The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2012

Link

A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks, Hyo-Sang Lim, Gabriel Ghinita, Elisa Bertino, and Murat Kantarcioglu

A hybrid approach of OpenMP for clusters, Okwan Kwon, Fahed Jubair, Rudolf Eigenmann, and Sam Midkiff

Link

A hybrid approach of OpenMP for clusters, Okwan Kwon, Fahed Jubair, Rudolf Eigenmann, and Samuel Midkiff

Link

A Hybrid Approach to Private Record Matching, Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, and Elisa Bertino

Link

A latent pairwise preference learning approach for recommendation from implicit feedback, Yi Fang and Luo Si

Link

An Access Control Framework for WS-BPEL Processes, Federica Paci, Elisa Bertino, and Jason Crampton

Link

An Analytic Approach to People Evaluation in Crowdsourcing Systems, Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Seyed-Mehdi-Reza Beheshti, and Elisa Bertino

Link

An energy-efficient approach for provenance transmission in wireless sensor networks, S.M.I. Alam and Sonia Fahmy

Link

ARES Conference - Message from ARES Conference Officers, Elisa Bertino, A Min Tjoa, and Gerald Quirchmayr

Link

A role-involved purpose-based access control model, Md. Enamul Kabir, Hua Wang, and Elisa Bertino

PDF

ARTL@ S and BasArt: A loose coupling strategy for digital humanities, Sorin Matei

PDF

Authenticated Top-K Aggregation in Distributed and Authenticated Top-K Aggregation in Distributed and, Sunoh Choi, Hyo-Sang Lim, and Elisa Bertino

Link

Auxin and ABA act as central regulators of developmental networks associated with paradormancy in Canada thistle (Cirsium arvense)., JV Anderson, M Dogramaci, DP Horvath, ME Foley, WS Chao, JC Suttle, Jyothi Thimmapuram, AG Hernandez, S Ali, and MA Mikel

Link

Collaborative Computing: Networking, Applications and Worksharing, James Joshi, Elisa Bertino, Calton Pu, and Heri Ramampiaro

Link

Collaborative Computing: Networking, Applications and Worksharing, James Joshi, Elisa Bertino, Calton Pu, and Heri Ramampiaro

Link

Content retrieval using cloud-based DNS, Ravish Khosla, Sonia Fahmy, and Y.C. Hu

Link

Cryptographic Key Management for Smart Power Grids, Mohamed Nabeel, John Zage, Sam Kerr, Elisa Bertino, Athula Kulatunga, U. Sudheera Navaratne, and May Lou Duren

Link

Data Protection from Insider Threats, Elisa Bertino

Link

Deep Web Query Interface Understanding and Integration, Eduard Dragut, Weiyi Meng, and Clement Yu

Link

Defending against insider threats and internal data leakage, Elisa Bertino, Ilsun You, Gabriele Lenzini, and Marek Ogiela

Link

Demonstrating a lightweight data provenance for sensor networks, Bilal Shebaro, Salmin Sultana, Shakthidhar Gopavaram, and Elisa Bertino

Link

Design and evaluation of the S3 monitor network measurement service on GENI, Ethan Blanton, S Chatterjee, S Gangam, S Kala, D Sharma, Sonia Fahmy, and P Sharma

Link

Detecting the unintended in BGP policies, Debbie Perouli, Timmothy Griffin, Olaf Maennel, Sonia Fahmy, Iain Phillips, and Cristel Pelsser

Link

Detecting unsafe BGP policies in a flexible world, Debbie Perouli, Timmothy Griffin, Olaf Maennel, Sonia Fahmy, Cristel Pelsser, Alexander Gurney, and Iain Phillips

Link

Effective query generation and postprocessing strategies for prior art patent search, Suleyman Cetintas and Luo Si