The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.
This series contains publications published through The Cyber Center at Purdue University.
Submissions from 2007
R-trees with Update Memos, Xiaopeng Xiong and Walid G. Aref
SOLE: scalable on-line execution of continuous queries on spatio-temporal data streams, Mohamed Mokbel and Walid G. Aref
Space-Partitioning Trees in PostgreSQL: Realization and Performance, Mohamed Eltabakh, Ramy Eltarras, and Walid G. Aref
Speculative thread decomposition through empirical optimization, Troy Johnson, Rudolf Eigenmann, and T.N. Vijaykumar
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations, Anna Squicciarini, Alberto Trombetta, and Elisa Bertino
The New Casper: A Privacy-Aware Location-Based Database Server, Mohamed Mokbel, Chin-Yin Chow, and Walid G. Aref
Trust Negotiation in Identity Management, Abhilasha Bhargav-Spantzel, Anna Squicciarini, and Elisa Bertino
User Tasks and Access Control overWeb Services, Jacques Thomas, Federica Paci, Elisa Bertino, and Patrick Eugster
Web services discovery in secure collaboration environments, Mohamed Shehab, Kamal Bhattacharya, and Arif Ghafoor
XACML Function Annotations, Prathima Rao, Dan Lin, and Elisa Bertino
XML-Based Policy Engineering Framework for Heterogeneous Network Management, Arjmand Samuel, Shahab Baqai, and Arif Ghafoor
Submissions from 2006
ABSTRACT Access Control Enforcement for Conversation-based Web Services, Massimo Mecella, Federica Paci, Mourad Ouzzani, and Elisa Bertino
Access Control and Authorization Constraints for WS-BPEL, Elisa Bertino, Jason Crampton, and Federica Paci
Access Control and Privacy in Location-Aware Services forMobile Organizations, Maria Luisa Damiani and Elisa Bertino
Access control, confidentiality and privacy for video surveillance databases, Bhavani Thuraisingham, Gal Lavee, Elisa Bertino, Jianoping Fan, and Latifur Khan
Access control enforcement for conversation-based web services, Massimo Mecella, Mourad Ouzzani, Federica Paci, and Elisa Bertino
Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information, Xiaoxin Wu, Jun Liu, Xiaoyan Hong, and Elisa Bertino
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach, Anna Squicciarini, Elisa Bertino, Elena Ferrari, and Indrakshi Ray
Adaptive rank-aware query optimization in relational databases, Ihab Ilyas, Walid G. Aref, Ahmed Elmagarmid, Hicham Elmongui, Rahul Shah, and Jeffrey S. Vitter
Adaptive rank-aware query optimization in relational databases, Ihab Ilyas, Walid G. Aref, Ahmed Elmagarmid, Hicham Elmongui, Rahul Shah, and Jeffrey S. Vitter
A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities, Elisa Bertino and Anna Squicciarini
A multigranular object-oriented framework supporting spatio-temporal granularity conversions, Elena Camossi, Mario Bertolotti, and Elisa Bertino
An Arabidopsis Basic Helix-Loop-Helix Leucine Zipper Protein Modulates Metal Homeostasis and Auxin Conjugate Responsiveness, Rebekah Rampey, Andrew Woodward, Brianne Hobbs, Megan Tierney, Brett Lahner, David Salt, and Bonnie Bartel
Architectural issues for a location-aware role-based access control system, Maria Luisa Damiani and Elisa Bertino
A semantic approach to build personalized interfaces in the cultural heritage domain, Stefano Valtolina, Pietro Mazzoleni, Stefano Franzoni, and Elisa Bertino