The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2007

Link

R-trees with Update Memos, Xiaopeng Xiong and Walid G. Aref

Link

SOLE: scalable on-line execution of continuous queries on spatio-temporal data streams, Mohamed Mokbel and Walid G. Aref

Link

Space-Partitioning Trees in PostgreSQL: Realization and Performance, Mohamed Eltabakh, Ramy Eltarras, and Walid G. Aref

Link

Speculative thread decomposition through empirical optimization, Troy Johnson, Rudolf Eigenmann, and T.N. Vijaykumar

Link

Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations, Anna Squicciarini, Alberto Trombetta, and Elisa Bertino

Link

The New Casper: A Privacy-Aware Location-Based Database Server, Mohamed Mokbel, Chin-Yin Chow, and Walid G. Aref

Link

Trust Negotiation in Identity Management, Abhilasha Bhargav-Spantzel, Anna Squicciarini, and Elisa Bertino

Link

User Tasks and Access Control overWeb Services, Jacques Thomas, Federica Paci, Elisa Bertino, and Patrick Eugster

Link

Web services discovery in secure collaboration environments, Mohamed Shehab, Kamal Bhattacharya, and Arif Ghafoor

Link

XACML Function Annotations, Prathima Rao, Dan Lin, and Elisa Bertino

Link

XML-Based Policy Engineering Framework for Heterogeneous Network Management, Arjmand Samuel, Shahab Baqai, and Arif Ghafoor

Submissions from 2006

Link

ABSTRACT Access Control Enforcement for Conversation-based Web Services, Massimo Mecella, Federica Paci, Mourad Ouzzani, and Elisa Bertino

Link

Access Control and Authorization Constraints for WS-BPEL, Elisa Bertino, Jason Crampton, and Federica Paci

Link

Access Control and Privacy in Location-Aware Services forMobile Organizations, Maria Luisa Damiani and Elisa Bertino

Link

Access control, confidentiality and privacy for video surveillance databases, Bhavani Thuraisingham, Gal Lavee, Elisa Bertino, Jianoping Fan, and Latifur Khan

Link

Access control enforcement for conversation-based web services, Massimo Mecella, Mourad Ouzzani, Federica Paci, and Elisa Bertino

Link

Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information, Xiaoxin Wu, Jun Liu, Xiaoyan Hong, and Elisa Bertino

Link

Achieving Privacy in Trust Negotiations with an Ontology-Based Approach, Anna Squicciarini, Elisa Bertino, Elena Ferrari, and Indrakshi Ray

Link

Adaptive rank-aware query optimization in relational databases, Ihab Ilyas, Walid G. Aref, Ahmed Elmagarmid, Hicham Elmongui, Rahul Shah, and Jeffrey S. Vitter

Link

Adaptive rank-aware query optimization in relational databases, Ihab Ilyas, Walid G. Aref, Ahmed Elmagarmid, Hicham Elmongui, Rahul Shah, and Jeffrey S. Vitter

Link

A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities, Elisa Bertino and Anna Squicciarini

Link

A multigranular object-oriented framework supporting spatio-temporal granularity conversions, Elena Camossi, Mario Bertolotti, and Elisa Bertino

Link

An Arabidopsis Basic Helix-Loop-Helix Leucine Zipper Protein Modulates Metal Homeostasis and Auxin Conjugate Responsiveness, Rebekah Rampey, Andrew Woodward, Brianne Hobbs, Megan Tierney, Brett Lahner, David Salt, and Bonnie Bartel

Link

Architectural issues for a location-aware role-based access control system, Maria Luisa Damiani and Elisa Bertino

Link

A semantic approach to build personalized interfaces in the cultural heritage domain, Stefano Valtolina, Pietro Mazzoleni, Stefano Franzoni, and Elisa Bertino