to Enforce Privacy in Data Storage," in Proc. of the 12th European Symposium On Research In Computer Security (ESORICS 2007), Dresden, Germany, September 24-26, 2007 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "An experimental evaluation of multi-key strategies for data outsourcing," in Proc. of the 22nd IFIP TC-11 International Information Security Conference (SEC 2007), Sandton, South Africa, May 14-16, 2007 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "A Data Outsourcing Architecture Combining Cryptography and Access Control," in Proc. of the 1st Computer Security Architecture Workshop (CSAW 2007), Fairfax, Virginia, USA, November 2, 2007 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Over-encryption: Management of Access Control Evolution on Outsourced Data," in Proc. of the 33rd International Conference on Very Large Data Bases (VLDB 2007), Vienna, Austria, September 23-28, 2007 [BibTex]
  • S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, P. Samarati, "Trust Management Services in Relational Databases," in Proc. of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), Singapore, March 20-22, 2007 [BibTex]
  • M. Anisetti, C.A. Ardagna, V. Bellandi, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "OpenAmbient: a Pervasive Access Control Architecture," in Proc. of ETRICS Workshop on Security in Autonomous Systems (SecAS), Friburg, Germany, June 2006 [BibTex]
  • C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Supporting Location-Based Conditions in Access Control Policies," in Proc. of the ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS 2006), Taipei, Taiwan, March 21-24, 2006 [BibTex]
  • C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Negotiation Protocols for LBAC Systems," in Proc. of 1st International Conference on Information Security and Computer Forensics (ISCF 2006), Chennai, India, December 6-8, 2006 [BibTex]
  • C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Location-based Metadata and Negotiation Protocols for LBAC in a One-to-Many Scenario," in Proc. of the Workshop On Security and Privacy in Mobile and Wireless Networking (SecPri MobiWi 2006), Coimbra, Portogal, May 19, 2006 [BibTex]
  • C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, F. Frati, P. Samarati, "CAS++: an Open Source Single Sign-On Solution for Secure e-Services," in Proc. of the 21st IFIP TC-11 International Information Security Conference, Karlstad, Sweden, May 22-24, 2006 [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, P. Samarati, "Enhancing User Privacy Through Data Handling Policies," in Proc. of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2006), Sophia Antipolis, France, July-August 2006 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Selective Data Encryption in Outsourced Dynamic Environments," in Proc. of the 2nd International Workshop on Views On Designing Complex Architectures (VODCA 2006), Bertinoro, Italy, September 16-17, 2006 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, C. Fugazza, P. Samarati, "Extending Context Descriptions in Semantics-Aware Access Control," in Proc. of the 2nd International Conference on Information Systems Security (ICISS 2006), Kolkata, India, December 17-21, 2006 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, C. Fugazza, P. Samarati, "Modality Conflicts in Semantics-Aware Access Control," in Proc. of the International Conference on Web Engineering, Menlo Park, California, USA, July 12-14, 2006 [BibTex]
  • S. De Capitani di Vimercati, A. Ferrero, M. Lazzaroni, "A Mobile Agent Platform for Remote Measurements," in Proc. of the IEEE Instrumentation and Measurement Technology Conference, Ottawa, Ontario, Canada, May 17-19, 2005 [BibTex]
  • C.A. Ardagna, E. Damiani, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "The Architecture of a Privacy-aware Access Control Decision Component," in Proc. of the Construction and Analysis of Safe, Secure and Interoperable Smart devices (CASSIS 2005), Nice, France, March 8-11, 2005 [BibTex]
  • C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, M. Cremonini, P. Samarati, "Towards Identity Management for E-Services," in Proc. of the TED Conference on e-Government Electronic democracy: The challenge ahead (poster session), Bolzano, Italy, March 2005 [BibTex]
  • C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, C. Fugazza, P. Samarati, "Offline Expansion of XACML Policies Based on P3P Metadata," in Proc. of the 5th International Conference on Web Engineering, Sydney, Australia, July 25-29, 2005 [BibTex]
  • R. Aringhieri, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Assessing Efficiency of Trust Management in Peer-to-Peer Systems," in Proc. of the 1st International Workshop on Collaborative Peer-to-Peer Information Systems (COPS 2005), Linkoping University, Sweden, June 13-15, 2005 [BibTex]
  • C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Towards Privacy-Enhanced Authorization Policies and Languages," in Proc. of the 19th IFIP WG11.3 Working Conference on Data and Application Security, Nathan Hale Inn, University of Connecticut, Storrs, USA, August 7-10, 2005 [BibTex]
  • P. Ceravolo, E. Damiani, S. De Capitani di Vimercati, C. Fugazza, P. Samarati, "Advanced Metadata for Privacy-Aware Representation of Credentials," in Proc. of the International Workshop on Privacy Data Management, Tokyo, Japan, April 8-9, 2005 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Metadata Management in Outsourced Encrypted Databases," in Proc. of the 2nd VLDB Workshop on Secure Data Management (SDM 2005), Trondheim, Norway, September 2-3, 2005 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, P. Samarati, "Key Management for Multiuser Encrypted Databases," in Proc. of the International Workshop on Storage Security and Survivability, Fairfax, Virginia, USA, November 11, 2005 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, M. Viviani, "Measuring Inference Exposure in Outsourced Encrypted Databases," in Proc. of the 1st Workshop on Quality of Protection (QoP 2005), Milan, Italy, September 15, 2005 (short paper) [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, P. Samarati, "New Paradigms for Access Control in Open Environments," in Proc. of the 5th IEEE International Symposium on Signal Processing and Information, Athens, Greece, December 18-21, 2005 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, P. Samarati, M. Viviani, "A WOWA-based Aggregation Technique on Trust Values Connected to Metadata," in Proc. of the1st International Workshop on Security and Trust Management (STM 2005), Milan, Italy, September 15, 2005 [BibTex]
  • S. De Capitani di Vimercati, S. Marrara, P. Samarati, "An Access Control Model for Querying XML Data," in Proc. of the ACM Workshop on Secure Web Services (SWS 2005), Fairfax, VA, USA, November 11, 2005 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, S. Jajodia, "Policies, Models, and Languages for Access Control," in Proc. of the Workshop on Databases in Networked Information Systems, Aizu-Wakamatsu, Japan, March 28-30, 2005 [BibTex]
  • C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "A Web Service Architecture for Enforcing Access Control Policies," in Proc. of the First International Workshop on Views On Designing Complex Architectures (VODCA 2004), Bertinoro, Italy, September 11-12, 2004 [BibTex]
  • S. Chhabra, E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "A Protocol for Reputation Management in Super-Peer Networks," in Proc. of the 1st International Workshop on Peer2Peer Data Management, Security and Trust, Zaragoza, Spain, August - September 2004 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, C. Fugazza, P. Samarati, "Extending Policy Languages to the Semantic Web," in Proc. of the International Conference on Web Engineering, Munich, Germany, July 28-30, 2004 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Computing Range Queries on Obfuscated Data," in Proc. of the Information Processing and Management of Uncertainty in Knowledge-Based Systems, Perugia, Italy, July 2004 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "P2P-based Collaborative Spam Detection and Filtering," in Proc. of the fourth IEEE International Conference on Peer-to-Peer Computing, Zurich, Switzerland, August 25-27, 2004 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "An Open Digest-based Technique for Spam Detection," in Proc. of the 2004 International Workshop on Security in Parallel and Distributed Systems, San Francisco, CA, USA, September 15-17, 2004 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, A. Tironi, L. Zaniboni, "Spam Attacks: P2P to the Rescue," in Poster Proceedings of the 13th World Wide Web Conference, New York City, USA, May 2004 [BibTex]
  • P. Bonatti, S. De Capitani di Vimercati, P. Samarati, "Towards Flexible Credential Negotiation Protocols," in Proc. of the Eleventh Cambridge International Workshop on Security Protocols, Cambridge, England, April 2003 [BibTex]
  • M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "An XML-based Approach to Combine Firewalls and Web Services Security Specifications," in Proc. of the ACM Workshop on XML Security, Washington, DC, USA, October 2003 [BibTex]
  • M. Cremonini, E. Damiani, P. Samarati, "Semantic-Aware Perimeter Protection," in Proc. of the 17th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, Estes Park, CO, USA, August 2003 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, "Securing XML-based Multimedia Content," in Proc. of the 18th IFIP International Information Security Conference, Athens, Greece, May 2003 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, P. Samarati, "Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs," in Proc. of the 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington, DC, USA, October 2003 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, M. Pesenti, P. Samarati, S. Zara, "Fuzzy Logic Techniques for Reputation Management in Anonymous Peer-to-Peer Systems," in Proc. of the 3rd International Conference in Fuzzy Logic and Technology, Zittau, Germany, September 2003 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, M. Finetti, S. Jajodia, S. Paraboschi, P. Samarati, "Implementation of a Storage Mechanism for Untrusted DBMSs," in Proc. of the Second International IEEE Security in Storage Workshop, Washington, DC, USA, October 2003 [BibTex]
  • E. Fernandez-Medina, G. Ruiz, S. De Capitani di Vimercati, "Implementing an Access Control System for SVG Documents," in Proc. of the Workshop for Metadata Security, Catania, Sicily, Italy, November 2003 [BibTex]
  • S. Castano, V. De Antonellis, S. De Capitani di Vimercati, M. Melchiori, "Semi-automated Extraction of Ontological Knowledge from XML Data Sources," in Proc. of the 2nd International Workshop on Electronic Business Hubs: XML, Metadata, Ontologies, and Business Knowledge on the Web (WEBH2002), Aix En Provence, France, September 2002 [BibTex]
  • F. Cornelli, E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Implementing a Reputation-Aware Gnutella Servent," in Proc. of the International Workshop on Peer-to-Peer Computing, Pisa, Italy, May 2002 [BibTex]
  • F. Cornelli, E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P . Samarati, "Choosing Reputable Servents in a P2P Network," in Proc. of the 11th International World Wide Web Conference, Honolulu, Hawaii, May 2002 [BibTex]
  • S. De Capitani di Vimercati, "An Authorization Model for Temporal XML Documents," in Proc. of the 17th ACM Symposium on Applied Computing, Madrid, Spain, March 2002 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, E. Fernandez-Medina, P. Samarati, "An Access Control System for SVG Documents," in in Proc. of the 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security (DBSec 2002), King's College, University of Cambridge, UK, July 2002 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, F. Violante, "A Reputation-based Approach for Choosing Reliable Resources in Peer-to-Peer Networks," in Proc. of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, DC, USA, November 2002 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Towards Securing XML Web Services," in Proc. of the 2002 ACM Workshop on XML Security, Washington, DC, USA, November 2002 [BibTex]
  • P. Bonatti, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "A Component-based Architecture for Secure Data Publication," in Proc. of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, December 2001 [BibTex]
  • P. Bonatti, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "An Access Control Model for Data Archives," in Proc. of the 16th International Conference on Information Security, Paris, France, June 2001 [BibTex]
  • S. Castano, V. De Antonellis, S. De Capitani di Vimercati, "An XML-based Interorganizational Knowledge Mediation Scheme to Support B2B Solutions," in Proc. of the 9th IFIP 2.6 Working Conference on Database Sematics (DS-9), Hong Kong, China, April 2001 [BibTex]
  • S. Castano, V. De Antonellis, S. De Capitani di Vimercati, M. Melchiori, "Data Integration for Web-based Systems," in Proc. of the 7th International Conference on Reverse Engineering for Information Systems (ReTIS'2001), Paris, France, July 2001 [BibTex]
  • S. Castano, V. De Antonellis, S. De Capitani di Vimercati, M. Melchiori, "Designing a Three-Layer Ontology in a Web-based Interconnection Scenario," in Proc. of the 1st International Workshop on Electronic Business Hubs: XML, Metadata, Ontologies, and Business Knowledge on the Web (WEBH2001), Munich, Germany, September 2001 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Fine Grained Access Control for SOAP E-Services," in Proc. of the 10th International World Wide Web Conference, Hong Kong, China, May 2001 [BibTex]
  • P. Bonatti, S. De Capitani di Vimercati, P. Samarati, "A Modular Approach to Composing Access Control Policies," in Proc. of the Seventh ACM Conference on Computer and Communications Security, Athens, Greece, 2000 [BibTex]
  • P. Bonatti, P. Samarati, "Regulating Service Access and Information Release on the Web," in Proc. of the Seventh ACM Conference on Computer and Communications Security, Athens, Greece, 2000 [BibTex]
  • S. Castano, V. De Antonellis, S. De Capitani di Vimercati, M. Melchiori, "An XML-based Framework for Information Integration over the Web," in Proc. of Int. Workshop on Information Integration and Web-based Applications & Services, Yogyakarta, Indonesia, September 2000 [BibTex]
  • S. Dawson, S. De Capitani di Vimercati, P. Lincoln, P. Samarati, "Classifying Information for External Release," in Proc. of the 15th International Conference on Information Security (IFIP SEC2000), Beijing, China, August 2000 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Securing XML Documents," in Proc. of the 2000 International Conference on Extending Database Technology (EDBT 2000), Konstanz, Germany, March 2000 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "XML Access Control Systems: A Component-Based Approach," in Proc. of the 14th Annual IFIP WG 11.3 Working Conference on Database Security, Schoorl, The Netherlands, August 2000 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Regulating Access to Semistructured Information on the Web," in Proc. of the 15th International Information Security Conference (IFIP SEC 2000), Beijing, China, August 2000 [BibTex]
  • S. Dawson, P. Samarati, S. De Capitani di Vimercati, P. Lincoln, G. Wiederhold, M. Bilello, J. Akella, "Secure Access Wrapper: Mediating Security Between Heterogeneous Databases," in Proc. of the Darpa Information Survivability Conference & Exposition, Hilton Head, South Carolina, USA, January 2000 [BibTex]
  • S. Dawson, S. De Capitani di Vimercati, P. Lincoln, P. Samarati, "Minimal Data Upgrading to Prevent Inference and Association Attacks," in Proc. of the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), Philadelphia, PA, USA, May - June 1999 [BibTex]
  • S. Dawson, S. De Capitani di Vimercati, P. Samarati, "Specification and Enforcement of Classification and Inference Constraints," in Proc. of the 20th IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 1999 [BibTex]
  • S. De Capitani di Vimercati, P. Lincoln, L. Ricciulli, P. Samarati, "PGRIP: PNNI Global Routing Infrastructure Protection," in The Internet Society 1999 Network and Distributed System Security Symposium (NDSS 1999), San Diego, CA, USA, February 1999 [BibTex]
  • S. Bergamaschi, S. Castano, S. De Capitani di Vimercati, S. Montanari, M. Vincini, "An Intelligent Approach to Information Integration," in International Conference on Formal Ontology in Information Systems (FOIS98), Trento, Italy, June 1998 [BibTex]
  • L. Ricciulli, S. De Capitani di Vimercati, P. Lincoln, P. Samarati, "PNNI Global Routing Infrastructure Protection," in Information Survivability Workshop 1998 (ISW'98), Orlando, Florida, USA, October 1998 (Position paper) [BibTex]
  • S. Dawson, S. Qian, P. Samarati, "Secure Interoperation of Heterogeneous Systems: A Mediator-Based Approach," in Proc. of the 14th IFIP TC-11 International Conference on Information Security, Vienna, Budapest, August 1998 [BibTex]
  • S. Dawson, P. Samarati, G. Wiederhold, "Ensuring Survivability in Information Sharing," in Information Survivability Workshop 1998 (ISW'98), Orlando, Florida, October 1998 (Position paper) [BibTex]
  • P. Samarati, L. Sweeney, "Generalizing Data to Provide Anonymity when Disclosing Information," in Proc. of the 17th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS 1998), Seattle, WA, USA, June 1-3, 1998 [BibTex]
  • E. Ferrari, P. Samarati, E. Bertino, S. Jajodia, "Providing Flexibility in Information Flow Control for Object-Oriented Systems," in Proc. of the 1997 IEEE Symposium on Security and Privacy, Oakland, CA, May 1997 [BibTex]
  • S. Jajodia, P. Samarati, V.S. Subramanian, "A Logical Language for Expressing Authorizations," in Proc. of the 1997 IEEE Symposium on Security and Privacy, Oakland, CA, May 1997 [BibTex]
  • S. Jajodia, P. Samarati, V.S. Subramanian, E. Bertino, "A Unified Framework for Enforcing Multiple Access Control Policies," in Proc. of the 1997 ACM International SIGMOD Conference on Management of Data, Tucson, AZ, May 1997 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "An Authorization Model for Federated Systems," in Proc. of the 4th European Symposium on Research in Computer Security, ESORICS'96, Rome, Italy, September 1996 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Access Control in Federated Systems," in Proc. of the ACM SIGSAC New Security Paradigms Workshop, Lake Arrowhead, CA, USA, September 1996 [BibTex]
  • E. Bertino, C. Bettini, E. Ferrari, P. Samarati, "A Decentralized Temporal Authorization Model," in Information Systems Security - Facing the Information Society of the 21st Century, S.K. Katsikas, D. Gritzalis (eds.), Chapman & Hall, 1996 [BibTex]
  • E. Bertino, C. Bettini, E. Ferrari, P. Samarati, "Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control," in Proc. of the 22nd International Conference on Very Large Databases (VLBD), Bombay, India, September 1996 [BibTex]
  • E. Bertino, S. Jajodia, P. Samarati, "A Non-Timestamped Authorization Model for Relational Databases," in Proc. of the 3rd ACM Conference on Computer and Communications Security, New Delhi, India, March 1996 [BibTex]
  • E. Bertino, S. Jajodia, P. Samarati, "Supporting Multiple Access Control Policies in Database Systems," in Proc. of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, May 1996 [BibTex]
  • E. Ferrari, E. Bertino, C. Bettini, A. Motta, P. Samarati, "On Using Materialization Strategies for a Temporal Authorization Model," in Proc. of the Int. Workshop on Materialized Views: Techniques and Applications (in co-operation with ACM-SIGMOD), Montreal, Canada, June 1996 [BibTex]
  • E. Bertino, P. Samarati, "Research Issues in Authorization Models for Hypertext Systems," in Proc. of the 1995 ACM SIGSAC New Security Paradigms Workshop, La Jolla, CA, August 1995 [BibTex]
  • E. Bertino, C. Bettini, P. Samarati, "A Temporal Authorization Model," in Proc. of the 2nd ACM Conference on Computer and Communications Security, Fairfax, VA, Novemver 1994 [BibTex]
  • E. Bertino, C. Bettini, P. Samarati, "A Discretionary Access Control Model with Temporal Authorizations," in Proc. of the 1994 ACM SIGSAC New Security Paradigms Workshop, Little Compton, RI, August 1994 [BibTex]
  • E. Bertino, S. Jajodia, P. Samarati, "Enforcing Mandatory Access Controls in Object Bases," in Security for Object-Oriented Systems, B. Thuraisingham, R. Sandhu, T.Y. Lin (eds.), Springer Verlag London Ltd., 1994 [BibTex]
  • E. Bertino, F. Origgi, P. Samarati, "A New Authorization Model for Object-Oriented Databases," in Database Security VIII - Status and Prospects, J. Biskup, M. Morgesten, C.E. Landwehr (eds.), North-Holland, 1994 [BibTex]
  • E. Bertino, P. Samarati, "Research Issues in Discretionary Authorizations for Object Bases," in Security for Object-Oriented Systems, B. Thuraisingham, R. Sandhu, T.Y. Lin (eds.), Springer Verlag London Ltd., 1994 [BibTex]
  • P. Samarati, P. Ammann, S. Jajodia, "Propagation of Authorizations in Distributed Databases," in Proc. of the 2nd ACM Conference on Computer and Communications Security, Fairfax, VA, November 1994 [BibTex]
  • S. Castano, G. Martella, P. Samarati, "A New Approach to Security System Development," in Proc. of the 1994 ACM SIGSAC New Security Paradigms Workshop, Little Compton, RI, August 1994 [BibTex]
  • E. Bertino, P. Samarati, S. Jajodia, "Authorizations in Relational Database Management Systems," in Proc. of the First ACM Conference on Computer and Communications Security, Fairfax, VA, November 1993 [BibTex]
  • E. Bertino, P. Samarati, S. Jajodia, "High Assurance Discretionary Access Control for Object Bases," in Proc. of the First ACM Conference on Computer and Communications Security, Fairfax, VA, November 1993 [BibTex]
  • S. Castano, P. Samarati, C. Villa, "Verifying System Security Using Petri Nets," in Proc. of the IEEE 27th Int. Carnahan Conf. on Security Technology, Ottawa, Canada, October 1993 [BibTex]
  • S. Ceri, M.A.W. Houtsma, A.M. Keller, P. Samarati, "Achieving Incremental Consistency among Autonomous Replicated Databases," in Proc. of the IFIP Working Conference on Semantics of Interoperable Database Systems (DS-5), Lorne, Australia, November 1992 [BibTex]
  • S. Ceri, M.A.W. Houtsma, A.M. Keller, P. Samarati, "The Case for Independent Updates," in Proc. of the 2nd Workshop on the Management of Replicated Data II, Monterey, California, November 1992 [BibTex]
  • S. Castano, P. Samarati, "Modeling Users' Behavior and Threats in Security Systems," in Proc. of the Int. Conf. on Safety, Security, and Reliability of Computers (Safecomp '92), Zurich, September 1992 [BibTex]
  • S. Castano, P. Samarati, "An Object-Oriented Security Model for Office Environments," in Proc. of the IEEE 26th Int. Carnahan Conf. on Security Technology, Atlanta, October 1992 [BibTex]
  • V. De Antonellis, B. Pernici, P. Samarati, "Object-Orientation in the Analysis of Work Organization and Agent Cooperation," in Dynamic Modeling of Information Systems, II, H.G. Sol, R.L. Crosslin (ed.), North-Holland, 1992 [BibTex]
  • M.G. Fugini, G. Martella, P. Samarati, "Complementing Access Controls for Comprehensive Security," in Proc. International Conference on Information Systems and Management of Data (CISMOD), Bangalore, July 1992 [BibTex]
  • F. Carrettoni, S. Castano, G. Martella, P. Samarati, "RETISS: A Real TIme Security System for Threat Detection Using Fuzzy Logic," in Proc. of the IEEE 25th Int. Carnahan Conf. on Security Technology, Taiwan, October 1991 [BibTex]
  • V. De Antonellis, B. Pernici, P. Samarati, "Designing Information Systems for Cooperating Agents," in Human Aspects in Computing: Design and Use of Interactive Systems and Information Management, H.J. Bullinger (ed.), Elsevier Science Publ., 1991 [BibTex]
  • V. De Antonellis, B. Pernici, P. Samarati, "F-ORM METHOD: A F-ORM Methodology for Reusing Specifications," in The Object-Oriented Approach in Information Systems, F. Van Assche, B. Moulin, C. Roland (eds.), North-Holland, 1991 [BibTex]

Chapters in Books

  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud," in Festschrift for David Kahn, P. Ryan, D. Naccache, J.-J. Quisquater (eds.), Springer, 2016 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Specification and Enforcement of Access Policies in Emerging Scenarios," in Cloud Computing Security: Foundations and Challenges, J.R. Vacca (ed.), CRC Press, August 2016 [BibTex]
  • P. Samarati, S. De Capitani di Vimercati, "Cloud Security: Issues and Concerns," in Encyclopedia on Cloud Computing, S. Murugesan, I. Bojanova (eds.), Wiley, 2016 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, S. Paraboschi, P. Samarati, "Privacy in Pervasive Systems: Social and Legal Aspects and Technical Solutions," in Data Management in Pervasive Systems, F. Colace, M. De Santo, V. Moscato, A. Picariello, F. Schreiber, L. Tanca (eds.), Springer, 2015 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Selective and Private Access to Outsourced Data Centers," in Handbook on Data Centers, S.U. Khan, A.Y. Zomaya (eds.), Springer, 2015 [BibTex]
  • S. De Capitani di Vimercati, R.F. Erbacher, S. Foresti, S. Jajodia, G. Livraga, P. Samarati, "Encryption and Fragmentation for Data Confidentiality in the Cloud," in Foundations of Security Analysis and Design VII, A. Aldini, J. Lopez, F. Martinelli (eds.), Springer, 2014 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, P. Samarati, "Database Security and Privacy," in Computer Science Handbook (3rd edition) - Information Systems and Information Technology, A. Tucker, H. Topi (eds.), Taylor and Francis Group, 2014 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Selective and Fine-Grained Access to Data in the Cloud," in Secure Cloud Computing, S. Jajodia, K. Kant, P. Samarati, V. Swarup, C. Wang (eds.), Springer, 2014 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, R. Sandhu, "Access Control," in Computer Science Handbook (3rd edition) - Information Systems and Information Technology, A. Tucker, H. Topi (eds.), Taylor and Francis Group, 2014 [BibTex]
  • M. Albanese, S. Jajodia, R. Jhawar, V. Piuri, "Securing Mission-Centric Operations in the Cloud," in Secure Cloud Computing, S. Jajodia, K. Kant, P. Samarati, V. Swarup, C. Wang (eds.), Springer, 2013 (to appear) [BibTex]
  • S. De Capitani di Vimercati, A. Genovese, G. Livraga, V. Piuri, F. Scotti, "Privacy and Security in Environmental Monitoring Systems: Issues and Solutions," in Computer and Information Security Handbook, 2nd Edition, J. Vacca (ed.), Morgan Kaufmann, June 2013 [BibTex]
  • S. Foresti, P. Samarati, "Supporting User Privacy Preferences in Digital Interactions," in Computer and Information Security Handbook, J.R. Vacca (ed.), Morgan Kaufmann, 2013 (2nd Edition) [BibTex]
  • R. Jhawar, V. Piuri, "Fault Tolerance and Resilience in Cloud Computing Environments," in Computer and Information Security Handbook, 2nd Edition, J. Vacca (ed.), Morgan Kaufmann, 2013 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Protecting Data in Outsourcing Scenarios," in Handbook on Securing Cyber-Physical Critical Infrastructure, S.K Das, K. Kant, N. Zhang (eds.), Morgan Kaufmann, 2012 [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, G. Neven, S. Paraboschi, E. Pedrini, F.-S. Preiss, P. Samarati, M. Verdicchio, "Advances in Access Control Policies," in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Huebner, K. Rannenberg (eds.), Springer, 2011 [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, E. Pedrini, P. Samarati, "Privacy-Aware Access Control System: Evaluation and Decision," in Digital Privacy: PRIME - Privacy and Identity Management for Europe, J. Camenisch, R. Leenes, D. Sommer (eds.), Springer, 2011 [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, P. Samarati, "Personal Privacy in Mobile Networks," in Mobile Technologies for Conflict Management: Online Dispute Resolution, Governance, Participation, M. Poblet (ed.), Springer Science+Business Media B.V., 2011 [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, P. Samarati, "Privacy Models and Languages: Access Control and Data Handling Policies," in Digital Privacy: PRIME - Privacy and Identity Management for Europe, J. Camenisch, R. Leenes, D. Sommer (eds.), Springer, 2011 [BibTex]
  • C. Bournez, C.A. Ardagna, "Policy Requirements and State of the Art," in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Huebner, K. Rannenberg (eds.), Springer, 2011 [BibTex]
  • M. Bezzi, S. De Capitani di Vimercati, S. Foresti, G. Livraga, S. Paraboschi, P. Samarati, "Data Privacy," in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hubner, K. Rannenberg (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Selective Exchange of Confidential Data in the Outsourcing Scenario," in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hubner, K. Rannenberg (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Protecting Information Privacy in the Electronic Society," in e-Business and Telecommunications International Conference (ICETE 2009), J. Filipe, M.S. Obaidat (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Protecting Privacy in Data Release," in Foundations of Security Analysis and Design VI, A. Aldini, R. Gorrieri (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, "Privacy of Outsourced Data," in Privacy and Identity Management for Life, M. Bezzi, P. Duquenoy, S. Fischer-Huebner, M. Hansen, G. Zhang (eds.), Springer, 2010 [BibTex]
  • C.A. Ardagna, C. Braghin, M. Cremonini, "Net Privacy," in Computer And Information Security Handbook, J.R. Vacca (ed.), Morgan Kaufmann, 2009 [BibTex]
  • C. A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "Location Privacy in Pervasive Computing," in Security and Privacy in Mobile and Wireless Networking, S. Gritzalis, T. Karygiannis, C. Skianis (eds.), Troubador Publishing, 2009 [BibTex]
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Theory of Privacy and Anonymity," in Algorithms and Theory of Computation Handbook (2nd edition), M. Atallah, M. Blanton (eds.), CRC Press, 2009 [BibTex]
  • C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "Access Control in Location-Based Services," in Privacy in Location Based Applications, C. Bettini, S. Jajodia, P. Samarati, S. Wang (eds.), Springer, 2009 [BibTex]
  • C.A. Ardagna, S. Jajodia, P. Samarati, A. Stavrou, "Privacy Preservation over Untrusted Mobile Networks," in Privacy in Location Based Applications: Research Issues and Emerging Trends, C. Bettini, S. Jajodia, P. Samarati, S. Wang (eds.), Springer, 2009 [BibTex]
  • C. A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Privacy in the Electronic Society: Emerging Problems and Solutions," in Statistical Science and Interdisciplinary Research - Vol. 3: Algorithms, Architectures and Information Systems Security, B.B. Bhattacharya, S. Sur-Kolay, S.C. Nandy, A. Bagchi (eds.), World Scientific Press, November 2008 [BibTex]
  • C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "Managing Privacy in Location-based Access Control Systems," in Mobile Intelligence: Mobile Computing and Computational Intelligence, L.T. Yang, A.B. Waluyo, J. Ma, L. Tan, B. Srinivasan (eds.), John Wiley & Sons, Inc., 2008 [BibTex]
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "k-Anonymous Data Mining: A Survey," in Privacy-Preserving Data Mining: Models and Algorithms, C.C. Aggarwal, P.S. Yu (eds.), Springer-Verlag, 2008 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Access Control," in The Handbook of Computer Networks, H. Bidgoli (ed.), Wiley, 2008 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Access Control Models for XML," in Handbook of Database Security: Applications and Trends, M. Gertz, S. Jajodia (eds.), Springer-Verlag, 2008 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Recent Advances in Access Control," in Handbook of Database Security: Applications and Trends, M. Gertz, S. Jajodia (eds.), Springer-Verlag, 2008 [BibTex]
  • C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Privacy-enhanced location services information," in Digital Privacy: Theory, Technologies and Practices, Acquisti, De Capitani di Vimercati, Gritzalis, Lambrinoudakis (eds.), Auerbach Publications (Taylor and Francis Group), 2007 [BibTex]
  • C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "Privacy-enhanced Location-based Access Control," in The Handbook of Database Security: Applications and Trends, M. Gertz, S. Jajodia (eds.), Springer-Verlag, 2007 [BibTex]
  • C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "XML Security," in Security, Privacy and Trust in Modern Data Management, M. Petkovic, W. Jonker (eds.), Springer-Verlag, 2007 [BibTex]
  • C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Trust Management," in Security, Privacy and Trust in Modern Data Management, M. Petkovic, W. Jonker (eds.), Springer-Verlag, 2007 [BibTex]
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "k-Anonymity," in Secure Data Management in Decentralized Systems, T. Yu, S. Jajodia (eds.), Springer-Verlag, 2007 [BibTex]
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Microdata Protection," in Secure Data Management in Decentralized Systems, T. Yu, S. Jajodia (eds.), Springer-Verlag, 2007 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Privacy of Outsourced Data," in Digital Privacy: Theory, Technologies and Practices, A. Acquisti, S. Gritzalis, C. Lambrinoudakis, S. De Capitani di Vimercati (eds.), Auerbach Publications (Taylor and Francis Group), 2007 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, P. Samarati, "Access Control Policies and Languages in Open Environments," in Secure Data Management in Decentralized Systems, T. Yu, S. Jajodia (eds.), Springer-Verlag, 2007 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Authorization and Access Control," in Security, Privacy and Trust in Modern Data Management, M. Petkovic, W. Jonker (eds.), Springer-Verlag, 2007 [BibTex]
  • S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Access control: Principles and Solutions," in Handbook of Information Security, H. Bidgoli (ed.), Wiley, 2006 [BibTex]
  • M. Cremonini, P. Samarati, "Contingency Planning Management," in Handbook of Information Security, H. Bidgoli (ed.), Wiley, 2006 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "New Directions in Access Control," in Cyberspace Security and Defense: Research Issues, Kluwer Academic Publisher, 2005 [BibTex]
  • P. Bonatti, P. Samarati, "Logics for Authorizations and Security," in Logics for Emerging Applications of Databases, J. Chomicki, R. van der Meyden, G. Saake (eds.), Springer-Verlag, 2003 [BibTex]
  • M. Cremonini, P. Samarati, "Disaster Recovery Planning," in The Internet Encyclopedia, H. Bidgoli (ed.), John Wiley & Sons Inc., 2003 [BibTex]
  • S. Castano, V. De Antonellis, S. De Capitani di Vimercati, M. Melchiori, "Data Schema Integration in Web-enabled Systems," in Web-enabled Systems Integration: practices and challenges, 2002 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, S. Jajodia, "Hardware and Software Data Security," in EOLSS The Encyclopedia of Life Support Systems, D. Kaeli, Z. Navabi (eds.), EOLSS Publishers, 2001 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, S. Jajodia, "Database Security," in Wiley Encyclopedia of Software Engineering, J. Marciniak (ed.), John Wiley & Sons, 2001 [BibTex]
  • P. Samarati, S. De Capitani di Vimercati, "Access Control: Policies, Models, and Mechanisms," in Foundations of Security Analysis and Design, R. Focardi, R. Gorrieri (eds.), Springer-Verlag, 2001 [BibTex]
  • P. Samarati, S. Jajodia, "Data Security," in Wiley Encyclopedia of Electrical and Electronics Engineering, J.G. Webster (ed.), John Wiley & Sons, February 1999 [BibTex]
  • R. Sandhu, P. Samarati, "Authentication, Access Control and Intrusion Detection," in CRC Handbook of Computer Science and Engineering, A. Tucker (ed.), CRC Press Inc., 1997 [BibTex]
  • S. Castano, G. Martella, P. Samarati, "Virus, Pirateria, Sabotaggio: l'Emergenza delle Difficoltà," in Le Scienze della Comunicazione, RCS Libri & Grandi Opere, 1996/1997 [BibTex]
  • E. Bertino, S. Jajodia, P. Samarati, "Access Controls in Object-Oriented Database Systems: Some Approaches and Issues," in Advanced Database Concepts and Research Issues, N. Adam, B. Bhargava (eds.), Springer-Verlag, 1993 [BibTex]

Papers in National Journals

  • S. Castano, G. Martella, P. Samarati, "Analysis, Comparison and Design of Role-Based Security Specifications," in Data & Knowledge Engineering (DKE), vol. 21, n. 1, December 1996, pp. 31-55 [BibTex]
  • G. Martella, P. Samarati, "La Sicurezza dell'Informazione Aziendale," in Rivista di Informatica, vol. XIX, n. 3, 1989, pp. 229-254 [BibTex]

Papers in Proceedings of National Conferences

  • S. Castano, V. De Antonellis, S. De Capitani di Vimercati, "An Interorganizational Knowledge Mediation Scheme for Information Sources over the Web," in Nono Convegno Nazionale su Sistemi Evoluti per Basi di Dati (SEBD 2000), Venezia, Italy, June 2001 (Extended abstract) [BibTex]
  • S. Castano, V. De Antonellis, S. De Capitani di Vimercati, M. Melchiori, "A Uniform Framework for Web Data Integration," in Ottavo Convegno Nazionale su Sistemi Evoluti per Basi di Dati (SEBD 2000), L'Aquila, Italy, June 2000 [BibTex]
  • S. Bergamaschi, S. Castano, S. De Capitani di Vimercati, S. Montanari, M. Vincini, "A Semantic Approach to Information Integration: The MOMIS Project," in Sesto Convegno della Associazione Italiana per l'Intelligenza Artificiale (AI*IA98), Padova, Italy, September 1998 [BibTex]
  • S. Bergamaschi, S. Castano, S. De Capitani di Vimercati, S. Montanari, M. Vincini, "Exploiting Schema Knowledge for the Integration of Heterogeneous Sources," in Sesto Convegno Nazionale su Sistemi Evoluti per Basi di Dati (SEBD 1998), Ancona, Italy, June 1998 [BibTex]
  • S. Castano, V. De Antonellis, S. De Capitani di Vimercati, M. Melchiori, "Information Integration on Multiple Heterogeneous Data Sources," in Sesto Convegno Nazionale su Sistemi Evoluti per Basi di Dati (SEBD 1998), Ancona, Italy, June 1998 [BibTex]
  • P. Samarati, "Multilevel Relational Databases: Issues and Solutions," in Atti del Congresso Annuale AICA, Palermo, September 1994 [BibTex]
  • S. Castano, P. Samarati, C. Villa, "Un Modello di Sicurezza per Ambienti Ipertestuali," in Atti del Congresso Annuale AICA, Lecce, September 1993 [BibTex]
  • S. Castano, P. Samarati, "Un Modello per la Rilevazione delle Minacce in un Sistema di Elaborazione," in Atti del Congresso Annuale AICA, Torino, October 1992 [BibTex]
  • S. Castano, G. Martella, P. Samarati, "Un Modello per la Protezione di Basi di Conoscenza," in Atti del Congresso Annuale AICA, Siena, September 1991 [BibTex]
  • M. Bianchini, G. Martella, P. Samarati, "Un Sistema di Sicurezza Object-Oriented per la Protezione dei Documenti nei Sistemi Informativi per l'Ufficio," in Atti del Congresso Annuale AICA, Bari, September 1990 [BibTex]

Other Publications

  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Data Protection in Cloud Scenarios," in Proc. of 10th Int'l Workshop on Data Privacy Management (DPM 2015) and 4th Int'l Workshop on Quantitative Aspects of Security Assurance (QASA 2015), Vienna, Austria, September 21-22, 2015 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Data Security Issues in Cloud Scenarios," in Proc. of the 11th International Conference on Information Systems Security (ICISS 2015), Kolkata, India, December 16-20, 2015 [BibTex]
  • C.A. Ardagna, "Location information (privacy of)," in Encyclopedia of Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • C.A. Ardagna, "Privacy-Aware Languages," in Encyclopedia of Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • C.A. Ardagna, "XML-based access control languages," in Encyclopedia of Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, "Quasi-identifier," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. Foresti, "Macrodata Protection," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. Foresti, "Microdata Protection," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, "Access Control Policies, Models, and Mechanisms," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, "Access Matrix," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Administrative Policies," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, "Authorizations," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, "Discretionary Access Control Policies (DAC)," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, "Least Privilege," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, "Privacy-Aware Access Control Policies," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, "Policy Composition," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, G. Livraga, "Grant Option," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, G. Livraga, "Privileges in SQL," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, G. Livraga, "SQL Access Control Model," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Clark and Wilson," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Chinese Wall," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Mandatory Access Control Policies (MAC)," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Polyinstantiation," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • G. Livraga, P. Samarati, "Multilevel Database," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • P. Samarati, "Flexible Authorization Framework (FAF)," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • P. Samarati, "k-anonymity," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • P. Samarati, "Recursive Revoke," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Data Privacy: Problems and Solutions," in Third International Conference on Information Systems Security (ICISS 2007), Delhi, India, December 16-20, 2007 (invited talk) [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Privacy in the Electronic Society," in Proc. of the International Conference on Information Systems Security (ICISS 2006), Kolkata, India, December 19-21, 2006 (invited talk) [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Protecting Privacy in the Global Infrastructure," in Proc. of the International Conference on Information Security and Computer Forensics, Chennai, India, December 6-8, 2006 (invited talk) [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Towards Privacy-Aware Identity Management," in ERCIM News, n. 63, October 2005 [BibTex]
  • E. Damiani, S. David, S. De Capitani di Vimercati, C. Fugazza, P. Samarati, "Open World Reasoning in Semantics-Aware Access Control: a Preliminary Study," in 2nd Italian Semantic Web Workshop (SWAP 2005), University of Trento, Trento, Italy, December 14-16, 2005 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, "Towards Semantics-Aware Access Control," in Proc. of the 18th IFIP WG11.3 Working Conference on Data and Application Security, Sitges, Spain, July 25-28, 2004 (invited talk) [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, "XrML - Un Linguaggio per la Gestione dei Diritti Digitali," in Internet Pro, 2004 [BibTex]
  • S. De Capitani di Vimercati, "L'evoluzione delle tecniche crittografiche per la trasmissione sicura di informazioni," in Sicurezza digitale, n. 1, 2004 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, C. Fugazza, P.Samarati, "Semantics-aware Privacy and Access Control: Motivation and Preliminary Results," in 1st Italian Semantic Web Workshop, Ancona, Italy, December 2004 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Reputation-based Pseudonymity: An Alternative or a Complement to Strong Identities?," in Workshop on Security and Dependability, Brussels, May 10, 2004 [BibTex]
  • E. Damiani, P. Samarati, "Towards Context Awareness in Ambient Intelligence," in Workshop on R&D challenges for Resilience in Ambient Intelligence, Brussels, March 19, 2004 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Privacy in the Electronic Society," in TILT, n. 15, March 2003 [BibTex]
  • E. Damiani, P. Samarati, C.A. Ardagna, M. Lupo Stanghellini , "Sicurezza e Web Service," in Sicurezza Digitale, n. 2, October 2003 [BibTex]
  • P. Samarati, "Access Control in the Open Infrastructure," in Proc. of the 1st International Conference on Information & Communication Technology (ICICT), Cairo, Egypt, December 2003 [BibTex]
  • P. Samarati, "Regulating Access to Web-published Data," in ERCIM News , April 2002 [BibTex]
  • E. Damiani, P. Samarati, "On the Secure Interoperability of E-Business Services," in Business Briefing, Global InfoSecurity, 2001 [BibTex]
  • S. Osborn, B. Thuraisingham, P. Samarati, "Panel of XML and Security," in Proc. of the 15th IFIP WG11.3 Working Conference on Database and Application Security, Niagara on the Lake, Ontario, Canada, July 2001 [BibTex]
  • B. Thuraisingham, S. Jajodia, P. Samarati, J. Dobson, M. Olivier, "Privacy Issues in WWW and Data Mining: Panel Discussion," in Database Security XII - Status and Prospects, S. Jajodia (ed.), Kluwer, 1999 [BibTex]
  • B. Thuraisingham, L. Schillper, P. Samarati, T.Y. Lin, S. Jajodia, C. Clifton, "Security Issues in Data Warehousing and Data Mining: Panel Discussion," in Database Security XI - Status and Prospects, T.Y. Lin, S. Qian (eds.), Chapman & Hall, 1998 [BibTex]
  • R. Thomas, E. Bertino, P. Samarati, H. Bruggemann, B. Hartman, R. Sandhu, T.C. Ting, "Panel Discussion: Role-Based Access Control and Next-Generation Security Models," in Database Security IX - Status and Prospects, D. Spooner, S. Demurjian, J. Dobson (eds.), Chapman & Hall, 1997 [BibTex]
  • M. Bianchini, S. Castano, G. Martella, P. Samarati, "Un Sistema di Sicurezza Object-Oriented per la Protezione di Documenti," in Sistemi e Software, vol. 25, January 1992 [BibTex]
  • S. Ceri, M.A.W. Houtsma, A.M. Keller, P. Samarati, "A Classification of Update Methods for Replicated Databases,", CS Dept., Stanford University (STAN-CS-91-1392), October 1991 [BibTex]
  • G. Martella, P. Samarati, "La Progettazione dei Sistemi di Protezione delle Informazioni in Azienda," in Data Manager, October 1989 [BibTex]