scispace - formally typeset
S

Sara Foresti

Researcher at University of Milan

Publications -  170
Citations -  4020

Sara Foresti is an academic researcher from University of Milan. The author has contributed to research in topics: Encryption & Cloud computing. The author has an hindex of 33, co-authored 154 publications receiving 3727 citations.

Papers
More filters
Proceedings Article

Over-encryption: management of access control evolution on outsourced data

TL;DR: A novel solution to the enforcement of access control and the management of its evolution is presented, based on the application of selective encryption as a means to enforce authorizations.
Journal ArticleDOI

Combining fragmentation and encryption to protect privacy in data storage

TL;DR: This article proposes a solution to enforce the privacy of data collections that combines data fragmentation with encryption, and formalizes the problem of minimizing the impact of fragmentation in terms of number of fragments and their affinity and presents two heuristic algorithms for solving such problems.
Journal ArticleDOI

Encryption policies for regulating access to outsourced data

TL;DR: The article presents a formal model for access control management and illustrates how an authorization policy can be translated into an equivalent encryption policy while minimizing the amount of keys and cryptographic tokens to be managed and introduces a two-layer encryption approach.
Proceedings ArticleDOI

A data outsourcing architecture combining cryptography and access control

TL;DR: This paper illustrates the basic principles on which an architecture for combining access control and cryptography can be built and illustrates an approach for enforcing authorization policies and supporting dynamic authorizations, allowing policy changes and data updates at a limited cost in terms of bandwidth and computational power.
Proceedings ArticleDOI

Key management for multi-user encrypted databases

TL;DR: This paper presents the approach for the implementation of access control through selective encryption, and the presentation of the experimental results, which demonstrate the applicability of the proposal.