The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2009

Link

Assured information sharing: concepts and issues, Elisa Bertino

PDF

Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk, Guy Lebanon, Monica Scannapieco, Mohamed Fouad, and Elisa Bertino

Link

Casper: Query processing for location services without compromising privacy, Chin-Yin Chow, Mohamed Mokbel, and Walid G. Aref

Link

Chameleon: Context-Awareness inside DBMSs, Hicham Elmongui, Walid G. Aref, and Mohamed Mokbel

Link

Collaborative Computing: Networking, Applications and Worksharing-A structure preserving approach for securing XML documents, Elisa Bertino and Mohamed Nabeel

Link

Correctness Criteria Beyond Serializability, Mourad Ouzzani, Brahim Medjahed, and Ahmed Elmagarmid

Link

D-algebra for composing access control policy decisions, Qun Ni, Elisa Bertino, and Jorge Lobo

Link

Deriving Customized Integrated Web Query Interfaces, Eduard Dragut, Fang Fang, Clement Yu, and Weiyi Meng

PDF

Diversity and Strain Specificity of Plant Cell Wall Degrading Enzymes Revealed by the Draft Genome of Ruminococcus flavefaciens FD-1, Margret E. Berg Miller, Dionysios A. Antonopoulos, Mark Brand, Albert Bari, Alvaro Hernandez, Jyothi Thimmapuram, Bryan A. White, Marco Rincon, Harry J. Flint, Bernard Henrissat, and Pedro M. Coutinho

Link

Efficient integration of fine-grained access control and resource brokering in grid, Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, and Elisa Bertino

Link

Efficient Private Record Linkage, Mohamed Yakout, Mikhail J. Atallah, and Ahmed Elmagarmid

Link

Electronic Ink Indexing, Walid G. Aref

Link

Exploiting similarity-aware grouping in decision support systems, Yasin Silva, Muhammed Arshad, and Walid G. Aref

Link

FALCON: a system for reliable checkpoint recovery in shared grid environments, Tanzima Zerin Islam, Saurabh Bagchi, and Rudolf Eigenmann

PDF

Foreword for the special issue of selected papers from the 1st ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS, Elisa Bertino and Maria Luisa Damiani

PDF

Generalization of ACID Properties, Brahim Medjahed, Mourad Ouzzani, and Ahmed Elmagarmid

Link

Guest Editorial: Special Section on Service-Oriented Distributed Computing Systems, Elisa Bertino and William Cheng-Chung Chu

Link

Guest Editors’ Introduction - Parallel Programming, Rudolf Eigenmann and Eduard Ayguade

Link

Hippocratic PostgreSQL, J Padma, Yasin Silva, Mohamed Arshad, and Walid G. Aref

Link

Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes, Federica Paci, Rodolfo Ferrini, and Elisa Bertino

Link

Indexing Historical Spatio-Temporal Data, Mohamed Mokbel and Walid G. Aref

Link

Interactive Location Cloaking with the PROBE Obfuscator, Gabriel Ghinita, Maria Luisa Damiani, Elisa Bertino, and Claudio Silvestri

Link

L'Elimination de la subjectivité dans la recommandation de confiance, Omar Hasan, Lionel Brunie, Jean-Marc Pierson, and Elisa Bertino

Link

Location-Aware Authentication and Access Control, Elisa Bertino and Michael Kirkpatrick

PDF

Location Privacy in Moving-Object Environments, Dan Lin, Elisa Bertino, Reynold Cheng, and Sunil Prabhakar