close

Enter

Log in using OpenID

Curriculum Vitae of Giovanni Livraga

embedDownload
Curriculum Vitae of
Giovanni Livraga
1
Personal Information
Address
E-mail
Voice
Current Position
Date of Birth
Place of Birth
2
Universit`
a degli Studi di Milano
Computer Science Department
via Bramante 65 - Crema 26013 - Italy
[email protected]
+39.02.503.30087
Postdoctoral research fellow
Computer Science Department
Universit`
a degli Studi di Milano, Italy
July 31, 1984
Crema 26013 - Italy
Positions
• January 2014 – now: Postdoctoral research fellow, Computer Science Department, Universit`a degli Studi
di Milano, Italy
• January 2011 – December 2013: PhD student, Computer Science Department, Universit`a degli Studi di
Milano, Italy
• July 2010 – December 2010: research collaborator, Department of Information Technology (now Computer
Science Department), Universit`a degli Studi di Milano, Italy
• October 2009 – July 2010: intern, Security and Trust Group, SAP Labs France, Sophia Antipolis, France
3
3.1
Education
School and Academia
March 2014: PhD in Computer Science (XXVI cycle), Universit`
a degli Studi di Milano, Italy, Computer Science
Doctorate School. Studies completed: December 31, 2013; PhD awarded: March 18, 2014.
April 2010: MSc degree in Scienze e Tecnologie dell’Informazione (Information Sciences and Technologies), graded
110/110 cum laude (full marks and honors), Universit`a degli Studi di Milano, Italy.
December 2006: BSc degree in Sicurezza dei Sistemi e delle Reti Informatiche (Security of Systems and Networks),
graded 110/110, Universit`a degli Studi di Milano, Italy.
3.2
Participation to International Schools
September 3–8, 2012: Participation to the 12th International School on Foundations of Security Analysis and
Design (FOSAD 2012), Bertinoro, Italy.
July 26 – August 8, 2009: Participation to the 12th Summer School “Intensive Programme on Information and
Communication Security” (IPICS 2009), Technische Universit¨at Wien, Austria.
3.3
Miscellaneous
February 2005 – January 2006: Participation to the preparation course for the CISCO CCNA Certification,
Dipartimento di Tecnologie dell’Informazione, Universit`
a degli Studi di Milano, Italy.
June 2002: FCE Certification issued by the University of Cambridge, UK (ref. 026IT6380002).
1
4
Research Interests
Giovanni Livraga’s research interests are in the main area of security and privacy, with particular emphasis
on problems related to data protection, information privacy, inference control, access control, and information
protection in general in publication, storage, and emerging scenarios. More specifically, Giovanni’s research
activity has focused/focuses on: i) data protection in emerging scenarios, to ensure confidentiality of large data
collections stored/published in cloud/outsourcing scenarios; ii) data sensitivity at different granularity levels, to
allow expressing different levels of sensitivity for different data items; iii) data utility measures, needed to define
techniques able to balance data recipients’ needs for accessing complete information and data respondents’ needs
for safeguarding data privacy; iv) external knowledge, that can put at high risk the confidentiality of data; v)
modeling of data dependencies, that can cause leakage of information not intended for disclosure; vi) access control
in cloud/outsourcing scenarios, to ensure that access to data stored and managed in the cloud, or outsourced to
external providers, be granted correctly enforcing the authorization policies defined by the data owner.
5
Participation in Research Projects
• Programma di Ricerca di Rilevante Interesse Nazionale (PRIN)
Project: Data-driven Genomic Computing (GenData 2020)
Project dates: February 2013 – January 2016
Involvement in the project: February 2013 – now
Collaborating at: Universit`a degli Studi di Milano
Position at Universit`
a degli Studi di Milano: PhD student, postdoctoral research fellow
• Google Faculty Research Award
Project: Fine-Grained Access Control for Social Networking Applications
Project dates: July 2012 – June 2013
Involvement in the project: July 2012 – June 2013
Collaborating at: Universit`a degli Studi di Milano
Position at Universit`
a degli Studi di Milano: PhD student
• EU 7th Framework Programme for Research (FP7) (ICT - Information and Communication Technologies)
Project: Privacy and Identity Management in Europe for Life (PrimeLife)
Project dates: March 2008 – June 2011
Involvement in the project: October 2009 – June 2011
Collaborating at: SAP Labs France / Universit`
a degli Studi di Milano
Position at SAP Labs France: intern
Position at Universit`
a degli Studi di Milano: research collaborator
6
Research Periods in International Research Centers
• July 29 – August 29, 2011: short-term scholar at George Mason University, Virginia, USA, Center for
Secure Information Systems (CSIS), in collaboration with Prof. Sushil Jajodia.
• July 27 – August 29, 2012: short-term scholar at George Mason University, Virginia, USA, Center for
Secure Information Systems (CSIS), in collaboration with Prof. Sushil Jajodia.
• July 29 – August 30, 2013: short-term scholar at George Mason University, Virginia, USA, Center for
Secure Information Systems (CSIS), in collaboration with Prof. Sushil Jajodia.
7
Participation to Conferences as a Speaker
• 15th IEEE International Conference on Computational Science and Engineering (CSE 2012), Paphos, Cyprus, December 7, 2012. Presentation of the work Protecting Privacy of User Information in Continuous
Location-Based Services, by C.A. Ardagna, G. Livraga, and P. Samarati.
2
• 1st IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL 2012), Rome, Italy, October 4, 2012. Presentation of the work Privacy and Security in Environmental Monitoring
Systems, by S. De Capitani di Vimercati, G. Livraga, V. Piuri, and F. Scotti.
8
Seminars and Talks
• Giovanni Livraga, Privacy, Sicurezza e Social Network, Collegio degli Angeli, Treviglio, Italy, December
06, 2013
• Giovanni Livraga, Internet, Sicurezza, e Giovani Utenti, Collegio degli Angeli, Treviglio, Italy, December
05, 2013
• Giovanni Livraga, Navigare Sicuri: i rischi di Internet, Istituto Comprensivo di Trescore Cremasco, Italy,
March 26, 2013
• Giovanni Livraga, I Social Network e la Privacy, Istituto Comprensivo di Trescore Cremasco, Vailate, Italy,
February 6, 2013
• Giovanni Livraga, I Social Network e la Privacy, Istituto Comprensivo di Trescore Cremasco, Trescore
Cremasco, Italy, February 5, 2013
• Giovanni Livraga, Cosa sono i Social Networks: Rischi e Benefici, IIS “Galilei”, Crema, Italy, November
30, 2012
• Giovanni Livraga, Internet e Social Networks: la Tutela della Privacy, Liceo Classico “Manin”, Cremona,
Italy, November 7, 2012
• Giovanni Livraga, Enforcing Subscription-based Authorization Policies in Cloud Scenarios, 12th International School on Foundations of Security Analysis and Design (FOSAD 2012), Bertinoro, Italy, September
7, 2012
• Giovanni Livraga, I Social Network in Chiave Didattica, Universit`a degli Studi di Milano, Dipartimento di
Informatica, June 2012
• Giovanni Livraga, La tutela della Privacy in Internet, Universit`a degli Studi di Milano, Dipartimento di
Informatica, June 2012
• Giovanni Livraga, I Social Network e la Tutela della Privacy, Scuola Media “Galmozzi”, Crema, Italy, June
2012
• Giovanni Livraga, Privacy e Social Network - I miei dati su Facebook, Istituto Comprensivo di Trescore
Cremasco, Vailate, Italy, May 9, 2012
• Giovanni Livraga, Privacy e Social Network, Istituto Comprensivo di Trescore Cremasco, Trescore Cremasco, Italy, May 2, 2012
• Giovanni Livraga, Privacy nella Societ`
a dell’Informazione - Dove sono i miei dati?, Istituto Tecnico “Luca
Pacioli”, Crema, Italy, May 31, 2011
9
Awards
The paper Extending Loose Associations to Multiple Fragment (co-authored by S. De Capitani di Vimercati, S.
Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati) received the Best Paper Runner-Up Award at the
27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2013),
held in Newark, NJ, USA, on July 15-17, 2013.
10
Professional Activities
Editorial Board Member of:
• International Journal On Advances in Security
Program Committee Member of the following International Conferences and Workshops:
• 8th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE
2014), November 16–20, 2014, Lisbon, Portugal
3
• 8th International Conference on Network and System Security (NSS 2014) October 15–17, 2014, Xi’an,
China
• International Workshop on Big Data Search and Mining (IWBSM 2014), September 24–27, 2014, Delhi,
India
• 9th International Workshop on Data Privacy Management (DPM 2014), September 10–11, Wroclaw, Poland
• 9th International Conference on Availability, Reliability and Security (ARES 2014), September 8–12, 2014,
Fribourg, Switzerland
• 11th International Conference on Security and Cryptography (SECRYPT 2014), August 28–30, 2014,
Vienna, Austria
• 3rd International Conference on Smart Systems, Devices and Technologies (SMART 2014), July 20–24,
2014, Paris, France
• 2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA
2014), June 23–25, 2014, Alberobello, Italy
• 2014 Workshop on Advanced Intrusion Detection and Prevention (AIDP 2014), June 4–5, 2014, Marrakech,
Morocco
• 10th International Conference on Networking and Services (ICNS 2014), April 20–24, 2014, Chamonix,
France
• 10th IEEE International Conference on Autonomic and Trusted Computing (ATC 2013), December 18–20,
2013, Vietri sul Mare, Italy
• 16th IEEE International Conference on Computational Science and Engineering (CSE 2013), December
3–5, 2013, Sydney, Australia
• 4th IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2013),
November 13–15, 2013 Zhangjiajie, China
• 12th Workshop on Privacy in the Electronic Society (WPES 2013), November 4, 2013, Berlin, Germany
• 3rd International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2013),
October 19–23, 2013, Kharagpur, India
• 2nd International Symposium on Privacy and Security in Cloud and Social Networks (PriSecCSN 2013),
September 30, 2013, Karlsruhe, Germany
• 6th SETOP International Workshop on Autonomous and Spontaneous Security (SETOP 2013), September
12–13, 2013, Egham, UK
• 9th International Workshop on Security and Trust Management (STM 2013), September 12-13, 2013,
Egham, UK
• 8th DPM International Workshop on Data Privacy Management (DPM 2013), September 12–13, 2013,
Egham, UK
• 8th International Conference on Availability, Reliability and Security (ARES 2013), September 2–6, 2013,
Regensburg, Germany
• 10th International Conference on Mobile Web Information Systems (MobiWIS 2013), August 26–28, 2013,
Paphos, Cyprus
• 7th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE
2013), August 25-31, 2013, Barcelona, Spain
• 2013 IEEE International Conference on Green Computing and Communications (GreenCom 2013), August
20–23, 2013, Beijing, China
• 10th International Conference on Security and Cryptography (SECRYPT 2013), July 29–31, 2013, Reykjavik, Iceland
4
• IEEE 2013 First International Workshop on Cloud Security Auditing (CSAW 2013), June 27–July 2, 2013,
Santa Clara, CA, USA
• 2nd International Conference on Smart Systems, Devices and Technologies (SMART 2013), June 23–28,
2013, Rome, Italy
• 7th International Conference on Network and System Security (NSS 2013), June 3–4, 2013, Madrid, Spain
• 4th International Conference on Computer Science and Its Applications (CIIA 2013), May 4–6, 2013, Saida,
Algeria
• 9th International Conference on Networking and Services (ICNS 2013), March 24–29, 2013, Lisbon, Portugal
• 15th IEEE International Conference on Computational Science and Engineering (CSE 2012), December
5–7, 2012, Paphos, Cyprus
• 1st International Workshop on Management and Security Technologies for Cloud Computing (ManSec-CC
2012), December 3–7, 2012, Anaheim, CA, USA
• 6th International Conference on Network and System Security (NSS 2012), November 21–23, 2012, Wu Yi
Shan, Fujian, China
• 2012 International Symposium on Privacy and Security in Cloud and Social Networks (PriSecCSN 2012),
November 1–3, 2012, Xiangtan, China
• 5th International Symposium on Foundations & Practice of Security (FPS 2012), October 25–26, 2012,
Montreal, QC, Canada
• 2012 International Conference on Security in Computer Networks and Distributed Systems (SNDS 2012),
October 11–12, 2012, Thiruvananthapuram, India
• 1st IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL 2012), October
2–5, 2012, Rome, Italy.
• 8th International Workshop on Security and Trust Management (STM 2012), September 13–14, Pisa, Italy
• 5th SETOP International Workshop on Autonomous and Spontaneous Security (SETOP 2012), September
10–12, Pisa, Italy
• 6th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE
2012), August 19–24, 2012, Rome, Italy
• 9th International Conference on Security and Cryptography (SECRYPT 2012), July 24–27, 2012, Rome,
Italy
• 2012 Summer FTRA International Symposium on Advances in Cryptography, Security and Applications
for Future Computing (ACSA-Summer), June 26–28, 2012, Vancouver, Canada
• 1st International Conference on Smart Systems, Devices and Technologies (SMART 2012), May 27–June
1, 2012, Stuttgart, Germany
• 8th International Conference on Networking and Services (ICNS 2012), March 25–29, 2012, St. Maarten,
Netherlands Antilles
• 4th SETOP International Workshop on Autonomous and Spontaneous Security (SETOP 2011), September
15–16, 2011, Leuven, Belgium
• 1st International Workshop on Securing Services on the Cloud (IWSSC 2011), September 6–8, 2011, Milan,
Italy
• 5th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE
2011), August 21–27, 2011, Nice/Saint Laurent du Var, France
5
Publication Chair of the following International Conferences:
• 5th International Conference on Network and System Security (NSS 2011), September 6–8, 2011, Milan,
Italy
• 1st International Workshop on Securing Services on the Cloud (IWSSC 2011), September 6–8, 2011, Milan,
Italy
• 2011 Workshop on Mobile and Online Social Networks (MOSN 2011), September 8, 2011, Milan, Italy
• 3rd International Workshop on Cyberspace Safety and Security (CSS 2011), September 8, 2011, Milan, Italy
Publicity Chair of the following International Conferences and Workshops:
• 3rd Joint Workshop on Security in Business Processes (SBP 2014), September 8, 2014, Haifa, Israel
• 19th European Symposium on Research in Computer Security (ESORICS 2014), September 7–11, 2014,
Wroclaw, Poland
• 11th International Conference on Security and Cryptography (SECRYPT 2014), August 28–30, 2014,
Vienna, Austria
• 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec
2014), July 14–16, 2014, Vienna, Austria
• 10th IEEE International Conference on Autonomic and Trusted Computing (ATC 2013), December 18-20,
2013, Vietri sul Mare, Italy
• 12th Workshop on Privacy in the Electronic Society (WPES 2013), November 4, 2013, Berlin, Germany
• 9th Workshop on Security & Trust management (STM 2013), September 9–13, 2013, Egham, UK
• 18th European Symposium on Research in Computer Security (ESORICS 2013), September 9–13, 2013,
Egham, UK
• 10th International Conference on Security and Cryptography (SECRYPT 2013), July 29–31, 2013, Reykjavik, Iceland
• 17th European Symposium on Research in Computer Security (ESORICS 2012), September 10–14, 2012,
Pisa, Italy
• 8th International Workshop on Security and Trust Management (STM 2012), September 13–14, 2012, Pisa,
Italy
• 9th European PKI Workshop: Research and Applications (EuroPKI 2012), September 13–14, 2012, Pisa,
Italy
• 9th International Conference on Security and Cryptography (SECRYPT 2012), July 24–27, 2012, Rome,
Italy
• 10th International Conference on Applied Cryptography and Network Security (ACNS 2012), June 26–29,
2012, Singapore
• 5th International Conference on Network and System Security (NSS 2011), September 6–8, 2011, Milan,
Italy
Reviewer for the following International Journals:
• ACM Transactions on the Web (ACM TWEB)
• International Journal of Information Security (IJIS)
• IET Information Security
• Elsevier Computers & Security Journal
6
• IEEE Systems Journal - Special Issue on Security and Privacy in Complex Systems
Reviewer for the following International Conferences and Workshops:
• 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), June
4–6, 2014, Kyoto, Japan
• 16th Information Security Conference (ISC 2103), November 13–15, 2013, Dallas, TX, USA
• 20th ACM Conference on Computer and Communications Security (CCS 2013), November 4–8, 2013, Berlin,
Germany
• 18th European Symposium on Research in Computer Security (ESORICS 2013), September 9–13, 2013,
Egham, UK
• 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), May
8–10, 2013, Hangzhou, China
• 20th Annual Network & Distributed System Security Symposium (NDSS 2013), February 24–27, 2013, San
Diego, CA, USA
• 2012 Annual Computer Security Applications Conference (ACSAC 2012), December 3–7, 2012, Orlando,
FL, USA
• 14th International Conference on Information and Communications Security (ICICS 2012), October 29–31,
2012, Hong Kong
• 2012 Workshop on Privacy in the Electronic Society (WPES 2012), October 15, 2012, Raleigh, NC, USA
• 17th European Symposium on Research in Computer Security (ESORICS 2012), September 10–14, 2012,
Pisa, Italy
• 25th IEEE Computer Security Foundations Symposium (CSF 2012), June 25-27, 2012, Harvard University,
Cambridge MA, USA
• 32nd International Conference on Distributed Computing Systems (ICDCS 2012), June 18-21, 2012, Macau,
China
• 14th Information Security Conference (ISC 2011), October 26-29, 2011, Xi’an, China
• 10th Workshop on Privacy in the Electronic Society (WPES 2011), October 17, 2011, Chicago, IL, USA
• 16th European Symposium on Research in Computer Security (ESORICS 2011), September 12-14, 2011,
Leuven, Belgium
• 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm
2011), September 7-9, 2011, London, UK
• 5th International Conference on Network and System Security (NSS 2011), September 6-8, 2011, Milan,
Italy
• 8th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2011), August 29
- September 02, 2011, Toulouse, France
• The 11th Privacy Enhancing Technologies Symposium (PETS 2011), July 27-29, 2011, Waterloo, Canada
• The International Conference on Security and Cryptography (SECRYPT 2011), July 18-21, 2011, Seville,
Spain
• 25th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2011), July
11-13, 2011, Richmond, VA, USA
7
11
Publications
Books
B–1
G. Livraga, Protecting Privacy in Data Release, Springer (to appear)
Edited Books
EB–1 P. Samarati, S. Foresti, J. Hu, and G. Livraga (eds.), Proc. of the 5th International Conference on Network
and System Security (NSS 2011), IEEE, Milan, Italy, September 6-8, 2011.
EB–2 C. C. Zou, Y. Xiang, and G. Livraga (eds.), Proc. of the 3rd International Workshop on Cyberspace Safety
and Security (CSS 2011), IEEE, Milan, Italy, September 8, 2011.
EB–3 J. Zhang and G. Livraga (eds.), Proc. of the 2011 International Conference on Data and Knowledge
Engineering (ICDKE 2011), IEEE, Milan, Italy, September 6, 2011.
EB–4 M. Li and G. Livraga (eds.), Proc. of the 2011 Workshop on Mobile and Online Social Networks (MOSN
2011), IEEE, Milan, Italy, September 8, 2011.
International Journal Articles
IJ–1
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, “Fragmentation
in Presence of Data Dependencies”, in IEEE Transactions on Dependable and Secure Computing (IEEE
TDSC), 2014 (to appear).
IJ–2
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, and P. Samarati, “Enforcing
Dynamic Write Privileges in Data Outsourcing”, in Computer & Security (COSE), vol. 39, part A,
pp.47–63, 2011.
IJ–3
S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati, “Data Privacy: Definitions and
Techniques”, in International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 20,
no. 6, pp. 793–817, 2012.
IJ–4
M. Bezzi, S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, and R. Sassi, “Modeling
and Preventing Inferences from Sensitive Value Distributions in Data Release”, in Journal of Computer
Security (JCS), vol. 20, no. 4, pp. 393–436, 2012.
IJ–5
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati, “An OBDD Approach to
Enforce Confidentiality and Visibility Constraints in Data Publishing”, in Journal of Computer Security
(JCS), vol. 20, no. 5, pp. 463–508, 2012.
IJ–6
S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati, “Anonymization of Statistical Data”,
in IT - Information Technology, vol. 53, no. 1, pp. 18–25, 2011.
Papers in Proceedings of International Conferences and Workshops
IC–1
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi and P. Samarati, “Extending
Loose Associations to Multiple Fragments”, in Proc. of the 27th Annual IFIP WG 11.3 Conference on
Data and Applications Security and Privacy (DBSec 2013), Newark, NJ, USA, July 15-17, 2013 (best
paper runner-up award).
IC–2
C.A. Ardagna, G. Livraga, and P. Samarati, “Protecting Privacy of User Information in Continuous
Location-Based Services”, in Proc. of the 15th IEEE International Conference on Computational Science
and Engineering (CSE 2012), Paphos, Cyprus, December 5-7, 2012
IC–3
S. De Capitani di Vimercati, G. Livraga, V. Piuri, and F. Scotti, “Privacy and Security in Environmental
Monitoring Systems”, in Proc. of the 1st IEEE-AESS Conference in Europe about Space and Satellite
Communications (ESTEL 2012), Rome, Italy, October 2-5, 2012
IC–4
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, and G. Livraga, “Enforcing Subscription-based Authorization Policies in Cloud Scenarios”, in Proc. of the 26th Annual IFIP WG 11.3 Conference on Data
and Applications Security and Privacy (DBSec 2012), Paris, France, July 11-13, 2012.
8
IC–5
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati, “Enforcing Confidentiality
and Data Visibility Constraints: An OBDD Approach”, in Proc. of the 25th Annual IFIP WG 11.3
Conference on Data and Applications Security and Privacy (DBSec 2011), Richmond, VA, USA, July
11-13, 2011.
IC–6
S. De Capitani di Vimercati, S. Foresti, and G. Livraga, “Privacy in Data Publishing”, in Data Privacy
Management and Autonomous Spontaneous Security, J. Garcia-Alfaro, G. Navarro-Arribas, A. Cavalli,
and J. Leneutre (eds.), Springer, 2011 (invited).
IC–7
M. Bezzi, S. De Capitani di Vimercati, G. Livraga, and P. Samarati, “Protecting Privacy of Sensitive
Value Distributions in Data Release”, in Proc. of the 6th International Workshop on Security and Trust
Management (STM 2010), Athens, Greece, October 24, 2010.
Chapters in Books
BC–1 S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, “Selective and Private Access to Outsourced Data Centers”, in Handbook on Data Centers, S.U. Khan, A.Y. Zomaya (eds.), Springer, 2014
(to appear).
BC–2 S. De Capitani di Vimercati, A. Genovese, G. Livraga, V. Piuri, and F. Scotti, “Privacy and Security
in Environmental Monitoring Systems: Issues and Solutions”, in Computer and Information Security
Handbook, 2nd Edition, J. Vacca (ed.), Morgan Kaufmann, 2013.
BC–3 M. Bezzi, S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati “Data Privacy”, in Privacy
and Identity Management for Life, J. Camenisch, S. Fischer-H¨
ubner, and K. Rannenberg (eds.), Springer,
2011.
BC–4 S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati, “Protecting Privacy in Data
Release”, in Foundations of Security Analysis and Design VI, A. Aldini, and R. Gorrieri (eds.), Springer,
2011.
Other Publications
OP–1 S. De Capitani di Vimercati and G. Livraga, “Grant Option”, in Encyclopedia on Cryptography and
Security, H.C.A. van Tilborg and S. Jajodia (eds.), Springer, 2011.
OP–2 S. De Capitani di Vimercati and G. Livraga, “Privileges in SQL”, in Encyclopedia on Cryptography and
Security, H.C.A. van Tilborg and S. Jajodia (eds.), Springer, 2011.
OP–3 S. De Capitani di Vimercati and G. Livraga, “SQL Access Control Model”, in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg and S. Jajodia (eds.), Springer, 2011.
OP–4 G. Livraga and P. Samarati “Multilevel Database”, in Encyclopedia on Cryptography and Security,
H.C.A. van Tilborg and S. Jajodia (eds.), Springer, 2011.
Thesis
TH–1 G. Livraga, “Preserving Privacy in Data Release”, PhD Thesis in Computer Science, Universit`a degli
Studi di Milano, Italy, March 2014.
TH–2 G. Livraga, “Protecting Privacy of Sensitive Value Distributions in Data Release”, MSc Thesis in Scienze
e Tecnologie dell’Informazione, Universit`a degli Studi di Milano, Italy, April 2010.
Crema, March 25, 2014
Giovanni Livraga
9
Author
Document
Category
Uncategorized
Views
0
File Size
165 KB
Tags
1/--pages
Report inappropriate content