Curriculum Vitae of Giovanni Livraga 1 Personal Information Address E-mail Voice Current Position Date of Birth Place of Birth 2 Universit` a degli Studi di Milano Computer Science Department via Bramante 65 - Crema 26013 - Italy giovanni.livraga@unimi.it +39.02.503.30087 Postdoctoral research fellow Computer Science Department Universit` a degli Studi di Milano, Italy July 31, 1984 Crema 26013 - Italy Positions • January 2014 – now: Postdoctoral research fellow, Computer Science Department, Universit`a degli Studi di Milano, Italy • January 2011 – December 2013: PhD student, Computer Science Department, Universit`a degli Studi di Milano, Italy • July 2010 – December 2010: research collaborator, Department of Information Technology (now Computer Science Department), Universit`a degli Studi di Milano, Italy • October 2009 – July 2010: intern, Security and Trust Group, SAP Labs France, Sophia Antipolis, France 3 3.1 Education School and Academia March 2014: PhD in Computer Science (XXVI cycle), Universit` a degli Studi di Milano, Italy, Computer Science Doctorate School. Studies completed: December 31, 2013; PhD awarded: March 18, 2014. April 2010: MSc degree in Scienze e Tecnologie dell’Informazione (Information Sciences and Technologies), graded 110/110 cum laude (full marks and honors), Universit`a degli Studi di Milano, Italy. December 2006: BSc degree in Sicurezza dei Sistemi e delle Reti Informatiche (Security of Systems and Networks), graded 110/110, Universit`a degli Studi di Milano, Italy. 3.2 Participation to International Schools September 3–8, 2012: Participation to the 12th International School on Foundations of Security Analysis and Design (FOSAD 2012), Bertinoro, Italy. July 26 – August 8, 2009: Participation to the 12th Summer School “Intensive Programme on Information and Communication Security” (IPICS 2009), Technische Universit¨at Wien, Austria. 3.3 Miscellaneous February 2005 – January 2006: Participation to the preparation course for the CISCO CCNA Certification, Dipartimento di Tecnologie dell’Informazione, Universit` a degli Studi di Milano, Italy. June 2002: FCE Certification issued by the University of Cambridge, UK (ref. 026IT6380002). 1 4 Research Interests Giovanni Livraga’s research interests are in the main area of security and privacy, with particular emphasis on problems related to data protection, information privacy, inference control, access control, and information protection in general in publication, storage, and emerging scenarios. More specifically, Giovanni’s research activity has focused/focuses on: i) data protection in emerging scenarios, to ensure confidentiality of large data collections stored/published in cloud/outsourcing scenarios; ii) data sensitivity at different granularity levels, to allow expressing different levels of sensitivity for different data items; iii) data utility measures, needed to define techniques able to balance data recipients’ needs for accessing complete information and data respondents’ needs for safeguarding data privacy; iv) external knowledge, that can put at high risk the confidentiality of data; v) modeling of data dependencies, that can cause leakage of information not intended for disclosure; vi) access control in cloud/outsourcing scenarios, to ensure that access to data stored and managed in the cloud, or outsourced to external providers, be granted correctly enforcing the authorization policies defined by the data owner. 5 Participation in Research Projects • Programma di Ricerca di Rilevante Interesse Nazionale (PRIN) Project: Data-driven Genomic Computing (GenData 2020) Project dates: February 2013 – January 2016 Involvement in the project: February 2013 – now Collaborating at: Universit`a degli Studi di Milano Position at Universit` a degli Studi di Milano: PhD student, postdoctoral research fellow • Google Faculty Research Award Project: Fine-Grained Access Control for Social Networking Applications Project dates: July 2012 – June 2013 Involvement in the project: July 2012 – June 2013 Collaborating at: Universit`a degli Studi di Milano Position at Universit` a degli Studi di Milano: PhD student • EU 7th Framework Programme for Research (FP7) (ICT - Information and Communication Technologies) Project: Privacy and Identity Management in Europe for Life (PrimeLife) Project dates: March 2008 – June 2011 Involvement in the project: October 2009 – June 2011 Collaborating at: SAP Labs France / Universit` a degli Studi di Milano Position at SAP Labs France: intern Position at Universit` a degli Studi di Milano: research collaborator 6 Research Periods in International Research Centers • July 29 – August 29, 2011: short-term scholar at George Mason University, Virginia, USA, Center for Secure Information Systems (CSIS), in collaboration with Prof. Sushil Jajodia. • July 27 – August 29, 2012: short-term scholar at George Mason University, Virginia, USA, Center for Secure Information Systems (CSIS), in collaboration with Prof. Sushil Jajodia. • July 29 – August 30, 2013: short-term scholar at George Mason University, Virginia, USA, Center for Secure Information Systems (CSIS), in collaboration with Prof. Sushil Jajodia. 7 Participation to Conferences as a Speaker • 15th IEEE International Conference on Computational Science and Engineering (CSE 2012), Paphos, Cyprus, December 7, 2012. Presentation of the work Protecting Privacy of User Information in Continuous Location-Based Services, by C.A. Ardagna, G. Livraga, and P. Samarati. 2 • 1st IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL 2012), Rome, Italy, October 4, 2012. Presentation of the work Privacy and Security in Environmental Monitoring Systems, by S. De Capitani di Vimercati, G. Livraga, V. Piuri, and F. Scotti. 8 Seminars and Talks • Giovanni Livraga, Privacy, Sicurezza e Social Network, Collegio degli Angeli, Treviglio, Italy, December 06, 2013 • Giovanni Livraga, Internet, Sicurezza, e Giovani Utenti, Collegio degli Angeli, Treviglio, Italy, December 05, 2013 • Giovanni Livraga, Navigare Sicuri: i rischi di Internet, Istituto Comprensivo di Trescore Cremasco, Italy, March 26, 2013 • Giovanni Livraga, I Social Network e la Privacy, Istituto Comprensivo di Trescore Cremasco, Vailate, Italy, February 6, 2013 • Giovanni Livraga, I Social Network e la Privacy, Istituto Comprensivo di Trescore Cremasco, Trescore Cremasco, Italy, February 5, 2013 • Giovanni Livraga, Cosa sono i Social Networks: Rischi e Benefici, IIS “Galilei”, Crema, Italy, November 30, 2012 • Giovanni Livraga, Internet e Social Networks: la Tutela della Privacy, Liceo Classico “Manin”, Cremona, Italy, November 7, 2012 • Giovanni Livraga, Enforcing Subscription-based Authorization Policies in Cloud Scenarios, 12th International School on Foundations of Security Analysis and Design (FOSAD 2012), Bertinoro, Italy, September 7, 2012 • Giovanni Livraga, I Social Network in Chiave Didattica, Universit`a degli Studi di Milano, Dipartimento di Informatica, June 2012 • Giovanni Livraga, La tutela della Privacy in Internet, Universit`a degli Studi di Milano, Dipartimento di Informatica, June 2012 • Giovanni Livraga, I Social Network e la Tutela della Privacy, Scuola Media “Galmozzi”, Crema, Italy, June 2012 • Giovanni Livraga, Privacy e Social Network - I miei dati su Facebook, Istituto Comprensivo di Trescore Cremasco, Vailate, Italy, May 9, 2012 • Giovanni Livraga, Privacy e Social Network, Istituto Comprensivo di Trescore Cremasco, Trescore Cremasco, Italy, May 2, 2012 • Giovanni Livraga, Privacy nella Societ` a dell’Informazione - Dove sono i miei dati?, Istituto Tecnico “Luca Pacioli”, Crema, Italy, May 31, 2011 9 Awards The paper Extending Loose Associations to Multiple Fragment (co-authored by S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati) received the Best Paper Runner-Up Award at the 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2013), held in Newark, NJ, USA, on July 15-17, 2013. 10 Professional Activities Editorial Board Member of: • International Journal On Advances in Security Program Committee Member of the following International Conferences and Workshops: • 8th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2014), November 16–20, 2014, Lisbon, Portugal 3 • 8th International Conference on Network and System Security (NSS 2014) October 15–17, 2014, Xi’an, China • International Workshop on Big Data Search and Mining (IWBSM 2014), September 24–27, 2014, Delhi, India • 9th International Workshop on Data Privacy Management (DPM 2014), September 10–11, Wroclaw, Poland • 9th International Conference on Availability, Reliability and Security (ARES 2014), September 8–12, 2014, Fribourg, Switzerland • 11th International Conference on Security and Cryptography (SECRYPT 2014), August 28–30, 2014, Vienna, Austria • 3rd International Conference on Smart Systems, Devices and Technologies (SMART 2014), July 20–24, 2014, Paris, France • 2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA 2014), June 23–25, 2014, Alberobello, Italy • 2014 Workshop on Advanced Intrusion Detection and Prevention (AIDP 2014), June 4–5, 2014, Marrakech, Morocco • 10th International Conference on Networking and Services (ICNS 2014), April 20–24, 2014, Chamonix, France • 10th IEEE International Conference on Autonomic and Trusted Computing (ATC 2013), December 18–20, 2013, Vietri sul Mare, Italy • 16th IEEE International Conference on Computational Science and Engineering (CSE 2013), December 3–5, 2013, Sydney, Australia • 4th IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2013), November 13–15, 2013 Zhangjiajie, China • 12th Workshop on Privacy in the Electronic Society (WPES 2013), November 4, 2013, Berlin, Germany • 3rd International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2013), October 19–23, 2013, Kharagpur, India • 2nd International Symposium on Privacy and Security in Cloud and Social Networks (PriSecCSN 2013), September 30, 2013, Karlsruhe, Germany • 6th SETOP International Workshop on Autonomous and Spontaneous Security (SETOP 2013), September 12–13, 2013, Egham, UK • 9th International Workshop on Security and Trust Management (STM 2013), September 12-13, 2013, Egham, UK • 8th DPM International Workshop on Data Privacy Management (DPM 2013), September 12–13, 2013, Egham, UK • 8th International Conference on Availability, Reliability and Security (ARES 2013), September 2–6, 2013, Regensburg, Germany • 10th International Conference on Mobile Web Information Systems (MobiWIS 2013), August 26–28, 2013, Paphos, Cyprus • 7th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2013), August 25-31, 2013, Barcelona, Spain • 2013 IEEE International Conference on Green Computing and Communications (GreenCom 2013), August 20–23, 2013, Beijing, China • 10th International Conference on Security and Cryptography (SECRYPT 2013), July 29–31, 2013, Reykjavik, Iceland 4 • IEEE 2013 First International Workshop on Cloud Security Auditing (CSAW 2013), June 27–July 2, 2013, Santa Clara, CA, USA • 2nd International Conference on Smart Systems, Devices and Technologies (SMART 2013), June 23–28, 2013, Rome, Italy • 7th International Conference on Network and System Security (NSS 2013), June 3–4, 2013, Madrid, Spain • 4th International Conference on Computer Science and Its Applications (CIIA 2013), May 4–6, 2013, Saida, Algeria • 9th International Conference on Networking and Services (ICNS 2013), March 24–29, 2013, Lisbon, Portugal • 15th IEEE International Conference on Computational Science and Engineering (CSE 2012), December 5–7, 2012, Paphos, Cyprus • 1st International Workshop on Management and Security Technologies for Cloud Computing (ManSec-CC 2012), December 3–7, 2012, Anaheim, CA, USA • 6th International Conference on Network and System Security (NSS 2012), November 21–23, 2012, Wu Yi Shan, Fujian, China • 2012 International Symposium on Privacy and Security in Cloud and Social Networks (PriSecCSN 2012), November 1–3, 2012, Xiangtan, China • 5th International Symposium on Foundations & Practice of Security (FPS 2012), October 25–26, 2012, Montreal, QC, Canada • 2012 International Conference on Security in Computer Networks and Distributed Systems (SNDS 2012), October 11–12, 2012, Thiruvananthapuram, India • 1st IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL 2012), October 2–5, 2012, Rome, Italy. • 8th International Workshop on Security and Trust Management (STM 2012), September 13–14, Pisa, Italy • 5th SETOP International Workshop on Autonomous and Spontaneous Security (SETOP 2012), September 10–12, Pisa, Italy • 6th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2012), August 19–24, 2012, Rome, Italy • 9th International Conference on Security and Cryptography (SECRYPT 2012), July 24–27, 2012, Rome, Italy • 2012 Summer FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-Summer), June 26–28, 2012, Vancouver, Canada • 1st International Conference on Smart Systems, Devices and Technologies (SMART 2012), May 27–June 1, 2012, Stuttgart, Germany • 8th International Conference on Networking and Services (ICNS 2012), March 25–29, 2012, St. Maarten, Netherlands Antilles • 4th SETOP International Workshop on Autonomous and Spontaneous Security (SETOP 2011), September 15–16, 2011, Leuven, Belgium • 1st International Workshop on Securing Services on the Cloud (IWSSC 2011), September 6–8, 2011, Milan, Italy • 5th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2011), August 21–27, 2011, Nice/Saint Laurent du Var, France 5 Publication Chair of the following International Conferences: • 5th International Conference on Network and System Security (NSS 2011), September 6–8, 2011, Milan, Italy • 1st International Workshop on Securing Services on the Cloud (IWSSC 2011), September 6–8, 2011, Milan, Italy • 2011 Workshop on Mobile and Online Social Networks (MOSN 2011), September 8, 2011, Milan, Italy • 3rd International Workshop on Cyberspace Safety and Security (CSS 2011), September 8, 2011, Milan, Italy Publicity Chair of the following International Conferences and Workshops: • 3rd Joint Workshop on Security in Business Processes (SBP 2014), September 8, 2014, Haifa, Israel • 19th European Symposium on Research in Computer Security (ESORICS 2014), September 7–11, 2014, Wroclaw, Poland • 11th International Conference on Security and Cryptography (SECRYPT 2014), August 28–30, 2014, Vienna, Austria • 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), July 14–16, 2014, Vienna, Austria • 10th IEEE International Conference on Autonomic and Trusted Computing (ATC 2013), December 18-20, 2013, Vietri sul Mare, Italy • 12th Workshop on Privacy in the Electronic Society (WPES 2013), November 4, 2013, Berlin, Germany • 9th Workshop on Security & Trust management (STM 2013), September 9–13, 2013, Egham, UK • 18th European Symposium on Research in Computer Security (ESORICS 2013), September 9–13, 2013, Egham, UK • 10th International Conference on Security and Cryptography (SECRYPT 2013), July 29–31, 2013, Reykjavik, Iceland • 17th European Symposium on Research in Computer Security (ESORICS 2012), September 10–14, 2012, Pisa, Italy • 8th International Workshop on Security and Trust Management (STM 2012), September 13–14, 2012, Pisa, Italy • 9th European PKI Workshop: Research and Applications (EuroPKI 2012), September 13–14, 2012, Pisa, Italy • 9th International Conference on Security and Cryptography (SECRYPT 2012), July 24–27, 2012, Rome, Italy • 10th International Conference on Applied Cryptography and Network Security (ACNS 2012), June 26–29, 2012, Singapore • 5th International Conference on Network and System Security (NSS 2011), September 6–8, 2011, Milan, Italy Reviewer for the following International Journals: • ACM Transactions on the Web (ACM TWEB) • International Journal of Information Security (IJIS) • IET Information Security • Elsevier Computers & Security Journal 6 • IEEE Systems Journal - Special Issue on Security and Privacy in Complex Systems Reviewer for the following International Conferences and Workshops: • 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), June 4–6, 2014, Kyoto, Japan • 16th Information Security Conference (ISC 2103), November 13–15, 2013, Dallas, TX, USA • 20th ACM Conference on Computer and Communications Security (CCS 2013), November 4–8, 2013, Berlin, Germany • 18th European Symposium on Research in Computer Security (ESORICS 2013), September 9–13, 2013, Egham, UK • 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), May 8–10, 2013, Hangzhou, China • 20th Annual Network & Distributed System Security Symposium (NDSS 2013), February 24–27, 2013, San Diego, CA, USA • 2012 Annual Computer Security Applications Conference (ACSAC 2012), December 3–7, 2012, Orlando, FL, USA • 14th International Conference on Information and Communications Security (ICICS 2012), October 29–31, 2012, Hong Kong • 2012 Workshop on Privacy in the Electronic Society (WPES 2012), October 15, 2012, Raleigh, NC, USA • 17th European Symposium on Research in Computer Security (ESORICS 2012), September 10–14, 2012, Pisa, Italy • 25th IEEE Computer Security Foundations Symposium (CSF 2012), June 25-27, 2012, Harvard University, Cambridge MA, USA • 32nd International Conference on Distributed Computing Systems (ICDCS 2012), June 18-21, 2012, Macau, China • 14th Information Security Conference (ISC 2011), October 26-29, 2011, Xi’an, China • 10th Workshop on Privacy in the Electronic Society (WPES 2011), October 17, 2011, Chicago, IL, USA • 16th European Symposium on Research in Computer Security (ESORICS 2011), September 12-14, 2011, Leuven, Belgium • 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2011), September 7-9, 2011, London, UK • 5th International Conference on Network and System Security (NSS 2011), September 6-8, 2011, Milan, Italy • 8th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2011), August 29 - September 02, 2011, Toulouse, France • The 11th Privacy Enhancing Technologies Symposium (PETS 2011), July 27-29, 2011, Waterloo, Canada • The International Conference on Security and Cryptography (SECRYPT 2011), July 18-21, 2011, Seville, Spain • 25th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2011), July 11-13, 2011, Richmond, VA, USA 7 11 Publications Books B–1 G. Livraga, Protecting Privacy in Data Release, Springer (to appear) Edited Books EB–1 P. Samarati, S. Foresti, J. Hu, and G. Livraga (eds.), Proc. of the 5th International Conference on Network and System Security (NSS 2011), IEEE, Milan, Italy, September 6-8, 2011. EB–2 C. C. Zou, Y. Xiang, and G. Livraga (eds.), Proc. of the 3rd International Workshop on Cyberspace Safety and Security (CSS 2011), IEEE, Milan, Italy, September 8, 2011. EB–3 J. Zhang and G. Livraga (eds.), Proc. of the 2011 International Conference on Data and Knowledge Engineering (ICDKE 2011), IEEE, Milan, Italy, September 6, 2011. EB–4 M. Li and G. Livraga (eds.), Proc. of the 2011 Workshop on Mobile and Online Social Networks (MOSN 2011), IEEE, Milan, Italy, September 8, 2011. International Journal Articles IJ–1 S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, “Fragmentation in Presence of Data Dependencies”, in IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2014 (to appear). IJ–2 S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, and P. Samarati, “Enforcing Dynamic Write Privileges in Data Outsourcing”, in Computer & Security (COSE), vol. 39, part A, pp.47–63, 2011. IJ–3 S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati, “Data Privacy: Definitions and Techniques”, in International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 20, no. 6, pp. 793–817, 2012. IJ–4 M. Bezzi, S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, and R. Sassi, “Modeling and Preventing Inferences from Sensitive Value Distributions in Data Release”, in Journal of Computer Security (JCS), vol. 20, no. 4, pp. 393–436, 2012. IJ–5 V. Ciriani, S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati, “An OBDD Approach to Enforce Confidentiality and Visibility Constraints in Data Publishing”, in Journal of Computer Security (JCS), vol. 20, no. 5, pp. 463–508, 2012. IJ–6 S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati, “Anonymization of Statistical Data”, in IT - Information Technology, vol. 53, no. 1, pp. 18–25, 2011. Papers in Proceedings of International Conferences and Workshops IC–1 S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi and P. Samarati, “Extending Loose Associations to Multiple Fragments”, in Proc. of the 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2013), Newark, NJ, USA, July 15-17, 2013 (best paper runner-up award). IC–2 C.A. Ardagna, G. Livraga, and P. Samarati, “Protecting Privacy of User Information in Continuous Location-Based Services”, in Proc. of the 15th IEEE International Conference on Computational Science and Engineering (CSE 2012), Paphos, Cyprus, December 5-7, 2012 IC–3 S. De Capitani di Vimercati, G. Livraga, V. Piuri, and F. Scotti, “Privacy and Security in Environmental Monitoring Systems”, in Proc. of the 1st IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL 2012), Rome, Italy, October 2-5, 2012 IC–4 S. De Capitani di Vimercati, S. Foresti, S. Jajodia, and G. Livraga, “Enforcing Subscription-based Authorization Policies in Cloud Scenarios”, in Proc. of the 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2012), Paris, France, July 11-13, 2012. 8 IC–5 V. Ciriani, S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati, “Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach”, in Proc. of the 25th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2011), Richmond, VA, USA, July 11-13, 2011. IC–6 S. De Capitani di Vimercati, S. Foresti, and G. Livraga, “Privacy in Data Publishing”, in Data Privacy Management and Autonomous Spontaneous Security, J. Garcia-Alfaro, G. Navarro-Arribas, A. Cavalli, and J. Leneutre (eds.), Springer, 2011 (invited). IC–7 M. Bezzi, S. De Capitani di Vimercati, G. Livraga, and P. Samarati, “Protecting Privacy of Sensitive Value Distributions in Data Release”, in Proc. of the 6th International Workshop on Security and Trust Management (STM 2010), Athens, Greece, October 24, 2010. Chapters in Books BC–1 S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, “Selective and Private Access to Outsourced Data Centers”, in Handbook on Data Centers, S.U. Khan, A.Y. Zomaya (eds.), Springer, 2014 (to appear). BC–2 S. De Capitani di Vimercati, A. Genovese, G. Livraga, V. Piuri, and F. Scotti, “Privacy and Security in Environmental Monitoring Systems: Issues and Solutions”, in Computer and Information Security Handbook, 2nd Edition, J. Vacca (ed.), Morgan Kaufmann, 2013. BC–3 M. Bezzi, S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati “Data Privacy”, in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-H¨ ubner, and K. Rannenberg (eds.), Springer, 2011. BC–4 S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati, “Protecting Privacy in Data Release”, in Foundations of Security Analysis and Design VI, A. Aldini, and R. Gorrieri (eds.), Springer, 2011. Other Publications OP–1 S. De Capitani di Vimercati and G. Livraga, “Grant Option”, in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg and S. Jajodia (eds.), Springer, 2011. OP–2 S. De Capitani di Vimercati and G. Livraga, “Privileges in SQL”, in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg and S. Jajodia (eds.), Springer, 2011. OP–3 S. De Capitani di Vimercati and G. Livraga, “SQL Access Control Model”, in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg and S. Jajodia (eds.), Springer, 2011. OP–4 G. Livraga and P. Samarati “Multilevel Database”, in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg and S. Jajodia (eds.), Springer, 2011. Thesis TH–1 G. Livraga, “Preserving Privacy in Data Release”, PhD Thesis in Computer Science, Universit`a degli Studi di Milano, Italy, March 2014. TH–2 G. Livraga, “Protecting Privacy of Sensitive Value Distributions in Data Release”, MSc Thesis in Scienze e Tecnologie dell’Informazione, Universit`a degli Studi di Milano, Italy, April 2010. Crema, March 25, 2014 Giovanni Livraga 9
© Copyright 2024 Paperzz