The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author s copyright. These works may not be reposted without the explicit permission of the copyright holder.

Publications

Books

Edited Books

  • C. Alcaraz, L. Chen, S. Li, P. Samarati (eds.), Proc. of the 24th International Conference on Information and Communications Security (ICICS 2022), Springer, 2022 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati (eds.), Proc. of the 19th International Conference on Security and Cryptography (SECRYPT 2022), ScitePress, 2022 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati (eds.), Proc. of the 18th International Conference on Security and Cryptography (SECRYPT 2021), ScitePress, 2021 [BibTex]
  • G. Livraga, N. Park (eds.), Proc. of the 20th Workshop on Privacy in the Electronic Society (WPES 2021), ACM, November 15, 2021 [BibTex]
  • P. Samarati, S. De Capitani di Vimercat, M.S. Obaidat, J. Ben-Othman (eds.), Proc. of the 17th International Joint Conference on e-Business and Telecommunications (ICETE 2020) - Volume 2: SECRYPT, ScitePress, 2020 [BibTex]
  • M.S. Obaidat, P. Samarati (eds.), Proc. of the 16th International Conference on Security and Cryptography (SECRYPT 2019), SciTePress, 2019 [BibTex]
  • J. Garcia-Alfaro, J. Herrera-Joancomarti, G. Livraga, R. Rios (eds.), Data Privacy Management, Cryptocurrencies and Blockchain Technology (Proc. of DPM and CBT 2018), Springer, Barcelona, Spain, September 6-7, 2018 [BibTex]
  • P. Samarati, I. Ray, I. Ray (eds.), From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, Springer, 2018 [BibTex]
  • P. Samarati, M.S. Obaidat (eds.), Proc. of the 15th International Conference on Security and Cryptography (SECRYPT 2018), SciTePress, 2018 [BibTex]
  • G. Livraga, C. Mitchell (eds.), Security and Trust Management XIII (Proc. of STM 2017), Springer, Oslo, Norway, September 14-15, 2017 [BibTex]
  • G. Livraga, S. Zhu (eds.), Data and Applications Security and Privacy XXXI (Proc. of DBSec 2017), Springer, Philadelphia, PA, USA, July 19-21, 2017 [BibTex]
  • G. Barte, E.P. Markatos, P. Samarati (eds.), Proc. of the 12th International Workshop on Security and Trust Management (STM 2016), Springer, 2016 [BibTex]
  • C. Callegari, M. van Sinderen, P.G. Sarigiannidis, P. Samarati, E. Cabello, P. Lorenz, M.S. Obaidat (eds.), Proc. of the 13th International Conference on Security and Cryptography (SECRYPT 2016), SciTePress, 2016 [BibTex]
  • S. De Capitani di Vimercati (ed.), Proc. of the 15th Workshop on Privacy in the Electronic Society (WPES 2016), Vienna, Austria, October 24, 2016 [BibTex]
  • S. Foresti, G. Persiano (eds.), Cryptology and Network Security, Lecture Notes in Computer Science 10052, Springer, November 2016 [BibTex]
  • S. Foresti, J. Lopez (eds.), Information Security Theory and Practice, Lecture Notes in Computer Science 9895, Springer, September 2016 [BibTex]
  • G. Livraga, V. Torra, A. Aldini, F. Martinelli and N Suri (eds.), Data Privacy Management and Security Assurance (Proc. of DPM 2016 and QASA 2016), Springer, Heraklion, Crete, Greece, September 26-27, 2016 [BibTex]
  • S. Foresti (ed.), Security and Trust Management, Lecture Notes of Computer Science 9331, Springer, 2015 [BibTex]
  • M.S. Obaidat, P. Lorenz, P. Samarati (eds.), Proc. of the 12th International Conference on Security and Cryptography (SECRYT 2015), SciTePress, 2015 [BibTex]
  • P. Samarati (ed.), Proc. of the 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2015), Springer, 2015 [BibTex]
  • S. Jajodia, K. Kant, P. Samarati, A. Singhal, V. Swarup, C. Wang (eds.), Secure Cloud Computing, Springer, 2014 [BibTex]
  • M.S. Obaidat, A. Holzinger, P. Samarati (eds.), Proc. of International Conference on Security and Cryptography (SECRYPT 2014), SciTePress, 2014 [BibTex]
  • A.-R. Sadeghi, S. Foresti (eds.), Proc. of the 12th ACM Workshop on Privacy in the Electronic Society (WPES 2013), ACM, November 2013 [BibTex]
  • P. Samarati (ed.), Proc. of International Conference on Security and Cryptography (SECRYPT 2013), SciTePress, 2013 [BibTex]
  • F. Bao, P. Samarati, J. Zhou (eds.), Proc. of the 10th International Conference on Applied Cryptography and Network Security (ACNS 2012), Springer, 2012 [BibTex]
  • S. Foresti, M. Yung, F. Martinelli (eds.), Computer Security - ESORICS 2012, Lecture Notes of Computer Science 7459, Springer, 2012 [BibTex]
  • A. Josang, P. Samarati, M. Petrocchi (eds.), Proc. of the 8th International Workshop on Security and Trust Management (STM 2012), Springer, 2012 [BibTex]
  • P. Samarati, W. Lou, J. Zhou (eds.), Proc. of International Conference on Security and Cryptography (SECRYPT 2012), SciTePress, 2012 [BibTex]
  • M. Li, G. Livraga (eds.), Proc. of the 2011 Workshop on Mobile and Online Social Networks (MOSN 2011), IEEE, Milan, Italy, September 8, 2011 [BibTex]
  • J. Lopez, P. Samarati (eds.), Proc. of International Conference on Security and Cryptography (SECRYPT 2011), SciTePress, 2011 [BibTex]
  • P. Samarati, S. Foresti, J. Hu, G. Livraga (eds.), Proc. of the 5th International Conference on Network and System Security (NSS 2011), IEEE, Milan, Italy, September 6-8, 2011 [BibTex]
  • C.A. Ardagna, J. Zhou (eds.), Proc.of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practice (WISTP 2011), Springer, June 1-3, 2011 [BibTex]
  • J. Zhang, G. Livraga (eds.), Proc. of the 2011 International Conference on Data and Knowledge Engineering (ICDKE 2011), IEEE, Milan, Italy, September 6, 2011 [BibTex]
  • C. C. Zou, Y. Xiang, G. Livraga (eds.), Proc. of the 3rd International Workshop on Cyberspace Safety and Security (CSS 2011), IEEE, Milan, Italy, September 8, 2011 [BibTex]
  • S. Foresti, S. Jajodia (eds.), Data and Applications Security and Privacy XXIV, Lecture Notes of Computer Science 6166, Springer, 2010 [BibTex]
  • S.K. Katsikas, P. Samarati (eds.), Proc. of International Conference on Security and Cryptography (SECRYPT 2010), SciTePress, 2010 [BibTex]
  • C. Bettini, S. Jajodia, P. Samarati, X. Sean Wang (eds.), Privacy in Location-Based Applications: Research Issues and Emerging Trends, Springer, 2009 [BibTex]
  • P. Samarati, M. Yung, F. Martinelli, C.A. Ardagna (eds.), Proc. of the 12th Information Security Conference (ISC 2009), Springer, September 7-9, 2009 [BibTex]
  • S. Cimato, S. Jajodia, P. Samarati (eds.), Proceedings of the IFIP TC11 23rd International Information Security Conference (SEC 2008), Springer, Milano, Italy, September 8 - 10, 2008 [BibTex]
  • S. De Capitani di Vimercati, P. Syverson, D. Evans (eds.), Proc. of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, October 29 - November 2 2007 [BibTex]
  • J. Lopez, P. Samarati, J.L. Ferrer (eds.), Proc. of the 4th European PKI Workshop: Theory and Practice, Palma de Mallorca, Spain, June 28-30, 2007 [BibTex]
  • S. Etalle, P. Samarati (eds.), Proc. of the Second International Workshop on Security and Trust Management (STM 2006), Elsevier, Hamburg, Germany, September 20-21, 2006 [BibTex]
  • R.N. Wright, S. De Capitani di Vimercati, V. Shmatikov (eds.), Proc. of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, October 30 - November 3 2006 [BibTex]
  • S. De Capitani di Vimercati, R. Dingledine (eds.), Proc. of the ACM Workshop on Privacy in the Electronic Society, Alexandria, VA, USA, November 7, 2005 [BibTex]
  • S. De Capitani di Vimercati, P. Syverson, D. Gollmann (eds.), Computer Security - ESORICS 2005, Springer, 2005 [BibTex]
  • S. De Capitani di Vimercati, I. Ray, I. Ray (eds.), Data and Applications Security XVII - Status and Prospects, Kluwer Academic Publisher, 2004 [BibTex]
  • S. De Capitani di Vimercati, P. Syverson (eds.), Proc. of the ACM Workshop on Privacy in the Electronic Society, Washington, DC, USA, October 28, 2004 [BibTex]
  • C. Farkas, P. Samarati (eds.), "Research Directions in Data and Applications Security XVIII," in Proc. of the 18th IFIP WG11.3 Working Conference on Data and Applications Security, Sitges, Spain, 2004 [BibTex]
  • P. Samarati, P. Ryan, D. Gollmann, R. Molva (eds.), Computer Security - ESORICS 2004, Sophia Antipolis, France, September 2004 [BibTex]
  • D. Gritzalis, S. De Capitani di Vimercati, P. Samarati, S. Katsikas (eds.), Security and Privacy in the Age of Uncertainty, Kluwer, 2003 [BibTex]
  • P. Samarati, P. Syverson (eds.), Proc. of the Second ACM Workshop on Privacy in the Electronic Society, Washington, USA, October 30, 2003 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati (eds.), Proc. of the First ACM Workshop on Privacy in the Electronic Society, Washington, USA, November 21, 2002 [BibTex]
  • P. Samarati (ed.), Proc. of the Eighth ACM Conference on Computer and Communications Security, Philadelphia, PA (USA), November 5-8, 2001 [BibTex]
  • V. Atluri, P. Samarati (eds.), Security of Data and Transaction Processing, Kluwer, 2000 [BibTex]
  • D. Gritzalis, S. Jajodia, P. Samarati (eds.), Proc. of the Seventh ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000 [BibTex]
  • P. Samarati, R. Sandhu (eds.), Database Security X: Status and Prospects, Chapman and Hall, 1997 [BibTex]

International Journals Articles

Papers in Proceedings of International Conferences and Workshops

Chapters in Books

  • S. Foresti, G.Livraga, "Selective Encryption for Owners’ Control in Digital Data Markets," in E-Business and Telecommunications, P. Samarati, M. van Sinderen, S. De Capitani di Vimercati, F. Wijnhoven (eds.), Springer, 2023 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Digital Infrastructure Policies for Data Security and Privacy in Smart Cities," in Smart Cities Policies and Financing, J. Vacca (ed.), Elsevier, 2022 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Towards Owner-Controlled Data Sharing," in Advances in Computing, Informatics, Networking and Cybersecurity: A Book Honoring Professor Mohammad S. Obaidat's Significant Scientific Contributions, P. Nicopolitidis, S. Misra, L.T. Yang (eds.), Springer, 2022 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Specification and Enforcement of Access Policies in Emerging Scenarios," in Cloud Computing Security: Foundations and Challenges, 2nd Edition, J. Vacca (ed.), CRC Press, 2020 [BibTex]
  • E. Bacis, S. De Capitani di Vimercati, S. Foresti and S. Paraboschi, M. Rosa, P. Samarati, "Protecting Resources and Regulating Access in Cloud-based Object Storage," in From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of his 70th Birthday, I. Ray, I. Ray, P. Samarati (eds.), Springer, 2018 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, V. Piuri, P. Samarati, "Supporting Users in Cloud Plan Selection," in From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of his 70th Birthday, P. Samarati, I. Ray, I. Ray (eds.), Springer, 2018 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Access Privacy in the Cloud," in From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of his 70th Birthday, I. Ray, I. Ray, P. Samarati (eds.), Springer, 2018 [BibTex]
  • G. Livraga, "Privacy in Microdata Release: Challenges, Techniques, and Approaches," in Data-Driven Policy Impact Evaluation: How Microdata is Transforming Policy Design, N. Crato, P. Paruolo (eds.), Springer, 2018 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, S. Paraboschi, P. Samarati, "Confidentiality Protection in Large Databases," in A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years, S. Flesca, S. Greco, E. Masciari, D. Sacca' (eds.), Springer, 2017 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Supporting Users in Data Outsourcing and Protection in the Cloud," in International Conference on Cloud Computing and Services Science, M. Helfert, D. Ferguson, V.M. Munoz, J. Cardoso (eds.), Springer, 2017 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud," in The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday, P. Ryan, D. Naccache, J.-J. Quisquater (eds.), Springer, 2016 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Specification and Enforcement of Access Policies in Emerging Scenarios," in Cloud Computing Security: Foundations and Challenges, J.R. Vacca (ed.), CRC Press, August 2016 [BibTex]
  • P. Samarati, S. De Capitani di Vimercati, "Cloud Security: Issues and Concerns," in Encyclopedia on Cloud Computing, S. Murugesan, I. Bojanova (eds.), Wiley, 2016 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, S. Paraboschi, P. Samarati, "Privacy in Pervasive Systems: Social and Legal Aspects and Technical Solutions," in Data Management in Pervasive Systems, F. Colace, M. De Santo, V. Moscato, A. Picariello, F. Schreiber, L. Tanca (eds.), Springer, 2015 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Selective and Private Access to Outsourced Data Centers," in Handbook on Data Centers, S.U. Khan, A.Y. Zomaya (eds.), Springer, 2015 [BibTex]
  • S. De Capitani di Vimercati, R.F. Erbacher, S. Foresti, S. Jajodia, G. Livraga, P. Samarati, "Encryption and Fragmentation for Data Confidentiality in the Cloud," in Foundations of Security Analysis and Design VII, A. Aldini, J. Lopez, F. Martinelli (eds.), Springer, 2014 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, P. Samarati, "Database Security and Privacy," in Computer Science Handbook (3rd edition) - Information Systems and Information Technology, A. Tucker, H. Topi (eds.), Taylor and Francis Group, 2014 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Selective and Fine-Grained Access to Data in the Cloud," in Secure Cloud Computing, S. Jajodia, K. Kant, P. Samarati, V. Swarup, C. Wang (eds.), Springer, 2014 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, R. Sandhu, "Access Control," in Computer Science Handbook (3rd edition) - Information Systems and Information Technology, A. Tucker, H. Topi (eds.), Taylor and Francis Group, 2014 [BibTex]
  • M. Albanese, S. Jajodia, R. Jhawar, V. Piuri, "Securing Mission-Centric Operations in the Cloud," in Secure Cloud Computing, S. Jajodia, K. Kant, P. Samarati, V. Swarup, C. Wang (eds.), Springer, 2013 (to appear) [BibTex]
  • S. De Capitani di Vimercati, A. Genovese, G. Livraga, V. Piuri, F. Scotti, "Privacy and Security in Environmental Monitoring Systems: Issues and Solutions," in Computer and Information Security Handbook, 2nd Edition, J. Vacca (ed.), Morgan Kaufmann, June 2013 [BibTex]
  • S. Foresti, P. Samarati, "Supporting User Privacy Preferences in Digital Interactions," in Computer and Information Security Handbook, J.R. Vacca (ed.), Morgan Kaufmann, 2013 (2nd Edition) [BibTex]
  • R. Jhawar, V. Piuri, "Fault Tolerance and Resilience in Cloud Computing Environments," in Computer and Information Security Handbook, 2nd Edition, J. Vacca (ed.), Morgan Kaufmann, 2013 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Protecting Data in Outsourcing Scenarios," in Handbook on Securing Cyber-Physical Critical Infrastructure, S.K Das, K. Kant, N. Zhang (eds.), Morgan Kaufmann, 2012 [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, G. Neven, S. Paraboschi, E. Pedrini, F.-S. Preiss, P. Samarati, M. Verdicchio, "Advances in Access Control Policies," in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Huebner, K. Rannenberg (eds.), Springer, 2011 [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, E. Pedrini, P. Samarati, "Privacy-Aware Access Control System: Evaluation and Decision," in Digital Privacy: PRIME - Privacy and Identity Management for Europe, J. Camenisch, R. Leenes, D. Sommer (eds.), Springer, 2011 [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, P. Samarati, "Personal Privacy in Mobile Networks," in Mobile Technologies for Conflict Management: Online Dispute Resolution, Governance, Participation, M. Poblet (ed.), Springer Science+Business Media B.V., 2011 [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, P. Samarati, "Privacy Models and Languages: Access Control and Data Handling Policies," in Digital Privacy: PRIME - Privacy and Identity Management for Europe, J. Camenisch, R. Leenes, D. Sommer (eds.), Springer, 2011 [BibTex]
  • C. Bournez, C.A. Ardagna, "Policy Requirements and State of the Art," in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Huebner, K. Rannenberg (eds.), Springer, 2011 [BibTex]
  • M. Bezzi, S. De Capitani di Vimercati, S. Foresti, G. Livraga, S. Paraboschi, P. Samarati, "Data Privacy," in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hubner, K. Rannenberg (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Protecting Privacy in Data Release," in Foundations of Security Analysis and Design VI, A. Aldini, R. Gorrieri (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Selective Exchange of Confidential Data in the Outsourcing Scenario," in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hubner, K. Rannenberg (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Protecting Information Privacy in the Electronic Society," in e-Business and Telecommunications International Conference (ICETE 2009), J. Filipe, M.S. Obaidat (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, "Privacy of Outsourced Data," in Privacy and Identity Management for Life, M. Bezzi, P. Duquenoy, S. Fischer-Huebner, M. Hansen, G. Zhang (eds.), Springer, 2010 [BibTex]
  • C. A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "Location Privacy in Pervasive Computing," in Security and Privacy in Mobile and Wireless Networking, S. Gritzalis, T. Karygiannis, C. Skianis (eds.), Troubador Publishing, 2009 [BibTex]
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Theory of Privacy and Anonymity," in Algorithms and Theory of Computation Handbook (2nd edition), M. Atallah, M. Blanton (eds.), CRC Press, 2009 [BibTex]
  • C.A. Ardagna, C. Braghin, M. Cremonini, "Net Privacy," in Computer And Information Security Handbook, J.R. Vacca (ed.), Morgan Kaufmann, 2009 [BibTex]
  • C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "Access Control in Location-Based Services," in Privacy in Location Based Applications, C. Bettini, S. Jajodia, P. Samarati, S. Wang (eds.), Springer, 2009 [BibTex]
  • C.A. Ardagna, S. Jajodia, P. Samarati, A. Stavrou, "Privacy Preservation over Untrusted Mobile Networks," in Privacy in Location Based Applications: Research Issues and Emerging Trends, C. Bettini, S. Jajodia, P. Samarati, S. Wang (eds.), Springer, 2009 [BibTex]
  • C. A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Privacy in the Electronic Society: Emerging Problems and Solutions," in Statistical Science and Interdisciplinary Research - Vol. 3: Algorithms, Architectures and Information Systems Security, B.B. Bhattacharya, S. Sur-Kolay, S.C. Nandy, A. Bagchi (eds.), World Scientific Press, November 2008 [BibTex]
  • C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "Managing Privacy in Location-based Access Control Systems," in Mobile Intelligence: Mobile Computing and Computational Intelligence, L.T. Yang, A.B. Waluyo, J. Ma, L. Tan, B. Srinivasan (eds.), John Wiley & Sons, Inc., 2008 [BibTex]
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "k-Anonymous Data Mining: A Survey," in Privacy-Preserving Data Mining: Models and Algorithms, C.C. Aggarwal, P.S. Yu (eds.), Springer-Verlag, 2008 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Access Control Models for XML," in Handbook of Database Security: Applications and Trends, M. Gertz, S. Jajodia (eds.), Springer-Verlag, 2008 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Access Control," in The Handbook of Computer Networks, H. Bidgoli (ed.), Wiley, 2008 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Recent Advances in Access Control," in Handbook of Database Security: Applications and Trends, M. Gertz, S. Jajodia (eds.), Springer-Verlag, 2008 [BibTex]
  • C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Privacy-enhanced location services information," in Digital Privacy: Theory, Technologies and Practices, Acquisti, De Capitani di Vimercati, Gritzalis, Lambrinoudakis (eds.), Auerbach Publications (Taylor and Francis Group), 2007 [BibTex]
  • C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "Privacy-enhanced Location-based Access Control," in The Handbook of Database Security: Applications and Trends, M. Gertz, S. Jajodia (eds.), Springer-Verlag, 2007 [BibTex]
  • C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Trust Management," in Security, Privacy and Trust in Modern Data Management, M. Petkovic, W. Jonker (eds.), Springer-Verlag, 2007 [BibTex]
  • C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "XML Security," in Security, Privacy and Trust in Modern Data Management, M. Petkovic, W. Jonker (eds.), Springer-Verlag, 2007 [BibTex]
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "k-Anonymity," in Secure Data Management in Decentralized Systems, T. Yu, S. Jajodia (eds.), Springer-Verlag, 2007 [BibTex]
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Microdata Protection," in Secure Data Management in Decentralized Systems, T. Yu, S. Jajodia (eds.), Springer-Verlag, 2007 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Privacy of Outsourced Data," in Digital Privacy: Theory, Technologies and Practices, A. Acquisti, S. Gritzalis, C. Lambrinoudakis, S. De Capitani di Vimercati (eds.), Auerbach Publications (Taylor and Francis Group), 2007 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, P. Samarati, "Access Control Policies and Languages in Open Environments," in Secure Data Management in Decentralized Systems, T. Yu, S. Jajodia (eds.), Springer-Verlag, 2007 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Authorization and Access Control," in Security, Privacy and Trust in Modern Data Management, M. Petkovic, W. Jonker (eds.), Springer-Verlag, 2007 [BibTex]
  • M. Cremonini, P. Samarati, "Contingency Planning Management," in Handbook of Information Security, H. Bidgoli (ed.), Wiley, 2006 [BibTex]
  • S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Access control: Principles and Solutions," in Handbook of Information Security, H. Bidgoli (ed.), Wiley, 2006 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "New Directions in Access Control," in Cyberspace Security and Defense: Research Issues, Kluwer Academic Publisher, 2005 [BibTex]
  • P. Bonatti, P. Samarati, "Logics for Authorizations and Security," in Logics for Emerging Applications of Databases, J. Chomicki, R. van der Meyden, G. Saake (eds.), Springer-Verlag, 2003 [BibTex]
  • M. Cremonini, P. Samarati, "Disaster Recovery Planning," in The Internet Encyclopedia, H. Bidgoli (ed.), John Wiley & Sons Inc., 2003 [BibTex]
  • S. Castano, V. De Antonellis, S. De Capitani di Vimercati, M. Melchiori, "Data Schema Integration in Web-enabled Systems," in Web-enabled Systems Integration: practices and challenges, 2002 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, S. Jajodia, "Hardware and Software Data Security," in EOLSS The Encyclopedia of Life Support Systems, D. Kaeli, Z. Navabi (eds.), EOLSS Publishers, 2001 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, S. Jajodia, "Database Security," in Wiley Encyclopedia of Software Engineering, J. Marciniak (ed.), John Wiley & Sons, 2001 [BibTex]
  • P. Samarati, S. De Capitani di Vimercati, "Access Control: Policies, Models, and Mechanisms," in Foundations of Security Analysis and Design, R. Focardi, R. Gorrieri (eds.), Springer-Verlag, 2001 [BibTex]
  • P. Samarati, S. Jajodia, "Data Security," in Wiley Encyclopedia of Electrical and Electronics Engineering, J.G. Webster (ed.), John Wiley & Sons, February 1999 [BibTex]
  • R. Sandhu, P. Samarati, "Authentication, Access Control and Intrusion Detection," in CRC Handbook of Computer Science and Engineering, A. Tucker (ed.), CRC Press Inc., 1997 [BibTex]
  • S. Castano, G. Martella, P. Samarati, "Virus, Pirateria, Sabotaggio: l'Emergenza delle Difficoltà," in Le Scienze della Comunicazione, RCS Libri & Grandi Opere, 1996/1997 [BibTex]
  • E. Bertino, S. Jajodia, P. Samarati, "Access Controls in Object-Oriented Database Systems: Some Approaches and Issues," in Advanced Database Concepts and Research Issues, N. Adam, B. Bhargava (eds.), Springer-Verlag, 1993 [BibTex]

Papers in National Journals

  • S. Castano, G. Martella, P. Samarati, "Analysis, Comparison and Design of Role-Based Security Specifications," in Data & Knowledge Engineering (DKE), vol. 21, n. 1, December 1996, pp. 31-55 [BibTex]
  • G. Martella, P. Samarati, "La Sicurezza dell'Informazione Aziendale," in Rivista di Informatica, vol. XIX, n. 3, 1989, pp. 229-254 [BibTex]

Papers in Proceedings of National Conferences

  • S. Castano, V. De Antonellis, S. De Capitani di Vimercati, "An Interorganizational Knowledge Mediation Scheme for Information Sources over the Web," in Nono Convegno Nazionale su Sistemi Evoluti per Basi di Dati (SEBD 2000), Venezia, Italy, June 2001 (Extended abstract) [BibTex]
  • S. Castano, V. De Antonellis, S. De Capitani di Vimercati, M. Melchiori, "A Uniform Framework for Web Data Integration," in Ottavo Convegno Nazionale su Sistemi Evoluti per Basi di Dati (SEBD 2000), L'Aquila, Italy, June 2000 [BibTex]
  • S. Bergamaschi, S. Castano, S. De Capitani di Vimercati, S. Montanari, M. Vincini, "A Semantic Approach to Information Integration: The MOMIS Project," in Sesto Convegno della Associazione Italiana per l'Intelligenza Artificiale (AI*IA98), Padova, Italy, September 1998 [BibTex]
  • S. Bergamaschi, S. Castano, S. De Capitani di Vimercati, S. Montanari, M. Vincini, "Exploiting Schema Knowledge for the Integration of Heterogeneous Sources," in Sesto Convegno Nazionale su Sistemi Evoluti per Basi di Dati (SEBD 1998), Ancona, Italy, June 1998 [BibTex]
  • S. Castano, V. De Antonellis, S. De Capitani di Vimercati, M. Melchiori, "Information Integration on Multiple Heterogeneous Data Sources," in Sesto Convegno Nazionale su Sistemi Evoluti per Basi di Dati (SEBD 1998), Ancona, Italy, June 1998 [BibTex]
  • P. Samarati, "Multilevel Relational Databases: Issues and Solutions," in Atti del Congresso Annuale AICA, Palermo, September 1994 [BibTex]
  • S. Castano, P. Samarati, C. Villa, "Un Modello di Sicurezza per Ambienti Ipertestuali," in Atti del Congresso Annuale AICA, Lecce, September 1993 [BibTex]
  • S. Castano, P. Samarati, "Un Modello per la Rilevazione delle Minacce in un Sistema di Elaborazione," in Atti del Congresso Annuale AICA, Torino, October 1992 [BibTex]
  • S. Castano, G. Martella, P. Samarati, "Un Modello per la Protezione di Basi di Conoscenza," in Atti del Congresso Annuale AICA, Siena, September 1991 [BibTex]
  • M. Bianchini, G. Martella, P. Samarati, "Un Sistema di Sicurezza Object-Oriented per la Protezione dei Documenti nei Sistemi Informativi per l'Ufficio," in Atti del Congresso Annuale AICA, Bari, September 1990 [BibTex]

Other Publications

  • P. Samarati, "MoSAICroWN - Data Protection in the Data Market Scenario," in ERCIM News, vol. 121, April 2020 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Data Protection in Cloud Scenarios," in Proc. of 10th Int'l Workshop on Data Privacy Management (DPM 2015) and 4th Int'l Workshop on Quantitative Aspects of Security Assurance (QASA 2015), Vienna, Austria, September 21-22, 2015 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Data Security Issues in Cloud Scenarios," in Proc. of the 11th International Conference on Information Systems Security (ICISS 2015), Kolkata, India, December 16-20, 2015 [BibTex]
  • C.A. Ardagna, "Location information (privacy of)," in Encyclopedia of Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • C.A. Ardagna, "Privacy-Aware Languages," in Encyclopedia of Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • C.A. Ardagna, "XML-based access control languages," in Encyclopedia of Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, "Access Control Policies, Models, and Mechanisms," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, "Access Matrix," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Administrative Policies," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, "Authorizations," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, "Discretionary Access Control Policies (DAC)," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, S. Foresti, "Quasi-identifier," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, G. Livraga, "Grant Option," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, "Least Privilege," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, G. Livraga, "Privileges in SQL," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, G. Livraga, "SQL Access Control Model," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, "Privacy-Aware Access Control Policies," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, "Policy Composition," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Clark and Wilson," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Chinese Wall," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Mandatory Access Control Policies (MAC)," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Polyinstantiation," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. Foresti, "Macrodata Protection," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. Foresti, "Microdata Protection," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • G. Livraga, P. Samarati, "Multilevel Database," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • P. Samarati, "Flexible Authorization Framework (FAF)," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • P. Samarati, "k-anonymity," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • P. Samarati, "Recursive Revoke," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Data Privacy: Problems and Solutions," in Third International Conference on Information Systems Security (ICISS 2007), Delhi, India, December 16-20, 2007 (invited talk) [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Privacy in the Electronic Society," in Proc. of the International Conference on Information Systems Security (ICISS 2006), Kolkata, India, December 19-21, 2006 (invited talk) [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Protecting Privacy in the Global Infrastructure," in Proc. of the International Conference on Information Security and Computer Forensics, Chennai, India, December 6-8, 2006 (invited talk) [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Towards Privacy-Aware Identity Management," in ERCIM News, n. 63, October 2005 [BibTex]
  • E. Damiani, S. David, S. De Capitani di Vimercati, C. Fugazza, P. Samarati, "Open World Reasoning in Semantics-Aware Access Control: a Preliminary Study," in 2nd Italian Semantic Web Workshop (SWAP 2005), University of Trento, Trento, Italy, December 14-16, 2005 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, "Towards Semantics-Aware Access Control," in Proc. of the 18th IFIP WG11.3 Working Conference on Data and Application Security, Sitges, Spain, July 25-28, 2004 (invited talk) [BibTex]
  • C.A. Ardagna, S. De Capitani di Vimercati, "XrML - Un Linguaggio per la Gestione dei Diritti Digitali," in Internet Pro, 2004 [BibTex]
  • S. De Capitani di Vimercati, "L'evoluzione delle tecniche crittografiche per la trasmissione sicura di informazioni," in Sicurezza digitale, n. 1, 2004 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, C. Fugazza, P.Samarati, "Semantics-aware Privacy and Access Control: Motivation and Preliminary Results," in 1st Italian Semantic Web Workshop, Ancona, Italy, December 2004 [BibTex]
  • E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Reputation-based Pseudonymity: An Alternative or a Complement to Strong Identities?," in Workshop on Security and Dependability, Brussels, May 10, 2004 [BibTex]
  • E. Damiani, P. Samarati, "Towards Context Awareness in Ambient Intelligence," in Workshop on R&D challenges for Resilience in Ambient Intelligence, Brussels, March 19, 2004 [BibTex]
  • E. Damiani, P. Samarati, C.A. Ardagna, M. Lupo Stanghellini , "Sicurezza e Web Service," in Sicurezza Digitale, n. 2, October 2003 [BibTex]
  • S. De Capitani di Vimercati, P. Samarati, "Privacy in the Electronic Society," in TILT, n. 15, March 2003 [BibTex]
  • P. Samarati, "Access Control in the Open Infrastructure," in Proc. of the 1st International Conference on Information & Communication Technology (ICICT), Cairo, Egypt, December 2003 [BibTex]
  • P. Samarati, "Regulating Access to Web-published Data," in ERCIM News , April 2002 [BibTex]
  • E. Damiani, P. Samarati, "On the Secure Interoperability of E-Business Services," in Business Briefing, Global InfoSecurity, 2001 [BibTex]
  • S. Osborn, B. Thuraisingham, P. Samarati, "Panel of XML and Security," in Proc. of the 15th IFIP WG11.3 Working Conference on Database and Application Security, Niagara on the Lake, Ontario, Canada, July 2001 [BibTex]
  • B. Thuraisingham, S. Jajodia, P. Samarati, J. Dobson, M. Olivier, "Privacy Issues in WWW and Data Mining: Panel Discussion," in Database Security XII - Status and Prospects, S. Jajodia (ed.), Kluwer, 1999 [BibTex]
  • B. Thuraisingham, L. Schillper, P. Samarati, T.Y. Lin, S. Jajodia, C. Clifton, "Security Issues in Data Warehousing and Data Mining: Panel Discussion," in Database Security XI - Status and Prospects, T.Y. Lin, S. Qian (eds.), Chapman & Hall, 1998 [BibTex]
  • R. Thomas, E. Bertino, P. Samarati, H. Bruggemann, B. Hartman, R. Sandhu, T.C. Ting, "Panel Discussion: Role-Based Access Control and Next-Generation Security Models," in Database Security IX - Status and Prospects, D. Spooner, S. Demurjian, J. Dobson (eds.), Chapman & Hall, 1997 [BibTex]
  • M. Bianchini, S. Castano, G. Martella, P. Samarati, "Un Sistema di Sicurezza Object-Oriented per la Protezione di Documenti," in Sistemi e Software, vol. 25, January 1992 [BibTex]
  • S. Ceri, M.A.W. Houtsma, A.M. Keller, P. Samarati, "A Classification of Update Methods for Replicated Databases,", CS Dept., Stanford University (STAN-CS-91-1392), October 1991 [BibTex]
  • G. Martella, P. Samarati, "La Progettazione dei Sistemi di Protezione delle Informazioni in Azienda," in Data Manager, October 1989 [BibTex]