Pierangela Samarati
YOU?
Author Swipe
View article: Security-Aware Allocation of Replicated Data in Distributed Storage Systems
Security-Aware Allocation of Replicated Data in Distributed Storage Systems Open
View article: TA_DA: Target-Aware Data Anonymization
TA_DA: Target-Aware Data Anonymization Open
View article: Query Integrity in Smart Environments
Query Integrity in Smart Environments Open
View article: Privacy-Preserving Synthetically Augmented Knowledge Graphs with Semantic Utility
Privacy-Preserving Synthetically Augmented Knowledge Graphs with Semantic Utility Open
Knowledge Graphs (KGs) have recently gained relevant attention in many application domains, from healthcare to biotechnology, from logistics to finance. Financial organisations, central banks, economic research entities, and national super…
View article: Enforcing Corporate Governance Controls With Cloud-Based Services
Enforcing Corporate Governance Controls With Cloud-Based Services Open
View article: Tasks Scheduling with Load Balancing in Fog Computing: a Bi-level Multi-Objective Optimization Approach
Tasks Scheduling with Load Balancing in Fog Computing: a Bi-level Multi-Objective Optimization Approach Open
View article: Supporting Data Owner Control in IPFS Networks
Supporting Data Owner Control in IPFS Networks Open
View article: Multi-Dimensional Flat Indexing for Encrypted Data
Multi-Dimensional Flat Indexing for Encrypted Data Open
We address the problem of indexing encrypted data outsourced to an external cloud server to support server-side execution of multi-attribute queries. Our approach partitions the dataset in groups with the same number of tuples, and associa…
View article: Model-Agnostic Utility-Preserving Biometric Information Anonymization
Model-Agnostic Utility-Preserving Biometric Information Anonymization Open
The recent rapid advancements in both sensing and machine learning\ntechnologies have given rise to the universal collection and utilization of\npeople's biometrics, such as fingerprints, voices, retina/facial scans, or\ngait/motion/gestur…
View article: Model-Agnostic Utility-Preserving Biometric Information Anonymization
Model-Agnostic Utility-Preserving Biometric Information Anonymization Open
View article: Guest Editorial Special Section on Security, Privacy and Trust for Consumer Smart Devices
Guest Editorial Special Section on Security, Privacy and Trust for Consumer Smart Devices Open
Currently, smart devices such as smartphones have become common and essential in our daily lives, which provide many new intelligent services. For example, consumers will use their smart devices for online purchase and personal data storag…
View article: DT-Anon: Decision Tree Target-Driven Anonymization
DT-Anon: Decision Tree Target-Driven Anonymization Open
View article: Protecting Data and Queries in Cloud-Based Scenarios
Protecting Data and Queries in Cloud-Based Scenarios Open
The availability of cloud services offered by different providers brings several advantages to users and companies, facilitating the storage, sharing, and processing of data. At the same time, the adoption of cloud services brings new secu…
View article: Mix&Slice for Efficient Access Revocation on Outsourced Data
Mix&Slice for Efficient Access Revocation on Outsourced Data Open
A complex problem when outsourcing data to the cloud is access control management. Encryption, by wrapping data with a self-enforcing protection layer, provides access control enforcement by making resources intelligible only to users hold…
View article: Supporting User Protection Requirements in Cloud-Based Data Outsourcing
Supporting User Protection Requirements in Cloud-Based Data Outsourcing Open
The cloud is nowadays widely used for storing and managing data, and leveraging scalable and flexible IT infrastructures while guaranteeing continuous data and application availability from anywhere at any time. The cloud market is charact…
View article: Distributed query execution under access restrictions
Distributed query execution under access restrictions Open
The availability of a multitude of data sources has naturally increased the need for subjects to collaborate for supporting distributed computations that combine different data collections for their elaboration and analysis. Due to the qui…
View article: Sentinels and Twins: Effective Integrity Assessment for Distributed Computation
Sentinels and Twins: Effective Integrity Assessment for Distributed Computation Open
Distributed computing supports large scale and data-intensive computations with the cooperation of a multitude of parties, each responsible for a portion of the workload. Such parties are often not fully reliable and may return incorrect r…
View article: MaSS: Multi-attribute Selective Suppression
MaSS: Multi-attribute Selective Suppression Open
The recent rapid advances in machine learning technologies largely depend on the vast richness of data available today, in terms of both the quantity and the rich content contained within. For example, biometric data such as images and voi…
View article: Scalable Distributed Data Anonymization for Large Datasets
Scalable Distributed Data Anonymization for Large Datasets Open
-Anonymity and -diversity are two well-known privacy metrics that guarantee protection of the respondents of a dataset by obfuscating information that can disclose their identities and sensitive information. Existing solutions for enforc…
View article: Digital infrastructure policies for data security and privacy in smart cities
Digital infrastructure policies for data security and privacy in smart cities Open
View article: Multi-dimensional indexes for point and range queries on outsourced encrypted data
Multi-dimensional indexes for point and range queries on outsourced encrypted data Open
We present an approach for indexing encrypted data stored at external providers to enable provider-side evaluation of queries. Our approach supports the evaluation of point and range conditions on multiple attributes. Protection against in…
View article: An authorization model for query execution in the cloud
An authorization model for query execution in the cloud Open
View article: Towards Machine-Learning-Based 5G and Beyond Intelligent Networks: The MARSAL Project Vision
Towards Machine-Learning-Based 5G and Beyond Intelligent Networks: The MARSAL Project Vision Open
5G mobile networks will be soon available to handle all types of applications and to provide service to massive numbers of users. In this complex and dynamic network ecosystem, end-to-end performance analysis and optimization will be key f…
View article: Scalable Distributed Data Anonymization
Scalable Distributed Data Anonymization Open
We present an approach for enabling a distributed anonymization process over large collections of sensor data. Our approach anonymizes large datasets (which might not fit in main memory) using an arbitrary number of workers within the Spar…
View article: Artifact: Scalable Distributed Data Anonymization
Artifact: Scalable Distributed Data Anonymization Open
We describe the artifact, publicly available at [1], that implements the proposal in [2], and the reproduction of the experimental results. It is an extended and distributed version of the Mondrian anonymization algorithm. Our solution ano…
View article: Distributed Query Evaluation over Encrypted Data
Distributed Query Evaluation over Encrypted Data Open
View article: Enforcing Corporate Governance's Internal Controls and Audit in the Cloud
Enforcing Corporate Governance's Internal Controls and Audit in the Cloud Open
More and more organizations are today using the cloud for their business as a quite convenient alternative to in-house solutions for storing, processing, and managing data. Cloud-based solutions are then permeating almost all aspects of bu…
View article: Specification and Enforcement of Access Policies in Emerging Scenarios
Specification and Enforcement of Access Policies in Emerging Scenarios Open
The enforcement of access restrictions modeled by access patterns requires a revision of the traditional query evaluation strategies. Users as well as companies access, disseminate, and share information with other parties to offer service…
View article: Toward Owners’ Control in Digital Data Markets
Toward Owners’ Control in Digital Data Markets Open
Finding a good balance between the availability of data for analysis and the control that individuals should exercise over their own data is a key requirement for generating innovation and growth in our data-driven society. A promising dir…
View article: Dynamic Allocation for Resource Protection in Decentralized Cloud Storage
Dynamic Allocation for Resource Protection in Decentralized Cloud Storage Open
Decentralized Cloud Storage (DCS) networks represent an interesting solution for data storage and management. DCS networks rely on the voluntary effort of a considerable number of (possibly untrusted) nodes, which may dynamically join and …