Sara Foresti

ORCID: 0000-0002-1658-6734
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Cardiac Arrhythmias and Treatments
  • Access Control and Trust
  • Atrial Fibrillation Management and Outcomes
  • Cardiac pacing and defibrillation studies
  • Privacy, Security, and Data Protection
  • Cardiac electrophysiology and arrhythmias
  • Blockchain Technology Applications and Security
  • Internet Traffic Analysis and Secure E-voting
  • Congenital Heart Disease Studies
  • Security and Verification in Computing
  • Distributed systems and fault tolerance
  • Data Quality and Management
  • Cardiovascular Effects of Exercise
  • Advanced Data Storage Technologies
  • Cloud Computing and Resource Management
  • Complexity and Algorithms in Graphs
  • Cardiovascular and Diving-Related Complications
  • IoT and Edge/Fog Computing
  • Cardiac Structural Anomalies and Repair
  • Peer-to-Peer Network Technologies
  • Mobile Crowdsensing and Crowdsourcing
  • Network Security and Intrusion Detection

University of Milan
2016-2025

MultiMedica
2021-2024

IRCCS Policlinico San Donato
2006-2023

Istituti di Ricovero e Cura a Carattere Scientifico
2022

Humanitas University
2017-2020

IRCCS Humanitas Research Hospital
2018-2020

Humanitas Gavazzeni
2015-2019

NIHR Bristol Cardiovascular Biomedical Research Unit
2017

University of Bristol
2017

Ospedale Papa Giovanni XXIII
2017

The impact of privacy requirements in the development modern applications is increasing very quickly. Many commercial and legal regulations are driving need to develop reliable solutions for protecting sensitive information whenever it stored, processed, or communicated external parties. To this purpose, encryption techniques currently used many scenarios where data protection required since they provide a layer against disclosure personal information, which safeguards companies from costs...

10.1145/1805974.1805978 article EN ACM Transactions on Information and System Security 2010-07-01

Current access control models typically assume that resources are under the strict custody of a trusted party which monitors each request to verify if it is compliant with specified policy. There many scenarios where this approach becoming no longer adequate. Many clear trends in Web technology creating need for owners sensitive information manage by legitimate users using services honest but curious third parties, is, parties providing required service not authorized read actual data...

10.1145/1735886.1735891 article EN ACM Transactions on Database Systems 2010-04-01

Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some most challenging issues in such scenario are enforcement authorization policies support policy updates. Since common approach protecting outsourced data consists encrypting themselves, promising solving these based on combination access control with cryptography. This idea itself not new, but problem applying it an architecture...

10.1145/1314466.1314477 article EN 2007-11-02

Atrial fibrillation (AF) may occasionally affect athletes by impairing their ability to compete, and leading noneligibility at prequalification screening. The impact of catheter ablation (CA) in restoring full competitive activity affected AF is not known. aim our study was investigate the effectiveness CA idiopathic with palpitations physical performance compromising eligibility for activities.Twenty consecutive (all males; 44.4 +/- 13.0 years) disabling on basis drug-refractory underwent...

10.1111/j.1540-8167.2007.01077.x article EN Journal of Cardiovascular Electrophysiology 2008-02-06

QRS-ST changes in the inferior and lateral ECG leads are frequently observed athletes. Recent studies have suggested a potential arrhythmogenic significance of these findings general population. The aim our study was to investigate whether markers cardiac arrest (CA) unexplained cause or sudden death athletes.In 21 athletes (mean age, 27 years; 5 women) with death, recorded before immediately after clinical event compared 365 healthy eligible for competitive sport activity. We measured...

10.1161/circep.110.945824 article EN Circulation Arrhythmia and Electrophysiology 2010-05-29

The proper protection of data privacy is a complex task that requires careful analysis what actually has to be kept private. Several definitions have been proposed over the years, from traditional syntactic definitions, which capture degree enjoyed by respondents with numerical value, more recent semantic take into consideration mechanism chosen for releasing data. In this paper, we illustrate evolution privacy, and survey some techniques devised enforcing such definitions. We also...

10.1142/s0218488512400247 article EN International Journal of Uncertainty Fuzziness and Knowledge-Based Systems 2012-12-01

As the use of external storage and data processing services for storing managing sensitive becomes more common, there is an increasing need novel techniques that support not only confidentiality, but also confidentiality accesses users make on such data. In this paper, we propose a technique guaranteeing content, access, pattern in outsourcing scenario. The proposed introduces shuffle index structure, which adapts traditional B+-trees. We show our solution exhibits limited performance cost,...

10.1109/icdcs.2011.37 article EN 2011-06-01

Ensuring proper privacy and protection of the information stored, communicated, processed, disseminated in cloud as well users accessing such an is one grand challenges our modern society. As a matter fact, advancements Information Technology diffusion novel paradigms data outsourcing computing, while allowing companies to easily access high quality applications services, introduce risks improper disclosure dissemination. In this paper, we will characterize different aspects problem emerging...

10.1109/crisis.2012.6378956 article EN 2012-10-01

Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service (DAS), where an organization's database stored at external service provider. In such scenario, access control very important issue, especially if the data owner wishes to publish her for use.In this paper, we first present our approach implementation of through selective encryption. The focus paper then presentation experimental results, which demonstrate applicability proposal.

10.1145/1103780.1103792 article EN 2005-11-11

Fragmentation has been recently proposed as a promising approach to protect the confidentiality of sensitive associations whenever data need undergo external release or storage. By splitting attributes among different fragments, fragmentation guarantees these under assumption that such cannot be reconstructed by re-combining fragments. We note requirement fragments do not have in common, imposed previous proposals, is only necessary, but sufficient, condition ensure information recombined...

10.1109/tdsc.2013.2295798 article EN IEEE Transactions on Dependable and Secure Computing 2014-01-31

Access control is the process of mediating every request to data and services maintained by a system determining whether should be granted or denied. Expressiveness flexibility are top requirements for an access together with, usually in conflict simplicity efficiency. In this paper, we discuss main desiderata systems illustrate characteristics solutions.

10.1504/ijcse.2007.015739 article EN International Journal of Computational Science and Engineering 2007-01-01
Coming Soon ...