The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2008

Link

Security and privacy for geospatial data: concepts and research directions, Elisa Bertino, Bhavani Thuraisingham, Michael Gertz, and Maria Luisa Damiani

Link

Slc39a1 to 3 (subfamily {II)} Zip genes in mice have unique cell-specific functions during adaptation to zinc deficiency, Taiho Kambe, Jim Geiser, Brett Lahner, and David Salt

Link

Space-Filling Curves, Mohamed Mokbel and Walid G. Aref

Link

Space-Filling Curves, Mohamed Mokbel and Walid G. Aref

Link

Spatial Domains for the Administration of Location-based Access Control Policies, Maria Luisa Damiani, Elisa Bertino, and Claudio Silvestri

Link

Spatio-temporal Database, Xiaopeng Xiong, Mohamed Mokbel, and Walid G. Aref

Link

Structural Signatures for Tree Data Structures, Ashish Kundu and Elisa Bertino

PDF

The draft genome of the transgenic tropical fruit tree papaya ( Carica papaya Linnaeus), Ray Ming, Shaobin Hou, Yun Feng, Qinguyi Yu, and Jyothi Thimmapuram

Link

The effect of iron on the primary root elongation of Arabidopsis during phosphate deficiency, James Ward, Brett Lahner, Elena Yakubova, and David Salt

Link

The leaf ionome as a multivariable system to detect a plant's physiological status, Ivan Baxter, Olga Vitek, Brett Lahner, Balasubramaniam Muthukumar, Monica Borghi, Joe Morrissey, May Lou Guerinot, and David Salt

Link

The SBC-tree: an index for run-length compressed sequences, Mohamed Eltabakh, Wing-Kai Hon, Rahul Shah, Walid G. Aref, and Jeffrey S. Vitter

Link

The SBC-tree: an index for run-length compressed sequences, Mohamed Eltabakh, Wing-Kai Hon, Rahul Shah, Walid G. Aref, and Jeffrey S. Vitter

PDF

Transcriptome analysis identifies novel responses and potential regulatory genes involved in seasonal dormancy transitions of leafy spurge (Euphorbia esula L.), David P. Horvath, Wun S. Chao, Jeffrey C. Suttle, Jyothi Thimmapuram, and James V. Anderson

Link

Trust establishment in the formation of Virtual Organizations, Anna Squicciarini, Federica Paci, and Elisa Bertino

Link

Usage-Based Schema Matching, Hazem Elmeleegy, Mourad Ouzzani, and Ahmed Elmagarmid

Link

Verification of Receipts from M-commerce Transactions on NFC Cellular Phones, Jungha Woo, Abhilasha Bhargav-Spantzel, Anna Squicciarini, and Elisa Bertino

Link

VeryIDX - A Digital Identity Management System for Pervasive Computing Environments, Federica Paci, Elisa Bertino, Sam Kerr, Aaron Lint, Anna Squicciarini, and Jungha Woo

Link

Watermarking Relational Databases Using Optimization-Based Techniques, Mohamed Shehab, Elisa Bertino, and Arif Ghafoor

Link

XACML Policy Integration Algorithms, Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, and Elisa Bertino

Submissions from 2007

Link

A Critique of the ANSI Standard on Role-Based Access Control, Ninghui Li, Ji-Won Byun, and Elisa Bertino

Link

A dynamic key management solution to access hierarchy, Xukai Zou, Yogesh Karandikar, and Elisa Bertino

Link

An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks, Xiaoxin Wu and Elisa Bertino

Link

An approach to evaluate policy similarity, Dan Lin, Prathima Rao, Elisa Bertino, and Jorge Lobo

Link

An integrated approach to federated identity and privilege management in open systems, Rafae Bhatti, Elisa Bertino, and Arif Ghafoor

Link

A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy, Rafae Bhatti, Daniel Sanz, Elisa Bertino, and Arif Ghafoor