PARABOSCHI, Stefano Giulio
 Distribuzione geografica
Continente #
EU - Europa 21.083
NA - Nord America 8.406
AS - Asia 2.262
Continente sconosciuto - Info sul continente non disponibili 22
AF - Africa 10
SA - Sud America 10
OC - Oceania 9
Totale 31.802
Nazione #
GB - Regno Unito 8.827
US - Stati Uniti d'America 8.181
IE - Irlanda 3.813
IT - Italia 2.240
CN - Cina 1.691
PL - Polonia 1.676
RU - Federazione Russa 1.556
DE - Germania 839
SE - Svezia 667
FR - Francia 665
UA - Ucraina 318
SG - Singapore 255
CA - Canada 224
FI - Finlandia 177
KR - Corea 98
NL - Olanda 94
AT - Austria 78
IN - India 72
VN - Vietnam 68
EU - Europa 46
BE - Belgio 41
ID - Indonesia 31
GR - Grecia 27
LT - Lituania 14
CZ - Repubblica Ceca 13
TR - Turchia 13
CH - Svizzera 12
HK - Hong Kong 10
RO - Romania 10
AU - Australia 9
BG - Bulgaria 6
DZ - Algeria 6
ES - Italia 6
JP - Giappone 5
IR - Iran 4
PE - Perù 4
TW - Taiwan 4
BD - Bangladesh 3
PH - Filippine 3
A2 - ???statistics.table.value.countryCode.A2??? 2
AR - Argentina 2
BR - Brasile 2
MA - Marocco 2
AZ - Azerbaigian 1
BY - Bielorussia 1
CL - Cile 1
CY - Cipro 1
HR - Croazia 1
KZ - Kazakistan 1
LB - Libano 1
MD - Moldavia 1
NG - Nigeria 1
PA - Panama 1
PT - Portogallo 1
PY - Paraguay 1
SC - Seychelles 1
UZ - Uzbekistan 1
Totale 31.828
Città #
Southend 8.512
Dublin 3.775
Warsaw 1.672
Jacksonville 957
Chandler 592
Mountain View 483
Ann Arbor 429
Ashburn 408
Princeton 356
Nanjing 328
Fairfield 299
Beijing 263
Dalmine 252
Dearborn 236
Toronto 215
Wilmington 207
Houston 182
Milan 182
Boardman 179
Woodbridge 175
Rancio Valcuvia 157
Shanghai 150
Singapore 142
Washington 133
Nanchang 131
Seattle 130
Cambridge 107
Altamura 104
San Mateo 104
Bergamo 100
Andover 87
Sunnyvale 87
Zhengzhou 87
Moscow 78
Vienna 78
Lappeenranta 74
Rome 66
Dong Ket 62
Atlanta 55
Kunming 55
Shenyang 52
Hebei 51
Redwood City 47
Needham Heights 46
Ogden 44
Tianjin 41
Brussels 39
Hangzhou 36
Jiaxing 36
Kiez 36
Jakarta 31
Guangzhou 30
Carignano 29
London 28
Norwalk 28
Los Angeles 27
Munich 20
Changsha 19
Chicago 19
Pisa 19
San Diego 19
Fremont 18
Bologna 17
Verona 17
Dallas 16
Jinan 16
Nürnberg 16
Turin 16
Kansas City 15
Bari 14
Fagnano Olona 14
Amsterdam 13
Redmond 13
Santa Clara 13
Fairfax 12
Changchun 11
Fano 11
Lanzhou 11
Segrate 11
Auburn Hills 10
Brno 10
Sakarya 10
Serra 10
Sona 10
Stuttgart 10
Torino 10
Acton 9
Catania 9
Frankfurt am Main 9
Nuremberg 9
Saint Petersburg 9
Vilnius 9
Berlin 8
Biella 8
Central 8
Chiswick 8
Stezzano 8
Torre Del Greco 8
Udine 8
Delhi 7
Totale 22.827
Nome #
Basi di dati: modelli e linguaggi di interrogazione (seconda edizione) 865
An Eclipse plug-in for specifying security policies in modern information systems 607
A dynamic tree-based data structure for access privacy in the cloud 568
Managing data sharing in OpenStack swift with over-encryption 552
Distributed shuffle index: Analysis and implementation in an industrial testbed 516
Access control for the shuffle index 499
Distributed Shuffle Index in the Cloud: Implementation and Evaluation 497
Mix&Slice: Efficient access revocation in the cloud 481
Basi di dati: modelli e linguaggi di interrogazione 451
Dynamic Allocation for Resource Protection in Decentralized Cloud Storage 400
Conflict detection in security policies using Semantic Web technology 389
Basi di dati - Architetture e linee di evoluzione (II ed.) 379
Automated Management and Analysis of Security Policies using Eclipse 375
DockerPolicyModules: Mandatory Access Control for Docker containers 347
An SELinux-based intent manager for Android 341
Basi di dati: Modelli e linguaggi di interrogazione (III ed.) 340
P2P-based collaborative spam detection and filtering 339
Supporting Concurrency in Private Data Outsourcing 332
Access Control Management for Secure Cloud Storage 325
A Model-Driven Approach for Securing Software Architectures 323
An open digest-based technique for spam detection 316
Extending XACML fr Open Web-based Scenarios 314
Keep a Few: Outsourcing Data While Maintaining Confidentiality 312
An Authorization Model for Multi-Provider Queries 306
Supporting concurrency and multiple indexes in private access to outsourced data 305
Integrating trust management and access control in data-intensive Web applications 303
Combining fragmentation and encryption to protect privacy in data storage 301
Bayesian-Networks-Based Misuse and Anomaly Prevention System 300
Modeling and assessing inference exposure in encrypted databases 297
A cache-aware mechanism to enforce confidentiality, trackability and access policy evolution in Content-Centric Networks 294
Selective data outsourcing for enforcing privacy 291
Spam Attacks: P2P to the Rescue 290
Key-management for multi-user encrypted databases 290
Active XQuery 286
Fragmentation and Encryption to Enforce Privacy in Data Storage 285
Advances in Access Control Policies 283
Managing key hierarchies for access control enforcement: Heuristic approaches 283
An XACML-based Privacy-Centered Access Control System 283
Detection of conflicts in security policies 281
Access Control 281
PrimeLife Policy Language 281
Securing Resources in Decentralized Cloud Storage 280
Multi-Provider Secure Processing of Sensors Data 280
Extending Mandatory Access Control Policies in Android 279
Administrative Policies in SQL 277
Authorization enforcement in distributed query evaluation 276
An experimental evaluation of multi-key strategies for data outsourcing 274
Metadata management in encrypted outsourced databases 273
AppPolicyModules: Mandatory Access Control for Third-Party Apps 273
A protocol for reputation management in super-peer networks 272
Fine-Grained Disclosure of Access Policies 270
Selective Exchange of Confidential Data in the Outsourcing Scenario 270
Privacy of Outsourced Data 270
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems 269
Computing range queries on obfuscated data 269
Proceedings Workshop on Privacy in the Electronic Society 268
A Data Outsourcing Architecture Combining Cryptography and Access Control 267
Assessing Query Privileges via Safe and Efficient Permission Composition 265
Integrity for join queries in the Cloud 263
Encryption-based Policy Enforcement for Cloud Storage 260
Minimising disclosure of client information in credential-based interactions 259
The PoSecCo Security Decision System 256
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML 254
Optimizing Integrity Checks for Join Queries in the Cloud 254
SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases 254
Efficient integrity checks for join queries in the cloud 254
Integrated Management of Security Policies 252
Fragments and Loose Associations: Respecting Privacy in Data Publishing 248
On Information leakage by indexes over data fragments 248
Extending loose associations to multiple fragments 248
Efficient and Private Access to Outsourced Data 246
Selective Data Encryption in Outsourced Dynamic Environments 246
Integrating advanced security certification and policy management 245
Private data indexes for selective access to outsourced data 245
Encryption policies for regulating access to outsourced data 244
ID mapping attacks in P2P networks 243
Policy Specialization to Support Domain Isolation 243
Support for Write Privileges on Outsourced Data 241
Enforcing authorizations while protecting access confidentiality 241
Policy-driven system management 240
Data privacy 240
Access Control Models for XML 240
Minimizing Disclosure of Private Information in Credential-Based Interactions: A Graph-Based Approach 239
Open Source Contributions 239
Over-Encryption: Management of Access Control Evolution on Encrypted Data 239
Trust management services in relational databases 238
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients 237
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios 236
Protecting Access Confidentiality with Data Distribution and Swapping 234
Controlled Information Sharing in Collaborative Distributed Query Processing 234
Access Control 234
Distributed shuffling for preserving access confidentiality 227
Supporting Privacy Preferences in Credential-Based Interactions 226
Event trace independence of active behavior 225
Supporting User Privacy Preferences on Information Release in Open Scenarios 224
Expressive and deployable access control in Open Web Service Applications 221
Preserving Confidentiality of Security Policies in Data Outsourcing 211
Enforcing dynamic write privileges in data outsourcing 210
Fragmentation in presence of data dependencies 210
Integrity for Approximate Joins on Untrusted Computational Servers 208
Totale 29.796
Categoria #
all - tutte 80.495
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 80.495


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20201.815 0 0 0 0 258 255 314 137 386 161 118 186
2020/20214.489 528 273 153 264 208 400 513 189 524 523 689 225
2021/20223.238 213 383 235 269 255 423 163 194 189 339 349 226
2022/20232.483 404 264 319 396 209 320 29 121 189 52 101 79
2023/20244.982 75 100 114 99 146 927 2.921 193 106 69 51 181
2024/20251.272 149 322 186 548 67 0 0 0 0 0 0 0
Totale 32.644