Damiani, Ernesto, 1960-....
Damiani, Ernesto
Ernesto Damiani
Damiani, Ernesto <ingegnere elettronico>
VIAF ID: 119607463 (Personal)
Permalink: http://viaf.org/viaf/119607463
Preferred Forms
- 200 _ 1 ‡a Damiani ‡b , Ernesto ‡c <ingegnere elettronico>
- 100 1 _ ‡a Damiani, Ernesto
-
- 100 1 _ ‡a Damiani, Ernesto
-
-
- 100 1 _ ‡a Damiani, Ernesto ‡d 1960-
- 100 1 _ ‡a Damiani, Ernesto ‡d 1960-
- 100 1 _ ‡a Damiani, Ernesto ‡d 1960-...
- 100 1 _ ‡a Damiani, Ernesto, ‡d 1960-
-
-
-
-
- 100 1 _ ‡a Damiani, Ernesto, ‡d 1960-....
- 100 0 _ ‡a Ernesto Damiani
4xx's: Alternate Name Forms (9)
5xx's: Related Names (2)
Works
Title | Sources |
---|---|
Addressing selfishness in the design of cooperative systems | |
Applied computing 2000 : Proceedings of the 2000 ACM Symposium on Applied Computing : Villa Olmo, Via Cantoni 1, 22100 Como, Italy, March 19 - March 21- 2000 | |
Une approche orientée service pour la préservation des données confidentielles dans les compositions de services Web. | |
The Architecture of a Privacy-Aware Access Control Decision Component | |
Augmented reality technologies, systems and applications | |
Bayer Demosaicking with Polynomial Interpolation | |
Blockcheck: A consortium blockchain-based conformance checking framework for business processes | |
Business System Management and Engineering : From Open Issues to Applications | |
CAS++: An Open Source Single Sign-On Solution for Secure e-Services | |
CCS 2005 | |
Chapter 13 Bottom-up extraction and maintenance of ontology-based metadata | |
Choosing reputable servents in a P2P network | |
Data and applications security XX : 20th Annual IFIP WG 11.3 working conference on data and applications security, Sophia Antipolis, France, July 31-August 2, 2006 : proceedings | |
Data-driven process discovery and analysis : First International Symposium, SIMPDA 2011, Campione d'Italia, Italy, June 29-July1, 2011 : revised selected papers | |
Database and expert systems applications 28th International Conference, DEXA 2017, Lyon, France, August 28-31, 2017 : proceedings | |
Déploiement et supervision de la sécurité pour architectures multi-cloud. | |
Design and implementation of an access control processor for XML documents | |
Development of an integrated human-monitoring system to support emotion-based insider threat detection | |
Emergsem : une approche d'annotation collaborative et de recherche d'images basée sur les sémantiques émergentes | |
Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography Using Biometric Authentication | |
Estimating Degradation of Machine Learning Data Assets | |
Evaluation of novel approaches to software engineering 13th International Conference, ENASE 2018, Funchal, Madeira, Portugal, March 23-24, 2018, revised selected papers | |
Evolutionary design of hashing function circuits using an FPGA | |
Exécutions de requêtes respectueuses de la vie privée par utilisation de composants matériels sécurisés | |
From combinatorics to philosophy : the legacy of G.-C. Rota | |
Gestion des risques liés au transport des matières dangereuses | |
Human-centered E-business | |
Intelligent multimedia multi-agent systems : a human-centered approach | |
Internet : guida pratica alla rete internazionale / Ernesto Damiani | |
Key management for multi-user encrypted databases | |
KIWI | |
KIWI: A Framework for Enabling Semantic Knowledge Management | |
Knowledge-based intelligent information engineering systems and allied technologies, c2002: | |
KPI Modeling in MDA Perspective | |
Legacy of Gian-Carlo Rota | |
Managing Privacy in LBAC Systems | |
Una Melusina a Padova : note di lettura del monumento funebre Pappenheim nella Basilica del Santo / Ernesto Damiani | |
Metaheuristic based peer rewiring for semantic overlay networks | |
Métaheuristique pour la configuration dynamique de réseaux pair-à-pair dans le context des réseaux logiques sémantiques. | |
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy | |
Modality conflicts in semantics aware access control | |
Modeling and assessing inference exposure in encrypted databases | |
Monitoring Business Processes in the Networked Enterprise | |
Multimedia techniques for device and ambient intelligence | |
New directions in intelligent interactive multimedia systems and services. | |
Open Culture for Education and Research Environment | |
Open Source Systems: Adoption and Impact : 11th IFIP WG 2.13 International Conference, OSS 2015, Florence, Italy, May 16-17, 2015, Proceedings | |
Open Source Systems : IFIP Working Group 2.13 Foundation on Open Source Software, June 8–10, 2006, Como, Italy | |
Open source systems security certification | |
Prise en compte et prévention des comportements égoïstes dans la conception de systèmes répartis collaboratifs. | |
Privacy- Enhanced Identity Management for E-Services | |
Privacy-Preserving Query Execution using Tamper Resistant Hardware. | |
Proactive Random-Forest Autoscaler for Microservice Resource Allocation | |
Process Mining Manifesto | |
Processes Meet Big Data: Connecting Data Science with Process Science | |
Risk management related to the transport of dangerous goods. | |
Secure Logging | |
Sécurité d'accès dans les Systèmes d'Information Coopératifs : modélisation et Implémentation à l'aide d'agents | |
Security, Privacy, and Trust in Mobile Systems and Applications | |
Semantic Web personalization and context awareness : management of personal identities and social networking | |
Semantic web science and real-world applications | |
Signal processing for image enhancement and multimedia processing | |
Soft computing in software engineering | |
Supporting location-based conditions in access control policies | |
SWS '05 : proceedings of the 2005 ACM Workshop on Secure Web Services : November 11, 2005, Fairfax, Virginia, USA : (co-located with CCS 2005) | |
Techniques for security configuration management in distributed information systems. | |
Toward sensor-based context aware systems | |
Transactions on large-scale data and knowledge-centered systems. | |
Travel ban effects on SARS-CoV-2 transmission lineages in the UAE as inferred by genomic epidemiology | |
Trust in Blockchain Cryptocurrency Ecosystem | |
Ubiquitous Security : Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers | |
UML pratico : con elementi di ingegneria del software / Ernesto Damiani, Mauro Madravio | |
Web 2.0 : The Business Model | |
A Web Service Architecture for Enforcing Access Control Policies | |
Web services oriented approach for privacy-preserving data sharing | |
A WOWA-based Aggregation Technique on Trust Values Connected to Metadata |