PARABOSCHI, Stefano Giulio
 Distribuzione geografica
Continente #
EU - Europa 23.141
NA - Nord America 11.259
AS - Asia 5.277
SA - Sud America 426
AF - Africa 204
Continente sconosciuto - Info sul continente non disponibili 22
OC - Oceania 10
Totale 40.339
Nazione #
US - Stati Uniti d'America 10.945
GB - Regno Unito 8.870
IE - Irlanda 3.816
RU - Federazione Russa 2.512
CN - Cina 2.458
IT - Italia 2.421
PL - Polonia 1.726
SG - Singapore 1.724
DE - Germania 933
FR - Francia 840
SE - Svezia 680
NL - Olanda 526
VN - Vietnam 434
UA - Ucraina 333
BR - Brasile 318
CA - Canada 271
FI - Finlandia 217
IN - India 142
ZA - Sudafrica 136
KR - Corea 111
AT - Austria 91
HK - Hong Kong 69
ID - Indonesia 48
EU - Europa 46
BD - Bangladesh 42
BE - Belgio 42
AR - Argentina 40
TR - Turchia 35
IQ - Iraq 34
ES - Italia 28
GR - Grecia 27
JP - Giappone 27
PK - Pakistan 26
MX - Messico 21
LT - Lituania 18
PH - Filippine 17
MA - Marocco 15
CZ - Repubblica Ceca 14
CH - Svizzera 12
DZ - Algeria 12
EC - Ecuador 12
RO - Romania 12
TW - Taiwan 12
UZ - Uzbekistan 12
CL - Cile 11
PE - Perù 11
AU - Australia 10
EG - Egitto 10
MY - Malesia 10
PY - Paraguay 10
AE - Emirati Arabi Uniti 9
CO - Colombia 9
SA - Arabia Saudita 8
VE - Venezuela 8
KE - Kenya 7
NP - Nepal 7
BG - Bulgaria 6
IL - Israele 6
JO - Giordania 6
KZ - Kazakistan 6
PA - Panama 6
BO - Bolivia 5
ET - Etiopia 5
IR - Iran 5
NI - Nicaragua 5
SN - Senegal 5
TH - Thailandia 5
AL - Albania 4
AZ - Azerbaigian 4
LB - Libano 4
RS - Serbia 4
LV - Lettonia 3
OM - Oman 3
TN - Tunisia 3
A2 - ???statistics.table.value.countryCode.A2??? 2
BH - Bahrain 2
CR - Costa Rica 2
CY - Cipro 2
DO - Repubblica Dominicana 2
JM - Giamaica 2
KW - Kuwait 2
MU - Mauritius 2
PS - Palestinian Territory 2
QA - Qatar 2
TT - Trinidad e Tobago 2
BF - Burkina Faso 1
BY - Bielorussia 1
CD - Congo 1
DM - Dominica 1
GY - Guiana 1
HN - Honduras 1
HR - Croazia 1
HU - Ungheria 1
KG - Kirghizistan 1
KH - Cambogia 1
KM - Comore 1
LK - Sri Lanka 1
LY - Libia 1
MD - Moldavia 1
MG - Madagascar 1
Totale 40.357
Città #
Southend 8.512
Dublin 3.778
Warsaw 1.690
Ashburn 1.491
Jacksonville 957
Singapore 829
San Jose 679
Chandler 592
Moscow 572
Mountain View 483
Ann Arbor 429
Princeton 356
Hefei 352
Beijing 351
Nanjing 329
Fairfield 299
Dalmine 253
Dearborn 236
Milan 223
Toronto 218
Wilmington 207
Houston 194
Boardman 180
Woodbridge 175
Rancio Valcuvia 157
Shanghai 157
Los Angeles 146
The Dalles 141
Seattle 136
Washington 133
Nanchang 131
Johannesburg 125
Ho Chi Minh City 115
Lauterbourg 112
Cambridge 107
Altamura 104
San Mateo 104
Bergamo 102
Hanoi 89
Zhengzhou 88
Andover 87
Sunnyvale 87
Vienna 85
Rome 81
Lappeenranta 76
Atlanta 70
Buffalo 66
Dong Ket 62
Kunming 56
Guangzhou 52
Hong Kong 52
Shenyang 52
Hebei 51
Tianjin 50
Redwood City 47
Needham Heights 46
Hangzhou 45
Chicago 44
Dallas 44
Ogden 44
Santa Clara 43
Helsinki 40
Munich 40
Brussels 39
Council Bluffs 39
London 39
Berlin 38
New York 38
Jakarta 36
Jiaxing 36
Kiez 36
São Paulo 36
Frankfurt am Main 31
Carignano 29
Amsterdam 28
Norwalk 28
Orem 27
Montreal 24
Nuremberg 24
Denver 23
Turin 23
Changsha 21
Tokyo 21
Bologna 20
Redondo Beach 20
Pisa 19
San Diego 19
Chennai 18
Fremont 18
Jinan 18
Seoul 18
Bari 17
Verona 17
Boston 16
Delhi 16
Haiphong 16
Nürnberg 16
Kansas City 15
Catania 14
Fagnano Olona 14
Totale 27.559
Nome #
Basi di dati: modelli e linguaggi di interrogazione (seconda edizione) 1.053
An Eclipse plug-in for specifying security policies in modern information systems 671
Managing data sharing in OpenStack swift with over-encryption 636
A dynamic tree-based data structure for access privacy in the cloud 627
Distributed shuffle index: Analysis and implementation in an industrial testbed 598
Access control for the shuffle index 592
Mix&Slice: Efficient access revocation in the cloud 577
Distributed Shuffle Index in the Cloud: Implementation and Evaluation 577
Basi di dati: modelli e linguaggi di interrogazione 531
Dynamic Allocation for Resource Protection in Decentralized Cloud Storage 495
Conflict detection in security policies using Semantic Web technology 443
Automated Management and Analysis of Security Policies using Eclipse 442
A cache-aware mechanism to enforce confidentiality, trackability and access policy evolution in Content-Centric Networks 440
Basi di dati - Architetture e linee di evoluzione (II ed.) 435
An SELinux-based intent manager for Android 424
A Model-Driven Approach for Securing Software Architectures 413
Keep a Few: Outsourcing Data While Maintaining Confidentiality 413
P2P-based collaborative spam detection and filtering 411
DockerPolicyModules: Mandatory Access Control for Docker containers 407
Access Control Management for Secure Cloud Storage 400
Basi di dati: Modelli e linguaggi di interrogazione (III ed.) 396
Supporting Concurrency in Private Data Outsourcing 391
Modeling and assessing inference exposure in encrypted databases 379
Supporting concurrency and multiple indexes in private access to outsourced data 379
Securing Resources in Decentralized Cloud Storage 378
An open digest-based technique for spam detection 374
Integrating trust management and access control in data-intensive Web applications 372
Extending Mandatory Access Control Policies in Android 368
Extending XACML fr Open Web-based Scenarios 365
Bayesian-Networks-Based Misuse and Anomaly Prevention System 361
Selective data outsourcing for enforcing privacy 357
Multi-Provider Secure Processing of Sensors Data 353
An Authorization Model for Multi-Provider Queries 351
Key-management for multi-user encrypted databases 350
An XACML-based Privacy-Centered Access Control System 350
AppPolicyModules: Mandatory Access Control for Third-Party Apps 350
Combining fragmentation and encryption to protect privacy in data storage 346
Detection of conflicts in security policies 342
SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases 342
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems 341
Authorization enforcement in distributed query evaluation 339
Integrity for join queries in the Cloud 337
Spam Attacks: P2P to the Rescue 332
Advances in Access Control Policies 330
Fragmentation and Encryption to Enforce Privacy in Data Storage 330
Administrative Policies in SQL 329
Fine-Grained Disclosure of Access Policies 327
Extending loose associations to multiple fragments 326
Active XQuery 326
Selective Exchange of Confidential Data in the Outsourcing Scenario 325
Managing key hierarchies for access control enforcement: Heuristic approaches 323
Computing range queries on obfuscated data 322
An experimental evaluation of multi-key strategies for data outsourcing 322
Access Control 319
The PoSecCo Security Decision System 317
Metadata management in encrypted outsourced databases 316
PrimeLife Policy Language 316
Encryption-based Policy Enforcement for Cloud Storage 315
Policy Specialization to Support Domain Isolation 315
Privacy of Outsourced Data 314
A Data Outsourcing Architecture Combining Cryptography and Access Control 313
Efficient integrity checks for join queries in the cloud 313
Minimizing Disclosure of Private Information in Credential-Based Interactions: A Graph-Based Approach 312
Integrating advanced security certification and policy management 311
A protocol for reputation management in super-peer networks 311
ID mapping attacks in P2P networks 306
Assessing Query Privileges via Safe and Efficient Permission Composition 304
Enforcing authorizations while protecting access confidentiality 304
Proceedings Workshop on Privacy in the Electronic Society 302
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML 300
Integrated Management of Security Policies 299
Efficient and Private Access to Outsourced Data 299
Minimising disclosure of client information in credential-based interactions 299
On Information leakage by indexes over data fragments 296
Optimizing Integrity Checks for Join Queries in the Cloud 294
Protecting Access Confidentiality with Data Distribution and Swapping 293
Fragments and Loose Associations: Respecting Privacy in Data Publishing 293
Data privacy 292
Private data indexes for selective access to outsourced data 290
Supporting Privacy Preferences in Credential-Based Interactions 289
Access Control Models for XML 289
Expressive and deployable access control in Open Web Service Applications 289
Selective Data Encryption in Outsourced Dynamic Environments 286
Support for Write Privileges on Outsourced Data 283
Policy-driven system management 281
Over-Encryption: Management of Access Control Evolution on Encrypted Data 281
Encryption policies for regulating access to outsourced data 281
Distributed shuffling for preserving access confidentiality 280
Controlled Information Sharing in Collaborative Distributed Query Processing 278
Open Source Contributions 278
Event trace independence of active behavior 277
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients 276
Access Control 276
Enforcing dynamic write privileges in data outsourcing 273
Trust management services in relational databases 273
Preface [to Data and Applications Security and Privacy XXXII] 273
Protecting resources and regulating access in cloud-based object storage 270
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios 269
Preserving Confidentiality of Security Policies in Data Outsourcing 266
Supporting User Privacy Preferences on Information Release in Open Scenarios 264
Totale 35.873
Categoria #
all - tutte 109.908
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 109.908


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.437 0 0 0 0 0 0 0 0 0 523 689 225
2021/20223.238 213 383 235 269 255 423 163 194 189 339 349 226
2022/20232.483 404 264 319 396 209 320 29 121 189 52 101 79
2023/20244.982 75 100 114 99 146 927 2.921 193 106 69 51 181
2024/20253.910 149 322 186 548 75 43 27 177 423 823 649 488
2025/20265.920 262 333 572 727 1.098 530 1.135 415 506 342 0 0
Totale 41.202