The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.
This series contains publications published through The Cyber Center at Purdue University.
Submissions from 2008
Application of Automatic Parallelization to Modern Challenges of Scientific Computing Industries, Brian Armstrong and Rudolf Eigenmann
Application of Automatic Parallelization to Modern Challenges of Scientific Computing Industries, Seyong Lee and Rudolf Eigenmann
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing, Xukai Zou, Yuan-Shun Dai, and Elisa Bertino
ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure, Mohamed Fouad, Guy Lebanon, and Elisa Bertino
A scalable call admission control algorithm, Zafar Ali, Waseem Sheikh, Edwin Chong, and Arif Ghafoor
A Security Punctuation Framework for Enforcing Access Control on Streaming Data, Rimma Nehme, Elisa Bertino, and Elke Rundensteiner
Authorization and User Failure Resiliency for WS-BPEL Business Processes, Federica Paci, Rodolfo Ferrini, Yuqing Sun, and Elisa Bertino
Automatic Compliance of Privacy Policies in Federated Digital Identity Management, Anna Squicciarini, Marco Casassa Mont, Abhilasha Bhargav-Spantzel, and Elisa Bertino
Community-Cyberinfrastructure-Enabled Discovery in Science and Engineering, Ahmed Elmagarmid, Arjmand Samuel, and Mourad Ouzzani
Context-Aware Adaptation of Access-Control Policies, Arjmand Samuel, Arif Ghafoor, and Elisa Bertino
Continuous Intersection Joins Over Moving Objects, Rui Zhang, Dan Lin, Kotagiri Ramamohanarao, and Elisa Bertino
Continuous Queries in Spatio-temporal Databases, Xiaopeng Xiong, Mohamed Mokbel, and Walid G. Aref
Cryptanalysis of Some RFID Authentication Protocols, Tianjie Cao, Peng Shen, and Elisa Bertino
Database Intrusion Detection and Response, Ashish Kamra and Elisa Bertino
Data management challenges for computational transportation, Walid G. Aref and Mourad Ouzzani
Data management challenges for computational transportation, Walid G. Aref and Mourad Ouzzani
Detecting anomalous access patterns in relational databases, Ashish Kamra, Evimaria Terzi, and Elisa Bertino
Detecting anomalous access patterns in relational databases, Ashish Kamra, Evimaria Terzi, and Elisa Bertino
Determination of the Limiting Oil Viscosity for Chemical Dispersion at Sea, Kevin Cokomb, David Salt, Malcolm Peddar, and Alun Lewis
Development and annotation of perennial Triticeae ESTs and SSR markers., B.S. Bushman, S R Larson, I W Mott, P F Cliften, R R Wang, N J Chatterton, A G Hernandez, S Ali, R W Kim, Jyothi Thimmapuram, G Gong, L Liu, and M A Mikel
Dynamic Resource Management in Energy Constrained Heterogeneous Computing Systems Using Voltage Scaling, Jong-Kook Kim, Howard Siegel, Anthony Maciejewski, and Rudolf Eigenmann
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries, Yunhua Koglin, Denfeng Yao, and Elisa Bertino
Efficient content search in iShare, a P2P based Internet-sharing system, Seyong Lee, Xiaojuan Ren, and Rudolf Eigenmann
EXAM: An Environment for Access Control Policy Analysis and Management, Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, and Jorge Lobo
Formal foundations for hybrid hierarchies in GTRBAC, James Joshi, Elisa Bertino, Arif Ghafoor, and Yue Zhang