Follow
Giovanni Livraga
Giovanni Livraga
Computer Science Department, Universita' degli Studi di Milano
Verified email at unimi.it - Homepage
Title
Cited by
Cited by
Year
Data privacy: Definitions and techniques
S De Capitani Di Vimercati, S Foresti, G Livraga, P Samarati
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems …, 2012
1032012
Fragmentation in presence of data dependencies
SDC di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ...
IEEE Transactions on Dependable and Secure Computing 11 (6), 510-523, 2014
602014
Enforcing dynamic write privileges in data outsourcing
SDC Di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ...
Computers & Security 39, 47-63, 2013
462013
Encryption and fragmentation for data confidentiality in the cloud
S De Capitani di Vimercati, RF Erbacher, S Foresti, S Jajodia, G Livraga, ...
Foundations of Security Analysis and Design VII: FOSAD 2012/2013 Tutorial …, 2014
372014
Protecting Privacy of User Information in Continuous Location-Based Services
CA Ardagna, G Livraga, P Samarati
Proc. of the 15th IEEE International Conference on Computational Science and …, 2012
332012
Enforcing subscription-based authorization policies in cloud scenarios
S De Capitani di Vimercati, S Foresti, S Jajodia, G Livraga
Data and Applications Security and Privacy XXVI, 314-329, 2012
24*2012
Protecting privacy in data release
S De Capitani di Vimercati, S Foresti, G Livraga, P Samarati
Foundations of Security Analysis and Design VI: FOSAD Tutorial Lectures 11, 1-34, 2011
242011
Practical techniques building on encryption for protecting and managing data in the cloud
S De Capitani di Vimercati, S Foresti, G Livraga, P Samarati
The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His …, 2016
232016
Extending loose associations to multiple fragments
S De Capitani di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ...
Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 …, 2013
202013
An OBDD approach to enforce confidentiality and visibility constraints in data publishing
V Ciriani, S De Capitani di Vimercati, S Foresti, G Livraga, P Samarati
Journal of Computer Security 20 (5), 463-508, 2012
202012
Integrity for distributed queries
SDC di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ...
2014 IEEE Conference on Communications and Network Security, 364-372, 2014
192014
A fuzzy-based brokering service for cloud plan selection
SDC di Vimercati, S Foresti, G Livraga, V Piuri, P Samarati
IEEE Systems Journal 13 (4), 4101-4109, 2019
172019
An authorization model for multi provider queries
S De Capitani di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ...
Proceedings of the VLDB Endowment 11 (3), 256-268, 2017
172017
Supporting Application Requirements in Cloud-based IoT Information Processing.
SDC di Vimercati, G Livraga, V Piuri, P Samarati, GA Soares
IoTBD, 65-72, 2016
172016
Loose associations to increase utility in data publishing 1
S De Capitani di Vimercati, S Foresti, S Jajodia, G Livraga, S Paraboschi, ...
Journal of Computer Security 23 (1), 59-88, 2015
172015
A consensus-based approach for selecting cloud plans
A Arman, S Foresti, G Livraga, P Samarati
2016 IEEE 2nd International Forum on Research and Technologies for Society …, 2016
152016
Enforcing confidentiality and data visibility constraints: An OBDD approach
V Ciriani, S De Capitani di Vimercati, S Foresti, G Livraga, P Samarati
Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 …, 2011
152011
Privacy and security in environmental monitoring systems: issues and solutions
SDC di Vimercati, A Genovese, G Livraga, V Piuri, F Scotti
Computer and information security handbook, 835-853, 2013
142013
Data confidentiality and information credibility in on-line ecosystems
G Livraga, M Viviani
Proceedings of the 11th international conference on management of digital …, 2019
132019
Modeling and Preventing Inferences from Sensitive Value Distributions in Data Release
M Bezzi, S De Capitani di Vimercati, S Foresti, G Livraga, P Samarati, ...
Journal of Computer Security (JCS) 20 (4), 393-436, 2012
112012
The system can't perform the operation now. Try again later.
Articles 1–20