1 Personal Information Address E-mail Voice +39.02.503.30087 Current Position Curriculum Vitae of Giovanni Livraga Università degli Studi di Milano Computer Science Department via Bramante 65 - Crema 26013 - giovanni.livraga@unimi.it Postdoctoral research fellow Computer Science Department Università degli Studi di Milano, Date of Birth July 31, 1984 Place of Birth Crema 26013-2 Positions January 2014 now: Postdoctoral research fellow, Computer Science Department, Università degli Studi di Milano, January 2011 December 2013: PhD student, Computer Science Department, Università degli Studi di Milano, July 2010 December 2010: research collaborator, Department of Information Technology (now Computer Science Department), Università degli Studi di Milano, October 2009 July 2010: intern, Security and Trust Group, SAP Labs France, Sophia Antipolis, France 3 Education 3.1 School and Academia March 2014: PhD in Computer Science (XXVI cycle), Università degli Studi di Milano,, Computer Science Doctorate School. Studies completed: December 31, 2013; PhD awarded: March 18, 2014. April 2010: MSc degree in Scienze e Tecnologie dell Informazione (Information Sciences and Technologies), graded 110/110 cum laude (full marks and honors), Università degli Studi di Milano,. December 2006: BSc degree in Sicurezza dei Sistemi e delle Reti Informatiche (Security of Systems and Networks), graded 110/110, Università degli Studi di Milano,. 3.2 Participation to International Schools September 3 8, 2012: Participation to the 12th International School on Foundations of Security Analysis and Design (FOSAD 2012), Bertinoro,. July 26 August 8, 2009: Participation to the 12th Summer School Intensive Programme on Information and Communication Security (IPICS 2009), Technische Universität Wien, Austria. 3.3 Miscellaneous February 2005 January 2006: Participation to the preparation course for the CISCO CCNA Certification, Dipartimento di Tecnologie dell Informazione, Università degli Studi di Milano,. June 2002: FCE Certification issued by the University of Cambridge, UK (ref. 026IT6380002). 1
4 Research Interests Giovanni Livraga s research interests are in the main area of security and privacy, with particular emphasis on problems related to data protection, information privacy, inference control, access control, and information protection in general in publication, storage, and emerging scenarios. More specifically, Giovanni s research activity has focused/focuses on: i) data protection in emerging scenarios, to ensure confidentiality of large data collections stored/published in cloud/outsourcing scenarios; ii) data sensitivity at different granularity levels, to allow expressing different levels of sensitivity for different data items; iii) data utility measures, needed to define techniques able to balance data recipients needs for accessing complete information and data respondents needs for safeguarding data privacy; iv) external knowledge, that can put at high risk the confidentiality of data; v) modeling of data dependencies, that can cause leakage of information not intended for disclosure; vi) access control in cloud/outsourcing scenarios, to ensure that access to data stored and managed in the cloud, or outsourced to external providers, be granted correctly enforcing the authorization policies defined by the data owner. 5 Participation in Research Projects Programma di Ricerca di Rilevante Interesse Nazionale (PRIN) Project: Data-driven Genomic Computing (GenData 2020) Project dates: February 2013 January 2016 Involvement in the project: February 2013 now Collaborating at: Università degli Studi di Milano Position at Università degli Studi di Milano: PhD student, postdoctoral research fellow Google Faculty Research Award Project: Fine-Grained Access Control for Social Networking Applications Project dates: July 2012 June 2013 Involvement in the project: July 2012 June 2013 Collaborating at: Università degli Studi di Milano Position at Università degli Studi di Milano: PhD student EU 7th Framework Programme for Research (FP7) (ICT - Information and Communication Technologies) Project: Privacy and Identity Management in Europe for Life (PrimeLife) Project dates: March 2008 June 2011 Involvement in the project: October 2009 June 2011 Collaborating at: SAP Labs France / Università degli Studi di Milano Position at SAP Labs France: intern Position at Università degli Studi di Milano: research collaborator 6 Research Periods in International Research Centers July 29 August 29, 2011: short-term scholar at George Mason University, Virginia, USA, Center for Secure Information Systems (CSIS), in collaboration with Prof. Sushil Jajodia. July 27 August 29, 2012: short-term scholar at George Mason University, Virginia, USA, Center for Secure Information Systems (CSIS), in collaboration with Prof. Sushil Jajodia. July 29 August 30, 2013: short-term scholar at George Mason University, Virginia, USA, Center for Secure Information Systems (CSIS), in collaboration with Prof. Sushil Jajodia. 7 Participation to Conferences as a Speaker 15th IEEE International Conference on Computational Science and Engineering (CSE 2012), Paphos, Cyprus, December 7, 2012. Presentation of the work Protecting Privacy of User Information in Continuous Location-Based Services, by C.A. Ardagna, G. Livraga, and P. Samarati. 2
1st IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL 2012), Rome,, October 4, 2012. Presentation of the work Privacy and Security in Environmental Monitoring Systems, by S. De Capitani di Vimercati, G. Livraga, V. Piuri, and F. Scotti. 8 Seminars and Talks Giovanni Livraga, Privacy, Sicurezza e Social Network, Collegio degli Angeli, Treviglio,, December 06, 2013 Giovanni Livraga, Internet, Sicurezza, e Giovani Utenti, Collegio degli Angeli, Treviglio,, December 05, 2013 Giovanni Livraga, Navigare Sicuri: i rischi di Internet, Istituto Comprensivo di Trescore Cremasco,, March 26, 2013 Giovanni Livraga, I Social Network e la Privacy, Istituto Comprensivo di Trescore Cremasco, Vailate,, February 6, 2013 Giovanni Livraga, I Social Network e la Privacy, Istituto Comprensivo di Trescore Cremasco, Trescore Cremasco,, February 5, 2013 Giovanni Livraga, Cosa sono i Social Networks: Rischi e Benefici, IIS Galilei, Crema,, November 30, 2012 Giovanni Livraga, Internet e Social Networks: la Tutela della Privacy, Liceo Classico Manin, Cremona,, November 7, 2012 Giovanni Livraga, Enforcing Subscription-based Authorization Policies in Cloud Scenarios, 12th International School on Foundations of Security Analysis and Design (FOSAD 2012), Bertinoro,, September 7, 2012 Giovanni Livraga, I Social Network in Chiave Didattica, Università degli Studi di Milano, Dipartimento di Informatica, June 2012 Giovanni Livraga, La tutela della Privacy in Internet, Università degli Studi di Milano, Dipartimento di Informatica, June 2012 Giovanni Livraga, I Social Network e la Tutela della Privacy, Scuola Media Galmozzi, Crema,, June 2012 Giovanni Livraga, Privacy e Social Network - I miei dati su Facebook, Istituto Comprensivo di Trescore Cremasco, Vailate,, May 9, 2012 Giovanni Livraga, Privacy e Social Network, Istituto Comprensivo di Trescore Cremasco, Trescore Cremasco,, May 2, 2012 Giovanni Livraga, Privacy nella Società dell Informazione - Dove sono i miei dati?, Istituto Tecnico Luca Pacioli, Crema,, May 31, 2011 9 Awards The paper Extending Loose Associations to Multiple Fragment (co-authored by S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati) received the Best Paper Runner-Up Award at the 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2013), held in Newark, NJ, USA, on July 15-17, 2013. 10 Professional Activities Editorial Board Member of: International Journal On Advances in Security Program Committee Member of the following International Conferences and Workshops: 8th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2014), November 16 20, 2014, Lisbon, Portugal 3
8th International Conference on Network and System Security (NSS 2014) October 15 17, 2014, Xi an, China International Workshop on Big Data Search and Mining (IWBSM 2014), September 24 27, 2014, Delhi, India 9th International Workshop on Data Privacy Management (DPM 2014), September 10 11, Wroclaw, Poland 9th International Conference on Availability, Reliability and Security (ARES 2014), September 8 12, 2014, Fribourg, Switzerland 11th International Conference on Security and Cryptography (SECRYPT 2014), August 28 30, 2014, Vienna, Austria 3rd International Conference on Smart Systems, Devices and Technologies (SMART 2014), July 20 24, 2014, Paris, France 2014 IEEE International Symposium on Innovations in Intelligent Systems and Applications (INISTA 2014), June 23 25, 2014, Alberobello, 2014 Workshop on Advanced Intrusion Detection and Prevention (AIDP 2014), June 4 5, 2014, Marrakech, Morocco 10th International Conference on Networking and Services (ICNS 2014), April 20 24, 2014, Chamonix, France 10th IEEE International Conference on Autonomic and Trusted Computing (ATC 2013), December 18 20, 2013, Vietri sul Mare, 16th IEEE International Conference on Computational Science and Engineering (CSE 2013), December 3 5, 2013, Sydney, Australia 4th IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2013), November 13 15, 2013 Zhangjiajie, China 12th Workshop on Privacy in the Electronic Society (WPES 2013), November 4, 2013, Berlin, Germany 3rd International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2013), October 19 23, 2013, Kharagpur, India 2nd International Symposium on Privacy and Security in Cloud and Social Networks (PriSecCSN 2013), September 30, 2013, Karlsruhe, Germany 6th SETOP International Workshop on Autonomous and Spontaneous Security (SETOP 2013), September 12 13, 2013, Egham, UK 9th International Workshop on Security and Trust Management (STM 2013), September 12-13, 2013, Egham, UK 8th DPM International Workshop on Data Privacy Management (DPM 2013), September 12 13, 2013, Egham, UK 8th International Conference on Availability, Reliability and Security (ARES 2013), September 2 6, 2013, Regensburg, Germany 10th International Conference on Mobile Web Information Systems (MobiWIS 2013), August 26 28, 2013, Paphos, Cyprus 7th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2013), August 25-31, 2013, Barcelona, Spain 2013 IEEE International Conference on Green Computing and Communications (GreenCom 2013), August 20 23, 2013, Beijing, China 10th International Conference on Security and Cryptography (SECRYPT 2013), July 29 31, 2013, Reykjavik, Iceland 4
IEEE 2013 First International Workshop on Cloud Security Auditing (CSAW 2013), June 27 July 2, 2013, Santa Clara, CA, USA 2nd International Conference on Smart Systems, Devices and Technologies (SMART 2013), June 23 28, 2013, Rome, 7th International Conference on Network and System Security (NSS 2013), June 3 4, 2013, Madrid, Spain 4th International Conference on Computer Science and Its Applications (CIIA 2013), May 4 6, 2013, Saida, Algeria 9th International Conference on Networking and Services (ICNS 2013), March 24 29, 2013, Lisbon, Portugal 15th IEEE International Conference on Computational Science and Engineering (CSE 2012), December 5 7, 2012, Paphos, Cyprus 1st International Workshop on Management and Security Technologies for Cloud Computing (ManSec-CC 2012), December 3 7, 2012, Anaheim, CA, USA 6th International Conference on Network and System Security (NSS 2012), November 21 23, 2012, Wu Yi Shan, Fujian, China 2012 International Symposium on Privacy and Security in Cloud and Social Networks (PriSecCSN 2012), November 1 3, 2012, Xiangtan, China 5th International Symposium on Foundations & Practice of Security (FPS 2012), October 25 26, 2012, Montreal, QC, Canada 2012 International Conference on Security in Computer Networks and Distributed Systems (SNDS 2012), October 11 12, 2012, Thiruvananthapuram, India 1st IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL 2012), October 2 5, 2012, Rome,. 8th International Workshop on Security and Trust Management (STM 2012), September 13 14, Pisa, 5th SETOP International Workshop on Autonomous and Spontaneous Security (SETOP 2012), September 10 12, Pisa, 6th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2012), August 19 24, 2012, Rome, 9th International Conference on Security and Cryptography (SECRYPT 2012), July 24 27, 2012, Rome, 2012 Summer FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-Summer), June 26 28, 2012, Vancouver, Canada 1st International Conference on Smart Systems, Devices and Technologies (SMART 2012), May 27 June 1, 2012, Stuttgart, Germany 8th International Conference on Networking and Services (ICNS 2012), March 25 29, 2012, St. Maarten, Netherlands Antilles 4th SETOP International Workshop on Autonomous and Spontaneous Security (SETOP 2011), September 15 16, 2011, Leuven, Belgium 1st International Workshop on Securing Services on the Cloud (IWSSC 2011), September 6 8, 2011, Milan, 5th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2011), August 21 27, 2011, Nice/Saint Laurent du Var, France 5
Publication Chair of the following International Conferences: 5th International Conference on Network and System Security (NSS 2011), September 6 8, 2011, Milan, 1st International Workshop on Securing Services on the Cloud (IWSSC 2011), September 6 8, 2011, Milan, 2011 Workshop on Mobile and Online Social Networks (MOSN 2011), September 8, 2011, Milan, 3rd International Workshop on Cyberspace Safety and Security (CSS 2011), September 8, 2011, Milan, Publicity Chair of the following International Conferences and Workshops: 3rd Joint Workshop on Security in Business Processes (SBP 2014), September 8, 2014, Haifa, Israel 19th European Symposium on Research in Computer Security (ESORICS 2014), September 7 11, 2014, Wroclaw, Poland 11th International Conference on Security and Cryptography (SECRYPT 2014), August 28 30, 2014, Vienna, Austria 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), July 14 16, 2014, Vienna, Austria 10th IEEE International Conference on Autonomic and Trusted Computing (ATC 2013), December 18-20, 2013, Vietri sul Mare, 12th Workshop on Privacy in the Electronic Society (WPES 2013), November 4, 2013, Berlin, Germany 9th Workshop on Security & Trust management (STM 2013), September 9 13, 2013, Egham, UK 18th European Symposium on Research in Computer Security (ESORICS 2013), September 9 13, 2013, Egham, UK 10th International Conference on Security and Cryptography (SECRYPT 2013), July 29 31, 2013, Reykjavik, Iceland 17th European Symposium on Research in Computer Security (ESORICS 2012), September 10 14, 2012, Pisa, 8th International Workshop on Security and Trust Management (STM 2012), September 13 14, 2012, Pisa, 9th European PKI Workshop: Research and Applications (EuroPKI 2012), September 13 14, 2012, Pisa, 9th International Conference on Security and Cryptography (SECRYPT 2012), July 24 27, 2012, Rome, 10th International Conference on Applied Cryptography and Network Security (ACNS 2012), June 26 29, 2012, Singapore 5th International Conference on Network and System Security (NSS 2011), September 6 8, 2011, Milan, Reviewer for the following International Journals: ACM Transactions on the Web (ACM TWEB) International Journal of Information Security (IJIS) IET Information Security Elsevier Computers & Security Journal 6
IEEE Systems Journal - Special Issue on Security and Privacy in Complex Systems Reviewer for the following International Conferences and Workshops: 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), June 4 6, 2014, Kyoto, Japan 16th Information Security Conference (ISC 2103), November 13 15, 2013, Dallas, TX, USA 20th ACM Conference on Computer and Communications Security (CCS 2013), November 4 8, 2013, Berlin, Germany 18th European Symposium on Research in Computer Security (ESORICS 2013), September 9 13, 2013, Egham, UK 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), May 8 10, 2013, Hangzhou, China 20th Annual Network & Distributed System Security Symposium (NDSS 2013), February 24 27, 2013, San Diego, CA, USA 2012 Annual Computer Security Applications Conference (ACSAC 2012), December 3 7, 2012, Orlando, FL, USA 14th International Conference on Information and Communications Security (ICICS 2012), October 29 31, 2012, Hong Kong 2012 Workshop on Privacy in the Electronic Society (WPES 2012), October 15, 2012, Raleigh, NC, USA 17th European Symposium on Research in Computer Security (ESORICS 2012), September 10 14, 2012, Pisa, 25th IEEE Computer Security Foundations Symposium (CSF 2012), June 25-27, 2012, Harvard University, Cambridge MA, USA 32nd International Conference on Distributed Computing Systems (ICDCS 2012), June 18-21, 2012, Macau, China 14th Information Security Conference (ISC 2011), October 26-29, 2011, Xi an, China 10th Workshop on Privacy in the Electronic Society (WPES 2011), October 17, 2011, Chicago, IL, USA 16th European Symposium on Research in Computer Security (ESORICS 2011), September 12-14, 2011, Leuven, Belgium 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2011), September 7-9, 2011, London, UK 5th International Conference on Network and System Security (NSS 2011), September 6-8, 2011, Milan, 8th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2011), August 29 - September 02, 2011, Toulouse, France The 11th Privacy Enhancing Technologies Symposium (PETS 2011), July 27-29, 2011, Waterloo, Canada The International Conference on Security and Cryptography (SECRYPT 2011), July 18-21, 2011, Seville, Spain 25th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2011), July 11-13, 2011, Richmond, VA, USA 7
11 Publications Books B 1 G. Livraga, Protecting Privacy in Data Release, Springer (to appear) Edited Books EB 1 P. Samarati, S. Foresti, J. Hu, and G. Livraga (eds.), Proc. of the 5th International Conference on Network and System Security (NSS 2011), IEEE, Milan,, September 6-8, 2011. EB 2 C. C. Zou, Y. Xiang, and G. Livraga (eds.), Proc. of the 3rd International Workshop on Cyberspace Safety and Security (CSS 2011), IEEE, Milan,, September 8, 2011. EB 3 J. Zhang and G. Livraga (eds.), Proc. of the 2011 International Conference on Data and Knowledge Engineering (ICDKE 2011), IEEE, Milan,, September 6, 2011. EB 4 M. Li and G. Livraga (eds.), Proc. of the 2011 Workshop on Mobile and Online Social Networks (MOSN 2011), IEEE, Milan,, September 8, 2011. International Journal Articles IJ 1 IJ 2 IJ 3 IJ 4 IJ 5 IJ 6 S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, P. Samarati, Fragmentation in Presence of Data Dependencies, in IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2014 (to appear). S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi, and P. Samarati, Enforcing Dynamic Write Privileges in Data Outsourcing, in Computer & Security (COSE), vol. 39, part A, pp.47 63, 2011. S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati, Data Privacy: Definitions and Techniques, in International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 20, no. 6, pp. 793 817, 2012. M. Bezzi, S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, and R. Sassi, Modeling and Preventing Inferences from Sensitive Value Distributions in Data Release, in Journal of Computer Security (JCS), vol. 20, no. 4, pp. 393 436, 2012. V. Ciriani, S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati, An OBDD Approach to Enforce Confidentiality and Visibility Constraints in Data Publishing, in Journal of Computer Security (JCS), vol. 20, no. 5, pp. 463 508, 2012. S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati, Anonymization of Statistical Data, in IT - Information Technology, vol. 53, no. 1, pp. 18 25, 2011. Papers in Proceedings of International Conferences and Workshops IC 1 IC 2 IC 3 IC 4 S. De Capitani di Vimercati, S. Foresti, S. Jajodia, G. Livraga, S. Paraboschi and P. Samarati, Extending Loose Associations to Multiple Fragments, in Proc. of the 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2013), Newark, NJ, USA, July 15-17, 2013 (best paper runner-up award). C.A. Ardagna, G. Livraga, and P. Samarati, Protecting Privacy of User Information in Continuous Location-Based Services, in Proc. of the 15th IEEE International Conference on Computational Science and Engineering (CSE 2012), Paphos, Cyprus, December 5-7, 2012 S. De Capitani di Vimercati, G. Livraga, V. Piuri, and F. Scotti, Privacy and Security in Environmental Monitoring Systems, in Proc. of the 1st IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL 2012), Rome,, October 2-5, 2012 S. De Capitani di Vimercati, S. Foresti, S. Jajodia, and G. Livraga, Enforcing Subscription-based Authorization Policies in Cloud Scenarios, in Proc. of the 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2012), Paris, France, July 11-13, 2012. 8
IC 5 IC 6 IC 7 V. Ciriani, S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati, Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach, in Proc. of the 25th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2011), Richmond, VA, USA, July 11-13, 2011. S. De Capitani di Vimercati, S. Foresti, and G. Livraga, Privacy in Data Publishing, in Data Privacy Management and Autonomous Spontaneous Security, J. Garcia-Alfaro, G. Navarro-Arribas, A. Cavalli, and J. Leneutre (eds.), Springer, 2011 (invited). M. Bezzi, S. De Capitani di Vimercati, G. Livraga, and P. Samarati, Protecting Privacy of Sensitive Value Distributions in Data Release, in Proc. of the 6th International Workshop on Security and Trust Management (STM 2010), Athens, Greece, October 24, 2010. Chapters in Books BC 1 BC 2 BC 3 BC 4 S. De Capitani di Vimercati, S. Foresti, G. Livraga, P. Samarati, Selective and Private Access to Outsourced Data Centers, in Handbook on Data Centers, S.U. Khan, A.Y. Zomaya (eds.), Springer, 2014 (to appear). S. De Capitani di Vimercati, A. Genovese, G. Livraga, V. Piuri, and F. Scotti, Privacy and Security in Environmental Monitoring Systems: Issues and Solutions, in Computer and Information Security Handbook, 2nd Edition, J. Vacca (ed.), Morgan Kaufmann, 2013. M. Bezzi, S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati Data Privacy, in Privacy and Identity Management for Life, J. Camenisch, S. Fischer-Hübner, and K. Rannenberg (eds.), Springer, 2011. S. De Capitani di Vimercati, S. Foresti, G. Livraga, and P. Samarati, Protecting Privacy in Data Release, in Foundations of Security Analysis and Design VI, A. Aldini, and R. Gorrieri (eds.), Springer, 2011. Other Publications OP 1 OP 2 OP 3 OP 4 S. De Capitani di Vimercati and G. Livraga, Grant Option, in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg and S. Jajodia (eds.), Springer, 2011. S. De Capitani di Vimercati and G. Livraga, Privileges in SQL, in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg and S. Jajodia (eds.), Springer, 2011. S. De Capitani di Vimercati and G. Livraga, SQL Access Control Model, in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg and S. Jajodia (eds.), Springer, 2011. G. Livraga and P. Samarati Multilevel Database, in Encyclopedia on Cryptography and Security, H.C.A. van Tilborg and S. Jajodia (eds.), Springer, 2011. Thesis TH 1 TH 2 G. Livraga, Preserving Privacy in Data Release, PhD Thesis in Computer Science, Università degli Studi di Milano,, March 2014. G. Livraga, Protecting Privacy of Sensitive Value Distributions in Data Release, MSc Thesis in Scienze e Tecnologie dell Informazione, Università degli Studi di Milano,, April 2010. Crema, March 25, 2014 Giovanni Livraga 9