The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2010

Link

Privilege States Based Access Control for Fine-Grained Intrusion Response, Ashish Kamra and Elisa Bertino

PDF

Privometer: Privacy protection in social networks, Nilothpal Talukder, Mourad Ouzzani, Ahmed Elmagarmid, and Hazem Elmeleegy

Link

Probabilistic Answer Ranking Models for Multilingual QA: Independent Prediction Model and Joint Prediction Model, Jeongwoo Ko, Luo Si, Eric Nyberg, and Teruko Mitamura

Link

Provenance-based trustworthiness assessment in sensor networks, Hyo-Sang Lim, Yang-Sae Moon, and Elisa Bertino

Link

Publishing Time-Series Data under Preservation of Privacy and Distance Orders, Yang-Sae Moon, Hea-Suk Kim, Sang-Pil Kim, and Elisa Bertino

Link

Purdue at TREC 2010 Entity Track: A Probabilistic Framework for Matching Types Between Candidate and Target Entities, Yi Fang, Luo Si, and Aditya P. Mathur

Link

Risk-based access control systems built on fuzzy inferences, Qun Ni, Elisa Bertino, and Jorge Lobo

Link

SimDB: a similarity-aware database system, Yasin Silva, Ahmed Aly, Walid G. Aref, and Per-Ake Larson

PDF

Spatio-Temporal Access Methods: Part 2 (2003 - 2010), Long-Van Nguyen-Dinh, Walid G. Aref, and Mohamed Mokbel

Link

Supporting real-world activities in database management systems, Mohamed Eltabakh, Walid G. Aref, Ahmed Elmagarmid, Yasin Silva, and Mourad Ouzzani

Link

Supporting views in data stream management systems, Thanaa Ghanem, Ahmed Elmagarmid, Per-Ake Larson, and Walid G. Aref

Link

The similarity join database operator, Yasin Silva, Walid G. Aref, and Mohamed Ali

Submissions from 2009

Link

Access control policy combining: theory meets practice, Ninghui Li, Qihua Wang, Wahbeh Qardaji, and Elisa Bertino

Link

A Characterization of the problem of secure provenance management, Shouhuai Xu, Qun Ni, Elisa Bertino, and Ravi Sandhu

Link

A comprehensive simulation tool for the analysis of password policies, Richard Shay and Elisa Bertino

Link

Adaptive Management of Multigranular Spatio-Temporal Object Attributes, Elena Camossi, Elisa Bertino, Giovanna Guerrini, and Michela Bertolotto

Link

A distributed approach to enabling privacy-preserving model-based classifier training, Hangzai Luo, Xiaodong Lin, Aoying Zhou, and Elisa Bertino

Link

A framework for efficient data anonymization under privacy and accuracy constraints, Gabriel Ghinita, Panagiotis Karras, Panos Kalnis, and Nikos Mamoulis

PDF

A Hierarchical Approach to Model Web Query Interfaces for Web Source Integration, Thomas Kabisch, Eduard Dragut, Clement Yu, and Ulf Leser

Link

A Hybrid Technique for Private Location-Based Queries with Database Protection, Gabriel Ghinita, Panos Kalnis, Kantarcioglu Kantarcioglu, and Elisa Bertino

Link

An Access Control Language for a General Provenance Model, Qun Ni, Shouhuai Xu, Elisa Bertino, and Ravi Sandhu

Link

An algebra for fine-grained integration of XACML policies, Prathima Rao, Dan Lin, Elisa Bertino, and Ninghui Li

Link

An Interoperable Approach to Multifactor Identity Verification, Federica Paci, Rodolfo Ferrini, Andrea Musci, and Kevin Steuer Jr

Link

An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices, Federica Paci, Elisa Bertino, Sam Kerr, Anna Squicciarini, and Jungha Woo

Link

Assessing the trustworthiness of location data based on provenance, Chenyun Dai, Hyo-Sang Lim, Elisa Bertino, and Yang-Sae Moon