The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.
This series contains publications published through The Cyber Center at Purdue University.
Submissions from 2010
Privilege States Based Access Control for Fine-Grained Intrusion Response, Ashish Kamra and Elisa Bertino
Privometer: Privacy protection in social networks, Nilothpal Talukder, Mourad Ouzzani, Ahmed Elmagarmid, and Hazem Elmeleegy
Probabilistic Answer Ranking Models for Multilingual QA: Independent Prediction Model and Joint Prediction Model, Jeongwoo Ko, Luo Si, Eric Nyberg, and Teruko Mitamura
Provenance-based trustworthiness assessment in sensor networks, Hyo-Sang Lim, Yang-Sae Moon, and Elisa Bertino
Publishing Time-Series Data under Preservation of Privacy and Distance Orders, Yang-Sae Moon, Hea-Suk Kim, Sang-Pil Kim, and Elisa Bertino
Purdue at TREC 2010 Entity Track: A Probabilistic Framework for Matching Types Between Candidate and Target Entities, Yi Fang, Luo Si, and Aditya P. Mathur
Risk-based access control systems built on fuzzy inferences, Qun Ni, Elisa Bertino, and Jorge Lobo
SimDB: a similarity-aware database system, Yasin Silva, Ahmed Aly, Walid G. Aref, and Per-Ake Larson
Spatio-Temporal Access Methods: Part 2 (2003 - 2010), Long-Van Nguyen-Dinh, Walid G. Aref, and Mohamed Mokbel
Supporting real-world activities in database management systems, Mohamed Eltabakh, Walid G. Aref, Ahmed Elmagarmid, Yasin Silva, and Mourad Ouzzani
Supporting views in data stream management systems, Thanaa Ghanem, Ahmed Elmagarmid, Per-Ake Larson, and Walid G. Aref
The similarity join database operator, Yasin Silva, Walid G. Aref, and Mohamed Ali
Submissions from 2009
Access control policy combining: theory meets practice, Ninghui Li, Qihua Wang, Wahbeh Qardaji, and Elisa Bertino
A Characterization of the problem of secure provenance management, Shouhuai Xu, Qun Ni, Elisa Bertino, and Ravi Sandhu
A comprehensive simulation tool for the analysis of password policies, Richard Shay and Elisa Bertino
Adaptive Management of Multigranular Spatio-Temporal Object Attributes, Elena Camossi, Elisa Bertino, Giovanna Guerrini, and Michela Bertolotto
A distributed approach to enabling privacy-preserving model-based classifier training, Hangzai Luo, Xiaodong Lin, Aoying Zhou, and Elisa Bertino
A framework for efficient data anonymization under privacy and accuracy constraints, Gabriel Ghinita, Panagiotis Karras, Panos Kalnis, and Nikos Mamoulis
A Hierarchical Approach to Model Web Query Interfaces for Web Source Integration, Thomas Kabisch, Eduard Dragut, Clement Yu, and Ulf Leser
A Hybrid Technique for Private Location-Based Queries with Database Protection, Gabriel Ghinita, Panos Kalnis, Kantarcioglu Kantarcioglu, and Elisa Bertino
An Access Control Language for a General Provenance Model, Qun Ni, Shouhuai Xu, Elisa Bertino, and Ravi Sandhu
An algebra for fine-grained integration of XACML policies, Prathima Rao, Dan Lin, Elisa Bertino, and Ninghui Li
An Interoperable Approach to Multifactor Identity Verification, Federica Paci, Rodolfo Ferrini, Andrea Musci, and Kevin Steuer Jr
An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices, Federica Paci, Elisa Bertino, Sam Kerr, Anna Squicciarini, and Jungha Woo
Assessing the trustworthiness of location data based on provenance, Chenyun Dai, Hyo-Sang Lim, Elisa Bertino, and Yang-Sae Moon