The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.
This series contains publications published through The Cyber Center at Purdue University.
Submissions from 2009
Specification and enforcement of flexible security policy for active cooperation, Yuqing Sun, Bin Gong, Xiangxu Meng, Zongkai Lin, and Elisa Bertino
Stop Word and Related Problems in Web Interface Integration, Eduard Dragut, Fang Fang, Prasad Sistla, and Clement Yu
StreamShield: a stream-centric approach towards security and privacy in data stream environments, Rimma Nehme, Hyo-Sang Lim, Elisa Bertino, and Elke Rundensteiner
Supporting annotations on relations, Mohamed Eltabakh, Walid G. Aref, Ahmed Elmagarmid, Mourad Ouzzani, and Yasin Silva
Supporting RBAC with XACML+OWL, Rodolfo Ferrini and Elisa Bertino
The Challenge of Assuring Data Trustworthiness, Elisa Bertino, Chenyun Dai, and Murat Kantarcioglu
The Design and Evaluation of Accountable Grid Computing System, Wonjun Lee, Anna Squicciarini, and Elisa Bertino
The plant ionome coming into focus, Lorraine Williams and David Salt
The RUM-tree: supporting frequent updates in R-trees using memos, Yasin Silva, Xiaopeng Xiong, and Walid G. Aref
The SCIFC Model for Information Flow Control in Web Service Composition, Wei She, I-Ling Yen, Bhavani Thuraisingham, and Elisa Bertino
Transcriptome pathways unique to dehydration tolerant relatives of modern wheat., N Z. Ergen, Jyothi Thimmapuram, H J. Bohnert, and H Budak
Using Anonymized Data for Classification, Ali Inan, Murat Kantarcioglu, and Elisa Bertino
Visualization for Access Control Policy Analysis Results Using Multi-level Grids, Prathima Rao, Gabriel Ghinita, Elisa Bertino, and Jorge Lobo
Window-based Query Processing, Walid G. Aref
Workshop Organizers’ Message, Shazia Sadiq, Ke Deng, Xiaofang Zhou, Xiaochun Yang, Walid G. Aref, Alex Delis, Qing Liu, and Kai Xu
Submissions from 2008
Adaptive tuning in a dynamically changing resource environment, Seyong Lee and Rudolf Eigenmann
A Federated Digital Identity Management Approach for Business Processes, Elisa Bertino, Rodolfo Ferrini, Andrea Musci, Federica Paci, and Kevin Steuer Jr
A Hybrid Approach to Private Record Linkage, Ali Inan, Murat Kantarcioglu, Elisa Bertino, and Maria Scannapieco
An Access-Control Framework for WS-BPEL, Federica Paci, Elisa Bertino, and Jason Crampton
An Approach to Evaluate Data Trustworthiness Based on Data Provenance, Chenyun Dai, Dan Lin, Elisa Bertino, and Murat Kantarcioglu
An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting, Elisa Bertino, Ning Shang, and Samuel S. Wagstaff Jr
A New Model for Secure Dissemination of XML Content, Ashish Kundu and Elisa Bertino
An obligation model bridging access control policies and privacy policies, Qun Ni, Elisa Bertino, and Jorge Lobo
Anonymous Geo-Forwarding in MANETs through Location Cloaking, Xiaoxin Wu, Jun Liu, Xiaoyan Hong, and Elisa Bertino
A Policy-Based Accountability Tool for Grid Computing Systems, Anna Squicciarini, Wonjun Lee, Elisa Bertino, and Carol Song