The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.
This series contains publications published through The Cyber Center at Purdue University.
Submissions from 2007
Knowledge Modeling for High Content Screening of Multimedia Biological Data, Arif Ghafoor and J. Paul Robinson
LAHVA: Linked Animal-Human Health Visual Analytics, Ross Maciejewski, Benjamin Tyner, Yun Jang, Cheng Zheng, Rimma Nehme, David S. Ebert, William S. Cleveland, Mourad Ouzzani, Shaun Grannis, and Lawrence Glickman
Location-Aware Query Processing and Optimization, Mohamed Mokbel and Walid G. Aref
Managing Risks in RBAC Employed Distributed Environments, Ebru Celikel, Murat Kantarcioglu, Bhavani Thuraisingham, and Elisa Bertino
Modeling and language support for the management of pattern-bases, Panos Vassiliadis, Spiros Skiadopoulos, Elisa Bertino, Barbara Catania, Anna Maddalena, and Stefano Rizzi
Open Internet-based Sharing for Desktop Grids in iShare, Xiaojuan Ren, Ayon Basumallik, Zhelong Pan, and Rudolf Eigenmann
Password policy simulation and analysis, Richard Shay, Abhilasha Bhargav-Spantzel, and Elisa Bertino
Password policy simulation and analysis, Richard Shay, Abhilasha Bhargav-Spantzel, and Elisa Bertino
Phenomenon-Aware Stream Query Processing, Mohamed Ali, Mohamed Mokbel, and Walid G. Aref
Pipelined spatial join processing for quadtree-based indexes, Walid G. Aref
Place: A Distributed Spatio-Temporal Data Stream Management System for Moving Objects, Xiaopeng Xiong, Hicham Elmongui, Xiaoyong Chai, and Walid G. Aref
PP-trust-X: A system for privacy preserving trust negotiations, Anna Squicciarini, Elisa Bertino, Elena Ferrari, Federica Paci, and Bhavani Thuraisingham
Prediction of Resource Availability in Fine-Grained Cycle Sharing Systems Empirical Evaluation, Xiaojuan Ren, Seyong Lee, Rudolf Eigenmann, and Saurabh Bagchi
Privacy-aware role based access control, Qun Ni, Alberto Trombetta, Elisa Bertino, and Jorge Lobo
Privacy preserving schema and data matching, Monica Scannapieco, Ilya Figotin, Elisa Bertino, and Ahmed Elmagarmid
Privacy Requirements in Identity Management Solutions, Abhilasha Bhargav-Spantzel, Anna Squicciarini, Matthew Young, and Elisa Bertino
Profiling Database Application to Detect SQL Injection Attacks, Elisa Bertino, Ashish Kamra, and James Early
Programming Distributed Memory Sytems Using OpenMP, Ayon Basumallik, Seung-Jai Min, and Rudolf Eigenmann
Quality-of-Service Routing in Heterogeneous Networks with Optimal Buffer and Bandwidth Allocation, Waseem Sheikh and Arif Ghafoor
Quantitative Analysis of Inter-object Spatial Relationships in Biological Images, Wamiq Manzoor Ahmed, Magdalena Jonczyk, Ali Shamsaie, Arif Ghafoor, and J. Paul Robinson
Query processing of multi-way stream window joins, Moustafa Hammad, Walid G. Aref, and Ahmed Elmagarmid
Realizing Privacy-Preserving Features in Hippocratic Databases, Yasin Silva and Walid G. Aref
Receipt management- transaction history based trust establishment, Abhilasha Bhargav-Spantzel, Jungha Woo, and Elisa Bertino
Receipt management- transaction history based trust establishment, Abhilasha Bhargav-Spantzel, Jungha Woo, and Elisa Bertino
Replacing Lost or Stolen E-Passports, Jianming Yong and Elisa Bertino