The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2008

Link

Application of Automatic Parallelization to Modern Challenges of Scientific Computing Industries, Brian Armstrong and Rudolf Eigenmann

Link

Application of Automatic Parallelization to Modern Challenges of Scientific Computing Industries, Seyong Lee and Rudolf Eigenmann

Link

A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing, Xukai Zou, Yuan-Shun Dai, and Elisa Bertino

Link

ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure, Mohamed Fouad, Guy Lebanon, and Elisa Bertino

Link

A scalable call admission control algorithm, Zafar Ali, Waseem Sheikh, Edwin Chong, and Arif Ghafoor

Link

A Security Punctuation Framework for Enforcing Access Control on Streaming Data, Rimma Nehme, Elisa Bertino, and Elke Rundensteiner

Link

Authorization and User Failure Resiliency for WS-BPEL Business Processes, Federica Paci, Rodolfo Ferrini, Yuqing Sun, and Elisa Bertino

Link

Automatic Compliance of Privacy Policies in Federated Digital Identity Management, Anna Squicciarini, Marco Casassa Mont, Abhilasha Bhargav-Spantzel, and Elisa Bertino

Link

Community-Cyberinfrastructure-Enabled Discovery in Science and Engineering, Ahmed Elmagarmid, Arjmand Samuel, and Mourad Ouzzani

Link

Context-Aware Adaptation of Access-Control Policies, Arjmand Samuel, Arif Ghafoor, and Elisa Bertino

Link

Continuous Intersection Joins Over Moving Objects, Rui Zhang, Dan Lin, Kotagiri Ramamohanarao, and Elisa Bertino

Link

Continuous Queries in Spatio-temporal Databases, Xiaopeng Xiong, Mohamed Mokbel, and Walid G. Aref

Link

Cryptanalysis of Some RFID Authentication Protocols, Tianjie Cao, Peng Shen, and Elisa Bertino

Link

Database Intrusion Detection and Response, Ashish Kamra and Elisa Bertino

Link

Data management challenges for computational transportation, Walid G. Aref and Mourad Ouzzani

Link

Data management challenges for computational transportation, Walid G. Aref and Mourad Ouzzani

Link

Detecting anomalous access patterns in relational databases, Ashish Kamra, Evimaria Terzi, and Elisa Bertino

Link

Detecting anomalous access patterns in relational databases, Ashish Kamra, Evimaria Terzi, and Elisa Bertino

Determination of the Limiting Oil Viscosity for Chemical Dispersion at Sea, Kevin Cokomb, David Salt, Malcolm Peddar, and Alun Lewis

PDF

Development and annotation of perennial Triticeae ESTs and SSR markers., B.S. Bushman, S R Larson, I W Mott, P F Cliften, R R Wang, N J Chatterton, A G Hernandez, S Ali, R W Kim, Jyothi Thimmapuram, G Gong, L Liu, and M A Mikel

Link

Dynamic Resource Management in Energy Constrained Heterogeneous Computing Systems Using Voltage Scaling, Jong-Kook Kim, Howard Siegel, Anthony Maciejewski, and Rudolf Eigenmann

Link

Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries, Yunhua Koglin, Denfeng Yao, and Elisa Bertino

Link

Efficient content search in iShare, a P2P based Internet-sharing system, Seyong Lee, Xiaojuan Ren, and Rudolf Eigenmann

Link

EXAM: An Environment for Access Control Policy Analysis and Management, Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, and Jorge Lobo

Link

Formal foundations for hybrid hierarchies in GTRBAC, James Joshi, Elisa Bertino, Arif Ghafoor, and Yue Zhang