Curriculum Vitae

Sara Foresti

Associate Professor
Dipartimento di Informatica
Università degli Studi di Milano

Education and employment history

1 March 2015 - Present: Associate professor at the Dipartimento di Informatica, Università degli Studi di Milano.

1 September 2011 - 28 February 2015: Assistant professor at the Dipartimento di Informatica, Università degli Studi di Milano.

November 2008 - August 2011: Post-Doc at the Dipartimento di Tecnologie dell'Informazione, Università degli Studi di Milano.

November 2005 - October 2008: PhD Student in Computer Science (XXI cycle) at the Information Technology Department, Università degli Studi di Milano, Italy (official title: April 22, 2009).
Thesis: "Preserving Privacy in Data Outsourcing".

April 2005 - October 2005: Research collaborator at the Dipartimento di Tecnologie dell'Informazione, Università degli Studi di Milano.

February 2005: Second level Laurea Degree in Computer Science, with full marks and honors, from the Università degli Studi di Milano.
Thesis: "Basi di Dati Crittografate: Un Modello per la Rappresentazione delle Regole d'Accesso".

October 2003: First level Laurea Degree in Computer Science, with full marks and honors, from the Università degli Studi di Milano.
Thesis: "Inferenza in Basi di Dati Crittografate: Studio e Valutazione di Coefficienti di Esposizione".

Awards

IEEE senior member (2016).

DBSec 2014 best paper award - S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati, "Optimizing Integrity Checks for Join Queries in the Cloud".

DBSec 2013 best paper runner-up award - S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, "Extending Loose Associations to Multiple Fragments".

ERCIM (European Research Consortium for Informatics and Mathematics) STM WG 2010 Award for the Best Ph.D. Thesis on Security and Trust Management (thesis: "Preserving Privacy in Data Outsourcing").

Visit in international research centers

Summers 2007-2016: Visit George Mason University, Virginia, USA. The research activity, in collaboration with prof. Sushil Jajodia focused on data protection in data outsourcing scenarios.

Invited Talks

"Data Security and Privacy in the Cloud," 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, (DBSec 2015), Fairfax, Virginia, July 13-15, 2015.

"Preserving Privacy in Data Outsourcing," 6th InternationalWorkshop on Security and Trust Management (STM 2010), Athens, Greece, September 23-24, 2010.
The invited talk was to present the Ph.D. thesis, which has been awarded the ERCIM (European Research Consortium for Informatics and Mathematics) STM WG 2010 Award for the Best Ph.D. Thesis on Security and Trust Management.

Lectures in International Summer Schools

Privacy and Data Protection in Emerging Scenarios, IPICS2016 - Intensive Programme on Information & Communication Security summer school, Leuven, Belgium, July 4-15, 2016.

IEEE Winter Academy on the Internet of Things, Milan, Italy, December 16, 2015.

Privacy and Data Protection in Emerging Scenarios, IPICS2013 - Intensive Programme on Information & Communication Security summer school, Samos Island, Greece, July 14-27, 2013.

Professional Activities

Chair of the IEEE Computer Science Italy Chapter [October 2015-present]

Vice-Chair of the IFIP WG 11.3 Working Group on Data and Applications Security and Privacy [July 2013-present]

Secretary of the IEEE Italy Section Systems Council Chapter (ISSCC) [January 2013-Seprember 2015]

Participation in editorial boards of international journals

Associate editor: Systems Journal, IEEE [June 2015-present]

Editorial board member: Computers & Security Journal, Elsevier [January 2014-present]

Associate editor: Annals of Telecommunications, Springer [January 2015-present]

Conference and Workshop Organization

General Chair of:

  • 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017)

Program Chair of:

  • 10th WISTP International Conference on Information Security Theory and Practice (WISTP 2016), Heraklion, Greece, September 26-27, 2016 (co-chair with Javier Lopez).

  • 15th International Conference on Cryptology and Network Security (CANS 2016), 2016, Milan, Italy (co-chair with Pino Persiano)

  • 1st Workshop on Security and Privacy in the Cloud (SPC 2015), September 30 2015, Florence, Italy (co-chair with Elli Androulaki)

  • 11th International Workshop on Security and Trust Management (STM 2015), September 21-22, 2015, Vienna, Austria

  • 10th IEEE International Conference on Autonomic and Trusted Computing (ATC 2013), December 18-21, 2013, Sorrento Peninsula, Italy

  • 12th Workshop on Privacy in the Electronic Society (WPES 2013), November 4, 2013, Berlin, Germany

  • 17th European Symposium on Research in Computer Security (ESORICS 2012), September 10-12, 2012, Pisa, Italy (co-chair with Moti Yung)

  • 5th International Conference on Network and System Security NSS 2011), September 6-8, 2011, Milan, Italy (chair: Pierangela Samarati, co-chair: Jiankun Hu)

  • 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2010), June 21-23, 2010, Rome, Italy (co-chair with Sushil Jajodia)

Program Track/Area Chair of:

  • 3rd IEEE Conference on Communications and Network Security (CNS 2015), 28-30 September 2015, Florence, Italy.

  • 2013 IEEE International Conference on Green Computing and Communications (GreenCom 2013) August 20-23, 2013, Beijing, China (co-chair with Joonsang Baek) [Security, Privacy, and Trust Computing Track]

Program Committee Member of:

  • 7th International Conference on e-Democracy (eDemocracy 2017), Athens, Greece, December 14-15, 2017.

  • 13th International Conference on Information Security Practice and Experience (ISPEC 2017), Melbourne, Australia, 29 November - 01 December 2017.

  • 5th IEEE Conference on Communications and Network Security (IEEE CNS 2017), Las Vegas, NV, USA, October 9-11, 2017.

  • 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017), Lund, Sweden, September 18-20, 2017.

  • 22nd European Symposium On Research In Computer Security (ESORICS 2017), Oslo, Norway, September 11-13, 2017.

  • 14th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2017), Lyon, France, August 28-30, 2017.

  • PST 2017 Annual Conference on Privacy, Security and Trust (PST 2017), Calgary, Canada, August 28-30, 2017.

  • 4th International Workshop on Information Integration in Cyber Physical Systems (IICPS 2017), San Diego, CA, USA, August 4-6, 2017.

  • 14th International Conference on Security and Cryptography (SECRYPT 2017), Madrid, Spain, July 24-26, 2017.

  • 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2017),Philadelphia, PA, USA, July 17-19, 2017.

  • 11th IFIP WG 11.11 International Conference on Trust Management (IFIP TM 2017), Gothenburg, Sweden, June 12-16, 2017.

  • 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017), Roma, Italy, May 29-31, 2017.

  • 14th IEEE International Conference on Networking, Sensing and Control, Calabria, Italy, May 16-18, 2017.

  • 5th International Workshop on Security in Cloud Computing (SCC 2017), Abu Dhabi, UAE, April 2, 2017.

  • 14th Annual IEEE Consumer Communications & Networking Conference (CCNC 2017), Las Vegas, NV, USA, January 8-11, 2017.

  • 15th Workshop on Privacy in the Electronic Society (WPES 2016), Vienna, Austria, October 28, 2016.

  • 8th Cloud Computing Security Workshop (CCSW 2016), Vienna, Austria, October 28, 2016.

  • 12th International Workshop on Security and Trust Management (STM 2016), Heraklion, Crete, Greece, September 26-30, 2016.

  • 11th DPM International Workshop on Data Privacy Management (DPM 2016), Heraklion, Crete, Greece, September 26-30, 2016.

  • 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS2016), Zhangjiajie, China, November 16-18, 2016.

  • 12th International Conference on Information Security Practice and Experience (ISPEC 2016), Zhangjiajie, China, November 16-18, 2016.

  • 3rd International Workshop on Information Integration in Cyber Physical Systems (IICPS 2016), Pittsburgh, PA, USA, July 30, 2016.

  • 21st European Symposium on Research in Computer Security (ESORICS), Crete, Greece, September 26-30, 2016.

  • 4th International Symposium on Security in Computing and Communications (SSCC 2016), Jaipur, India, September 21-24, 2016.

  • 13th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2016), Porto, Portugal, September 5-8, 2016.

  • 13th International Conference on Security and Cryptography (SECRYPT 2016), Lisboa, Portugal, July 26-28, 2016.

  • 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016), Trento, Italy, July 18-21, 2016.

  • 10th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2016), Darmstadt, Germany, July 18-22, 2016.

  • 11th ACM Asia Conference on Computer and Communications Security (ASIACCS 2016), Xi'an, China, May 31-June 3, 2016.

  • 31st IFIP TC-11 International Information Security and Privacy Conference (SEC 2016), Ghent, Belgium, May 30-June 1, 2016.

  • 13th Consumer Communications and Networking Conference (CCNC 2016), Las Vegas, NV, USA, January 9-12, 2016.

  • 6th International Conference on e-Democracy (eDemocracy 2015), Athens, Greece, December 10-11, 2015.

  • 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2015), Krakow, Poland, November 4-6, 2015.

  • 8th International Symposium on Foundations and Practice of Security (FPS 2015), Clermont-Ferrand, France, October 26-28, 2015.

  • 7th ACM Cloud Computing Security Workshop (CCSW 2015), Denver, CO, USA, October 16, 2015.

  • 10th International Workshop on Data Privacy Management (DPM 2015), Vienna, Austria, September 24-25, 2015.

  • 12th International Conference on Trust, Privacy \& Security in Digital Business (TrustBus 2015), Valencia, Spain, September 1-2 2015.

  • 5th Workshop in Information Security Theory and Practice (WISTP 2015), Heraklion, Greece, August 24-25, 2015.

  • 2nd International Workshop on Information Integration in Cyber Physical Systems (IICPS 2015), San Francisco, CA, USA, August 13-15, 2015.

  • 10th International Conference on Security and Cryptography (SECRYPT 2015), Colmar, France, July 20-22, 2015.

  • 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2015), Fairfax, VA, USA, July 13-15, 2015.

  • 3rd International Workshop on Security in Cloud Computing (SCC 2015), Singapore, April 14, 2015.

  • 30th IFIP TC-11 International Information Security and Privacy Conference (SEC 2015), Hamburg, Germany, May 26-28, 2015.

  • 11th Information Security Practice and Experience (ISPEC 2015), Beijing, China, May 5-8, 2015.

  • 9th Web 2.0 Security and Privacy Workshop (W2SP 2015), 2015.

  • 10th ACM Symposium on Information, Computer and Communications Security (AsiaCCS 2015), Singapore, April 14-17, 2015.

  • 11th IEEE International Conference on Autonomic and Trusted Computing (ATC 2014), Bali, Indonesia, December 9-12, 2014.

  • 10th International Conference on Information Security and Cryptology (Inscrypt 2014), Beijing, China, December 13-15, 2014.

  • 7th International Symposium on Foundations& Practice of Security (FPS 2014),Montreal, Canada, November 3-5, 2014.

  • 13th Workshop on Privacy in the Electronic Society (WPES 2014), Scottsdale, AZ, USA, November 3, 2014.

  • 2nd IEEE Conference on Communications and Network Security (IEEE CNS 2014), San Francisco, CA, USA, October 29-31, 2014.

  • 13th International Conference on Cryptology and Network Security (CANS 2014), Crete, Greece, October 22-24, 2014.

  • 1st International Workshop on Access Control Policies, Models and Mechanisms (ACPM 2014), Delhi, India, September 24-27, 2014.

  • 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2014), Halifax, Nova Scotia, Canada, September 22-25, 2014.

  • 9th International IFIP Summer School on Privacy and Identity Management for the Future Internet in the Age of Globalisation, Patras, Greece, 7-12 September 2014.

  • 19th European Symposium on Research in Computer Security (ESORICS 2014), Wroclaw, Poland, September 7-11, 2014.

  • 9th DPM International Workshop on Data Privacy Management (DPM 2014), Wroclaw, Poland, September 10-11, 2014.

  • 10th International Workshop on Security and Trust Management (STM 2014), Wroclaw, Poland, September 10-11, 2014.

  • 11th International Conference on Trust, Privacy \& Security in Digital Business (TrustBus 2014), Munich, Germany, September 1-5, 2014.

  • 9th International Conference on Security and Cryptography (SECRYPT 2014), Vienna, Austria, August 28-30, 2014.

  • 1st International Workshop on Information Integration in Cyber Physical Systems (IICPS 2014), San Francisco, California, USA, August 13-15, 2014.

  • 28th IFIP WG 11.3 Conference on Data and Application Security and Privacy (DBSec 2014), Vienna, Austria, July 14-16, 2014.

  • 8th IFIP WG 11.11 International Conference on Trust Management (IFIP TM 2014), Singapore, July 7-10, 2014.

  • 2014 IEEE International Symposium on INnovations in Intelligent SysTems and Applications (IEEE INISTA 2014), Alberobello, Italy, June 23-25, 2014.

  • 2014 International Workshop on Security in Cloud Computing (SCC 2014) Kyoto, Japan, June 3, 2014.

  • 29th IFIP TC-11 International Information Security Conference (SEC 2014), Marrakech, Morocco, June 2-4, 2014.

  • 11th Annual IEEE Consumer Communications and Networking Conference (CCNC 2014), Track "Security and Content Protection," Las Vegas, Nevada, USA, January 10-13, 2014.

  • 10th International Conference on Information Security Practice and Experience (ISPEC 2014), Fuzhou, China, May 13-15, 2014.

  • 2nd International Conference on Security in Computer Networks and Distributed Systems (SNDS 2014), Trivandrum, India, March 13-14, 2014.

  • 15th International Conference on Information and Communications Security (ICICS 2013), Beijing, China, November 20-22, 2013.

  • 2013 International Workshop on Trust, Security and Privacy for Big Data (TrustData 2013), Zhangjiajie, China, November 13-15, 2013.

  • 6th FPS International Symposium on Foundations & Practice of Security (FPS 2013), La Rochelle, France, October 21-22, 2013.

  • 4th International Workshop on Security and Privacy in Cloud Computing (IEEE CNS-SPCC 2013), Washington, DC, USA, October 14-16, 2013.

  • 9th International Workshop on Security and Trust Management (STM 2013), Egham, UK, September 12-13, 2013.

  • 8th DPM International Workshop on Data Privacy Management (DPM 2013), Egham, UK, September 12-13, 2013.

  • 6th SETOP International Workshop on Autonomous and Spontaneous Security (SETOP 2013), London, UK, September 12-13, 2013.

  • 10th European Workshop on Public Key Infrastructures, Applications and Services (EuroPKI 2013), London, UK, September 12-13, 2013.

  • 18th European Symposium On Research In Computer Security (ESORICS 2013), London, UK, September 9-11, 2013.

  • 10th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2013), Praha, Czech Republic, August 26-30, 2013.

  • 8th International Conference on Security and Cryptography (SECRYPT 2013), Reykjavik, Iceland, July 29-31, 2013.

  • 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2013), Newark, New Jersey, USA, July 15-17, 2013.

  • 2013 Workshop on Foundations of Computer Security (FCS 2013), New Orleans, Louisiana, USA, June 29, 2013.

  • 11th International Conference on Applied Cryptography and Network Security (ACNS 2013), Banff, Canada, June 25-28, 2013.

  • 2013 International Workshop on Security in Cloud Computing (ASIACCS - SCC 2013) Hangzhou, China, May 8-10, 2013.

  • 2013 IEEE Symposium Series on Computational Intelligence, Symposium on Computational Intelligence in Cyber Security (SSCI 2013 - CICS), Singapore, April 15-19, 2013.

  • 3rd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management (IFIP IDMAN 2013), London, UK, April 8-9, 2013.

  • 15th International Conference on Computational Science and Engineering (CSE 2012), Track "Security, Privacy and Trust," Pafos, Cyprus, December 5-7, 2012.

  • 5th FPS International Symposium on Foundations & Practice of Security (FPS 2012), Montreal, Canada, October 25-26, 2012.

  • 15th International Conference on Security in Computer Networks and Distributed Systems (SNDS 2012), Trivandrum, India, October 11-12, 2012.

  • 15th Information Security Conference (ISC 2012), Passau, Germany, September 19-21, 2012.

  • 9th European PKI Workshop: Research and Applications (EuroPKI 2012), Pisa, Italy, September 13-14, 2012.

  • 5th SETOP International Workshop on Autonomous and Spontaneous Security (SETOP 2012), Pisa, Italy, September 13-14, 2012.

  • 8th International Workshop on Security and Trust Management (STM 2012), Pisa, Italy, September 13-14, 2012.

  • 9th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2012), Vienna, Austria, September 3-7, 2012.

  • 8th International Conference on Mobile Web Information Systems (MobiWIS 2012), Ontario, Canada, August 27-29, 2012.

  • 7th International Conference on Security and Cryptography (SECRYPT 2012), Rome, Italy, July 24-27, 2012.

  • 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2012), Paris, France, July 11-13, 2012.

  • 10th International Conference on Applied Cryptography and Network Security (ACNS 2012), Singapore, June 26-29, 2012.

  • 9th Annual IEEE Consumer Communications and Networking Conference (CCNC 2012), Track "Security and Content Protection," Las Vegas, Nevada, USA, January 14-17, 2012.

  • 14th Information Security Conference (ISC 2011), Xian, China, October 26-29, 2011.

  • 10th Workshop on Privacy in the Electronic Society (WPES 2011), Chicago, Illinois, USA, October 17, 2011.

  • 4th SETOP International Workshop on Autonomous and Spontaneous Security (SETOP 2011), Leuven, Belgium, September 15-16, 2011.

  • 8th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2011), Toulouse, France, August 29 - September 2, 2011.

  • 1st International Workshop on Model-Based and Policy-Based Engineering in Information Security (MPEIS 2011), Siviglia, Spain, July 18-21, 2011.

  • 6th International Conference on Security and Cryptography (SECRYPT 2011), Siviglia, Spain, July 18-21, 2011.

  • 25th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2011), Richmond, Virginia, USA, July 11-13, 2011.

  • 1st International Workshop on Security and Privacy Preserving in e-Societies (SeceS 2011), Baabda, Lebanon, June 9-10, 2011.

  • 5th Workshop in Information Security Theory and Practice (WISTP 2011), Heraklion, Greece, June 8-10, 2011.

  • 26th IFIP TC-11 International Information Security Conference (SEC 2011), Lucerne, Switzerland, June 7-9, 2011.

  • 3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec 2011), Aalborg, Denmark, May 17-19, 2011.

  • 4th Canada-France MITACS Workshop on Foundations & Practice of Security (FPS 2011), Paris, France, May 12-13, 2011.

  • 2011 IEEE Symposium Series on Computational Intelligence, Symposium on Computational Intelligence in Cyber Security (SSCI 2011 - CICS), Paris, France, April 11-15, 2011.

  • 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2011), Paris, France, February 7-10, 2011.

  • 8th Annual IEEE Consumer Communications and Networking Conference (CCNC 2011), Track "Security and Content Protection," Las Vegas, Nevada, USA, January 8-11, 2011.

  • 2nd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management (IFIP IDMAN 2010), Oslo, Norway, November 18-19, 2010.

  • 4th International Conference on Network and System Security (NSS 2010), Melbourne, Australia, September 1-3, 2010.

  • 5th International Workshop on Flexible Database and Information System Technology (FlexDBIST 2010), Bilbao, Spain, August 30 - September 3, 2010.

  • 7th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2010), Bilbao, Spain, August 30 - September 3, 2010.

  • 19th International Conference on Computer Communication Networks (ICCCN 2010), Track "Network Security and Privacy," Zurich, Switzerland, August 2-5, 2010.

  • 5th International Conference on Security and Cryptography (SECRYPT 2010), Athens, Greece, July 26-28, 2010.

  • 2nd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec 2010), Catania, Italy, May 26-28, 2010.

  • 5th International Conference on Future Information Technology (FutureTech 2010), Track "Security and Trust Computing," Busan, Korea, May 21-23, 2010.

  • 4th Workshop in Information Security Theory and Practice (WISTP 2010), Passau, Germany, April 12-14, 2010.

  • 25th Symposium on Applied Computing (SAC 2010), Track "Privacy on the Web," Sierre, Switzerland, March 22-26, 2010.

  • 1st FTRG International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA 2009), Jeju, Korea, December 11-12, 2009.

  • 25th Annual Computer Security Applications Conference (ACSAC 2009), Honolulu, Hawaii, USA, December 7-11, 2009.

  • 5th International Workshop on Security and Trust Management (STM 2009), Saint Malo, France, September 24-25, 2009.

  • 12th Information Security Conference (ISC 2009), Pisa, Italy, September 7-9, 2009.

  • 3rd Workshop in Information Security Theory and Practice (WISTP 2009), Bruxelles, Belgium, September 2-4, 2009.

  • 4th International Workshop on Flexible Database and Information System Technology (FlexDBIST 2009), Linz, Austria, August 31 - September 4, 2009.

  • 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2009), Linz, Austria, August 31 - September 4, 2009.

  • 3rd International Conference on Information Security and Assurance (ISA 2009), Seoul, Korea, June 25-27, 2009.

  • 1st International Workshop on Privacy-Preserving Data Analysis (PPDA 2009), Brisbane, Australia, April 20, 2009.

  • 24th Annual Computer Security Applications Conference (ACSAC 2008), Anaheim, California, USA, December 8-12, 2008.

  • 23rd IFIP TC-11 International Information Security Conference (SEC 2008), Milan, Italy, September 8-10, 2008.

  • 12th International Database Engineering & Applications Symposium (IDEAS 2008), Muenster, Germany, September 3-5, 2008.

  • 3rd International Workshop on Flexible Database and Information System Technology (FlexDBIST 2008), Turin, Italy, September 1-5, 2008.

  • 5th International Workshop on Mobile P2P Data Management, Security and Trust (MPDMST 2008), Turin, Italy, September 1-5, 2008.

  • 23rd Annual Computer Security Applications Conference (ACSAC 2007), Miami Beach, Florida, USA, December 10-14, 2007.

  • 11th International Database Engineering & Applications Symposium (IDEAS 2007), Banff, Canada, September 6-8, 2007.

Publication chair of:

  • 2nd International Workshop on Security and Trust Management (STM 2006), Hamburg, Germany, September 20-21, 2006.

Publicity chair of:

  • 11th International Conference on Information Systems Security (ICISS 2015), Kolkata, India, December 2015.

  • 1st ACM Workshop on Moving Target Defense (MTD 2014), Scottsdale, AZ, USA, November 2014.

  • 2nd IEEE Conference on Communications and Network Security (IEEE CNS 2014), San Francisco, CA, USA, October 29-31, 2014.

  • 13th International Conference on Cryptology and Network Security (CANS 2014), Crete, Greece, October 22-24, 2014.

  • 8th Workshop in Information Security Theory and Practice (WISTP 2014), Heraklion, Greece, June 23-25, 2014.

  • 29th IFIP TC-11 International Information Security Conference (SEC 2014), Marrakech, Morocco, June 2-4, 2014.

  • 6th Workshop in Information Security Theory and Practice (WISTP 2012), Egham, UK, June 19-22, 2012.

  • 27th IFIP TC-11 International Information Security Conference (SEC 2012), Heraklion, Greece, June 4-6, 2012.

  • 14th Information Security Conference (ISC 2011), Xian, China, October 26-29, 2011 (co-chair with Xiaofeng Chen).

  • 10th Workshop on Privacy in the Electronic Society (WPES 2011), Chicago, Illinois, USA, October 17, 2011.

  • 5th Workshop in Information Security Theory and Practice (WISTP 2011), Heraklion, Greece, June 8-10, 2011 (co-chair with Cheng-Kang Chu).

  • 15th European Symposium On Research In Computer Security (ESORICS 2010), Athens, Greece, September 20-22, 2010.

  • 6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010), Singapore, September 7-10, 2010.

  • 8th Workshop on Privacy in the Electronic Society (WPES 2009), Chicago, Illinois, USA, November 9, 2009.

  • 14th European Symposium On Research In Computer Security (ESORICS 2009), Saint Malo, France, September 21-25, 2009.

Guest editor:

Reviewer for the following international journals:

  • ACM Computing Surveys (CSUR).

  • ACM Transactions on Database Systems (TODS).

  • ACM Transactions on Information and System Security (TISSEC).

  • ACM Transactions on Knowledge Discovery from Data (TKDD).

  • ACM Transactions on the Web (TWEB).

  • Computing.

  • Computers & Security.

  • IEEE Systems Journal.

  • IEEE Transactions on Cloud Computing (TCC).

  • IEEE Transactions on Knowledge and Data Engineering (TKDE).

  • IET Information Security Journal.

  • Information Processing Letters.

  • Information Sciences.

  • International Journal of Information Security.

  • Journal of Computer Security.

  • Journal of System Architecture.

  • SIGMOD Record.

  • The Computer Journal.

  • VLDB Journal.

Reviewer for the following conferences:

  • 42nd International Conference on Very Large DataBases (VLDB 2016), New Delhi, India, September 4-9, 2016.

  • 18th International Conference on Extending Database Technology (EDBT 2015), Brussels, Belgium, March 23-27, 2015.

  • 4th Conference on Principles of Security and Trust (POST 2015), London, UK, 2015.

  • 10th International Conference on Information Systems Security (ICISS 2014), Hyderabad, India, December 16-20, 2014.

  • 21st ACM Conference on Computer and Communications Security (CCS 2014), Scottsdale, Arizona, USA, November 3-7, 2014.

  • 19th Australasian Conference on Information Security and Privacy (ACIPS 2014), Wollongong, Australia, July 7-9, 2014.

  • 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), Kyoto, Japan, June 4-6, 2014.

  • 9h International Conference on Information Systems Security (ICISS 2013), Kolkata, India, December 16-20, 2013.

  • 2013 ACM Cloud Computing Security Workshop (CCSW 2013), Berlin, Germany, November 8, 2013.

  • 20th ACM Conference on Computer and Communications Security (CCS 2013), Berlin, Germany, November 4-8, 2013.

  • 33rd International Conference on Distributed Computing Systems (ICDCS 2013), Philadelphia, Pennsylvania, USA, July 8-11, 2013.

  • 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Hangzhou, China, May 8-10, 2013.

  • 6th International Workshop on Privacy and Anonymity in the Information Society (PAIS 2013), Genova, Italy, March 22, 2013.

  • 19th Annual Network & Distributed System Security Symposium (NDSS 2013), San Diego, California, USA, February 24-27, 2013.

  • 28th Annual Computer Security Applications Conference (ACSAC 2012), Orlando, Florida, USA, December 3-7, 2012.

  • 11th Workshop on Privacy in the Electronic Society (WPES 2012), Raleigh, North Carolina, USA, October 15, 2012.

  • 12th Privacy Enhancing Technologies Symposium (PETS 2012), Vigo, Spain, July 11-13, 2012.

  • 25th IEEE Computer Security Foundations Symposium (CSF 2012), Cambridge, Massachusetts, USA, June 25-27, 2012.

  • 32nd International Conference on Distributed Computing Systems (ICDCS 2012), Macau, China, June 18-21, 2012.

  • 16th European Symposium on Research in Computer Security (ESORICS 2011), Leuven, Belgium, September 12-14, 2011

  • 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), Hong Kong, March 22-24, 2011

  • 12th International Conference on Information and Communications Security (ICICS 2010), Barcelona, Spain, December 15-17, 2010.

  • 26th Annual Computer Security Applications Conference (ACSAC 2010), Austin, Texas, USA, December 6-10, 2010.

  • 19th ACM International Conference on Information and Knowledge Management (CIKM 2010), Toronto, Canada, October 26-30, 2010.

  • 13th Information Security Conference (ISC 2010), Boca Raton, Florida, USA, October 25-28, 2010.

  • 2nd IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2010), Minneapolis, Minnesota, USA, August 20-22, 2010.

  • 30th International Conference on Distributed Computing Systems (ICDCS 2010), Genova, Italy, June 21-25, 2010.

  • 36th ACM Special Interest Group on Management Of Data Conference (SIGMOD 2010), Indianapolis, Indiana, USA, June 6-11, 2010.

  • 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, April 13-16, 2010.

  • 13th International Conference on Extending Database Technology (EDBT 2010), Lausanne, Switzerland, March 22-26, 2010.

  • 16th ACM Computer and Communications Security Conference (CCS 2009), Chicago, Illinois, USA, November 9-13 2009.

  • 35th International Conference on Very Large Data Bases (VLDB 2009), Lyon, France, August 24-28, 2009.

  • 22nd IEEE Computer Security Foundations Symposium (CSF 2009), Port Jefferson, New York, USA, July 8-10, 2009.

  • 29th International Conference on Distributed Computing Systems (ICDCS 2009), Montreal, Quebec, Canada, June 22-26, 2009.

  • 24th IFIP TC-11 International Information Security Conference (SEC 2009), Paphos, Cyprus, May 18-20, 2009.

  • 23rd International Conference on Advanced Information Networking and Applications (AINA 2009), Bradford, UK, May 26-29, 2009.

  • 4th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), Sydney, Australia, March 10-12, 2009.

  • 12th International Conference on Extending Database Technology (EDBT 2009), Saint-Petersburg, Russia, March 23-26, 2009.

  • 7th Workshop on Privacy in the Electronic Society (WPES 2008), Alexandria, Virginia, USA, October 27, 2008.

  • 15th ACM Computer and Communications Security Conference (CCS 2008), Alexandria, Virginia, USA, October 27-31, 2008.

  • 13th European Symposium On Research In Computer Security (ESORICS 2008), Malaga, Spain, October 6-8, 2008.

  • 22st Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2008), London, UK, July 13-16, 2008.

  • 28th International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China, June 17-20, 2008.

  • 10th Information Security Conference (ISC 2007), Valparaiso, Chile, October 9-12, 2007.

  • 33rd International Conference on Very Large Data Bases (VLDB 2007), Vienna, Austria, September 23-28, 2007.

  • 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2007), Redondo Beach, California, USA, July 8-11, 2007.

  • 12th International Conference on Database Systems for Advanced Applications (DASFAA 2007), Bangkok, Thailand, April 9-12, 2007.

  • 2nd International Conference on Information Systems Security (ICISS 2006), Kolkata, India, December 17-21, 2006.

Research Projects

She participates/has participated to the following research projects:

  • January 2015 - December 2017: Enforceable Security in the Cloud to Uphold Data Ownership - ESCUDO-CLOUD (funded by the European Union under Horizon 2020 research and innovation programme -- Advanced Cloud Infrastructures and Services)

  • January 2014 - October 2017: Automated Border Control Gates for Europe - ABC4EU (funded by the European Union under the VII Framework Program -- SEC - Research Theme: Security)

  • March 2008 - June 2011 : Privacy and Identity Management in Europe for Life - PrimeLife (funded by the European Union under the VII Framework Program targeted to the development of privacy-aware solutions)

  • March 2004 - June 2008 : Privacy and Identity Management for Europe - PRIME (funded by the European Union under the VI Framework Program targeted to the development of privacy-aware solutions for enforcing security)

  • February 2013 - January 2016 : Genomic Data Management (funded by the Italian Ministry of Research - MIUR)

  • March 2010 - September 2012 : Privacy and Protection of Personal Data (funded by the Italian Ministry of Research - MIUR)

  • February 2007-February 2009 : Encrypted databases (funded by the Italian Ministry of Research - MIUR)

  • March 2010 - February 2012 : Privacy-aware environmental data publishing (project founded by Università degli Studi di Milano)

Teaching activities

Undergraduate and graduate courses, Laurea in Computer Science (Crema), Università degli Studi di Milano:

  • A.Y. 2015-2016 - Algoritmi e Strutture Dati

  • A.Y. 2015-2016 - Distributed Systems

  • A.Y. 2015-2016 - Laboratorio di Basi di Dati

  • A.Y. 2014-2015 - Distributed Systems

  • A.Y. 2014-2015 - Laboratorio di Basi di Dati

  • A.Y. 2013-2014 - Distributed Systems

  • A.Y. 2012-2013 - Distributed Systems

  • A.Y. 2011-2012 - Laboratorio di Basi di Dati

PhD in Computer Science, Università degli Studi di Milano:

  • July 2016 - Privacy and Data Protection in Emerging Scenarios

  • June 2015 - Protecting Data Confidentiality and Integrity in Cloud Scenarios

  • October 2011 - Privacy in Data Publication and Outsourcing

Lessons and exercises, Laurea in "Ingegneria Informatica", Università degli Studi di Bergamo:

  • A.Y. 2015-2016 - Basi di Dati e Web

  • A.Y. 2015-2016 - Sicurezza dei Sistemi Informatici

  • A.Y. 2014-2015 - Basi di Dati e Web

  • A.Y. 2014-2015 - Sicurezza dei Sistemi Informatici

  • A.Y. 2013-2014 - Basi di Dati e Web

  • A.Y. 2012-2013 - Basi di Dati e Web

  • A.Y. 2012-2013 - Sicurezza dei Sistemi Informatici

  • A.Y. 2011-2012 - Basi di Dati e Web

  • A.Y. 2011-2012 - Sicurezza dei Sistemi Informatici

Lessons and exercises, Laurea in Computer Science (Crema), Università degli Studi di Milano:

  • A.Y. 2015-2016 - Privatezza e Protezione dei Dati

  • A.Y. 2014-2015 - Privatezza e Protezione dei Dati

  • A.Y. 2013-2014 - Basi di Dati

  • A.Y. 2013-2014 - Privatezza e Protezione dei Dati

  • A.Y. 2012-2013 - Basi di Dati

  • A.Y. 2012-2013 - Privatezza e Protezione dei Dati

  • A.Y. 2011-2012 - Basi di Dati

  • A.Y. 2011-2012 - Privatezza e Protezione dei Dati

  • A.Y. 2010-2011 - Basi di Dati

  • A.Y. 2010-2011 - Privatezza e Protezione dei Dati

  • A.Y. 2009-2010 - Basi di Dati: Elementi

  • A.Y. 2009-2010 - Basi di Dati: Complementi

  • A.Y. 2009-2010 - Privatezza e Protezione dei Dati

  • A.Y. 2008-2009 - Basi di Dati: Elementi

  • A.Y. 2008-2009 - Basi di Dati: Complementi

  • A.Y. 2007-2008 - Basi di Dati: Elementi

  • A.Y. 2007-2008 - Basi di Dati: Complementi

  • A.Y. 2007-2008 - Tecniche Avanzate per la Protezione dei Dati

  • A.Y. 2006-2007 - Basi di Dati: Elementi

  • A.Y. 2006-2007 - Basi di Dati: Complementi

  • A.Y. 2005-2006 - Basi di Dati: Elementi

  • A.Y. 2005-2006 - Basi di Dati: Complementi

Tutor, Laurea in "Sicurezza dei Sistemi e delle Reti Informatiche" (on-line edition), Università degli Studi di Milano:

  • A.Y. 2010-2011 - Basi di Dati

  • A.Y. 2009-2010 - Basi di Dati: Elementi

  • A.Y. 2009-2010 - Basi di Dati: Complementi

  • A.Y. 2008-2009 - Basi di Dati: Elementi

  • A.Y. 2008-2009 - Basi di Dati: Complementi

  • A.Y. 2007-2008 - Basi di Dati: Elementi

  • A.Y. 2007-2008 - Basi di Dati: Complementi

  • A.Y. 2006-2007 - Basi di Dati: Elementi

  • A.Y. 2006-2007 - Basi di Dati: Complementi

  • A.Y. 2005-2006 - Basi di Dati: Elementi

  • A.Y. 2005-2006 - Basi di Dati: Complementi

Post high-school courses ("Istruzione e Formazione Tecnica Superiore" - IFTS):

  • May 2008 - Basi di Dati. IFTS course titled "Tecnico Superiore Commerciale, per il Marketing e per l'Organizzazione delle Vendite" (Crema)

  • February 2006 - Basi di Dati. IFTS course titled "Tecnico Superiore per la Comunicazione e il Multimedia" (Crema)

Co-advisor of the Ph.D. thesis "Preserving Privacy in Data Release" by Giovani Livraga.

Co-advisor of several thesis on different topics related to security and data protection.

Publications

See publications page