Sara Foresti


Ontology type: schema:Person     


Person Info

NAME

Sara

SURNAME

Foresti

Publications in SciGraph latest 50 shown

  • 2022-03-03 Towards Owner-Controlled Data Sharing in ADVANCES IN COMPUTING, INFORMATICS, NETWORKING AND CYBERSECURITY
  • 2021-11-06 An authorization model for query execution in the cloud in THE VLDB JOURNAL
  • 2021-08-04 Information Security and Privacy – Challenges and Outlook in ADVANCING RESEARCH IN INFORMATION AND COMMUNICATION TECHNOLOGY
  • 2021-07-25 Quasi-Identifier in ENCYCLOPEDIA OF CRYPTOGRAPHY, SECURITY AND PRIVACY
  • 2021-07-14 Distributed Query Evaluation over Encrypted Data in DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV
  • 2018-11-30 Protecting Resources and Regulating Access in Cloud-Based Object Storage in FROM DATABASE TO CYBER SECURITY
  • 2018-11-30 Supporting Users in Cloud Plan Selection in FROM DATABASE TO CYBER SECURITY
  • 2018-11-30 Access Privacy in the Cloud in FROM DATABASE TO CYBER SECURITY
  • 2017-07-20 Supporting Users in Data Outsourcing and Protection in the Cloud in CLOUD COMPUTING AND SERVICES SCIENCE
  • 2017-06-14 Access Control Management for Secure Cloud Storage in SECURITY AND PRIVACY IN COMMUNICATION NETWORKS
  • 2017-05-31 Confidentiality Protection in Large Databases in A COMPREHENSIVE GUIDE THROUGH THE ITALIAN DATABASE RESEARCH OVER THE LAST 25 YEARS
  • 2016-07-02 Access Control for the Shuffle Index in DATA AND APPLICATIONS SECURITY AND PRIVACY XXX
  • 2016-03-18 Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud in THE NEW CODEBREAKERS
  • 2016 Data Protection in Cloud Scenarios in DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE
  • 2015-12-31 Data Security Issues in Cloud Scenarios in INFORMATION SYSTEMS SECURITY
  • 2015-05-09 Integrity for Approximate Joins on Untrusted Computational Servers in ICT SYSTEMS SECURITY AND PRIVACY PROTECTION
  • 2015-03-17 Selective and Private Access to Outsourced Data Centers in HANDBOOK ON DATA CENTERS
  • 2015 Privacy in Pervasive Systems: Social and Legal Aspects and Technical Solutions in DATA MANAGEMENT IN PERVASIVE SYSTEMS
  • 2014 Encryption and Fragmentation for Data Confidentiality in the Cloud in FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN VII
  • 2014 Optimizing Integrity Checks for Join Queries in the Cloud in DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII
  • 2013-12-07 Selective and Fine-Grained Access to Data in the Cloud in SECURE CLOUD COMPUTING
  • 2013-11-08 Privacy-aware electronic society in ANNALS OF TELECOMMUNICATIONS
  • 2013 Extending Loose Associations to Multiple Fragments in DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII
  • 2013 Distributed Shuffling for Preserving Access Confidentiality in COMPUTER SECURITY – ESORICS 2013
  • 2012 Enforcing Subscription-Based Authorization Policies in Cloud Scenarios in DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI
  • 2012 Support for Write Privileges on Outsourced Data in INFORMATION SECURITY AND PRIVACY RESEARCH
  • 2011-06-23 Selective Exchange of Confidential Data in the Outsourcing Scenario in PRIVACY AND IDENTITY MANAGEMENT FOR LIFE
  • 2011-06-23 Data Privacy in PRIVACY AND IDENTITY MANAGEMENT FOR LIFE
  • 2011 Protecting Privacy in Data Release in FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN VI
  • 2011 Protecting Information Privacy in the Electronic Society in E-BUSINESS AND TELECOMMUNICATIONS
  • 2011 Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach in DATA AND APPLICATIONS SECURITY AND PRIVACY XXV
  • 2011 Privacy in Data Publishing in DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY
  • 2011 Preserving Privacy in Data Outsourcing in NONE
  • 2011 Supporting Concurrency in Private Data Outsourcing in COMPUTER SECURITY – ESORICS 2011
  • 2011 Macrodata Protection in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Microdata Protection in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2011 Quasi-Identifier in ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY
  • 2010 Fine-Grained Disclosure of Access Policies in INFORMATION AND COMMUNICATIONS SECURITY
  • 2010 Privacy of Outsourced Data in PRIVACY AND IDENTITY MANAGEMENT FOR LIFE
  • 2009 Efficient Key Management for Enforcing Access Control in Outsourced Scenarios in EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST
  • 2009 Keep a Few: Outsourcing Data While Maintaining Confidentiality in COMPUTER SECURITY – ESORICS 2009
  • 2009 Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients in DATA AND APPLICATIONS SECURITY XXIII
  • 2008-01-01 Access Control Models for XML in HANDBOOK OF DATABASE SECURITY
  • 2008-01-01 Recent Advances in Access Control in HANDBOOK OF DATABASE SECURITY
  • 2008 k-Anonymous Data Mining: A Survey in PRIVACY-PRESERVING DATA MINING
  • 2007 An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing in NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS
  • 2007 Fragmentation and Encryption to Enforce Privacy in Data Storage in COMPUTER SECURITY – ESORICS 2007
  • 2007 Access Control Policies and Languages in Open Environments in SECURE DATA MANAGEMENT IN DECENTRALIZED SYSTEMS
  • 2007 Microdata Protection in SECURE DATA MANAGEMENT IN DECENTRALIZED SYSTEMS
  • 2007 Authorization and Access Control in SECURITY, PRIVACY, AND TRUST IN MODERN DATA MANAGEMENT
  • Affiliations

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "http://www.grid.ac/institutes/grid.4708.b", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }
        ], 
        "familyName": "Foresti", 
        "givenName": "Sara", 
        "id": "sg:person.011023475701.12", 
        "identifier": [
          {
            "name": "orcid_id", 
            "type": "PropertyValue", 
            "value": "0000-0002-1658-6734"
          }
        ], 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011023475701.12", 
          "https://orcid.org/0000-0002-1658-6734"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2022-05-20T08:05", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/person/person_840.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.011023475701.12'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.011023475701.12'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.011023475701.12'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.011023475701.12'


     




    Preview window. Press ESC to close (or click here)


    ...