2016 - Edward J. McCluskey Technical Achievement Award, IEEE Computer Society For pioneering and outstanding contributions to data security and privacy
2012 - IEEE Fellow For contributions to information security, data protection, and privacy
2009 - ACM Distinguished Member
Her primary areas of study are Computer security, Access control, Computer access control, World Wide Web and Encryption. The various areas that Pierangela Samarati examines in her Computer security study include The Internet, Server and Database. Her work deals with themes such as Security policy, Enforcement and Authorization, which intersect with Access control.
Her research investigates the connection between Computer access control and topics such as Control that intersect with problems in Theoretical computer science. Her Encryption research integrates issues from Cryptography, Outsourcing, Confidentiality, Service provider and Data Protection Act 1998. The study incorporates disciplines such as Internet privacy and Reputation in addition to Anonymity.
Pierangela Samarati spends much of her time researching Computer security, Access control, Internet privacy, Encryption and Database. Her Computer security research includes themes of Enforcement, Cloud computing and Server. Her biological study spans a wide range of topics, including World Wide Web, The Internet and Authorization.
Pierangela Samarati interconnects Security service, Cloud computing security, Personally identifiable information and Anonymity in the investigation of issues within Internet privacy. Her research integrates issues of Outsourcing, Search engine indexing and Cryptography in her study of Encryption. Her Role-based access control study combines topics from a wide range of disciplines, such as Network Access Control and Process.
Pierangela Samarati mainly investigates Cloud computing, Computer security, Encryption, Confidentiality and Internet privacy. Her Cloud computing research is multidisciplinary, relying on both Scalability, Database, Distributed computing, Outsourcing and Server. Pierangela Samarati works in the field of Computer security, namely Cloud storage.
Her study in Encryption is interdisciplinary in nature, drawing from both Revocation, Authorization, Cryptography and Search engine indexing. Her Confidentiality research incorporates themes from Computer data storage, Fragmentation, Client-side encryption and Access control. The Internet privacy study combines topics in areas such as Information sensitivity and Information security.
Pierangela Samarati mostly deals with Cloud computing, Computer security, Encryption, Confidentiality and Server. Her Cloud computing research also works with subjects such as
Her primary area of study in Internet privacy is in the field of Information privacy. Her Encryption study incorporates themes from Database, Data structure, Search engine indexing and Cryptography. She has included themes like Enforcement, Authorization and Hash function in her Database study.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Protecting respondents identities in microdata release
IEEE Transactions on Knowledge and Data Engineering (2001)
Access control: principle and practice
R.S. Sandhu;P. Samarati.
IEEE Communications Magazine (1994)
Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression
Pierangela Samarati;Latanya Sweeney.
Generalizing data to provide anonymity when disclosing information (abstract)
Pierangela Samarati;Latanya Sweeney.
symposium on principles of database systems (1998)
Access control : Policies, models, and mechanisms
Pierangela Samarati;Sabrina De Capitani Di Vimercati.
Lecture Notes in Computer Science (2001)
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Ernesto Damiani;De Capitani di Vimercati;Stefano Paraboschi;Pierangela Samarati.
computer and communications security (2002)
Flexible support for multiple access control policies
Sushil Jajodia;Pierangela Samarati;Maria Luisa Sapino;V. S. Subrahmanian.
ACM Transactions on Database Systems (2001)
Silvana Castano;Maria Grazia Fugini;Giancarlo Martella;Pierangela Samarati.
A fine-grained access control system for XML documents
Ernesto Damiani;Sabrina De Capitani di Vimercati;Stefano Paraboschi;Pierangela Samarati.
ACM Transactions on Information and System Security (2002)
Choosing reputable servents in a P2P network
Fabrizio Cornelli;Ernesto Damiani;Sabrina De Capitani di Vimercati;Stefano Paraboschi.
the web conference (2002)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: