Search

Your search keyword '"Sara Foresti"' showing total 91 results

Search Constraints

Start Over You searched for: Author "Sara Foresti" Remove constraint Author: "Sara Foresti" Topic computer.software_genre Remove constraint Topic: computer.software_genre
91 results on '"Sara Foresti"'

Search Results

1. An authorization model for query execution in the cloud

2. Distributed Query Evaluation over Encrypted Data

4. Enforcing Corporate Governance's Internal Controls and Audit in the Cloud

5. Securing Resources in Decentralized Cloud Storage

6. Empowering Owners with Control in Digital Data Markets

7. Data security and privacy in the cloud

8. Protecting Resources and Regulating Access in Cloud-Based Object Storage

9. Enforcing authorizations while protecting access confidentiality1

10. Loose associations to increase utility in data publishing1

11. Distributed Shuffle Index in the Cloud: Implementation and Evaluation

12. Access Control Management for Secure Cloud Storage

13. Integrity for join queries in the cloud

14. A Dynamic Tree-Based Data Structure for Access Privacy in the Cloud

15. Efficient integrity checks for join queries in the cloud1

16. Cryptology and Network Security

17. Access Control for the Shuffle Index

18. Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud

19. DATA PRIVACY: DEFINITIONS AND TECHNIQUES

20. Integrating trust management and access control in data-intensive Web applications

21. Authorization enforcement in distributed query evaluation*

22. Shuffle Index: efficient and private access to outsourced data

23. Selective and Private Access to Outsourced Data Centers

24. Protecting Access Confidentiality with Data Distribution and Swapping

25. Security and Trust Management

26. Data Protection in Cloud Scenarios

27. Three-server swapping for access confidentiality

28. Optimizing Integrity Checks for Join Queries in the Cloud

29. Fragmentation in presence of data dependencies

30. On information leakage by indexes over data fragments

31. Enforcing dynamic write privileges in data outsourcing

32. 12th workshop on privacy in the electronic society (WPES 2013)

33. Extending loose associations to multiple fragments

34. Distributed Shuffling for Preserving Access Confidentiality

35. Enforcing Subscription-Based Authorization Policies in Cloud Scenarios

36. Support for Write Privileges on Outsourced Data

37. Computer Security – ESORICS 2012

38. Private data indexes for selective access to outsourced data

39. Supporting concurrency in private data outsourcing

40. Selective Encryption to Enforce Access Control

41. Combining Fragmentation and Encryption to Protect Data Privacy

42. Distributed Query Processing under Safely Composed Permissions

43. Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach

44. Fine-grained disclosure of access policies

45. Data and Applications Security and Privacy XXIV

46. Managing key hierarchies for access control enforcement: Heuristic approaches

47. Encryption policies for regulating access to outsourced data

48. Encryption-based policy enforcement for cloud storage

49. Supporting privacy preferences in credential-based interactions

50. Access control for smarter healthcare using policy spaces

Catalog

Books, media, physical & digital resources