PARABOSCHI, Stefano Giulio
 Distribuzione geografica
Continente #
EU - Europa 22.904
NA - Nord America 10.034
AS - Asia 4.271
SA - Sud America 340
AF - Africa 153
Continente sconosciuto - Info sul continente non disponibili 22
OC - Oceania 10
Totale 37.734
Nazione #
US - Stati Uniti d'America 9.739
GB - Regno Unito 8.860
IE - Irlanda 3.814
RU - Federazione Russa 2.508
IT - Italia 2.391
CN - Cina 2.304
PL - Polonia 1.725
SG - Singapore 1.366
DE - Germania 915
FR - Francia 716
SE - Svezia 679
NL - Olanda 523
UA - Ucraina 328
BR - Brasile 278
CA - Canada 266
FI - Finlandia 188
VN - Vietnam 185
ZA - Sudafrica 124
KR - Corea 107
IN - India 90
AT - Austria 89
HK - Hong Kong 48
EU - Europa 46
BE - Belgio 41
ID - Indonesia 38
ES - Italia 27
GR - Grecia 27
TR - Turchia 24
AR - Argentina 22
LT - Lituania 18
BD - Bangladesh 17
JP - Giappone 17
MX - Messico 16
CZ - Repubblica Ceca 14
CH - Svizzera 12
IQ - Iraq 12
RO - Romania 11
AU - Australia 10
PE - Perù 10
PY - Paraguay 10
DZ - Algeria 9
AE - Emirati Arabi Uniti 8
PK - Pakistan 8
TW - Taiwan 8
EC - Ecuador 7
BG - Bulgaria 6
EG - Egitto 5
IR - Iran 5
KZ - Kazakistan 5
MA - Marocco 5
PA - Panama 5
VE - Venezuela 5
CL - Cile 4
CO - Colombia 4
UZ - Uzbekistan 4
AZ - Azerbaigian 3
JO - Giordania 3
LV - Lettonia 3
PH - Filippine 3
RS - Serbia 3
TH - Thailandia 3
A2 - ???statistics.table.value.countryCode.A2??? 2
AL - Albania 2
CY - Cipro 2
KE - Kenya 2
LB - Libano 2
NI - Nicaragua 2
NP - Nepal 2
SN - Senegal 2
TN - Tunisia 2
BY - Bielorussia 1
CR - Costa Rica 1
DM - Dominica 1
DO - Repubblica Dominicana 1
ET - Etiopia 1
HN - Honduras 1
HR - Croazia 1
IL - Israele 1
KG - Kirghizistan 1
KH - Cambogia 1
KW - Kuwait 1
MD - Moldavia 1
MG - Madagascar 1
NG - Nigeria 1
PS - Palestinian Territory 1
PT - Portogallo 1
QA - Qatar 1
SA - Arabia Saudita 1
SC - Seychelles 1
SV - El Salvador 1
TT - Trinidad e Tobago 1
Totale 37.760
Città #
Southend 8.512
Dublin 3.776
Warsaw 1.690
Ashburn 1.087
Jacksonville 957
Singapore 638
Chandler 592
Moscow 572
Mountain View 483
Ann Arbor 429
Princeton 356
Hefei 352
Beijing 345
Nanjing 329
Fairfield 299
Dalmine 252
Dearborn 236
Milan 223
Toronto 218
Wilmington 207
Houston 193
Boardman 180
Woodbridge 175
Rancio Valcuvia 157
Shanghai 154
Los Angeles 137
Seattle 136
The Dalles 135
Washington 133
Nanchang 131
Johannesburg 122
Cambridge 107
Altamura 104
San Mateo 104
Bergamo 102
Zhengzhou 88
Andover 87
Sunnyvale 87
Vienna 84
Rome 80
Lappeenranta 76
Atlanta 70
Buffalo 66
Dong Ket 62
Kunming 56
Shenyang 52
Hebei 51
Ho Chi Minh City 50
Redwood City 47
Needham Heights 46
Tianjin 45
Ogden 44
Chicago 43
Guangzhou 43
Dallas 40
Munich 40
Brussels 39
Hangzhou 39
Hong Kong 39
Berlin 38
London 37
Jiaxing 36
Kiez 36
New York 36
Santa Clara 33
Jakarta 32
São Paulo 30
Carignano 29
Hanoi 28
Norwalk 28
Amsterdam 26
Frankfurt am Main 26
Montreal 24
Turin 22
Changsha 21
Denver 21
Bologna 20
Redondo Beach 20
Pisa 19
San Diego 19
Fremont 18
Nuremberg 18
Jinan 17
Verona 17
Boston 16
Nürnberg 16
Kansas City 15
Bari 14
Catania 14
Fagnano Olona 14
Seoul 14
Chennai 13
Council Bluffs 13
Redmond 13
Fairfax 12
Orem 12
Reggio Calabria 12
Stockholm 12
Tokyo 12
Brooklyn 11
Totale 25.861
Nome #
Basi di dati: modelli e linguaggi di interrogazione (seconda edizione) 1.007
An Eclipse plug-in for specifying security policies in modern information systems 646
Managing data sharing in OpenStack swift with over-encryption 624
A dynamic tree-based data structure for access privacy in the cloud 613
Distributed shuffle index: Analysis and implementation in an industrial testbed 582
Distributed Shuffle Index in the Cloud: Implementation and Evaluation 562
Access control for the shuffle index 560
Mix&Slice: Efficient access revocation in the cloud 548
Basi di dati: modelli e linguaggi di interrogazione 505
Dynamic Allocation for Resource Protection in Decentralized Cloud Storage 469
Conflict detection in security policies using Semantic Web technology 426
Automated Management and Analysis of Security Policies using Eclipse 423
Basi di dati - Architetture e linee di evoluzione (II ed.) 417
An SELinux-based intent manager for Android 399
P2P-based collaborative spam detection and filtering 392
A cache-aware mechanism to enforce confidentiality, trackability and access policy evolution in Content-Centric Networks 387
DockerPolicyModules: Mandatory Access Control for Docker containers 386
Access Control Management for Secure Cloud Storage 385
Keep a Few: Outsourcing Data While Maintaining Confidentiality 381
Basi di dati: Modelli e linguaggi di interrogazione (III ed.) 378
A Model-Driven Approach for Securing Software Architectures 372
Supporting Concurrency in Private Data Outsourcing 370
Securing Resources in Decentralized Cloud Storage 369
An open digest-based technique for spam detection 353
Extending XACML fr Open Web-based Scenarios 348
Supporting concurrency and multiple indexes in private access to outsourced data 346
Bayesian-Networks-Based Misuse and Anomaly Prevention System 345
An Authorization Model for Multi-Provider Queries 342
Integrating trust management and access control in data-intensive Web applications 341
Multi-Provider Secure Processing of Sensors Data 341
Modeling and assessing inference exposure in encrypted databases 340
Extending Mandatory Access Control Policies in Android 338
Key-management for multi-user encrypted databases 333
Combining fragmentation and encryption to protect privacy in data storage 330
AppPolicyModules: Mandatory Access Control for Third-Party Apps 328
Detection of conflicts in security policies 326
Selective data outsourcing for enforcing privacy 325
Spam Attacks: P2P to the Rescue 320
Advances in Access Control Policies 320
An XACML-based Privacy-Centered Access Control System 320
Fragmentation and Encryption to Enforce Privacy in Data Storage 316
Administrative Policies in SQL 315
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems 315
Active XQuery 315
SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases 311
Authorization enforcement in distributed query evaluation 309
Access Control 309
Selective Exchange of Confidential Data in the Outsourcing Scenario 308
An experimental evaluation of multi-key strategies for data outsourcing 305
PrimeLife Policy Language 305
Computing range queries on obfuscated data 304
Managing key hierarchies for access control enforcement: Heuristic approaches 304
Fine-Grained Disclosure of Access Policies 303
Integrity for join queries in the Cloud 302
Metadata management in encrypted outsourced databases 302
A Data Outsourcing Architecture Combining Cryptography and Access Control 301
Privacy of Outsourced Data 298
A protocol for reputation management in super-peer networks 297
Policy Specialization to Support Domain Isolation 297
Encryption-based Policy Enforcement for Cloud Storage 295
Extending loose associations to multiple fragments 293
Assessing Query Privileges via Safe and Efficient Permission Composition 292
Proceedings Workshop on Privacy in the Electronic Society 290
Enforcing authorizations while protecting access confidentiality 290
The PoSecCo Security Decision System 289
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML 289
Efficient and Private Access to Outsourced Data 285
Integrating advanced security certification and policy management 284
Efficient integrity checks for join queries in the cloud 284
Minimizing Disclosure of Private Information in Credential-Based Interactions: A Graph-Based Approach 282
Integrated Management of Security Policies 282
ID mapping attacks in P2P networks 282
Minimising disclosure of client information in credential-based interactions 282
Optimizing Integrity Checks for Join Queries in the Cloud 280
On Information leakage by indexes over data fragments 280
Fragments and Loose Associations: Respecting Privacy in Data Publishing 278
Protecting Access Confidentiality with Data Distribution and Swapping 275
Access Control Models for XML 275
Selective Data Encryption in Outsourced Dynamic Environments 275
Encryption policies for regulating access to outsourced data 273
Private data indexes for selective access to outsourced data 271
Data privacy 271
Policy-driven system management 270
Open Source Contributions 267
Access Control 267
Support for Write Privileges on Outsourced Data 265
Over-Encryption: Management of Access Control Evolution on Encrypted Data 265
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients 263
Trust management services in relational databases 263
Distributed shuffling for preserving access confidentiality 263
Controlled Information Sharing in Collaborative Distributed Query Processing 262
Expressive and deployable access control in Open Web Service Applications 261
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios 261
Supporting Privacy Preferences in Credential-Based Interactions 260
Preface [to Data and Applications Security and Privacy XXXII] 259
Event trace independence of active behavior 256
Protecting resources and regulating access in cloud-based object storage 255
Supporting User Privacy Preferences on Information Release in Open Scenarios 252
Enforcing dynamic write privileges in data outsourcing 249
Preserving Confidentiality of Security Policies in Data Outsourcing 247
Totale 33.895
Categoria #
all - tutte 105.304
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 105.304


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20213.063 0 0 0 0 0 400 513 189 524 523 689 225
2021/20223.238 213 383 235 269 255 423 163 194 189 339 349 226
2022/20232.483 404 264 319 396 209 320 29 121 189 52 101 79
2023/20244.982 75 100 114 99 146 927 2.921 193 106 69 51 181
2024/20253.910 149 322 186 548 75 43 27 177 423 823 649 488
2025/20263.303 262 333 572 727 1.098 311 0 0 0 0 0 0
Totale 38.585