The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2009

Link

Specification and enforcement of flexible security policy for active cooperation, Yuqing Sun, Bin Gong, Xiangxu Meng, Zongkai Lin, and Elisa Bertino

Link

Stop Word and Related Problems in Web Interface Integration, Eduard Dragut, Fang Fang, Prasad Sistla, and Clement Yu

Link

StreamShield: a stream-centric approach towards security and privacy in data stream environments, Rimma Nehme, Hyo-Sang Lim, Elisa Bertino, and Elke Rundensteiner

Link

Supporting annotations on relations, Mohamed Eltabakh, Walid G. Aref, Ahmed Elmagarmid, Mourad Ouzzani, and Yasin Silva

Link

Supporting RBAC with XACML+OWL, Rodolfo Ferrini and Elisa Bertino

Link

The Challenge of Assuring Data Trustworthiness, Elisa Bertino, Chenyun Dai, and Murat Kantarcioglu

Link

The Design and Evaluation of Accountable Grid Computing System, Wonjun Lee, Anna Squicciarini, and Elisa Bertino

PDF

The plant ionome coming into focus, Lorraine Williams and David Salt

Link

The RUM-tree: supporting frequent updates in R-trees using memos, Yasin Silva, Xiaopeng Xiong, and Walid G. Aref

Link

The SCIFC Model for Information Flow Control in Web Service Composition, Wei She, I-Ling Yen, Bhavani Thuraisingham, and Elisa Bertino

Link

Transcriptome pathways unique to dehydration tolerant relatives of modern wheat., N Z. Ergen, Jyothi Thimmapuram, H J. Bohnert, and H Budak

Link

Using Anonymized Data for Classification, Ali Inan, Murat Kantarcioglu, and Elisa Bertino

Link

Visualization for Access Control Policy Analysis Results Using Multi-level Grids, Prathima Rao, Gabriel Ghinita, Elisa Bertino, and Jorge Lobo

Link

Window-based Query Processing, Walid G. Aref

Link

Workshop Organizers’ Message, Shazia Sadiq, Ke Deng, Xiaofang Zhou, Xiaochun Yang, Walid G. Aref, Alex Delis, Qing Liu, and Kai Xu

Submissions from 2008

Link

Adaptive tuning in a dynamically changing resource environment, Seyong Lee and Rudolf Eigenmann

Link

A Federated Digital Identity Management Approach for Business Processes, Elisa Bertino, Rodolfo Ferrini, Andrea Musci, Federica Paci, and Kevin Steuer Jr

Link

A Hybrid Approach to Private Record Linkage, Ali Inan, Murat Kantarcioglu, Elisa Bertino, and Maria Scannapieco

Link

An Access-Control Framework for WS-BPEL, Federica Paci, Elisa Bertino, and Jason Crampton

Link

An Approach to Evaluate Data Trustworthiness Based on Data Provenance, Chenyun Dai, Dan Lin, Elisa Bertino, and Murat Kantarcioglu

Link

An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting, Elisa Bertino, Ning Shang, and Samuel S. Wagstaff Jr

Link

A New Model for Secure Dissemination of XML Content, Ashish Kundu and Elisa Bertino

Link

An obligation model bridging access control policies and privacy policies, Qun Ni, Elisa Bertino, and Jorge Lobo

Link

Anonymous Geo-Forwarding in MANETs through Location Cloaking, Xiaoxin Wu, Jun Liu, Xiaoyan Hong, and Elisa Bertino

Link

A Policy-Based Accountability Tool for Grid Computing Systems, Anna Squicciarini, Wonjun Lee, Elisa Bertino, and Carol Song