The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.
This series contains publications published through The Cyber Center at Purdue University.
Submissions from 2009
Measuring the structural similarity among XML documents and DTDs, Elisa Bertino, Giovanna Guerrini, and Michela Bertolotto
Multi-dimensional phenomenon-aware stream query processing, Ashish Bindra, Ankur Teredesai, Mohamed Ali, and Walid G. Aref
Multi-granular Spatio-temporal Object Models: Concepts and Research Directions, Elisa Bertino, Elena Camossi, and Michela Bertolotto
Online Piece-wise Linear Approximation of Numerical Streams with Precision Guarantees, Hazem Elmeleegy, Ahmed Elmagarmid, Emmanuel Cecchet, Walid G. Aref, and Willy Zwaenepoel
OpenMP to GPGPU: a compiler framework for automatic translation and optimization, Seyong Lee, Seung-Jai Min, and Rudolf Eigenmann
Outsourcing Search Services on Private Spatial Data, Man Lung Yiu, Gabriel Ghinita, Christian Jensen, and Panos Kalnis
Physically restricted authentication with trusted hardware, Michael Kirkpatrick and Elisa Bertino
Preventing velocity-based linkage attacks in location-aware applications, Gabriel Ghinita, Maria Luisa Damiani, Claudio Silvestri, and Elisa Bertino
Privacy-Preserving Accountable Accuracy Management Systems (PAAMS), Roshan Thomas, Ravi Sandhu, Elisa Bertino, Budak Arpinar, and Shouhuai Xu
Privacy-preserving Digital Identity Management for Cloud Computing, Elisa Bertino, Federica Paci, Rodolfo Ferrini, and Ning Shang
Privacy-preserving incremental data dissemination, Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, and Yonglak Sohn
Privacy-preserving management of transactions' receipts for mobile environments, Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer Jr, Jungha Woo, and Elisa Bertino
Privacy Preserving OLAP over Distributed XML Documents, Elisa Bertino and Alfredo Cuzzocrea
Privacy-preserving techniques for location-based services, Elisa Bertino
Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy, Gabriel Ghinita
Query Mesh: MultiRoute, Rimma Nehme, Karen Works, Elke Rundensteiner, and Elisa Bertino
Query Processing Techniques for Compliance with Data Confidence Policies, Chenyun Dai, Dan Lin, Murat Kantarcioglu, and Elisa Bertino
Scalable and Effective Test Generation for Role-Based Access Control Systems, Ammar Masood, Rafae Bhatti, Arif Ghafoor, and Aditya P. Mathur
Scalable and Effective Test Generation for Role-Based Access Control Systems, Ammar Masood, Rafae Bhatti, Arif Ghafoor, and Aditya P. Mathur
Security Analysis of the SASI Protocol, Tianjie Cao, Elisa Bertino, and Hong Lei
Security for Web Services: Standards and Research Issues, Lorenzo D. Martino and Elisa Bertino
Self-tuning query mesh for adaptive multi-route query processing, Rimma Nehme, Elke Rundensteiner, and Elisa Bertino
Similarity Group-By, Yasin Silva, Walid G. Aref, and Mohamed Ali
Space-Filling Curves for Query Processing, Mohamed Mokbel and Walid G. Aref
Spatial Anonymity, Panos Kalnis and Gabriel Ghinita