Scholarly papers authored faculty from the Department of Computer Science at Purdue University.

Follow

Submissions from 2009

Link

Specification and enforcement of flexible security policy for active cooperation, Yuqing Sun, Bin Gong, Xiangxu Meng, Zongkai Lin, and Elisa Bertino

Privacy-Preserving Accountable Accuracy Management Systems (PAAMS), Roshan Thomas, Ravi Sandhu, Elisa Bertino, Budak Arpinar, and Shouhuai Xu

Link

A Characterization of the problem of secure provenance management, Shouhuai Xu, Qun Ni, Elisa Bertino, and Ravi Sandhu

Link

Efficient Private Record Linkage, Mohamed Yakout, Mikhail J. Atallah, and Ahmed K. Elmagarmid

Submissions from 2008

Link

Data management challenges for computational transportation, Walid G. Aref and Mourad Ouzzani

Link

The leaf ionome as a multivariable system to detect a plant's physiological status, Ivan Baxter, Olga Vitek, Brett Lahner, Balasubramaniam Muthukumar, Monica Borghi, Joe Morrissey, May Lou Guerinot, and David Salt

Link

High-Assurance Integrity Techniques for Databases, Elisa Bertino, Chenyun Dai, Hyo-Sang Lim, and Dan Lin

Link

A Federated Digital Identity Management Approach for Business Processes, Elisa Bertino, Rodolfo Ferrini, Andrea Musci, Federica Paci, and Kevin Steuer Jr

Link

Object-Oriented Databases, Elisa Bertino and Giovanna Guerrini

Link

An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting, Elisa Bertino, Ning Shang, and Samuel S. Wagstaff Jr

Link

Security and privacy for geospatial data: concepts and research directions, Elisa Bertino, Bhavani Thuraisingham, Michael Gertz, and Maria Luisa Damiani

Link

Multigranular spatio-temporal models: implementation challenges, Elena Camossi, Michela Bertolotto, and Elisa Bertino

Link

Querying Multigranular Spatio-temporal Objects, Elena Camossi, Michela Bertolotto, and Elisa Bertino

Link

Cryptanalysis of Some RFID Authentication Protocols, Tianjie Cao, Peng Shen, and Elisa Bertino

Link

An Approach to Evaluate Data Trustworthiness Based on Data Provenance, Chenyun Dai, Dan Lin, Elisa Bertino, and Murat Kantarcioglu

Link

Spatial Domains for the Administration of Location-based Access Control Policies, Maria Luisa Damiani, Elisa Bertino, and Claudio Silvestri

Link

Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems, Maria Luisa Damiani, Claudio Silvestri, and Elisa Bertino

Link

Community-Cyberinfrastructure-Enabled Discovery in Science and Engineering, Ahmed K. Elmagarmid, Arjmand Samuel, and Mourad Ouzzani

Link

Usage-Based Schema Matching, Hazem Elmeleegy, Mourad Ouzzani, and Ahmed K. Elmagarmid

Link

The SBC-tree: an index for run-length compressed sequences, Mohamed Eltabakh, Wing-Kai Hon, Rahul Shah, Walid G. Aref, and Jeffrey S. Vitter

Link

The SBC-tree: an index for run-length compressed sequences, Mohamed Eltabakh, Wing-Kai Hon, Rahul Shah, Walid G. Aref, and Jeffrey S. Vitter

Link

Managing Biological Data using bdbms, Mohamed Eltabakh, Mourad Ouzzani, Walid G. Aref, Ahmed K. Elmagarmid, Yasin Silva, Mohamed Arshad, David Salt, and Ivan Baxter

Link

Managing Biological Data using bdbms, Mohamed Eltabakh, Mourad Ouzzani, Walid G. Aref, Ahmed K. Elmagarmid, Yasin Silva, Muhammed Arshad, David Salt, and Ivan Baxter

Link

ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure, Mohamed Fouad, Guy Lebanon, and Elisa Bertino

Link

A Hybrid Approach to Private Record Linkage, Ali Inan, Murat Kantarcioglu, Elisa Bertino, and Maria Scannapieco

Link

Formal foundations for hybrid hierarchies in GTRBAC, James Joshi, Elisa Bertino, Arif Ghafoor, and Yue Zhang

Link

Database Intrusion Detection and Response, Ashish Kamra and Elisa Bertino

Link

Responding to Anomalous Database Requests, Ashish Kamra, Elisa Bertino, and Rimma Nehme

Link

Detecting anomalous access patterns in relational databases, Ashish Kamra, Evimaria Terzi, and Elisa Bertino

Link

Detecting anomalous access patterns in relational databases, Ashish Kamra, Evimaria Terzi, and Elisa Bertino

Link

Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries, Yunhua Koglin, Denfeng Yao, and Elisa Bertino

Link

A New Model for Secure Dissemination of XML Content, Ashish Kundu and Elisa Bertino

Link

Structural Signatures for Tree Data Structures, Ashish Kundu and Elisa Bertino

Link

Position transformation: a location privacy protection method for moving objects, Dan Lin, Elisa Bertino, Reynold Cheng, and Sunil Prabhakar

Link

Policy decomposition for collaborative access control, Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, and Jorge Lobo

Link

XACML Policy Integration Algorithms, Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, and Elisa Bertino

Link

Space-Filling Curves, Mohamed Mokbel and Walid G. Aref

Link

Mining roles with semantic meanings, Ian Molloy, Hong Chen, Tiancheng Li, Elisa Bertino, Seraphin Calo, and Jorge Lobo

Link

Secure Delta-Publishing of XML Content, Mohamed Nabeel and Elisa Bertino

Link

A Security Punctuation Framework for Enforcing Access Control on Streaming Data, Rimma Nehme, Elisa Bertino, and Elke Rundensteiner

Link

An obligation model bridging access control policies and privacy policies, Qun Ni, Elisa Bertino, and Jorge Lobo

Link

Minimal credential disclosure in trust negotiations, Federica Paci, David Bauer, Elisa Bertino, Douglas Blough, and Anna Squicciarini

Link

An Access-Control Framework for WS-BPEL, Federica Paci, Elisa Bertino, and Jason Crampton

Link

VeryIDX - A Digital Identity Management System for Pervasive Computing Environments, Federica Paci, Elisa Bertino, Sam Kerr, Aaron Lint, Anna Squicciarini, and Jungha Woo

Link

Authorization and User Failure Resiliency for WS-BPEL Business Processes, Federica Paci, Rodolfo Ferrini, Yuqing Sun, and Elisa Bertino

Link

EXAM: An Environment for Access Control Policy Analysis and Management, Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, and Jorge Lobo

Link

Context-Aware Adaptation of Access-Control Policies, Arjmand Samuel, Arif Ghafoor, and Elisa Bertino

PDF

Proactive Role Discovery in Mediator-Free Environments, Mohamed Shehab, Elisa Bertino, and Arif Ghafoor

Link

Watermarking Relational Databases Using Optimization-Based Techniques, Mohamed Shehab, Elisa Bertino, and Arif Ghafoor

Link

Secure Collaboration in a Mediator-Free Distributed Environment, Mohamed Shehab, Arif Ghafoor, and Elisa Bertino

Link

A Policy-Based Accountability Tool for Grid Computing Systems, Anna Squicciarini, Wonjun Lee, Elisa Bertino, and Carol Song

Link

Automatic Compliance of Privacy Policies in Federated Digital Identity Management, Anna Squicciarini, Marco Casassa Mont, Abhilasha Bhargav-Spantzel, and Elisa Bertino

Link

Trust establishment in the formation of Virtual Organizations, Anna Squicciarini, Federica Paci, and Elisa Bertino

Link

Protecting Databases from Query Flood Attacks, Anna Squicciarini, Ivan Paloscia, and Elisa Bertino

Link

Identity-based long running negotiations, Anna Squicciarini, Alberto Trombetta, Elisa Bertino, and Stefano Braghin

Link

Privately Updating Suppression and Generalization based k-Anonymous Databases, Alberto Trombetta, Wei Jiang, Elisa Bertino, and Lorenzo Bossi

Link

P-CDN: Extending access control capabilities of P2P systems to provide CDN services, Fatih Turkmen, Pietro Mazzoleni, Bruno Crispo, and Elisa Bertino

Link

Verification of Receipts from M-commerce Transactions on NFC Cellular Phones, Jungha Woo, Abhilasha Bhargav-Spantzel, Anna Squicciarini, and Elisa Bertino

Link

Anonymous Geo-Forwarding in MANETs through Location Cloaking, Xiaoxin Wu, Jun Liu, Xiaoyan Hong, and Elisa Bertino

Link

Continuous Queries in Spatio-temporal Databases, Xiaopeng Xiong, Mohamed Mokbel, and Walid G. Aref

Link

Spatio-temporal Database, Xiaopeng Xiong, Mohamed Mokbel, and Walid G. Aref

Link

Continuous Intersection Joins Over Moving Objects, Rui Zhang, Dan Lin, Kotagiri Ramamohanarao, and Elisa Bertino

Link

A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing, Xukai Zou, Yuan-Shun Dai, and Elisa Bertino

Submissions from 2007

Link

Phenomenon-Aware Stream Query Processing, Mohamed Ali, Mohamed Mokbel, and Walid G. Aref

Link

A roadmap for comprehensive online privacy policy management, Annie Anton, Elisa Bertino, Ninghui Li, and Ting Yu

Link

Pipelined spatial join processing for quadtree-based indexes, Walid G. Aref

Link

Challenges of Testing Web Services and Security in SOA Implementations, Abbie Barbir, Chris Hobbs, Elisa Bertino, Frederick Hirsch, and Lorenzo D. Martino

Link

Collaborative Computing: Networking, Applications and Worksharing, 2007. CollaborateCom 2007. International Conference on, Elisa Bertino

Link

A system for securing push-based distribution of XML documents, Elisa Bertino, Elena Ferrari, Federica Paci, and Loredana Provenza

Link

Profiling Database Application to Detect SQL Injection Attacks, Elisa Bertino, Ashish Kamra, and James Early

Link

Trust Negotiation in Identity Management, Abhilasha Bhargav-Spantzel, Anna Squicciarini, and Elisa Bertino

Link

Privacy Requirements in Identity Management Solutions, Abhilasha Bhargav-Spantzel, Anna Squicciarini, Matthew Young, and Elisa Bertino

Link

Receipt management- transaction history based trust establishment, Abhilasha Bhargav-Spantzel, Jungha Woo, and Elisa Bertino

Link

An integrated approach to federated identity and privilege management in open systems, Rafae Bhatti, Elisa Bertino, and Arif Ghafoor

Link

A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy, Rafae Bhatti, Daniel Sanz, Elisa Bertino, and Arif Ghafoor

Link

A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy, Rafae Bhatti, Daniel Sanz, Elisa Bertino, and Arif Ghafoor

Link

Efficient k-Anonymization Using Clustering Techniques, Ji-Won Byun, Ashish Kamra, Elisa Bertino, and Ninghui Li

Link

Managing Risks in RBAC Employed Distributed Environments, Ebru Celikel, Murat Kantarcioglu, Bhavani Thuraisingham, and Elisa Bertino

Link

GEO-RBAC: A spatially aware RBAC, Maria Luisa Damiani, Elisa Bertino, Barbara Catania, and Paolo Perlasca

Link

Space-Partitioning Trees in PostgreSQL: Realization and Performance, Mohamed Eltabakh, Ramy Eltarras, and Walid G. Aref

Link

Duplicate Elimination in Space-partitioning Tree Indexes, Mohamed Eltabakh, Mourad Ouzzani, and Walid G. Aref

Link

Incremental Evaluation of Sliding-Window Queries over Data Streams, Thanaa Ghanem, Moustafa Hammad, Mohamed Mokbel, Walid G. Aref, and Ahmed K. Elmagarmid

Link

Efficient query execution on broadcasted index tree structures, Susanne E. Hambrusch, Chuan-Ming Liu, Walid G. Aref, and Sunil Prabhakar

Link

Query processing of multi-way stream window joins, Moustafa Hammad, Walid G. Aref, and Ahmed K. Elmagarmid

Link

Data Management in RFID Applications, Dan Lin, Hicham Elmongui, Elisa Bertino, and Beng Chin Ooi

Link

An approach to evaluate policy similarity, Dan Lin, Prathima Rao, Elisa Bertino, and Jorge Lobo

Link

A Critique of the ANSI Standard on Role-Based Access Control, Ninghui Li, Ji-Won Byun, and Elisa Bertino

Link

LAHVA: Linked Animal-Human Health Visual Analytics, Ross Maciejewski, Benjamin Tyner, Yun Jang, Cheng Zheng, Rimma Nehme, David S. Ebert, William S. Cleveland, Mourad Ouzzani, Shaun Grannis, and Lawrence Glickman

Link

Location-Aware Query Processing and Optimization, Mohamed Mokbel and Walid G. Aref

Link

SOLE: scalable on-line execution of continuous queries on spatio-temporal data streams, Mohamed Mokbel and Walid G. Aref

Link

The New Casper: A Privacy-Aware Location-Based Database Server, Mohamed Mokbel, Chin-Yin Chow, and Walid G. Aref

Link

A structure preserving approach for securing XML documents, Mohamed Nabeel and Elisa Bertino

Link

A structure preserving approach for securing XML documents, Mohamed Nabeel and Elisa Bertino

Link

Privacy-aware role based access control, Qun Ni, Alberto Trombetta, Elisa Bertino, and Jorge Lobo

Link

XACML Function Annotations, Prathima Rao, Dan Lin, and Elisa Bertino

Link

Privacy preserving schema and data matching, Monica Scannapieco, Ilya Figotin, Elisa Bertino, and Ahmed K. Elmagarmid

Link

Password policy simulation and analysis, Richard Shay, Abhilasha Bhargav-Spantzel, and Elisa Bertino

Link

Realizing Privacy-Preserving Features in Hippocratic Databases, Yasin Silva and Walid G. Aref

Link

PP-trust-X: A system for privacy preserving trust negotiations, Anna Squicciarini, Elisa Bertino, Elena Ferrari, Federica Paci, and Bhavani Thuraisingham

Link

A System for the Specification and Enforcement of Quality-Based Authentication Policies, Anna Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, and Alexie Czeskis