The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2006

Link

Natural Variants of AtHKT1 Enhance Na+ Accumulation in Two Wild Populations of Arabidopsis, Ana Rus, Ivan Baxter, Balasubramaniam Muthukumar, Jeff Gustin, Brett Lahner, Elena Yakubova, and David Salt

Link

Optimizing irregular shared-memory applications for distributed-memory systems, Ayon Basumallik and Rudolf Eigenmann

Link

PEAK—a fast and effective performance tuning system via compiler optimization orchestration, Zhelong Pan and Rudolf Eigenmann

Link

Policies and IT Technologies: A Puzzle of Two Pieces, Elisa Bertino and Steve Ruth

Link

Policy-based security management for federated healthcare databases (or RHIOs), Rafae Bhatti, Khalid Moidu, and Arif Ghafoor

Link

Policy Languages for Digital Identity Management in Federation Systems, Elisa Bertino, Abhilasha Bhargav-Spantzel, and Anna Squicciarini

Link

Preserving User Location Privacy in Mobile Data Management Infrastructures, Reynold Cheng, Yu Zhang, Elisa Bertino, and Sunil Prabhakar

Link

Privacy preserving multi-factor authentication with biometrics, Abhilasha Bhargav-Spantzel, Anna Squicciarini, and Elisa Bertino

Link

Private Updates to Anonymous Databases, Alberto Trombetta and Elisa Bertino

Link

Reducing the Cost of Validating Mapping Compositions by Exploiting Semantic Relationships, Eduard Dragut and Ramon Lawrence

Link

Resource Availability Prediction in Fine-Grained Cycle Sharing Systems, Xiaojuan Ren, Seyong Lee, Rudolf Eigenmann, and Saurabh Bagchi

Scalability Management in Sensor-Network PhenomenaBases, Mohamed Ali, Walid G. Aref, and Ibrahim Kamel

Link

Secure Anonymization for Incremental Datasets, Ji-Won Byun, Yonglak Sohn, Elisa Bertino, and Ninghui Li

Link

Secure Dissemination of XML Content Using Structure-based Routing, Ashish Kundu and Elisa Bertino

Link

Secure knowledge management: confidentiality, trust, and privacy, Elisa Bertino, Latifur Khan, Ravi Sandhu, and Bhavani Thuraisingham

Link

Security in SOA and Web Services, Elisa Bertino and Lorenzo D. Martino

Link

SIZ1 Small Ubiquitin-Like Modifier E3 Ligase Facilitates Basal Thermotolerance in Arabidopsis Independent of Salicylic Acid, Chan Yul Yoo, Kenji Miura, Jing Bo Jin, Jiyoung Lee, Hyeong Park, David Salt, Dae-Jin Yun, Ray Bressan, and Paul Hasegawa

Link

STAGGER: Periodicity Mining of Data Streams Using Expanding Sliding Windows, Mohamed Elfeky, Walid G. Aref, and Ahmed Elmagarmid

Link

Systematic control and management of data integrity, Ji-Won Byun, Yonglak Sohn, and Elisa Bertino

Link

Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints, Basit Shafiq, Arjmand Samuel, Elisa Bertino, and Arif Ghafoor

Link

Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management, Anna Squicciarini, Abhilasha Bhargav-Spantzel, Alexie Czeskis, and Elisa Bertino

Link

Trust Negotiations with Customizable Anonymity, Anna Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, and Indrakshi Ray

Link

Ws-AC: A Fine Grained Access Control System for Web Services, Elisa Bertino, Anna Squicciarini, Ivan Paloscia, and Lorenzo D. Martino

Link

XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!, Pietro Mazzoleni, Elisa Bertino, Bruno Crispo, and Swaminathan Sivasubramanian

Link

X-FEDERATE: A Policy Engineering Framework for Federated Access Management, Rafae Bhatti, Elisa Bertino, and Arif Ghafoor