Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Regulating Access To Semistructured Information on the Web., , , and . SEC, volume 175 of IFIP Conference Proceedings, page 351-360. Kluwer, (2000)Special issue: Semantics-Aware Techniques for Security.. Comput. Syst. Sci. Eng., (2004)A General Approach to Securely Querying XML., , , and . WOSIS, page 115-122. INSTICC Press, (2007)Mining Class Hierarchies from XML Data: Representation Techniques., and . Fuzzy Days, volume 33 of Advances in Soft Computing, page 385-396. Springer, (2004)Using WG-log Schemata to Represent Semistructured Data., , , and . DS-8, volume 138 of IFIP Conference Proceedings, page 331-349. Kluwer, (1999)SSRI online First experiences in a three-years course degree offered in e-learning at the University of Milan., , , , , and . DMS, page 65-70. Knowledge Systems Institute, (2005)A Non-invasive Method for the Conformance Assessment of Pair Programming Practices Based on Hierarchical Hidden Markov Models., and . XP, volume 4536 of Lecture Notes in Computer Science, page 123-136. Springer, (2007)AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing., , , , and . DPM/SETOP, volume 7731 of Lecture Notes in Computer Science, page 201-216. Springer, (2012)A Knowledge-Based IoT Security Checker., , , , , and . Euro-Par Workshops, volume 11339 of Lecture Notes in Computer Science, page 299-311. Springer, (2018)Una estensione fuzzy del modello relazionale per il riutilizzo di componenti software., , and . SEBD, page 161-179. STAR - Servizio Tecnografico Area Ricerca CNR, Pisa, (1996)