PARABOSCHI, Stefano Giulio
 Distribuzione geografica
Continente #
EU - Europa 20.474
NA - Nord America 8.216
AS - Asia 2.089
Continente sconosciuto - Info sul continente non disponibili 22
AF - Africa 10
OC - Oceania 9
SA - Sud America 8
Totale 30.828
Nazione #
GB - Regno Unito 8.825
US - Stati Uniti d'America 7.996
IE - Irlanda 3.813
IT - Italia 2.178
CN - Cina 1.689
PL - Polonia 1.675
RU - Federazione Russa 1.048
DE - Germania 821
SE - Svezia 667
FR - Francia 665
UA - Ucraina 318
CA - Canada 219
FI - Finlandia 168
SG - Singapore 118
KR - Corea 98
NL - Olanda 94
AT - Austria 78
IN - India 72
VN - Vietnam 68
EU - Europa 46
BE - Belgio 39
GR - Grecia 27
CZ - Repubblica Ceca 13
CH - Svizzera 12
TR - Turchia 11
HK - Hong Kong 10
RO - Romania 10
AU - Australia 9
LT - Lituania 9
BG - Bulgaria 6
DZ - Algeria 6
JP - Giappone 5
ES - Italia 4
IR - Iran 4
PE - Perù 4
TW - Taiwan 4
BD - Bangladesh 3
A2 - ???statistics.table.value.countryCode.A2??? 2
BR - Brasile 2
MA - Marocco 2
PH - Filippine 2
AR - Argentina 1
BY - Bielorussia 1
CY - Cipro 1
HR - Croazia 1
ID - Indonesia 1
KZ - Kazakistan 1
LB - Libano 1
MD - Moldavia 1
NG - Nigeria 1
PA - Panama 1
PT - Portogallo 1
PY - Paraguay 1
SC - Seychelles 1
UZ - Uzbekistan 1
Totale 30.854
Città #
Southend 8.512
Dublin 3.775
Warsaw 1.672
Jacksonville 957
Chandler 592
Mountain View 483
Ann Arbor 429
Ashburn 396
Princeton 356
Nanjing 328
Fairfield 299
Beijing 263
Dalmine 252
Dearborn 236
Toronto 211
Wilmington 207
Houston 182
Woodbridge 175
Milan 171
Rancio Valcuvia 157
Shanghai 150
Washington 133
Nanchang 131
Seattle 130
Cambridge 107
Altamura 104
San Mateo 104
Bergamo 100
Andover 87
Sunnyvale 87
Zhengzhou 87
Moscow 78
Vienna 78
Lappeenranta 66
Dong Ket 62
Rome 61
Boardman 56
Atlanta 55
Kunming 55
Shenyang 52
Hebei 51
Redwood City 47
Needham Heights 46
Ogden 44
Tianjin 41
Brussels 37
Jiaxing 36
Kiez 36
Hangzhou 34
Singapore 32
Guangzhou 30
Carignano 29
Norwalk 28
Los Angeles 27
London 26
Changsha 19
Chicago 19
Pisa 19
San Diego 19
Fremont 18
Verona 17
Dallas 16
Jinan 16
Nürnberg 16
Kansas City 15
Munich 15
Bari 14
Bologna 14
Fagnano Olona 14
Amsterdam 13
Redmond 13
Fairfax 12
Turin 12
Changchun 11
Lanzhou 11
Segrate 11
Auburn Hills 10
Brno 10
Sakarya 10
Serra 10
Sona 10
Stuttgart 10
Torino 10
Acton 9
Nuremberg 9
Saint Petersburg 9
Vilnius 9
Biella 8
Central 8
Chiswick 8
Stezzano 8
Torre Del Greco 8
Delhi 7
Hefei 7
Hounslow 7
Ningbo 7
Scranton 7
Seregno 7
Taizhou 7
Zurich 7
Totale 22.496
Nome #
Basi di dati: modelli e linguaggi di interrogazione (seconda edizione) 812
An Eclipse plug-in for specifying security policies in modern information systems 599
A dynamic tree-based data structure for access privacy in the cloud 560
Managing data sharing in OpenStack swift with over-encryption 541
Distributed shuffle index: Analysis and implementation in an industrial testbed 503
Distributed Shuffle Index in the Cloud: Implementation and Evaluation 489
Access control for the shuffle index 487
Mix&Slice: Efficient access revocation in the cloud 470
Basi di dati: modelli e linguaggi di interrogazione 441
Dynamic Allocation for Resource Protection in Decentralized Cloud Storage 385
Conflict detection in security policies using Semantic Web technology 380
Basi di dati - Architetture e linee di evoluzione (II ed.) 368
Automated Management and Analysis of Security Policies using Eclipse 359
DockerPolicyModules: Mandatory Access Control for Docker containers 339
An SELinux-based intent manager for Android 332
Basi di dati: Modelli e linguaggi di interrogazione (III ed.) 328
P2P-based collaborative spam detection and filtering 327
Supporting Concurrency in Private Data Outsourcing 325
Access Control Management for Secure Cloud Storage 317
A Model-Driven Approach for Securing Software Architectures 314
An open digest-based technique for spam detection 311
Extending XACML fr Open Web-based Scenarios 307
Keep a Few: Outsourcing Data While Maintaining Confidentiality 305
Supporting concurrency and multiple indexes in private access to outsourced data 301
Integrating trust management and access control in data-intensive Web applications 297
Combining fragmentation and encryption to protect privacy in data storage 292
Modeling and assessing inference exposure in encrypted databases 290
Bayesian-Networks-Based Misuse and Anomaly Prevention System 288
Selective data outsourcing for enforcing privacy 288
An Authorization Model for Multi-Provider Queries 287
A cache-aware mechanism to enforce confidentiality, trackability and access policy evolution in Content-Centric Networks 285
Active XQuery 283
Fragmentation and Encryption to Enforce Privacy in Data Storage 282
Spam Attacks: P2P to the Rescue 281
Advances in Access Control Policies 280
Managing key hierarchies for access control enforcement: Heuristic approaches 279
Key-management for multi-user encrypted databases 278
PrimeLife Policy Language 278
An XACML-based Privacy-Centered Access Control System 277
Access Control 276
Authorization enforcement in distributed query evaluation 273
Detection of conflicts in security policies 271
Administrative Policies in SQL 270
Securing Resources in Decentralized Cloud Storage 270
An experimental evaluation of multi-key strategies for data outsourcing 268
Multi-Provider Secure Processing of Sensors Data 268
A protocol for reputation management in super-peer networks 267
Selective Exchange of Confidential Data in the Outsourcing Scenario 265
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems 265
Privacy of Outsourced Data 265
Fine-Grained Disclosure of Access Policies 264
Computing range queries on obfuscated data 264
Metadata management in encrypted outsourced databases 264
Proceedings Workshop on Privacy in the Electronic Society 264
Extending Mandatory Access Control Policies in Android 264
AppPolicyModules: Mandatory Access Control for Third-Party Apps 263
Assessing Query Privileges via Safe and Efficient Permission Composition 261
A Data Outsourcing Architecture Combining Cryptography and Access Control 259
Integrity for join queries in the Cloud 258
Encryption-based Policy Enforcement for Cloud Storage 256
Minimising disclosure of client information in credential-based interactions 256
The PoSecCo Security Decision System 252
Optimizing Integrity Checks for Join Queries in the Cloud 251
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML 250
Efficient integrity checks for join queries in the cloud 249
Integrated Management of Security Policies 247
Fragments and Loose Associations: Respecting Privacy in Data Publishing 244
Extending loose associations to multiple fragments 244
SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases 244
On Information leakage by indexes over data fragments 243
Integrating advanced security certification and policy management 242
Selective Data Encryption in Outsourced Dynamic Environments 242
Private data indexes for selective access to outsourced data 241
Efficient and Private Access to Outsourced Data 240
Support for Write Privileges on Outsourced Data 238
ID mapping attacks in P2P networks 237
Data privacy 235
Over-Encryption: Management of Access Control Evolution on Encrypted Data 235
Encryption policies for regulating access to outsourced data 235
Policy Specialization to Support Domain Isolation 235
Policy-driven system management 234
Access Control Models for XML 234
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios 233
Trust management services in relational databases 233
Minimizing Disclosure of Private Information in Credential-Based Interactions: A Graph-Based Approach 232
Open Source Contributions 232
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients 231
Enforcing authorizations while protecting access confidentiality 231
Protecting Access Confidentiality with Data Distribution and Swapping 230
Controlled Information Sharing in Collaborative Distributed Query Processing 229
Access Control 229
Distributed shuffling for preserving access confidentiality 223
Supporting User Privacy Preferences on Information Release in Open Scenarios 221
Event trace independence of active behavior 221
Supporting Privacy Preferences in Credential-Based Interactions 220
Expressive and deployable access control in Open Web Service Applications 217
Fragmentation in presence of data dependencies 208
Enforcing dynamic write privileges in data outsourcing 206
Preserving Confidentiality of Security Policies in Data Outsourcing 204
Integrity for Approximate Joins on Untrusted Computational Servers 203
Totale 29.071
Categoria #
all - tutte 75.117
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 75.117


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20202.636 0 142 264 415 258 255 314 137 386 161 118 186
2020/20214.489 528 273 153 264 208 400 513 189 524 523 689 225
2021/20223.238 213 383 235 269 255 423 163 194 189 339 349 226
2022/20232.483 404 264 319 396 209 320 29 121 189 52 101 79
2023/20244.982 75 100 114 99 146 927 2.921 193 106 69 51 181
2024/2025289 149 140 0 0 0 0 0 0 0 0 0 0
Totale 31.661