DE CAPITANI DI VIMERCATI, SABRINA
 Distribuzione geografica
Continente #
NA - Nord America 6764
EU - Europa 3300
AS - Asia 2700
AF - Africa 338
OC - Oceania 173
SA - Sud America 58
Continente sconosciuto - Info sul continente non disponibili 6
Totale 13339
Nazione #
US - Stati Uniti d'America 6551
CN - Cina 945
IT - Italia 850
DE - Germania 622
IN - India 503
GB - Regno Unito 455
FR - Francia 312
CA - Canada 194
NL - Olanda 181
IR - Iran 166
AU - Australia 151
KR - Corea 148
ID - Indonesia 137
IE - Irlanda 130
SA - Arabia Saudita 103
MY - Malesia 97
PK - Pakistan 91
ZA - Sudafrica 89
BE - Belgio 88
GR - Grecia 83
UA - Ucraina 75
RO - Romania 70
JP - Giappone 69
ET - Etiopia 63
RU - Federazione Russa 59
SE - Svezia 58
TW - Taiwan 53
HK - Hong Kong 47
VN - Vietnam 45
CH - Svizzera 43
SG - Singapore 40
EG - Egitto 38
OM - Oman 34
DZ - Algeria 31
KE - Kenya 28
NO - Norvegia 28
TR - Turchia 28
AT - Austria 27
IL - Israele 27
ES - Italia 26
PT - Portogallo 25
EU - Europa 23
LK - Sri Lanka 23
PH - Filippine 23
CZ - Repubblica Ceca 21
DK - Danimarca 21
JO - Giordania 21
NZ - Nuova Zelanda 21
FI - Finlandia 20
NG - Nigeria 18
BR - Brasile 17
PL - Polonia 17
MT - Malta 16
BD - Bangladesh 13
CO - Colombia 13
MA - Marocco 13
TN - Tunisia 13
CL - Cile 12
CY - Cipro 11
HU - Ungheria 11
LU - Lussemburgo 10
MU - Mauritius 10
MX - Messico 10
TH - Thailandia 10
AE - Emirati Arabi Uniti 9
LT - Lituania 9
RS - Serbia 9
IQ - Iraq 8
SD - Sudan 8
AL - Albania 7
KW - Kuwait 7
NP - Nepal 7
QA - Qatar 7
BH - Bahrain 6
GH - Ghana 6
PE - Perù 6
SK - Slovacchia (Repubblica Slovacca) 6
BB - Barbados 5
KZ - Kazakistan 5
SI - Slovenia 5
UG - Uganda 5
ZM - Zambia 5
AR - Argentina 4
BG - Bulgaria 4
MD - Moldavia 4
SC - Seychelles 4
BY - Bielorussia 3
KH - Cambogia 3
SY - Repubblica araba siriana 3
YE - Yemen 3
BO - Bolivia 2
EC - Ecuador 2
EE - Estonia 2
GE - Georgia 2
XK - ???statistics.table.value.countryCode.XK??? 2
A1 - ???statistics.table.value.countryCode.A1??? 1
A2 - ???statistics.table.value.countryCode.A2??? 1
AF - Afghanistan, Repubblica islamica di 1
BN - Brunei Darussalam 1
BZ - Belize 1
Totale 13340
Città #
Houston 814
Fairfield 655
Ann Arbor 462
Ashburn 358
Seattle 340
Woodbridge 321
Milan 300
Buffalo 284
Wilmington 247
Cambridge 241
Beijing 228
Santa Cruz 192
Dublin 98
Bengaluru 93
Modena 87
Mountain View 77
San Diego 75
Jakarta 63
Shanghai 63
Hangzhou 59
Southend 56
Brussels 52
Chicago 51
Guangzhou 49
Mumbai 48
Redmond 48
Toronto 46
Wuhan 46
Boardman 45
London 44
Tianjin 44
Ottawa 43
Phoenix 43
Taipei 41
Shenyang 39
Nanjing 36
San Jose 36
Islamabad 34
Delhi 32
Norwalk 32
Berlin 30
Clearwater 30
Los Angeles 30
New York 30
Bergamo 29
Boulder 29
Dammam 29
Singapore 29
Athens 28
Las Vegas 28
Muizenberg 28
Sunnyvale 28
University Park 28
Seri Kembangan 27
Fairfax 26
Amsterdam 25
Piacenza 25
Addis Ababa 24
Hyderabad 24
Dallas 23
Eindhoven 23
Karlsruhe 23
Kuala Lumpur 23
Fremont 22
Sydney 22
Atlanta 21
Bangalore 21
Des Moines 21
Falls Church 21
Nürnberg 20
Riva 20
Changsha 19
Kiez 19
Riyadh 19
Etobicoke 18
Fleming Island 18
Munich 18
Paris 18
Rome 18
Xian 18
Central 17
Chennai 17
Seoul 17
Hanoi 16
Jeddah 16
Kraainem 16
Scranton 16
Frankfurt am Main 15
Pune 15
Brooklyn 14
Taiyüan 14
Tokyo 14
Bottanuco 13
Henderson 13
Melbourne 13
New Delhi 13
San Francisco 13
Ames 12
Central District 12
Gurgaon 12
Totale 7162
Nome #
Cloud Security: Issues and Concerns, file dfa8b996-0c70-748b-e053-3a05fe0a3a96 1738
Location privacy protection through obfuscation-based techniques, file dfa8b990-e52b-748b-e053-3a05fe0a3a96 842
Access control for smarter healthcare using policy spaces, file dfa8b98f-9556-748b-e053-3a05fe0a3a96 821
Protecting data in outsourcing scenarios, file dfa8b98f-9cd9-748b-e053-3a05fe0a3a96 664
Data security issues in cloud scenarios, file dfa8b995-94f6-748b-e053-3a05fe0a3a96 389
PrimeLife policy language, file dfa8b98f-7692-748b-e053-3a05fe0a3a96 365
Minimising disclosure of client information in credential-based interactions, file dfa8b98f-b2f5-748b-e053-3a05fe0a3a96 363
Towards privacy-aware identity management, file dfa8b98e-9855-748b-e053-3a05fe0a3a96 319
Data Security and Privacy in the Cloud, file dfa8b99e-4c72-748b-e053-3a05fe0a3a96 289
Practical techniques building on encryption for protecting and managing data in the Cloud, file dfa8b995-5666-748b-e053-3a05fe0a3a96 273
Securing Resources in Decentralized Cloud Storage, file dfa8b99e-4feb-748b-e053-3a05fe0a3a96 271
Supporting Application Requirements in Cloud-based IoT Information Processing, file dfa8b995-e0b5-748b-e053-3a05fe0a3a96 249
An Authorization Model for Multi-Provider Queries, file dfa8b99a-31ce-748b-e053-3a05fe0a3a96 246
Enforcing authorizations while protecting access confidentiality, file dfa8b99a-1536-748b-e053-3a05fe0a3a96 245
Three-server swapping for access confidentiality, file dfa8b995-3dc5-748b-e053-3a05fe0a3a96 239
Confidentiality Protection in Large Databases, file dfa8b998-9c1f-748b-e053-3a05fe0a3a96 234
Minimizing disclosure of private information in credential-based interactions : a graph-based approach, file dfa8b98f-9655-748b-e053-3a05fe0a3a96 232
Managing data sharing in OpenStack Swift with Over-Encryption, file dfa8b996-e848-748b-e053-3a05fe0a3a96 224
A dynamic tree-based data structure for access privacy in the cloud, file dfa8b998-5cb9-748b-e053-3a05fe0a3a96 223
Access Control Management for Secure Cloud Storage, file dfa8b999-2851-748b-e053-3a05fe0a3a96 223
Toward Owners' Control in Digital Data Markets, file dfa8b9a0-ec4e-748b-e053-3a05fe0a3a96 222
Application requirements with preferences in cloud-based information processing, file dfa8b996-c027-748b-e053-3a05fe0a3a96 217
A Fuzzy-Based Brokering Service for Cloud Plan Selection, file dfa8b9a0-317a-748b-e053-3a05fe0a3a96 212
Supporting User Requirements and Preferences in Cloud Plan Selection, file dfa8b999-eaa5-748b-e053-3a05fe0a3a96 210
Selective and private access to outsourced data centers, file dfa8b995-93a3-748b-e053-3a05fe0a3a96 207
Data protection in Cloud scenarios, file dfa8b995-6b0d-748b-e053-3a05fe0a3a96 206
Empowering Owners with Control in Digital Data Markets, file dfa8b99e-e1c9-748b-e053-3a05fe0a3a96 204
Computing range queries on obfuscated data, file dfa8b98f-2ddc-748b-e053-3a05fe0a3a96 200
Supporting Users in Cloud Plan Selection, file dfa8b99d-3221-748b-e053-3a05fe0a3a96 198
Privacy in pervasive systems: social and legal aspects and technical solutions, file dfa8b995-81d0-748b-e053-3a05fe0a3a96 195
Loose associations to increase utility in data publishing, file dfa8b995-7f80-748b-e053-3a05fe0a3a96 194
Distributed Shuffle Index in the Cloud: Implementation and Evaluation, file dfa8b999-d8b6-748b-e053-3a05fe0a3a96 192
Supporting Users in Data Outsourcing and Protection in the Cloud, file dfa8b999-211f-748b-e053-3a05fe0a3a96 187
Distributed shuffle index: Analysis and implementation in an industrial testbed, file dfa8b99a-0d60-748b-e053-3a05fe0a3a96 187
Multi-Provider Secure Processing of Sensors Data, file dfa8b99e-e58a-748b-e053-3a05fe0a3a96 185
Dynamic Allocation for Resource Protection in Decentralized Cloud Storage, file dfa8b9a0-6fd4-748b-e053-3a05fe0a3a96 185
Specification and enforcement of access policies in emerging scenarios, file dfa8b995-c444-748b-e053-3a05fe0a3a96 182
Privacy and Security in Environmental Monitoring Systems, file dfa8b99a-77e1-748b-e053-3a05fe0a3a96 181
Digital Infrastructure Policies for Data Security and Privacy in Smart Cities, file dfa8b9a9-4314-748b-e053-3a05fe0a3a96 168
Protecting resources and regulating access in cloud-based object storage, file dfa8b99d-4e40-748b-e053-3a05fe0a3a96 161
Shuffle index : efficient and private access to outsourced data, file dfa8b995-52ed-748b-e053-3a05fe0a3a96 158
Integrity for approximate joins on untrusted computational servers, file dfa8b995-624b-748b-e053-3a05fe0a3a96 155
A WOWA-based aggregation technique on trust values connected to metadata, file dfa8b99f-2ac5-748b-e053-3a05fe0a3a96 149
Access Privacy in the Cloud, file dfa8b99c-f02a-748b-e053-3a05fe0a3a96 144
Mix&Slice: efficient access revocation in the Cloud, file dfa8b996-ba70-748b-e053-3a05fe0a3a96 138
Access control for the shuffle index, file dfa8b995-54a3-748b-e053-3a05fe0a3a96 129
Security-aware data allocation in multicloud scenarios, file dfa8b9a3-482f-748b-e053-3a05fe0a3a96 128
Support for write privileges on outsourced data, file dfa8b98f-bb46-748b-e053-3a05fe0a3a96 113
Optimizing integrity checks for join queries in the cloud, file dfa8b991-323f-748b-e053-3a05fe0a3a96 103
Distributed query evaluation over encrypted data, file dfa8b9a7-718a-748b-e053-3a05fe0a3a96 92
Supporting user privacy preferences on information release in open scenarios, file dfa8b98f-7c14-748b-e053-3a05fe0a3a96 82
Artifact: Scalable Distributed Data Anonymization, file dfa8b9a7-e07c-748b-e053-3a05fe0a3a96 69
Scalable Distributed Data Anonymization, file dfa8b9a8-12f4-748b-e053-3a05fe0a3a96 66
A component-based architecture for secure data publication, file dfa8b9a2-fdad-748b-e053-3a05fe0a3a96 62
Multi-dimensional indexes for point and range queries on outsourced encrypted data, file dfa8b9a9-85f1-748b-e053-3a05fe0a3a96 61
Enforcing Corporate Governance's Internal Controls and Audit in the Cloud, file dfa8b9a9-ad54-748b-e053-3a05fe0a3a96 61
Scalable Distributed Data Anonymization for Large Datasets, file a6275ba6-f9a4-45a5-ac3a-924a603454be 28
An authorization model for query execution in the cloud, file dfa8b9a8-c8b1-748b-e053-3a05fe0a3a96 23
Efficient integrity checks for join queries in the cloud, file dfa8b995-a30c-748b-e053-3a05fe0a3a96 21
Privacy and security in environmental monitoring systems : issues and solutions, file dfa8b993-845d-748b-e053-3a05fe0a3a96 12
Open world reasoning in semantics-aware access control: A preliminary study, file dfa8b9a0-8c06-748b-e053-3a05fe0a3a96 12
An authorization model for query execution in the cloud, file dfa8b9a8-b667-748b-e053-3a05fe0a3a96 5
Mobile agent technology for remote measurements, file dfa8b990-7603-748b-e053-3a05fe0a3a96 4
Expressive and deployable access control in open Web service applications, file dfa8b993-845c-748b-e053-3a05fe0a3a96 4
An OBDD approach to enforce confidentiality and visibility constraints in data publishing, file dfa8b993-9711-748b-e053-3a05fe0a3a96 4
An obfuscation-based approach for protecting location privacy, file dfa8b993-d41b-748b-e053-3a05fe0a3a96 4
Protecting access confidentiality with data distribution and swapping, file dfa8b992-14dc-748b-e053-3a05fe0a3a96 3
Supporting concurrency in private data outsourcing, file dfa8b993-6961-748b-e053-3a05fe0a3a96 3
Integrity for join queries in the cloud, file dfa8b993-84b1-748b-e053-3a05fe0a3a96 3
Selective data outsourcing for enforcing privacy, file dfa8b993-d388-748b-e053-3a05fe0a3a96 3
A Manifesto for Future Generation Cloud Computing, file dfa8b99d-257a-748b-e053-3a05fe0a3a96 3
Multi-Provider Secure Processing of Sensors Data, file dfa8b99f-1050-748b-e053-3a05fe0a3a96 3
k-Anonymity: From Theory to Applications, file 1d1f957f-65fd-4f8f-8512-4ed4f041ced4 2
Distributed query execution under access restrictions, file a47102b9-ac9e-4900-bc92-d49d5afe83f8 2
k-Anonymity: From Theory to Applications, file ad03c0fc-a716-4f07-8aca-7459cd54c2d2 2
Efficient and private access to outsourced data, file dfa8b993-64a8-748b-e053-3a05fe0a3a96 2
Integrating trust management and access control in data-intensive Web applications, file dfa8b993-6959-748b-e053-3a05fe0a3a96 2
Authorization enforcement in distributed query evaluation, file dfa8b993-695f-748b-e053-3a05fe0a3a96 2
Modeling and preventing inferences from sensitive value distributions in data release, file dfa8b993-84b2-748b-e053-3a05fe0a3a96 2
Supporting concurrency and multiple indexes in private access to outsourced data, file dfa8b993-c21d-748b-e053-3a05fe0a3a96 2
Distributed shuffling for preserving access confidentiality, file dfa8b993-c3f6-748b-e053-3a05fe0a3a96 2
Fragmentation in presence of data dependencies, file dfa8b993-d7f4-748b-e053-3a05fe0a3a96 2
Enforcing dynamic write privileges in data outsourcing, file dfa8b994-ae01-748b-e053-3a05fe0a3a96 2
Distributed query evaluation over encrypted data, file dfa8b9a7-592f-748b-e053-3a05fe0a3a96 2
Towards Owner-Controlled Data Sharing, file 53ecc759-cac8-4e79-8e50-c972e7e4c2e1 1
Sentinels and twins : effective integrity assessment for distributed computation, file 60411d90-160a-4af9-8105-0abf6ef5ca38 1
Supporting User Protection Requirements in Cloud-Based Data Outsourcing, file 7b489ddc-731a-4f09-81f5-e197b0c0df71 1
Distributed query execution under access restrictions, file 890991be-5db0-40cc-8d79-f29754d63ac6 1
Loose associations to increase utility in data publishing, file dfa8b995-3b2f-748b-e053-3a05fe0a3a96 1
Data security issues in cloud scenarios, file dfa8b995-5665-748b-e053-3a05fe0a3a96 1
Efficient integrity checks for join queries in the cloud, file dfa8b995-875f-748b-e053-3a05fe0a3a96 1
Access control for the shuffle index, file dfa8b996-0768-748b-e053-3a05fe0a3a96 1
Supporting Users in Cloud Plan Selection, file dfa8b99e-e0e0-748b-e053-3a05fe0a3a96 1
A Fuzzy-Based Brokering Service for Cloud Plan Selection, file dfa8b9a0-821f-748b-e053-3a05fe0a3a96 1
Toward Owners' Control in Digital Data Markets, file dfa8b9a6-be22-748b-e053-3a05fe0a3a96 1
Scalable Distributed Data Anonymization, file dfa8b9a8-2b0e-748b-e053-3a05fe0a3a96 1
Distributed query execution under access restrictions, file fd228166-488d-469f-8281-00b199edfde6 1
Totale 14224
Categoria #
all - tutte 18460
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 18460


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2017/2018167 0000 00 00 007691
2018/2019978 53816452 3960 5365 8391175162
2019/20202119 12173112347 254179 195193 228136117164
2020/20212376 111216186197 159118 178181 185417221207
2021/20223431 212200221756 521174 172230 160140410235
2022/20232286 124197417275 232207 191107 1661971730
Totale 14224