- J. Cao, B. Carminati, E. Ferrari, K.L. Tan. CASTLE: Continuously Anonymizing Data Streams. IEEE Transactions on Dependable and Secure Computing (TDSC), to appear.
- B. Carminati, E. Ferrari, and A. Perego. Enforcing Access Control in Web-based Social Networks. ACM Transactions on Information & System Security (TISSEC), 2008. To appear PDF | BibTeX
- B. Carminati, E. Ferrari, K.L. Tan, and J. Cao. A Framework to Enforce Access Control over Data Streams. ACM Transactions on Information & System Security (TISSEC), 2008. To appear PDF | BibTeX
- B. Carminati, E. Ferrari. Access control and Privacy in Web-based Social Networks. Journal of Web Information Systems, to appear. PDF | BibTeX
- B. Carminati, E. Ferrari, and A. Perego. A Decentralized Security Framework for Web-based Social Networks. International Journal of Information Security and Privacy, 2008. To appear PDF | BibTeX
- B.Carminati, E.Ferrari, E.Bertino A Comprehensive Framework for Secure Outsourcing of XML Data Journal of Information Assurance and Security (JIAS), in corso di pubblicazione, Dynamic Publishers, Inc. PDF | BibTeX
- B.Carminati, E. Ferrari. A System for Controlled Outsourcing of Personal Data. Computer Systems Science and Engineering , vol. 21, 2006. PDF | BibTeX
- B.Carminati, E. Ferrari, B. Thuraisingham. Access Control for Web Data: Models and Policy Languages. Annals of Telecommunications, 61(3-4):245-266, 2006. PDF | BibTeX
- B.Carminati, E.Ferrari, P.C.K. Hung. Exploring Privacy Issues in Web Services Discovery Agencies. IEEE Security & Privacy Magazine. 3(5):14-21, 2005. PDF | BibTeX
- E.Bertino, B.Carminati, E.Ferrari. Merkle Tree Authentication in UDDI Registries. International Journal of Web Services Research, 1(2):37-57, 2004, Idea Group Inc. PDF | BibTeX
- E.Bertino, B.Carminati, E.Ferrari, B. Thuraisingham, A. Gupta. Selective and Authentic Third-Party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering (TKDE), 16(10):1263-1278, 2004. PDF | BibTeX
- E.Bertino, B.Carminati, E.Ferrari. Access Control for XML documents and data. Information Security. Technical Report, 9(3):19-34, 2004, Elsevier Science. PDF | BibTeX