The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2014

Link

A formal proximity model for RBAC systems, Aditi Gupta, Michael Kirkpatrick, and Elisa Bertino

Link

A practical approach for provenance transmission in wireless sensor networks, S.M.I. Alam and Sonia Fahmy

Link

Detecting mobile malware threats to homeland security through static analysis, Seung-Hyun Seo, Aditi Gupta, Asmaa Mohamed Sallama, and Kangbin Yimb

Link

Flow-based partitioning of network testbed experiments, Wei-Min Yao and Sonia Fahmy

Link

IEEE TDSC Editorial, Elisa Bertino

Link

Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases, Bharath Samanthula, Wei Jiang, and Elisa Bertino

Link

Representation and querying of unfair evaluations in social rating systems, Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Seyed-Mehdi-Reza Beheshti, Norman Foo, and Elisa Bertino

Submissions from 2013

Link

Active Learning with Optimal Instance Subset Selection, Yifan Fu, Xingquan Zhu, and Ahmed Elmagarmid

Link

Adaptive data protection in distributed systems, Anna Squicciarini, Giuseppe Petracca, and Elisa Bertino

Link

A distributed cloud architecture for mobile multimedia services, Muhamed Felemban, Saleh Basalamah, and Arif Ghafoor

Link

A fast parallel maximum clique algorithm for large sparse graphs and temporal strong components, Ryan Rossi, David Gleich, and Assefaw Gebramedhin

Link

A file provenance system, Salmin Sultana and Elisa Bertino

Link

An efficient certificateless cryptography scheme without pairing, Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, and Elisa Bertino

Link

An Experimental Framework for BGP Securuty Evaluation, Debbie Perouli, Olaf Maennel, Iain Phillips, Sonia Fahmy, Randy Bush, and Rob Austein

Link

Author disambiguation by hierarchical agglomerative clustering with adaptive stopping criterion, Lei Cen, Eduard Dragut, Luo Si, and Mourad Ouzzani

Link

Collaboration in Multicloud computing environments: Framework and security issues, S Chandrasekhar, M Singhl, GE Tingjian, R Krishnan, Gail Joon Ahn, and Elisa Bertino

Collaboration in multicloud computing environments: Framework and security issues, M Singhal, S Chandrasekhar, Ge Tingjian, R. Sandhu, R Krishnan, Ahn Gail-Joon, and Elisa Bertino

Link

Collusion Detection in Online Rating Systems, Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Seyed-Mehdi-Reza Beheshti, Elisa Bertino, and Norman Foo

Link

Compiler Infrastructure, Rudolf Eigenmann and Samuel Midkiff

Link

Continuous aggregate nearest neighbor queries, Hicham Elmongui, Mohamed Mokbel, and Walid G. Aref

Link

Don's be SCAREd: use SCalable Automatic REpairing with maximal likelihood and bounded changes, Mohamed Yakout, Laure Berti-Equille, and Ahmed Elmagarmid

Link

Efficient and accurate strategies for differentially-private sliding window queries, Jianneng Cao, Qian Xiao, Gabriel Ghinita, Ninghui Li, Elisa Bertino, and Kian-Lee Tan

Link

Efficient privacy-aware record integration, Mehmet Kuzu, Murat Kantarcioglu, Ali Inan, Elisa Bertino, Elizabeth Durham, and Bradley Malin

Link

Efficient tree pattern queries on encrypted XML documents, Jianneng Cao, Fang-Yu Rao, Mehmet Kuzu, Elisa Bertino, and Murat Kantarcioglu

Link

FENCE: continuous access control enforcement in dynamic data stream environments, Rimma Nehme, Hyo-Sang Lim, and Elisa Bertino