The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.
This series contains publications published through The Cyber Center at Purdue University.
Submissions from 2007
A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy, Rafae Bhatti, Daniel Sanz, Elisa Bertino, and Arif Ghafoor
A privacy preserving assertion based policy language for federation systems, Anna Squicciarini, Ayca Azgin Hintoqlu, Elisa Bertino, and Yucel Saygin
A roadmap for comprehensive online privacy policy management, Annie Anton, Elisa Bertino, Ninghui Li, and Ting Yu
A structure preserving approach for securing XML documents, Mohamed Nabeel and Elisa Bertino
A structure preserving approach for securing XML documents, Mohamed Nabeel and Elisa Bertino
A system for securing push-based distribution of XML documents, Elisa Bertino, Elena Ferrari, Federica Paci, and Loredana Provenza
A System for the Specification and Enforcement of Quality-Based Authentication Policies, Anna Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, and Alexie Czeskis
Challenges of Testing Web Services and Security in SOA Implementations, Abbie Barbir, Chris Hobbs, Elisa Bertino, Frederick Hirsch, and Lorenzo D. Martino
Collaborative Computing: Networking, Applications and Worksharing, 2007. CollaborateCom 2007. International Conference on, Elisa Bertino
Data Management in RFID Applications, Dan Lin, Hicham Elmongui, Elisa Bertino, and Beng Chin Ooi
Data Management in RFID Applications, Dan Lin, Hicham Elmongui, Elisa Bertino, and Beng Chin Ooi
Decentralized authorization and data security in web content delivery, Danfeng Yao, Yunhua Koglin, Elisa Bertino, and Roberto Tamassia
Distributed multimedia information systems: an end-to-end perspective, Arif Ghafoor
Duplicate Elimination in Space-partitioning Tree Indexes, Mohamed Eltabakh, Mourad Ouzzani, and Walid G. Aref
Efficient k-Anonymization Using Clustering Techniques, Ji-Won Byun, Ashish Kamra, Elisa Bertino, and Ninghui Li
Efficient k-Anonymization Using Clustering Techniques, Ji-Won Byun, Ashish Kamra, Elisa Bertino, and Ninghui Li
Efficient query execution on broadcasted index tree structures, Susanne E. Hambrusch, Chuan-Ming Liu, Walid G. Aref, and Sunil Prabhakar
Engineering a Policy-Based System for Federated Healthcare Databases, Rafae Bhatti, Arjmand Samuel, Mohamed Eltabakh, Haseeb Amjad, and Arif Ghafoor
Failure-aware checkpointing in fine-grained cycle sharing systems, Xiaojuan Ren, Rudolf Eigenmann, and Saurabh Bagchi
Fast and Effective Orchestration of Compiler Optimizations for Automatic Performance Tuning, Zhelong Pan and Rudolf Eigenmann
FSM-based model for spatio-temporal event recognition for HCS, Wamiq Ahmed, Jia Liu, Dominik Lenz, Arif Ghafoor, and J. Paul Robinson
GEO-RBAC: A spatially aware RBAC, Maria Luisa Damiani, Elisa Bertino, Barbara Catania, and Paolo Perlasca
Incremental Evaluation of Sliding-Window Queries over Data Streams, Thanaa Ghanem, Moustafa Hammad, Mohamed Mokbel, Walid G. Aref, and Ahmed Elmagarmid
Information carrying identity proof trees, Wiliam Winsborough, Anna Squicciarini, and Elisa Bertino
Knowledge Extraction for High-Throughput Biological Imaging, Wamiq Ahmed, Arif Ghafoor, and J. Paul Robinson