The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.
This series contains publications published through The Cyber Center at Purdue University.
Submissions from 2008
Security and privacy for geospatial data: concepts and research directions, Elisa Bertino, Bhavani Thuraisingham, Michael Gertz, and Maria Luisa Damiani
Slc39a1 to 3 (subfamily {II)} Zip genes in mice have unique cell-specific functions during adaptation to zinc deficiency, Taiho Kambe, Jim Geiser, Brett Lahner, and David Salt
Space-Filling Curves, Mohamed Mokbel and Walid G. Aref
Space-Filling Curves, Mohamed Mokbel and Walid G. Aref
Spatial Domains for the Administration of Location-based Access Control Policies, Maria Luisa Damiani, Elisa Bertino, and Claudio Silvestri
Spatio-temporal Database, Xiaopeng Xiong, Mohamed Mokbel, and Walid G. Aref
Structural Signatures for Tree Data Structures, Ashish Kundu and Elisa Bertino
The draft genome of the transgenic tropical fruit tree papaya ( Carica papaya Linnaeus), Ray Ming, Shaobin Hou, Yun Feng, Qinguyi Yu, and Jyothi Thimmapuram
The effect of iron on the primary root elongation of Arabidopsis during phosphate deficiency, James Ward, Brett Lahner, Elena Yakubova, and David Salt
The leaf ionome as a multivariable system to detect a plant's physiological status, Ivan Baxter, Olga Vitek, Brett Lahner, Balasubramaniam Muthukumar, Monica Borghi, Joe Morrissey, May Lou Guerinot, and David Salt
The SBC-tree: an index for run-length compressed sequences, Mohamed Eltabakh, Wing-Kai Hon, Rahul Shah, Walid G. Aref, and Jeffrey S. Vitter
The SBC-tree: an index for run-length compressed sequences, Mohamed Eltabakh, Wing-Kai Hon, Rahul Shah, Walid G. Aref, and Jeffrey S. Vitter
Transcriptome analysis identifies novel responses and potential regulatory genes involved in seasonal dormancy transitions of leafy spurge (Euphorbia esula L.), David P. Horvath, Wun S. Chao, Jeffrey C. Suttle, Jyothi Thimmapuram, and James V. Anderson
Trust establishment in the formation of Virtual Organizations, Anna Squicciarini, Federica Paci, and Elisa Bertino
Usage-Based Schema Matching, Hazem Elmeleegy, Mourad Ouzzani, and Ahmed Elmagarmid
Verification of Receipts from M-commerce Transactions on NFC Cellular Phones, Jungha Woo, Abhilasha Bhargav-Spantzel, Anna Squicciarini, and Elisa Bertino
VeryIDX - A Digital Identity Management System for Pervasive Computing Environments, Federica Paci, Elisa Bertino, Sam Kerr, Aaron Lint, Anna Squicciarini, and Jungha Woo
Watermarking Relational Databases Using Optimization-Based Techniques, Mohamed Shehab, Elisa Bertino, and Arif Ghafoor
XACML Policy Integration Algorithms, Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, and Elisa Bertino
Submissions from 2007
A Critique of the ANSI Standard on Role-Based Access Control, Ninghui Li, Ji-Won Byun, and Elisa Bertino
A dynamic key management solution to access hierarchy, Xukai Zou, Yogesh Karandikar, and Elisa Bertino
An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks, Xiaoxin Wu and Elisa Bertino
An approach to evaluate policy similarity, Dan Lin, Prathima Rao, Elisa Bertino, and Jorge Lobo
An integrated approach to federated identity and privilege management in open systems, Rafae Bhatti, Elisa Bertino, and Arif Ghafoor
A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy, Rafae Bhatti, Daniel Sanz, Elisa Bertino, and Arif Ghafoor