The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Publications

Books and Edited Books
International Journals Articles
Papers in Proceedings of International Conferences and Workshops
Chapters in Books
Papers in National Journals
Papers in Proceedings of National Conferences
Other publications

Books and Edited Books

  • G. Barte, E.P. Markatos, P. Samarati (eds.), Proc. of the 12th International Workshop on Security and Trust Management (STM 2016), Springer, 2016 [BibTex entry]
  • C. Callegari, M. van Sinderen, P.G. Sarigiannidis, P. Samarati, E. Cabello, P. Lorenz, M.S. Obaidat (eds.), Proc. of the 13th International Conference on Security and Cryptography (SECRYT 2016), SciTePress, 2016 [BibTex entry]
  • M.S. Obaidat, P. Lorenz, P. Samarati (eds.), Proc. of the 12th International Conference on Security and Cryptography (SECRYT 2015), SciTePress, 2015 [BibTex entry]
  • P. Samarati (ed.), Proc. of the 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2015), Springer, 2015 [BibTex entry]
  • S. Jajodia, K. Kant, P. Samarati, A. Singhal, V. Swarup, C. Wang (eds.), Secure Cloud Computing, Springer, 2014 [BibTex entry]
  • M.S. Obaidat, A. Holzinger, P. Samarati (eds.), Proc. of International Conference on Security and Cryptography (SECRYPT 2014), SciTePress, 2014 [BibTex entry]
  • P. Samarati (ed.), Proc. of International Conference on Security and Cryptography (SECRYPT 2013), SciTePress, 2013 [BibTex entry]
  • F. Bao, P. Samarati, J. Zhou (eds.), Proc. of the 10th International Conference on Applied Cryptography and Network Security (ACNS 2012), Springer, 2012 [BibTex entry]
  • A. Josang, P. Samarati, M. Petrocchi (eds.), Proc. of the 8th International Workshop on Security and Trust Management (STM 2012), Springer, 2012 [BibTex entry]
  • P. Samarati, W. Lou, J. Zhou (eds.), Proc. of International Conference on Security and Cryptography (SECRYPT 2012), SciTePress, 2012 [BibTex entry]
  • J. Lopez, P. Samarati (eds.), Proc. of International Conference on Security and Cryptography (SECRYPT 2011), SciTePress, 2011 [BibTex entry]
  • P. Samarati, S. Foresti, J. Hu, G. Livraga (eds.), Proc. of the 5th International Conference on Network and System Security (NSS 2011), IEEE, Milan, Italy, September 6-8, 2011 [BibTex entry]
  • S.K. Katsikas, P. Samarati (eds.), Proc. of International Conference on Security and Cryptography (SECRYPT 2010), SciTePress, 2010 [BibTex entry]
  • P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis, D. Sauveron, (eds.), Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices, Lecture Notes in Computer Science 6033, Springer, 2010 [BibTex entry]
  • Y. Xiang, P. Samarati, J. Hu, W. Zhou, A. Sadeghi (eds.), Proc. of the 4th International Conference on Network and System Security (NSS 2010), Melborne, Australia, September 1-3, 2010 [BibTex entry]
  • C. Bettini, S. Jajodia, P. Samarati, X. Sean Wang (eds.), Privacy in Location-Based Applications: Research Issues and Emerging Trends, Springer, 2009 [BibTex entry]
  • P. Samarati, M. Yung, F. Martinelli, C.A. Ardagna (eds.), Proc. of the 12th Information Security Conference (ISC 2009), Springer, September 7-9, 2009 [BibTex entry]
  • S. Cimato, S. Jajodia, P. Samarati (eds.), Proceedings of the IFIP TC11 23rd International Information Security Conference (SEC 2008), Springer, Milano, Italy, September 8 - 10, 2008 [BibTex entry]
  • J. Lopez, P. Samarati, J.L. Ferrer (eds.), Proc. of the 4th European PKI Workshop: Theory and Practice, Palma de Mallorca, Spain, June 28-30, 2007 [BibTex entry]
  • S. Etalle, P. Samarati (eds.), Proc. of the Second International Workshop on Security and Trust Management (STM 2006), Elsevier, Hamburg, Germany, September 20-21, 2006 [BibTex entry]
  • C. Farkas, P. Samarati (eds.), "Research Directions in Data and Applications Security XVIII," in Proc. of the 18th IFIP WG11.3 Working Conference on Data and Applications Security, Sitges, Spain, 2004 [BibTex entry]
  • P. Samarati, P. Ryan, D. Gollmann, R. Molva (eds.), Computer Security - ESORICS 2004, Sophia Antipolis, France, September 2004 [BibTex entry]
  • D. Gritzalis, S. De Capitani di Vimercati, P. Samarati, S. Katsikas (eds.), Security and Privacy in the Age of Uncertainty, Kluwer, 2003 [BibTex entry]
  • P. Samarati, P. Syverson (eds.), Proc. of the Second ACM Workshop on Privacy in the Electronic Society, Washington, USA, October 30, 2003 [BibTex entry]
  • S. De Capitani di Vimercati, P. Samarati (eds.), Proc. of the First ACM Workshop on Privacy in the Electronic Society, Washington, USA, November 21, 2002 [BibTex entry]
  • P. Samarati (ed.), Proc. of the Eighth ACM Conference on Computer and Communications Security, Philadelphia, PA (USA), November 5-8, 2001 [BibTex entry]
  • V. Atluri, P. Samarati (eds.), Security of Data and Transaction Processing, Kluwer, 2000 [BibTex entry]
  • D. Gritzalis, S. Jajodia, P. Samarati (eds.), Proc. of the Seventh ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000 [BibTex entry]
  • P. Samarati, R. Sandhu (eds.), Database Security X: Status and Prospects, Chapman and Hall, 1997 [BibTex entry]

International Journals Articles

Papers in Proceedings of International Conferences and Workshops

Chapters in Books

  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud," in Festschrift for David Kahn, P. Ryan, D. Naccache, J.-J. Quisquater (eds.), Springer, 2016 [BibTex entry]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Specification and Enforcement of Access Policies in Emerging Scenarios," in Cloud Computing Security: Foundations and Challenges, J.R. Vacca (ed.), CRC Press, August 2016 [BibTex entry]
  • P. Samarati, S. De Capitani di Vimercati, "Cloud Security: Issues and Concerns," in Encyclopedia on Cloud Computing, S. Murugesan, I. Bojanova (eds.), Wiley, 2016 [BibTex entry]
  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, S. Paraboschi, P. Samarati, "Privacy in Pervasive Systems: Social and Legal Aspects and Technical Solutions," in Data Management in Pervasive Systems, F. Colace, M. De Santo, V. Moscato, A. Picariello, F. Schreiber, L. Tanca (eds.), Springer, 2015 [BibTex entry]
  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Selective and Private Access to Outsourced Data Centers," in Handbook on Data Centers, S.U. Khan, A.Y. Zomaya (eds.), Springer, 2015 [BibTex entry]
  • S. De Capitani di Vimercati, R.F. Erbacher, S. Foresti, S. Jajodia, G. Livraga, P. Samarati, "Encryption and Fragmentation for Data Confidentiality in the Cloud," in Foundations of Security Analysis and Design VII, A. Aldini, J. Lopez, F. Martinelli (eds.), Springer, 2014 [BibTex entry]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, P. Samarati, "Database Security and Privacy," in Computer Science Handbook (3rd edition) - Information Systems and Information Technology, A. Tucker, H. Topi (eds.), Taylor and Francis Group, 2014 [BibTex entry]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Selective and Fine-Grained Access to Data in the Cloud," in Secure Cloud Computing, S. Jajodia, K. Kant, P. Samarati, V. Swarup, C. Wang (eds.), Springer, 2014 [BibTex entry]
  • S. De Capitani di Vimercati, P. Samarati, R. Sandhu, "Access Control," in Computer Science Handbook (3rd edition) - Information Systems and Information Technology, A. Tucker, H. Topi (eds.), Taylor and Francis Group, 2014 [BibTex entry]
  • S. Foresti, P. Samarati, "Supporting User Privacy Preferences in Digital Interactions," in Computer and Information Security Handbook, J.R. Vacca (ed.), Morgan Kaufmann, 2013 (2nd Edition) [BibTex entry]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Protecting Data in Outsourcing Scenarios," in Handbook on Securing Cyber-Physical Critical Infrastructure, S.K Das, K. Kant, N. Zhang (eds.), Morgan Kaufmann, 2012 [BibTex entry]
  • C.A. Ardagna, S. De Capitani di Vimercati, G. Neven, S. Paraboschi, E. Pedrini, F.-S. Preiss, P. Samarati, M. Verdicchio, "Advances in Access Control Policies," in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Huebner, K. Rannenberg (eds.), Springer, 2011 [BibTex entry]
  • C.A. Ardagna, S. De Capitani di Vimercati, E. Pedrini, P. Samarati, "Privacy-Aware Access Control System: Evaluation and Decision," in Digital Privacy: PRIME - Privacy and Identity Management for Europe, J. Camenisch, R. Leenes, D. Sommer (eds.), Springer, 2011 [BibTex entry]
  • C.A. Ardagna, S. De Capitani di Vimercati, P. Samarati, "Personal Privacy in Mobile Networks," in Mobile Technologies for Conflict Management: Online Dispute Resolution, Governance, Participation, M. Poblet (ed.), Springer Science+Business Media B.V., 2011 [BibTex entry]
  • C.A. Ardagna, S. De Capitani di Vimercati, P. Samarati, "Privacy Models and Languages: Access Control and Data Handling Policies," in Digital Privacy: PRIME - Privacy and Identity Management for Europe, J. Camenisch, R. Leenes, D. Sommer (eds.), Springer, 2011 [BibTex entry]
  • M. Bezzi, S. De Capitani di Vimercati, S. Foresti, G. Livraga, S. Paraboschi, P. Samarati, "Data Privacy," in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hubner, K. Rannenberg (eds.), Springer, 2011 [BibTex entry]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, G. Pelosi, P. Samarati, "Selective Exchange of Confidential Data in the Outsourcing Scenario," in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hubner, K. Rannenberg (eds.), Springer, 2011 [BibTex entry]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Protecting Information Privacy in the Electronic Society," in e-Business and Telecommunications International Conference (ICETE 2009), J. Filipe, M.S. Obaidat (eds.), Springer, 2011 [BibTex entry]
  • S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, "Protecting Privacy in Data Release," in Foundations of Security Analysis and Design VI, A. Aldini, R. Gorrieri (eds.), Springer, 2011 [BibTex entry]
  • C. A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "Location Privacy in Pervasive Computing," in Security and Privacy in Mobile and Wireless Networking, S. Gritzalis, T. Karygiannis, C. Skianis (eds.), Troubador Publishing, 2009 [BibTex entry]
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Theory of Privacy and Anonymity," in Algorithms and Theory of Computation Handbook (2nd edition), M. Atallah, M. Blanton (eds.), CRC Press, 2009 [BibTex entry]
  • C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "Access Control in Location-Based Services," in Privacy in Location Based Applications, C. Bettini, S. Jajodia, P. Samarati, S. Wang (eds.), Springer, 2009 [BibTex entry]
  • C.A. Ardagna, S. Jajodia, P. Samarati, A. Stavrou, "Privacy Preservation over Untrusted Mobile Networks," in Privacy in Location Based Applications: Research Issues and Emerging Trends, C. Bettini, S. Jajodia, P. Samarati, S. Wang (eds.), Springer, 2009 [BibTex entry]
  • C. A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Privacy in the Electronic Society: Emerging Problems and Solutions," in Statistical Science and Interdisciplinary Research - Vol. 3: Algorithms, Architectures and Information Systems Security, B.B. Bhattacharya, S. Sur-Kolay, S.C. Nandy, A. Bagchi (eds.), World Scientific Press, November 2008 [BibTex entry]
  • C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "Managing Privacy in Location-based Access Control Systems," in Mobile Intelligence: Mobile Computing and Computational Intelligence, L.T. Yang, A.B. Waluyo, J. Ma, L. Tan, B. Srinivasan (eds.), John Wiley & Sons, Inc., 2008 [BibTex entry]
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "k-Anonymous Data Mining: A Survey," in Privacy-Preserving Data Mining: Models and Algorithms, C.C. Aggarwal, P.S. Yu (eds.), Springer-Verlag, 2008 [BibTex entry]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Access Control," in The Handbook of Computer Networks, H. Bidgoli (ed.), Wiley, 2008 [BibTex entry]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Access Control Models for XML," in Handbook of Database Security: Applications and Trends, M. Gertz, S. Jajodia (eds.), Springer-Verlag, 2008 [BibTex entry]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Recent Advances in Access Control," in Handbook of Database Security: Applications and Trends, M. Gertz, S. Jajodia (eds.), Springer-Verlag, 2008 [BibTex entry]
  • C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Privacy-enhanced location services information," in Digital Privacy: Theory, Technologies and Practices, Acquisti, De Capitani di Vimercati, Gritzalis, Lambrinoudakis (eds.), Auerbach Publications (Taylor and Francis Group), 2007 [BibTex entry]
  • C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, P. Samarati, "Privacy-enhanced Location-based Access Control," in The Handbook of Database Security: Applications and Trends, M. Gertz, S. Jajodia (eds.), Springer-Verlag, 2007 [BibTex entry]
  • C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, P. Samarati, "XML Security," in Security, Privacy and Trust in Modern Data Management, M. Petkovic, W. Jonker (eds.), Springer-Verlag, 2007 [BibTex entry]
  • C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Trust Management," in Security, Privacy and Trust in Modern Data Management, M. Petkovic, W. Jonker (eds.), Springer-Verlag, 2007 [BibTex entry]
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "k-Anonymity," in Secure Data Management in Decentralized Systems, T. Yu, S. Jajodia (eds.), Springer-Verlag, 2007 [BibTex entry]
  • V. Ciriani, S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Microdata Protection," in Secure Data Management in Decentralized Systems, T. Yu, S. Jajodia (eds.), Springer-Verlag, 2007 [BibTex entry]
  • S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, P. Samarati, "Privacy of Outsourced Data," in Digital Privacy: Theory, Technologies and Practices, A. Acquisti, S. Gritzalis, C. Lambrinoudakis, S. De Capitani di Vimercati (eds.), Auerbach Publications (Taylor and Francis Group), 2007 [BibTex entry]
  • S. De Capitani di Vimercati, S. Foresti, S. Jajodia, P. Samarati, "Access Control Policies and Languages in Open Environments," in Secure Data Management in Decentralized Systems, T. Yu, S. Jajodia (eds.), Springer-Verlag, 2007 [BibTex entry]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Authorization and Access Control," in Security, Privacy and Trust in Modern Data Management, M. Petkovic, W. Jonker (eds.), Springer-Verlag, 2007 [BibTex entry]
  • S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Access control: Principles and Solutions," in Handbook of Information Security, H. Bidgoli (ed.), Wiley, 2006 [BibTex entry]
  • M. Cremonini, P. Samarati, "Contingency Planning Management," in Handbook of Information Security, H. Bidgoli (ed.), Wiley, 2006 [BibTex entry]
  • S. De Capitani di Vimercati, P. Samarati, "New Directions in Access Control," in Cyberspace Security and Defense: Research Issues, Kluwer Academic Publisher, 2005 [BibTex entry]
  • P. Bonatti, P. Samarati, "Logics for Authorizations and Security," in Logics for Emerging Applications of Databases, J. Chomicki, R. van der Meyden, G. Saake (eds.), Springer-Verlag, 2003 [BibTex entry]
  • M. Cremonini, P. Samarati, "Disaster Recovery Planning," in The Internet Encyclopedia, H. Bidgoli (ed.), John Wiley & Sons Inc., 2003 [BibTex entry]
  • S. De Capitani di Vimercati, P. Samarati, S. Jajodia, "Hardware and Software Data Security," in EOLSS The Encyclopedia of Life Support Systems, D. Kaeli, Z. Navabi (eds.), EOLSS Publishers, 2001 [BibTex entry]
  • S. De Capitani di Vimercati, P. Samarati, S. Jajodia, "Database Security," in Wiley Encyclopedia of Software Engineering, J. Marciniak (ed.), John Wiley & Sons, 2001 [BibTex entry]
  • P. Samarati, S. De Capitani di Vimercati, "Access Control: Policies, Models, and Mechanisms," in Foundations of Security Analysis and Design, R. Focardi, R. Gorrieri (eds.), Springer-Verlag, 2001 [BibTex entry]
  • P. Samarati, S. Jajodia, "Data Security," in Wiley Encyclopedia of Electrical and Electronics Engineering, J.G. Webster (ed.), John Wiley & Sons, February 1999 [BibTex entry]
  • R. Sandhu, P. Samarati, "Authentication, Access Control and Intrusion Detection," in CRC Handbook of Computer Science and Engineering, A. Tucker (ed.), CRC Press Inc., 1997 [BibTex entry]
  • S. Castano, G. Martella, P. Samarati, "Virus, Pirateria, Sabotaggio: l'Emergenza delle Difficoltà," in Le Scienze della Comunicazione, RCS Libri & Grandi Opere, 1996/1997 [BibTex entry]
  • E. Bertino, S. Jajodia, P. Samarati, "Access Controls in Object-Oriented Database Systems: Some Approaches and Issues," in Advanced Database Concepts and Research Issues, N. Adam, B. Bhargava (eds.), Springer-Verlag, 1993 [BibTex entry]

Papers in National Journals

  • S. Castano, G. Martella, P. Samarati, "Analysis, Comparison and Design of Role-Based Security Specifications," in Data & Knowledge Engineering (DKE), vol. 21, n. 1, December 1996, pp. 31-55 [BibTex entry]
  • G. Martella, P. Samarati, "La Sicurezza dell'Informazione Aziendale," in Rivista di Informatica, vol. XIX, n. 3, 1989, pp. 229-254 [BibTex entry]

Papers in Proceedings of National Conferences

  • P. Samarati, "Multilevel Relational Databases: Issues and Solutions," in Atti del Congresso Annuale AICA, Palermo, September 1994 [BibTex entry]
  • S. Castano, P. Samarati, C. Villa, "Un Modello di Sicurezza per Ambienti Ipertestuali," in Atti del Congresso Annuale AICA, Lecce, September 1993 [BibTex entry]
  • S. Castano, P. Samarati, "Un Modello per la Rilevazione delle Minacce in un Sistema di Elaborazione," in Atti del Congresso Annuale AICA, Torino, October 1992 [BibTex entry]
  • S. Castano, G. Martella, P. Samarati, "Un Modello per la Protezione di Basi di Conoscenza," in Atti del Congresso Annuale AICA, Siena, September 1991 [BibTex entry]
  • M. Bianchini, G. Martella, P. Samarati, "Un Sistema di Sicurezza Object-Oriented per la Protezione dei Documenti nei Sistemi Informativi per l'Ufficio," in Atti del Congresso Annuale AICA, Bari, September 1990 [BibTex entry]

Other Publications

  • E. Damiani, S. De Capitani di Vimercati, P. Samarati, "Towards Privacy-Aware Identity Management," in ERCIM News, n. 63, October 2005 [BibTex entry]
  • S. De Capitani di Vimercati, P. Samarati, "Privacy in the Electronic Society," in TILT, n. 15, March 2003 [BibTex entry]
  • E. Damiani, P. Samarati, C.A. Ardagna, M. Lupo Stanghellini , "Sicurezza e Web Service," in Sicurezza Digitale, n. 2, October 2003 [BibTex entry]
  • P. Samarati, "Regulating Access to Web-published Data," in ERCIM News , April 2002 [BibTex entry]
  • E. Damiani, P. Samarati, "On the Secure Interoperability of E-Business Services," in Business Briefing, Global InfoSecurity, 2001 [BibTex entry]
  • M. Bianchini, S. Castano, G. Martella, P. Samarati, "Un Sistema di Sicurezza Object-Oriented per la Protezione di Documenti," in Sistemi e Software, vol. 25, January 1992 [BibTex entry]
  • G. Martella, P. Samarati, "La Progettazione dei Sistemi di Protezione delle Informazioni in Azienda," in Data Manager, October 1989 [BibTex entry]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Data Protection in Cloud Scenarios," in Proc. of 10th Int'l Workshop on Data Privacy Management (DPM 2015) and 4th Int'l Workshop on Quantitative Aspects of Security Assurance (QASA 2015), Vienna, Austria, September 21-22, 2015 [BibTex entry]
  • S. De Capitani di Vimercati, S. Foresti, P. Samarati, "Data Security Issues in Cloud Scenarios," in Proc. of the 11th International Conference on Information Systems Security (ICISS 2015), Kolkata, India, December 16-20, 2015 [BibTex entry]
  • S. De Capitani di Vimercati, P. Samarati, "Data Privacy: Problems and Solutions," in Third International Conference on Information Systems Security (ICISS 2007), Delhi, India, December 16-20, 2007 (invited talk) [BibTex entry]
  • S. De Capitani di Vimercati, P. Samarati, "Privacy in the Electronic Society," in Proc. of the International Conference on Information Systems Security (ICISS 2006), Kolkata, India, December 19-21, 2006 (invited talk) [BibTex entry]
  • S. De Capitani di Vimercati, P. Samarati, "Protecting Privacy in the Global Infrastructure," in Proc. of the International Conference on Information Security and Computer Forensics, Chennai, India, December 6-8, 2006 (invited talk) [BibTex entry]
  • E. Damiani, S. David, S. De Capitani di Vimercati, C. Fugazza, P. Samarati, "Open World Reasoning in Semantics-Aware Access Control: a Preliminary Study," in 2nd Italian Semantic Web Workshop (SWAP 2005), University of Trento, Trento, Italy, December 14-16, 2005 [BibTex entry]
  • E. Damiani, S. De Capitani di Vimercati, C. Fugazza, P.Samarati, "Semantics-aware Privacy and Access Control: Motivation and Preliminary Results," in 1st Italian Semantic Web Workshop, Ancona, Italy, December 2004 [BibTex entry]
  • E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Reputation-based Pseudonymity: An Alternative or a Complement to Strong Identities?," in Workshop on Security and Dependability, Brussels, May 10, 2004 [BibTex entry]
  • E. Damiani, P. Samarati, "Towards Context Awareness in Ambient Intelligence," in Workshop on R&D challenges for Resilience in Ambient Intelligence, Brussels, March 19, 2004 [BibTex entry]
  • P. Samarati, "Access Control in the Open Infrastructure," in Proc. of the 1st International Conference on Information & Communication Technology (ICICT), Cairo, Egypt, December 2003 [BibTex entry]
  • S. Osborn, B. Thuraisingham, P. Samarati, "Panel of XML and Security," in Proc. of the 15th IFIP WG11.3 Working Conference on Database and Application Security, Niagara on the Lake, Ontario, Canada, July 2001 [BibTex entry]
  • B. Thuraisingham, S. Jajodia, P. Samarati, J. Dobson, M. Olivier, "Privacy Issues in WWW and Data Mining: Panel Discussion," in Database Security XII - Status and Prospects, S. Jajodia (ed.), Kluwer, 1999 [BibTex entry]
  • B. Thuraisingham, L. Schillper, P. Samarati, T.Y. Lin, S. Jajodia, C. Clifton, "Security Issues in Data Warehousing and Data Mining: Panel Discussion," in Database Security XI - Status and Prospects, T.Y. Lin, S. Qian (eds.), Chapman & Hall, 1998 [BibTex entry]
  • R. Thomas, E. Bertino, P. Samarati, H. Bruggemann, B. Hartman, R. Sandhu, T.C. Ting, "Panel Discussion: Role-Based Access Control and Next-Generation Security Models," in Database Security IX - Status and Prospects, D. Spooner, S. Demurjian, J. Dobson (eds.), Chapman & Hall, 1997 [BibTex entry]
  • S. De Capitani di Vimercati, P. Samarati, "Administrative Policies," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex entry]
  • S. De Capitani di Vimercati, P. Samarati, "Clark and Wilson," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex entry]
  • S. De Capitani di Vimercati, P. Samarati, "Chinese Wall," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex entry]
  • S. De Capitani di Vimercati, P. Samarati, "Mandatory Access Control Policies (MAC)," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex entry]
  • S. De Capitani di Vimercati, P. Samarati, "Polyinstantiation," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex entry]
  • G. Livraga, P. Samarati, "Multilevel Database," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex entry]
  • P. Samarati, "Flexible Authorization Framework (FAF)," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex entry]
  • P. Samarati, "k-anonymity," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex entry]
  • P. Samarati, "Recursive Revoke," in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg, S. Jajodia (eds.), Springer, 2011 [BibTex entry]
  • S. Ceri, M.A.W. Houtsma, A.M. Keller, P. Samarati, "A Classification of Update Methods for Replicated Databases,", CS Dept., Stanford University (STAN-CS-91-1392), October 1991 [BibTex entry]