Scholarly papers authored faculty from the Department of Computer Science at Purdue University.

Follow

Submissions from 2012

PDF

Matching Phosphorylation Response Patterns of Antigen-Receptor-Stimulated T Cells Via Flow Cytometry, Ariful Azad, Saumyadipta Pyne, and Alex Pothen

Submissions from 2011

PDF

Privacy-Preserving Assessment of Location Data Trustworthiness, Chenyun Dai, Fang-Yu Rao, Gabriel Ghinita, and Elisa Bertino

Link

A conditional purpose-based access control model with dynamic roles, Enamul Kabir, Hua Wang, and Elisa Bertino

Link

Efficient systematic clustering method for k-anonymization, Enamul Kabir, Hua Wang, and Elisa Bertino

PDF

Two approximate Minkowski sum algorithms, Victor Milenkovic and Elisha P. Sacks

Link

Fine-grained integration of access control policies, Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, and Jorge Lobo

PDF

Controlled linear perturbation, Elisha P. Sacks, Victor Milenkovic, and Min-Ho Kyung

Link

Trust establishment in the formation of Virtual Organizations, Anna Squicciarini, Federica Paci, and Elisa Bertino

Submissions from 2010

Link

A General Framework for Web Content Filtering, Elisa Bertino, Elena Ferrari, and Andrea Perego

Link

Assuring Data Trustworthiness - Concepts and Research Challenges, Elisa Bertino and Hyo-Sang Lim

Link

Guest Editors' Introduction: Data Quality in the Internet Era, Elisa Bertino, Andrea Maurino, and Monica Scannapieco

Link

Biometrics-based identifiers for digital identity management, Abhilasha Bhargav-Spantzel, Anna Squicciarini, Elisa Bertino, and Xiangwei Kong

Link

A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations, Sunoh Choi, Gabriel Ghinita, and Elisa Bertino

Link

A secure multiparty computation privacy preserving OLAP framework over distributed XML data, Alfredo Cuzzocrea and Elisa Bertino

Link

Preserving privacy and fairness in peer-to-peer data integration, Hazem Elmeleegy, Mourad Ouzzani, Ahmed Elmagarmid, and Ahmad Abusalah

PDF

A database server for next-generation scientific data management, Mohamed Eltabakh, Walid G. Aref, and Ahmed Elmagarmid

Link

Supporting real-world activities in database management systems, Mohamed Eltabakh, Walid G. Aref, Ahmed Elmagarmid, Yasin Silva, and Mourad Ouzzani

Link

Supporting views in data stream management systems, Thanaa Ghanem, Ahmed Elmagarmid, Per-Ake Larson, and Walid G. Aref

Link

Privacy-Aware Location-Aided Routing in Mobile Ad Hoc Networks, Gabriel Ghinita, Mehdi Azarmi, and Elisa Bertino

Link

Private record matching using differential privacy, Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, and Elisa Bertino

Link

Privilege States Based Access Control for Fine-Grained Intrusion Response, Ashish Kamra and Elisa Bertino

Link

Enforcing spatial constraints for mobile RBAC systems, Michael Kirkpatrick and Elisa Bertino

Link

How to authenticate graphs without leaking, Ashish Kundu and Elisa Bertino

Link

Provenance-based trustworthiness assessment in sensor networks, Hyo-Sang Lim, Yang-Sae Moon, and Elisa Bertino

Link

EXAM: a comprehensive environment for the analysis of access control policies, Dan Lin, Prathima Rao, Elisa Bertino, and Ninghui Li

PDF

A Visual Analytics Approach to Understanding Spatiotemporal Hotspots, Ross Maciejewski, Stephen Rudolph, Ryan Hafen, Ahmad Abusalah, Mohamed Yakout, Mourad Ouzzani, William S. Cleveland, Shaun Grannis, and David S. Ebert

Link

Publishing Time-Series Data under Preservation of Privacy and Distance Orders, Yang-Sae Moon, Hea-Suk Kim, Sang-Pil Kim, and Elisa Bertino

Link

Mask: a system for privacy-preserving policy-based access to published content, Mohamed Nabeel, Ning Shang, John Zage, and Elisa Bertino

Link

FENCE: Continuous access control enforcement in dynamic data stream environments, Rimma Nehme, Hyo-Sang Lim, and Elisa Bertino

PDF

Spatio-Temporal Access Methods: Part 2 (2003 - 2010), Long-Van Nguyen-Dinh, Walid G. Aref, and Mohamed Mokbel

Link

Credibility-enhanced curated database: Improving the value of curated databases, Qun Ni and Elisa Bertino

Link

Risk-based access control systems built on fuzzy inferences, Qun Ni, Elisa Bertino, and Jorge Lobo

Link

Privacy-aware role-based access control, Qun Ni, Elisa Bertino, Jorge Lobo, and Carolyn Brodie

Link

Controlling data disclosure in computational PIR protocols, Ning Shang, Gabriel Ghinita, Yongbin Zhou, and Elisa Bertino

Link

A privacy-preserving approach to policy-based content dissemination, Ning Shang, Mohamed Nabeel, Federica Paci, and Elisa Bertino

Link

Efficient and privacy-preserving enforcement of attribute-based access control, Ning Shang, Federica Paci, and Elisa Bertino

Link

Policy-Driven Service Composition with Information Flow Control, Wei She, I-Ling Yen, Bhavani Thuraisingham, and Elisa Bertino

Link

SimDB: a similarity-aware database system, Yasin Silva, Ahmed Aly, Walid G. Aref, and Per-Ake Larson

Link

The similarity join database operator, Yasin Silva, Walid G. Aref, and Mohamed Ali

Link

Group-Based Negotiations in P2P Systems, Anna Squicciarini, Federica Paci, Elisa Bertino, and Alberto Trombetta

PDF

Privometer: Privacy protection in social networks, Nilothpal Talukder, Mourad Ouzzani, Ahmed Elmagarmid, and Hazem Elmeleegy

Link

GDR: a system for guided data repair, Mohamed Yakout, Ahmed Elmagarmid, Jennifer Neville, and Mourad Ouzzani

Submissions from 2009

Link

Electronic Ink Indexing, Walid G. Aref

Link

Window-based Query Processing, Walid G. Aref

Link

Assured information sharing: concepts and issues, Elisa Bertino

Link

Privacy-preserving techniques for location-based services, Elisa Bertino

Link

Multi-granular Spatio-temporal Object Models: Concepts and Research Directions, Elisa Bertino, Elena Camossi, and Michela Bertolotto

Link

Guest Editorial: Special Section on Service-Oriented Distributed Computing Systems, Elisa Bertino and William Cheng-Chung Chu

Link

Privacy Preserving OLAP over Distributed XML Documents, Elisa Bertino and Alfredo Cuzzocrea

Link

The Challenge of Assuring Data Trustworthiness, Elisa Bertino, Chenyun Dai, and Murat Kantarcioglu

PDF

Foreword for the special issue of selected papers from the 1st ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS, Elisa Bertino and Maria Luisa Damiani

Link

Measuring the structural similarity among XML documents and DTDs, Elisa Bertino, Giovanna Guerrini, and Michela Bertolotto

Link

Location-Aware Authentication and Access Control, Elisa Bertino and Michael Kirkpatrick

Link

Collaborative Computing: Networking, Applications and Worksharing-A structure preserving approach for securing XML documents, Elisa Bertino and Mohamed Nabeel

Link

Privacy-preserving Digital Identity Management for Cloud Computing, Elisa Bertino, Federica Paci, Rodolfo Ferrini, and Ning Shang

Link

Multi-dimensional phenomenon-aware stream query processing, Ashish Bindra, Ankur Teredesai, Mohamed Ali, and Walid G. Aref

Link

Privacy-preserving incremental data dissemination, Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, and Yonglak Sohn

Link

Adaptive Management of Multigranular Spatio-Temporal Object Attributes, Elena Camossi, Elisa Bertino, Giovanna Guerrini, and Michela Bertolotto

Link

Security Analysis of the SASI Protocol, Tianjie Cao, Elisa Bertino, and Hong Lei

Link

Casper: Query processing for location services without compromising privacy, Chin-Yin Chow, Mohamed Mokbel, and Walid G. Aref

Link

Assessing the trustworthiness of location data based on provenance, Chenyun Dai, Hyo-Sang Lim, Elisa Bertino, and Yang-Sae Moon

Link

Query Processing Techniques for Compliance with Data Confidence Policies, Chenyun Dai, Dan Lin, Murat Kantarcioglu, and Elisa Bertino

PDF

Online Piece-wise Linear Approximation of Numerical Streams with Precision Guarantees, Hazem Elmeleegy, Ahmed Elmagarmid, Emmanuel Cecchet, Walid G. Aref, and Willy Zwaenepoel

Link

Chameleon: Context-Awareness inside DBMSs, Hicham Elmongui, Walid G. Aref, and Mohamed Mokbel

Link

Supporting annotations on relations, Mohamed Eltabakh, Walid G. Aref, Ahmed Elmagarmid, Mourad Ouzzani, and Yasin Silva

Link

Supporting RBAC with XACML+OWL, Rodolfo Ferrini and Elisa Bertino

Link

Interactive Location Cloaking with the PROBE Obfuscator, Gabriel Ghinita, Maria Luisa Damiani, Elisa Bertino, and Claudio Silvestri

Link

Preventing velocity-based linkage attacks in location-aware applications, Gabriel Ghinita, Maria Luisa Damiani, Claudio Silvestri, and Elisa Bertino

Link

A Hybrid Technique for Private Location-Based Queries with Database Protection, Gabriel Ghinita, Panos Kalnis, Kantarcioglu Kantarcioglu, and Elisa Bertino

Link

L'Elimination de la subjectivité dans la recommandation de confiance, Omar Hasan, Lionel Brunie, Jean-Marc Pierson, and Elisa Bertino

Link

Using Anonymized Data for Classification, Ali Inan, Murat Kantarcioglu, and Elisa Bertino

Link

Physically restricted authentication with trusted hardware, Michael Kirkpatrick and Elisa Bertino

PDF

Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk, Guy Lebanon, Monica Scannapieco, Mohamed Fouad, and Elisa Bertino

Link

The Design and Evaluation of Accountable Grid Computing System, Wonjun Lee, Anna Squicciarini, and Elisa Bertino

PDF

Location Privacy in Moving-Object Environments, Dan Lin, Elisa Bertino, Reynold Cheng, and Sunil Prabhakar

Link

Access control policy combining: theory meets practice, Ninghui Li, Qihua Wang, Wahbeh Qardaji, and Elisa Bertino

Link

A distributed approach to enabling privacy-preserving model-based classifier training, Hangzai Luo, Xiaodong Lin, Aoying Zhou, and Elisa Bertino

Link

Security for Web Services: Standards and Research Issues, Lorenzo D. Martino and Elisa Bertino

Link

Scalable and Effective Test Generation for Role-Based Access Control Systems, Ammar Masood, Rafae Bhatti, Arif Ghafoor, and Aditya P. Mathur

Link

Efficient integration of fine-grained access control and resource brokering in grid, Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, and Elisa Bertino

PDF

Generalization of ACID Properties, Brahim Medjahed, Mourad Ouzzani, and Ahmed Elmagarmid

Link

Indexing Historical Spatio-Temporal Data, Mohamed Mokbel and Walid G. Aref

Link

Space-Filling Curves for Query Processing, Mohamed Mokbel and Walid G. Aref

Link

StreamShield: a stream-centric approach towards security and privacy in data stream environments, Rimma Nehme, Hyo-Sang Lim, Elisa Bertino, and Elke Rundensteiner

Link

Self-tuning query mesh for adaptive multi-route query processing, Rimma Nehme, Elke Rundensteiner, and Elisa Bertino

PDF

Query Mesh: MultiRoute, Rimma Nehme, Karen Works, Elke Rundensteiner, and Elisa Bertino

Link

D-algebra for composing access control policy decisions, Qun Ni, Elisa Bertino, and Jorge Lobo

Link

An Access Control Language for a General Provenance Model, Qun Ni, Shouhuai Xu, Elisa Bertino, and Ravi Sandhu

Link

Correctness Criteria Beyond Serializability, Mourad Ouzzani, Brahim Medjahed, and Ahmed Elmagarmid

Link

An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices, Federica Paci, Elisa Bertino, Sam Kerr, Anna Squicciarini, and Jungha Woo

Link

Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes, Federica Paci, Rodolfo Ferrini, and Elisa Bertino

Link

Privacy-preserving management of transactions' receipts for mobile environments, Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer Jr, Jungha Woo, and Elisa Bertino

Link

Hippocratic PostgreSQL, J Padma, Yasin Silva, Mohamed Arshad, and Walid G. Aref

Link

Visualization for Access Control Policy Analysis Results Using Multi-level Grids, Prathima Rao, Gabriel Ghinita, Elisa Bertino, and Jorge Lobo

Link

An algebra for fine-grained integration of XACML policies, Prathima Rao, Dan Lin, Elisa Bertino, and Ninghui Li

Link

Workshop Organizers’ Message, Shazia Sadiq, Ke Deng, Xiaofang Zhou, Xiaochun Yang, Walid G. Aref, Alex Delis, Qing Liu, and Kai Xu

Link

A comprehensive simulation tool for the analysis of password policies, Richard Shay and Elisa Bertino

Link

The SCIFC Model for Information Flow Control in Web Service Composition, Wei She, I-Ling Yen, Bhavani Thuraisingham, and Elisa Bertino

Link

Similarity Group-By, Yasin Silva, Walid G. Aref, and Mohamed Ali

Link

Exploiting similarity-aware grouping in decision support systems, Yasin Silva, Muhammed Arshad, and Walid G. Aref