DE CAPITANI DI VIMERCATI, SABRINA
 Distribuzione geografica
Continente #
NA - Nord America 7.461
EU - Europa 4.218
AS - Asia 3.359
AF - Africa 415
OC - Oceania 209
SA - Sud America 88
Continente sconosciuto - Info sul continente non disponibili 6
Totale 15.756
Nazione #
US - Stati Uniti d'America 7.214
CN - Cina 1.171
IT - Italia 926
DE - Germania 757
IN - India 674
GB - Regno Unito 502
FR - Francia 424
FI - Finlandia 396
CA - Canada 225
NL - Olanda 210
AU - Australia 178
IR - Iran 171
KR - Corea 163
ID - Indonesia 142
IE - Irlanda 128
BE - Belgio 124
ZA - Sudafrica 119
SA - Arabia Saudita 115
MY - Malesia 112
PK - Pakistan 112
GR - Grecia 104
JP - Giappone 90
HK - Hong Kong 86
UA - Ucraina 80
SG - Singapore 78
RO - Romania 73
CH - Svizzera 71
ET - Etiopia 69
SE - Svezia 67
RU - Federazione Russa 66
TW - Taiwan 63
VN - Vietnam 49
DZ - Algeria 43
EG - Egitto 43
TR - Turchia 42
ES - Italia 40
KE - Kenya 35
OM - Oman 35
AT - Austria 33
BR - Brasile 32
NO - Norvegia 31
LK - Sri Lanka 30
IL - Israele 28
NZ - Nuova Zelanda 28
PT - Portogallo 28
JO - Giordania 25
PH - Filippine 25
EU - Europa 23
AE - Emirati Arabi Uniti 22
CZ - Repubblica Ceca 22
NG - Nigeria 22
DK - Danimarca 21
PL - Polonia 19
BD - Bangladesh 17
CO - Colombia 16
MT - Malta 16
CY - Cipro 15
PE - Perù 15
CL - Cile 14
LU - Lussemburgo 14
TH - Thailandia 14
MA - Marocco 13
TN - Tunisia 13
HU - Ungheria 11
MX - Messico 11
MU - Mauritius 10
BH - Bahrain 9
GH - Ghana 9
LT - Lituania 9
NP - Nepal 9
AL - Albania 8
IQ - Iraq 8
KW - Kuwait 8
QA - Qatar 8
RS - Serbia 8
SD - Sudan 8
KZ - Kazakistan 7
UG - Uganda 7
ZM - Zambia 7
SK - Slovacchia (Repubblica Slovacca) 6
YE - Yemen 6
BB - Barbados 5
SI - Slovenia 5
AF - Afghanistan, Repubblica islamica di 4
AR - Argentina 4
BG - Bulgaria 4
BN - Brunei Darussalam 4
MD - Moldavia 4
SC - Seychelles 4
BY - Bielorussia 3
EC - Ecuador 3
KH - Cambogia 3
LY - Libia 3
PG - Papua Nuova Guinea 3
PR - Porto Rico 3
SY - Repubblica araba siriana 3
AM - Armenia 2
BO - Bolivia 2
EE - Estonia 2
GE - Georgia 2
Totale 15.745
Città #
Houston 815
Ashburn 736
Fairfield 655
Ann Arbor 462
Seattle 345
Lappeenranta 334
Milan 325
Woodbridge 323
Buffalo 287
Beijing 267
Wilmington 247
Cambridge 241
Santa Cruz 192
Bengaluru 110
Hangzhou 103
Dublin 94
Brussels 87
Modena 87
Mountain View 77
San Diego 75
Shanghai 74
Jakarta 64
Wuhan 64
Chicago 63
Chennai 61
Southend 56
Delhi 52
Mumbai 52
Toronto 51
Columbus 50
Guangzhou 49
New York 48
Redmond 48
Boardman 47
London 47
Los Angeles 46
Ottawa 45
Phoenix 45
Taipei 45
Helsinki 44
Tianjin 44
Nanjing 42
Singapore 42
Shenyang 40
San Jose 39
Islamabad 38
Athens 37
Berlin 34
Sydney 34
Sunnyvale 33
Dammam 32
Hyderabad 32
Norwalk 32
Tokyo 32
Frankfurt am Main 31
Bergamo 30
Clearwater 30
Rome 30
Boulder 29
Amsterdam 28
Las Vegas 28
Muizenberg 28
Paris 28
Pune 28
University Park 28
Seri Kembangan 27
Chandigarh 26
Dallas 26
Fairfax 26
Kuala Lumpur 25
Piacenza 25
Addis Ababa 24
Central 24
Karlsruhe 24
Atlanta 23
Eindhoven 23
Fremont 23
Passau 23
Bangalore 21
Des Moines 21
Falls Church 21
Riyadh 21
Seoul 21
Johannesburg 20
Munich 20
Nürnberg 20
Riva 20
Changsha 19
Jeddah 19
Kiez 19
Etobicoke 18
Grenoble 18
Hanoi 18
Xian 18
Council Bluffs 17
Melbourne 17
New Delhi 17
Kraainem 16
Madrid 16
Pretoria 16
Totale 8.474
Nome #
Cloud Security: Issues and Concerns, file dfa8b996-0c70-748b-e053-3a05fe0a3a96 2.188
Location privacy protection through obfuscation-based techniques, file dfa8b990-e52b-748b-e053-3a05fe0a3a96 894
Access control for smarter healthcare using policy spaces, file dfa8b98f-9556-748b-e053-3a05fe0a3a96 893
Protecting data in outsourcing scenarios, file dfa8b98f-9cd9-748b-e053-3a05fe0a3a96 721
Data security issues in cloud scenarios, file dfa8b995-94f6-748b-e053-3a05fe0a3a96 414
PrimeLife policy language, file dfa8b98f-7692-748b-e053-3a05fe0a3a96 388
Data Security and Privacy in the Cloud, file dfa8b99e-4c72-748b-e053-3a05fe0a3a96 385
Minimising disclosure of client information in credential-based interactions, file dfa8b98f-b2f5-748b-e053-3a05fe0a3a96 375
Securing Resources in Decentralized Cloud Storage, file dfa8b99e-4feb-748b-e053-3a05fe0a3a96 345
Towards privacy-aware identity management, file dfa8b98e-9855-748b-e053-3a05fe0a3a96 335
Practical techniques building on encryption for protecting and managing data in the Cloud, file dfa8b995-5666-748b-e053-3a05fe0a3a96 303
Toward Owners' Control in Digital Data Markets, file dfa8b9a0-ec4e-748b-e053-3a05fe0a3a96 296
An Authorization Model for Multi-Provider Queries, file dfa8b99a-31ce-748b-e053-3a05fe0a3a96 288
Enforcing authorizations while protecting access confidentiality, file dfa8b99a-1536-748b-e053-3a05fe0a3a96 279
Access Control Management for Secure Cloud Storage, file dfa8b999-2851-748b-e053-3a05fe0a3a96 275
A Fuzzy-Based Brokering Service for Cloud Plan Selection, file dfa8b9a0-317a-748b-e053-3a05fe0a3a96 272
Three-server swapping for access confidentiality, file dfa8b995-3dc5-748b-e053-3a05fe0a3a96 259
Supporting Application Requirements in Cloud-based IoT Information Processing, file dfa8b995-e0b5-748b-e053-3a05fe0a3a96 258
Confidentiality Protection in Large Databases, file dfa8b998-9c1f-748b-e053-3a05fe0a3a96 256
Digital Infrastructure Policies for Data Security and Privacy in Smart Cities, file dfa8b9a9-4314-748b-e053-3a05fe0a3a96 255
Empowering Owners with Control in Digital Data Markets, file dfa8b99e-e1c9-748b-e053-3a05fe0a3a96 254
Minimizing disclosure of private information in credential-based interactions : a graph-based approach, file dfa8b98f-9655-748b-e053-3a05fe0a3a96 251
A dynamic tree-based data structure for access privacy in the cloud, file dfa8b998-5cb9-748b-e053-3a05fe0a3a96 251
Managing data sharing in OpenStack Swift with Over-Encryption, file dfa8b996-e848-748b-e053-3a05fe0a3a96 250
Supporting Users in Cloud Plan Selection, file dfa8b99d-3221-748b-e053-3a05fe0a3a96 248
Application requirements with preferences in cloud-based information processing, file dfa8b996-c027-748b-e053-3a05fe0a3a96 235
Supporting User Requirements and Preferences in Cloud Plan Selection, file dfa8b999-eaa5-748b-e053-3a05fe0a3a96 233
Dynamic Allocation for Resource Protection in Decentralized Cloud Storage, file dfa8b9a0-6fd4-748b-e053-3a05fe0a3a96 230
Selective and private access to outsourced data centers, file dfa8b995-93a3-748b-e053-3a05fe0a3a96 228
Multi-Provider Secure Processing of Sensors Data, file dfa8b99e-e58a-748b-e053-3a05fe0a3a96 227
Data protection in Cloud scenarios, file dfa8b995-6b0d-748b-e053-3a05fe0a3a96 223
Access control for the shuffle index, file dfa8b995-54a3-748b-e053-3a05fe0a3a96 217
Privacy and Security in Environmental Monitoring Systems, file dfa8b99a-77e1-748b-e053-3a05fe0a3a96 214
Loose associations to increase utility in data publishing, file dfa8b995-7f80-748b-e053-3a05fe0a3a96 212
Specification and enforcement of access policies in emerging scenarios, file dfa8b995-c444-748b-e053-3a05fe0a3a96 211
Protecting resources and regulating access in cloud-based object storage, file dfa8b99d-4e40-748b-e053-3a05fe0a3a96 210
Distributed Shuffle Index in the Cloud: Implementation and Evaluation, file dfa8b999-d8b6-748b-e053-3a05fe0a3a96 206
Privacy in pervasive systems: social and legal aspects and technical solutions, file dfa8b995-81d0-748b-e053-3a05fe0a3a96 203
Distributed shuffle index: Analysis and implementation in an industrial testbed, file dfa8b99a-0d60-748b-e053-3a05fe0a3a96 202
Computing range queries on obfuscated data, file dfa8b98f-2ddc-748b-e053-3a05fe0a3a96 201
Supporting Users in Data Outsourcing and Protection in the Cloud, file dfa8b999-211f-748b-e053-3a05fe0a3a96 200
Shuffle index : efficient and private access to outsourced data, file dfa8b995-52ed-748b-e053-3a05fe0a3a96 188
Security-aware data allocation in multicloud scenarios, file dfa8b9a3-482f-748b-e053-3a05fe0a3a96 167
Access Privacy in the Cloud, file dfa8b99c-f02a-748b-e053-3a05fe0a3a96 165
Integrity for approximate joins on untrusted computational servers, file dfa8b995-624b-748b-e053-3a05fe0a3a96 161
A WOWA-based aggregation technique on trust values connected to metadata, file dfa8b99f-2ac5-748b-e053-3a05fe0a3a96 158
Mix&Slice: efficient access revocation in the Cloud, file dfa8b996-ba70-748b-e053-3a05fe0a3a96 145
Enforcing Corporate Governance's Internal Controls and Audit in the Cloud, file dfa8b9a9-ad54-748b-e053-3a05fe0a3a96 142
Distributed query evaluation over encrypted data, file dfa8b9a7-718a-748b-e053-3a05fe0a3a96 122
Support for write privileges on outsourced data, file dfa8b98f-bb46-748b-e053-3a05fe0a3a96 114
Multi-dimensional indexes for point and range queries on outsourced encrypted data, file dfa8b9a9-85f1-748b-e053-3a05fe0a3a96 114
Optimizing integrity checks for join queries in the cloud, file dfa8b991-323f-748b-e053-3a05fe0a3a96 107
Artifact: Scalable Distributed Data Anonymization, file dfa8b9a7-e07c-748b-e053-3a05fe0a3a96 106
Scalable Distributed Data Anonymization, file dfa8b9a8-12f4-748b-e053-3a05fe0a3a96 106
Supporting user privacy preferences on information release in open scenarios, file dfa8b98f-7c14-748b-e053-3a05fe0a3a96 85
A component-based architecture for secure data publication, file dfa8b9a2-fdad-748b-e053-3a05fe0a3a96 78
An authorization model for query execution in the cloud, file dfa8b9a8-c8b1-748b-e053-3a05fe0a3a96 59
Efficient integrity checks for join queries in the cloud, file dfa8b995-a30c-748b-e053-3a05fe0a3a96 46
Privacy and security in environmental monitoring systems : issues and solutions, file dfa8b993-845d-748b-e053-3a05fe0a3a96 36
Protecting Data and Queries in Cloud-Based Scenarios, file b50cbc49-b026-4809-a5b7-b7701984d856 17
Scalable Distributed Data Anonymization for Large Datasets, file 74448690-3c75-4738-ac0c-ed37139c27ab 16
Open world reasoning in semantics-aware access control: A preliminary study, file dfa8b9a0-8c06-748b-e053-3a05fe0a3a96 14
Supporting User Protection Requirements in Cloud-Based Data Outsourcing, file 7b489ddc-731a-4f09-81f5-e197b0c0df71 12
An authorization model for query execution in the cloud, file dfa8b9a8-b667-748b-e053-3a05fe0a3a96 10
Distributed query execution under access restrictions, file 890991be-5db0-40cc-8d79-f29754d63ac6 8
Distributed query execution under access restrictions, file a47102b9-ac9e-4900-bc92-d49d5afe83f8 7
Sentinels and twins : effective integrity assessment for distributed computation, file 60411d90-160a-4af9-8105-0abf6ef5ca38 6
Mobile agent technology for remote measurements, file dfa8b990-7603-748b-e053-3a05fe0a3a96 4
Expressive and deployable access control in open Web service applications, file dfa8b993-845c-748b-e053-3a05fe0a3a96 4
An OBDD approach to enforce confidentiality and visibility constraints in data publishing, file dfa8b993-9711-748b-e053-3a05fe0a3a96 4
An obfuscation-based approach for protecting location privacy, file dfa8b993-d41b-748b-e053-3a05fe0a3a96 4
Protecting access confidentiality with data distribution and swapping, file dfa8b992-14dc-748b-e053-3a05fe0a3a96 3
Supporting concurrency in private data outsourcing, file dfa8b993-6961-748b-e053-3a05fe0a3a96 3
Integrity for join queries in the cloud, file dfa8b993-84b1-748b-e053-3a05fe0a3a96 3
Selective data outsourcing for enforcing privacy, file dfa8b993-d388-748b-e053-3a05fe0a3a96 3
A Manifesto for Future Generation Cloud Computing, file dfa8b99d-257a-748b-e053-3a05fe0a3a96 3
Multi-Provider Secure Processing of Sensors Data, file dfa8b99f-1050-748b-e053-3a05fe0a3a96 3
k-Anonymity: From Theory to Applications, file 1d1f957f-65fd-4f8f-8512-4ed4f041ced4 2
k-Anonymity: From Theory to Applications, file ad03c0fc-a716-4f07-8aca-7459cd54c2d2 2
Efficient and private access to outsourced data, file dfa8b993-64a8-748b-e053-3a05fe0a3a96 2
Integrating trust management and access control in data-intensive Web applications, file dfa8b993-6959-748b-e053-3a05fe0a3a96 2
Authorization enforcement in distributed query evaluation, file dfa8b993-695f-748b-e053-3a05fe0a3a96 2
Modeling and preventing inferences from sensitive value distributions in data release, file dfa8b993-84b2-748b-e053-3a05fe0a3a96 2
Supporting concurrency and multiple indexes in private access to outsourced data, file dfa8b993-c21d-748b-e053-3a05fe0a3a96 2
Distributed shuffling for preserving access confidentiality, file dfa8b993-c3f6-748b-e053-3a05fe0a3a96 2
Fragmentation in presence of data dependencies, file dfa8b993-d7f4-748b-e053-3a05fe0a3a96 2
Enforcing dynamic write privileges in data outsourcing, file dfa8b994-ae01-748b-e053-3a05fe0a3a96 2
Distributed query evaluation over encrypted data, file dfa8b9a7-592f-748b-e053-3a05fe0a3a96 2
Towards Owner-Controlled Data Sharing, file 53ecc759-cac8-4e79-8e50-c972e7e4c2e1 1
Mix&slice for Efficient Access Revocation on Outsourced Data, file d221e7cf-4286-4e8e-b570-8ab729d9d42f 1
Loose associations to increase utility in data publishing, file dfa8b995-3b2f-748b-e053-3a05fe0a3a96 1
Data security issues in cloud scenarios, file dfa8b995-5665-748b-e053-3a05fe0a3a96 1
Efficient integrity checks for join queries in the cloud, file dfa8b995-875f-748b-e053-3a05fe0a3a96 1
Access control for the shuffle index, file dfa8b996-0768-748b-e053-3a05fe0a3a96 1
Supporting Users in Cloud Plan Selection, file dfa8b99e-e0e0-748b-e053-3a05fe0a3a96 1
A Fuzzy-Based Brokering Service for Cloud Plan Selection, file dfa8b9a0-821f-748b-e053-3a05fe0a3a96 1
Toward Owners' Control in Digital Data Markets, file dfa8b9a6-be22-748b-e053-3a05fe0a3a96 1
Scalable Distributed Data Anonymization, file dfa8b9a8-2b0e-748b-e053-3a05fe0a3a96 1
Distributed query execution under access restrictions, file fd228166-488d-469f-8281-00b199edfde6 1
Totale 16.641
Categoria #
all - tutte 27.541
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 27.541


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019162 0 0 0 0 0 0 0 0 0 0 0 162
2019/20202.119 121 73 112 347 254 179 195 193 228 136 117 164
2020/20212.376 111 216 186 197 159 118 178 181 185 417 221 207
2021/20223.431 212 200 221 756 521 174 172 230 160 140 410 235
2022/20232.393 124 197 417 274 231 203 164 78 147 183 203 172
2023/20242.310 133 192 215 170 164 149 241 195 137 467 243 4
Totale 16.641