Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Samarati, Pierangela Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 5 of 7 reviews    
  Shuffle index: efficient and private access to outsourced data
De Capitani Di Vimercati S., Foresti S., Paraboschi S., Pelosi G., Samarati P. ACM Transactions on Storage 11(4): 1-55, 2015.  Type: Article

There exists “a clear need to provide proper confidentiality protection” to outsourced data where the data itself and access to that data is “not under the control of the data owner.” Content pro...
...
Jan 20 2016  
  Secure cloud computing
Jajodia S., Kant K., Samarati P., Singhal A., Swarup V., Wang C., Springer Publishing Company, Incorporated, New York, NY, 2014. 350 pp.  Type: Book (978-1-461492-77-1)

The increased prevalence of cloud computing has led to fears of more and more damaging cloud security attacks. In the cloud environment, three levels of access have traditionally been defined: infrastructure as a service (IaaS), platfo...
...
Sep 25 2014  
  Privacy in location-based applications: research issues and emerging trends
Bettini C., Jajodia S., Samarati P., Wang X. Springer-Verlag, New York, NY, 2009.  Type: Divisible Book

This edited book provides the state of the art in research on privacy in location-based applications. The collection consists of nine chapters that accomplish two key objectives....
...
Mar 12 2010  
  An XML-based approach to combine firewalls and Web services security specifications
Cremonini M., di Vimercati S., Damiani E. (ed), Samarati P.  XML security (Proceedings of the 2003 ACM workshop, Fairfax, Virginia, Oct 31, 2003) 69-78, 2003.  Type: Proceedings

The authors extend their previous work on simple object access protocol (SOAP) security to address broader questions associated with the integration of Web services security with network security. They discuss the limitations of Web se...
...
Jun 4 2004  
  An authorization model for a public key management service
Samarati P., Reiter M., Jajodia S. ACM Transactions on Information and System Security 4(4): 453-482, 2001.  Type: Article

One basic requirement of key-based security systems is the ability to control access to both public and private keys. The authors present a powerful yet flexible authorization model for controlling access to public and private keys hel...
...
May 22 2002  

 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy