The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2013

Link

Similarity queries: their conceptual evaluation, transformation and processing, Yasin Silva, Walid G. Aref, Per-Ake Larson, Spencer Pearson, and Mohamed Ali

Link

Single-Database Private Information Retrieval from Fully Homomorphic Encryption, Xun Yi, Mohammed Golam Kaosar, Russell Paulet, and Elisa Bertino

Link

The Cetus Source-to-Source Compiler Infrastructure: Overview and Evaluation, Hansang Bae, Dheya Mustafa, Jaewoo Lee, Aurangzeb, Hao Lin, Chirag Dave, Rudolf Eigenmann, and Samuel Midkiff

PDF

The Palm-tree Index: Indexing with the crowd, Aamer Mahmood, Walid G. Aref, Eduard Dragut, and Saleh Basalamah

Submissions from 2012

Link

A Bayesian Approach toward Active Learning for Collaborative Filtering, Rong Jin and Luo Si

Link

A Comprehensive Model for Provenance, Salmin Sultana and Elisa Bertino

Link

A Comprehensive Model for Provenance, Salmin Sultana and Elisa Bertino

PDF

Adaptive data management for self-protecting objects in cloud computing systems, Anna Squicciarini, Giuseppe Petracca, and Elisa Bertino

Link

A Discriminative Data-Dependent Mixture-Model Approach for Multiple Instance Learning in Image Classification, Qifan Wang, Luo Si, and Dan Zhang

Link

A Distributed Access Control Architecture for Cloud Computing, Abdulrahman Almutairi, Muhammed Sarfraz, Saleh Basalamah, Walid G. Aref, and Arif Ghafoor

Link

A Flexible Approach to Multisession Trust Negotiations, Anna Squicciarini, Elisa Bertino, Alberto Trombetta, and Stefano Braghin

Link

A framework for verification and optimal reconfiguration of event-driven role based access control policies, Basit Shafiq, Jaideep Vaidya, Arif Ghafoor, and Elisa Bertino

Link

A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks, Hyo-Sang Lim, Gabriel Ghinita, Elisa Bertino, and Murat Kantarcioglu

Link

A hybrid approach of OpenMP for clusters, Okwan Kwon, Fahed Jubair, Rudolf Eigenmann, and Samuel Midkiff

Link

A Hybrid Approach to Private Record Matching, Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, and Elisa Bertino

Link

A latent pairwise preference learning approach for recommendation from implicit feedback, Yi Fang and Luo Si

Link

An Access Control Framework for WS-BPEL Processes, Federica Paci, Elisa Bertino, and Jason Crampton

Link

An Analytic Approach to People Evaluation in Crowdsourcing Systems, Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Seyed-Mehdi-Reza Beheshti, and Elisa Bertino

Link

An energy-efficient approach for provenance transmission in wireless sensor networks, S.M.I. Alam and Sonia Fahmy

Link

ARES Conference - Message from ARES Conference Officers, Elisa Bertino, A Min Tjoa, and Gerald Quirchmayr

Link

A role-involved purpose-based access control model, Md. Enamul Kabir, Hua Wang, and Elisa Bertino

PDF

ARTL@ S and BasArt: A loose coupling strategy for digital humanities, Sorin Matei

PDF

Authenticated Top-K Aggregation in Distributed and Authenticated Top-K Aggregation in Distributed and, Sunoh Choi, Hyo-Sang Lim, and Elisa Bertino

Link

Auxin and ABA act as central regulators of developmental networks associated with paradormancy in Canada thistle (Cirsium arvense)., JV Anderson, M Dogramaci, DP Horvath, ME Foley, WS Chao, JC Suttle, Jyothi Thimmapuram, AG Hernandez, S Ali, and MA Mikel

Link

Collaborative Computing: Networking, Applications and Worksharing, James Joshi, Elisa Bertino, Calton Pu, and Heri Ramampiaro