The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.
This series contains publications published through The Cyber Center at Purdue University.
Submissions from 2009
Assured information sharing: concepts and issues, Elisa Bertino
Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk, Guy Lebanon, Monica Scannapieco, Mohamed Fouad, and Elisa Bertino
Casper: Query processing for location services without compromising privacy, Chin-Yin Chow, Mohamed Mokbel, and Walid G. Aref
Chameleon: Context-Awareness inside DBMSs, Hicham Elmongui, Walid G. Aref, and Mohamed Mokbel
Collaborative Computing: Networking, Applications and Worksharing-A structure preserving approach for securing XML documents, Elisa Bertino and Mohamed Nabeel
Correctness Criteria Beyond Serializability, Mourad Ouzzani, Brahim Medjahed, and Ahmed Elmagarmid
D-algebra for composing access control policy decisions, Qun Ni, Elisa Bertino, and Jorge Lobo
Deriving Customized Integrated Web Query Interfaces, Eduard Dragut, Fang Fang, Clement Yu, and Weiyi Meng
Diversity and Strain Specificity of Plant Cell Wall Degrading Enzymes Revealed by the Draft Genome of Ruminococcus flavefaciens FD-1, Margret E. Berg Miller, Dionysios A. Antonopoulos, Mark Brand, Albert Bari, Alvaro Hernandez, Jyothi Thimmapuram, Bryan A. White, Marco Rincon, Harry J. Flint, Bernard Henrissat, and Pedro M. Coutinho
Efficient integration of fine-grained access control and resource brokering in grid, Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, and Elisa Bertino
Efficient Private Record Linkage, Mohamed Yakout, Mikhail J. Atallah, and Ahmed Elmagarmid
Electronic Ink Indexing, Walid G. Aref
Exploiting similarity-aware grouping in decision support systems, Yasin Silva, Muhammed Arshad, and Walid G. Aref
FALCON: a system for reliable checkpoint recovery in shared grid environments, Tanzima Zerin Islam, Saurabh Bagchi, and Rudolf Eigenmann
Foreword for the special issue of selected papers from the 1st ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS, Elisa Bertino and Maria Luisa Damiani
Generalization of ACID Properties, Brahim Medjahed, Mourad Ouzzani, and Ahmed Elmagarmid
Guest Editorial: Special Section on Service-Oriented Distributed Computing Systems, Elisa Bertino and William Cheng-Chung Chu
Guest Editors’ Introduction - Parallel Programming, Rudolf Eigenmann and Eduard Ayguade
Hippocratic PostgreSQL, J Padma, Yasin Silva, Mohamed Arshad, and Walid G. Aref
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes, Federica Paci, Rodolfo Ferrini, and Elisa Bertino
Indexing Historical Spatio-Temporal Data, Mohamed Mokbel and Walid G. Aref
Interactive Location Cloaking with the PROBE Obfuscator, Gabriel Ghinita, Maria Luisa Damiani, Elisa Bertino, and Claudio Silvestri
L'Elimination de la subjectivité dans la recommandation de confiance, Omar Hasan, Lionel Brunie, Jean-Marc Pierson, and Elisa Bertino
Location-Aware Authentication and Access Control, Elisa Bertino and Michael Kirkpatrick
Location Privacy in Moving-Object Environments, Dan Lin, Elisa Bertino, Reynold Cheng, and Sunil Prabhakar