SAMARATI, PIERANGELA
 Distribuzione geografica
Continente #
EU - Europa 19.588
NA - Nord America 12.676
AS - Asia 7.277
SA - Sud America 246
OC - Oceania 159
AF - Africa 101
Continente sconosciuto - Info sul continente non disponibili 24
Totale 40.071
Nazione #
US - Stati Uniti d'America 12.521
GB - Regno Unito 8.043
IT - Italia 3.561
CN - Cina 3.099
SE - Svezia 1.994
DE - Germania 1.322
SG - Singapore 1.195
RU - Federazione Russa 1.106
TR - Turchia 892
KR - Corea 741
UA - Ucraina 740
IN - India 695
IE - Irlanda 633
FI - Finlandia 571
FR - Francia 466
NL - Olanda 415
EU - Europa 387
CO - Colombia 185
GR - Grecia 168
DK - Danimarca 154
AU - Australia 142
PL - Polonia 133
CA - Canada 127
ID - Indonesia 115
HK - Hong Kong 101
VN - Vietnam 96
BE - Belgio 70
IR - Iran 67
JP - Giappone 43
TW - Taiwan 38
PK - Pakistan 35
ES - Italia 34
MY - Malesia 34
PH - Filippine 31
BR - Brasile 30
CH - Svizzera 29
NO - Norvegia 29
RO - Romania 29
AT - Austria 18
NZ - Nuova Zelanda 17
CY - Cipro 16
IL - Israele 15
MX - Messico 15
ZA - Sudafrica 15
PT - Portogallo 14
BG - Bulgaria 13
NG - Nigeria 12
TH - Thailandia 12
AE - Emirati Arabi Uniti 9
CZ - Repubblica Ceca 9
EC - Ecuador 9
EG - Egitto 9
CL - Cile 8
EE - Estonia 8
TN - Tunisia 8
BD - Bangladesh 7
DZ - Algeria 7
HU - Ungheria 6
KE - Kenya 6
LU - Lussemburgo 6
SA - Arabia Saudita 6
CR - Costa Rica 5
IQ - Iraq 5
RS - Serbia 5
RW - Ruanda 5
BN - Brunei Darussalam 4
MA - Marocco 4
PE - Perù 4
SC - Seychelles 4
SN - Senegal 4
UG - Uganda 4
UZ - Uzbekistan 4
A2 - ???statistics.table.value.countryCode.A2??? 3
AR - Argentina 3
BW - Botswana 3
JO - Giordania 3
LT - Lituania 3
PY - Paraguay 3
SD - Sudan 3
VE - Venezuela 3
AL - Albania 2
AZ - Azerbaigian 2
BJ - Benin 2
BT - Bhutan 2
CI - Costa d'Avorio 2
GH - Ghana 2
GN - Guinea 2
LK - Sri Lanka 2
LV - Lettonia 2
NA - Namibia 2
PA - Panama 2
SI - Slovenia 2
XK - ???statistics.table.value.countryCode.XK??? 2
ZM - Zambia 2
ZW - Zimbabwe 2
AF - Afghanistan, Repubblica islamica di 1
BB - Barbados 1
BS - Bahamas 1
BY - Bielorussia 1
BZ - Belize 1
Totale 40.423
Città #
Southend 7.432
Milan 1.725
Chandler 950
Princeton 862
Wilmington 850
Singapore 835
Seattle 810
Fairfield 746
Beijing 730
Ashburn 708
Dublin 620
Jacksonville 587
Houston 466
Dearborn 445
Redmond 437
Santa Clara 414
Woodbridge 373
Nanjing 366
Mountain View 354
Cambridge 318
Medford 297
Sakarya 294
Ann Arbor 273
Des Moines 255
Andover 229
Bengaluru 226
Hangzhou 191
Serra 191
Boardman 184
Bogotá 183
Lappeenranta 168
Somerville 164
Jinan 142
Shenyang 123
Warsaw 121
Athens 109
Nanchang 109
Changsha 98
Hebei 98
Shanghai 98
Eitensheim 93
San Giuliano 93
Berlin 89
Redwood City 87
Seoul 80
San Diego 78
Phoenix 77
Istanbul 73
Guangzhou 71
Tianjin 68
Zhengzhou 62
Jakarta 59
Helsinki 57
Munich 57
Norwalk 57
Rome 55
Hong Kong 50
Hyderabad 50
Jiaxing 50
Ottawa 50
Pisa 50
Hamburg 49
Odernheim 49
New York 48
Sunnyvale 47
Bitonto 45
Chicago 45
London 38
Ningbo 36
Verona 35
Fairfax 32
Lanzhou 32
Los Angeles 32
Brussels 31
Dong Ket 31
Falls Church 31
New Delhi 31
Fuzhou 30
Kunming 30
Pune 30
Geisenheim 28
Brisbane 26
Auburn Hills 25
Central District 25
Toronto 25
Haikou 24
Saint Petersburg 24
Taizhou 24
Wuhan 24
Daejeon 21
Lokeren 21
Madras 21
Nuremberg 21
Segrate 21
Stavanger 21
Taiyuan 21
Tokyo 21
Bühl 20
Frankfurt am Main 20
Hefei 20
Totale 26.142
Nome #
Database security 527
Supporting Application Requirements in Cloud-based IoT Information Processing 421
Protecting data in outsourcing scenarios 398
Contingency planning management 383
A Fuzzy-Based Brokering Service for Cloud Plan Selection 299
Securing Resources in Decentralized Cloud Storage 295
SSRI online : first experiences in a three-years course degree offered in e-learning at the University of Milan (Italy) 259
Data Security and Privacy in the Cloud 252
RETISS: A Real TIme Security System for Threat Detection Using Fuzzy Logic 248
Toward Owners' Control in Digital Data Markets 240
k-anonymity 239
Access control for the shuffle index 215
Three-server swapping for access confidentiality 215
Protecting respondents' identities in microdata release 212
k-Anonymity: From Theory to Applications 209
Loose associations to increase utility in data publishing 209
Multi-Provider Secure Processing of Sensors Data 204
Practical techniques building on encryption for protecting and managing data in the Cloud 203
Distributed Shuffle Index in the Cloud: Implementation and Evaluation 199
Empowering Owners with Control in Digital Data Markets 198
An Authorization Model for Multi-Provider Queries 197
Access control for smarter healthcare using policy spaces 196
An XML-based approach to combine firewalls and web services security specifications 194
Efficient integrity checks for join queries in the cloud 194
A consensus-based approach for selecting cloud plans 194
Enforcing authorizations while protecting access confidentiality 190
A dynamic tree-based data structure for access privacy in the cloud 187
Privacy in pervasive systems: social and legal aspects and technical solutions 187
Location privacy protection through obfuscation-based techniques 186
Data protection in Cloud scenarios 185
A multi-path approach for k-anonymity in mobile hybrid networks 179
Minimising disclosure of client information in credential-based interactions 178
K-anonymous data mining : a survey 176
Mix&Slice: efficient access revocation in the Cloud 173
Confidentiality Protection in Large Databases 173
Selective and private access to outsourced data centers 171
Access Control Management for Secure Cloud Storage 171
Optimizing integrity checks for join queries in the cloud 169
Privacy-enhanced identity management for e-services 167
Semantics-aware perimeter protection 163
Supporting Users in Data Outsourcing and Protection in the Cloud 161
The architecture of a privacy-aware access control decision component 159
Supporting user privacy preferences on information release in open scenarios 159
Towards identity management for e-services 158
Security, privacy, and trust in mobile systems 158
Managing data sharing in OpenStack Swift with Over-Encryption 158
XML-based access control languages 157
Minimizing disclosure of private information in credential-based interactions : a graph-based approach 157
Security-aware data allocation in multicloud scenarios 156
Microdata protection 155
Computing range queries on obfuscated data 154
A WOWA-based aggregation technique on trust values connected to metadata 153
Specification and enforcement of access policies in emerging scenarios 153
Integrity for approximate joins on untrusted computational servers 153
A privacy-aware access control system 152
Over-encryption : management of access control evolution on outsourced data 151
Supporting location-based conditions in access control policies 151
Access control in location-based services 151
Privacy-enhanced location-based access control 150
Data privacy : definitions and techniques 150
Supporting Users in Cloud Plan Selection 150
Expressive and deployable access control in open Web service applications 149
Supporting User Requirements and Preferences in Cloud Plan Selection 149
Dynamic Allocation for Resource Protection in Decentralized Cloud Storage 148
Measuring inference exposure in outsourced encrypted databases 147
Data security issues in cloud scenarios 147
Negotiation protocols for LBAC systems 146
k-anonymity 145
A fine-grained access control system for XML documents 144
Selective data outsourcing for enforcing privacy 144
Semantic-Aware Perimeter Protection 144
Advanced metadata for privacy-aware representation of credentials 143
Access control : principles and solutions 141
Enforcing dynamic write privileges in data outsourcing 141
Selective data encryption in outsourced dynamic environments 140
Support for write privileges on outsourced data 139
Business continuity planning 139
CAS++ : an open source single sign-on solution for secure e-services 138
Authorization and access control 138
Shuffle index : efficient and private access to outsourced data 138
Flexible support for multiple access control policies 136
Protecting privacy in data release 136
An obfuscation-based approach for protecting location privacy 135
Combining fragmentation and encryption to protect privacy in data storage 134
A protocol for reputation management in super-peer networks 134
A New Approach to Security System Development 134
Access control 133
Database security and privacy 133
Access Privacy in the Cloud 133
Assessing efficiency of trust management in peer-to-peer systems 132
PrimeLife policy language 132
Enforcing confidentiality and data visibility constraints : an OBDD approach 132
A Manifesto for Future Generation Cloud Computing 132
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems 131
Fragmentation and encryption to enforce privacy in data storage 131
An XACML-based privacy-centered access control system 131
Security, privacy, and trust in mobile systems 131
Supporting concurrency and multiple indexes in private access to outsourced data 131
Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning 131
Trust management services in relational databases 129
Totale 17.672
Categoria #
all - tutte 107.622
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 107.622


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20204.015 0 0 0 0 433 613 674 411 646 808 243 187
2020/20214.722 222 336 385 138 474 314 239 130 515 591 1.141 237
2021/20224.509 341 135 237 338 276 272 366 248 270 366 583 1.077
2022/20234.478 719 345 351 462 527 928 134 269 363 97 186 97
2023/20242.837 106 229 150 97 462 392 114 112 79 343 314 439
2024/20252.281 362 737 125 475 582 0 0 0 0 0 0 0
Totale 42.989