The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.
This series contains publications published through The Cyber Center at Purdue University.
Submissions from 2010
Controlling data disclosure in computational PIR protocols, Ning Shang, Gabriel Ghinita, Yongbin Zhou, and Elisa Bertino
Credibility-enhanced curated database: Improving the value of curated databases, Qun Ni and Elisa Bertino
Detecting Students’ Off-Task Behavior in Intelligent Tutoring Systems with Machine Learning Techniques, Suleyman Cetintas, Luo Si, Yan Ping Xin, and Casey Hord
Discriminative Graphical Models for Joint Faculty Homepage Discovery, Yi Fang, Luo Si, and Aditya P. Mathur
Efficient and privacy-preserving enforcement of attribute-based access control, Ning Shang, Federica Paci, and Elisa Bertino
Efficient Privacy-Preserving Similar Document Detection, Mummoorthy Murugesan, Wei Jiang, Chris W. Clifton, Luo Si, and Jiadeep Vaidya
Enabling search services on outsourced private spatial data, Man Lung Yiu, Gabriel Ghinita, Christian Jensen, and Panos Kalnis
Endogenous siRNAs and noncoding RNA-derived small RNAs are expressed in adult mouse hippocampus and are up-regulated in olfactory discrimination training., Neil Smalheiser, G Lugli, Jyothi Thimmapuram, E.H. Cook, and J Larson
Enforcing spatial constraints for mobile RBAC systems, Michael Kirkpatrick and Elisa Bertino
EXAM: a comprehensive environment for the analysis of access control policies, Dan Lin, Prathima Rao, Elisa Bertino, and Ninghui Li
FENCE: Continuous access control enforcement in dynamic data stream environments, Rimma Nehme, Hyo-Sang Lim, and Elisa Bertino
GDR: a system for guided data repair, Mohamed Yakout, Ahmed Elmagarmid, Jennifer Neville, and Mourad Ouzzani
Group-Based Negotiations in P2P Systems, Anna Squicciarini, Federica Paci, Elisa Bertino, and Alberto Trombetta
Guest Editors' Introduction: Data Quality in the Internet Era, Elisa Bertino, Andrea Maurino, and Monica Scannapieco
How to authenticate graphs without leaking, Ashish Kundu and Elisa Bertino
Learning to Identify Students’ Relevant and Irrelevant Questions in a Micro-blogging Supported Classroom, Suleyman Cetintas, Luo Si, Sugato Chakravarty, Hans Aagard, and Kyle Bowen
Mask: a system for privacy-preserving policy-based access to published content, Mohamed Nabeel, Ning Shang, John Zage, and Elisa Bertino
Micro-Blogging in Classroom: Classifying Students’ Relevant and Irrelevant Questions in a Micro-Blogging Supported Classroom, Suleyman Cetintas, Luo Si, Hans Aagard, Kyle Bowen, and M Cordova-Sanchez
OpenMPC: Extended OpenMP Programming and Tuning for GPUs, Seyong Lee and Rudolf Eigenmann
Policy-Driven Service Composition with Information Flow Control, Wei She, I-Ling Yen, Bhavani Thuraisingham, and Elisa Bertino
Predicting Correctness of Problem Solving in ITS with a Temporal Collaborative Filtering Approach, Suleyman Cetintas, Luo Si, Yan Ping Xin, and Casey Hord
Preserving privacy and fairness in peer-to-peer data integration, Hazem Elmeleegy, Mourad Ouzzani, Ahmed Elmagarmid, and Ahmad Abusalah
Privacy-Aware Location-Aided Routing in Mobile Ad Hoc Networks, Gabriel Ghinita, Mehdi Azarmi, and Elisa Bertino
Privacy-aware role-based access control, Qun Ni, Elisa Bertino, Jorge Lobo, and Carolyn Brodie
Private record matching using differential privacy, Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, and Elisa Bertino