The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.
This series contains publications published through The Cyber Center at Purdue University.
Submissions from 2006
Natural Variants of AtHKT1 Enhance Na+ Accumulation in Two Wild Populations of Arabidopsis, Ana Rus, Ivan Baxter, Balasubramaniam Muthukumar, Jeff Gustin, Brett Lahner, Elena Yakubova, and David Salt
Optimizing irregular shared-memory applications for distributed-memory systems, Ayon Basumallik and Rudolf Eigenmann
PEAK—a fast and effective performance tuning system via compiler optimization orchestration, Zhelong Pan and Rudolf Eigenmann
Policies and IT Technologies: A Puzzle of Two Pieces, Elisa Bertino and Steve Ruth
Policy-based security management for federated healthcare databases (or RHIOs), Rafae Bhatti, Khalid Moidu, and Arif Ghafoor
Policy Languages for Digital Identity Management in Federation Systems, Elisa Bertino, Abhilasha Bhargav-Spantzel, and Anna Squicciarini
Preserving User Location Privacy in Mobile Data Management Infrastructures, Reynold Cheng, Yu Zhang, Elisa Bertino, and Sunil Prabhakar
Privacy preserving multi-factor authentication with biometrics, Abhilasha Bhargav-Spantzel, Anna Squicciarini, and Elisa Bertino
Private Updates to Anonymous Databases, Alberto Trombetta and Elisa Bertino
Reducing the Cost of Validating Mapping Compositions by Exploiting Semantic Relationships, Eduard Dragut and Ramon Lawrence
Resource Availability Prediction in Fine-Grained Cycle Sharing Systems, Xiaojuan Ren, Seyong Lee, Rudolf Eigenmann, and Saurabh Bagchi
Scalability Management in Sensor-Network PhenomenaBases, Mohamed Ali, Walid G. Aref, and Ibrahim Kamel
Secure Anonymization for Incremental Datasets, Ji-Won Byun, Yonglak Sohn, Elisa Bertino, and Ninghui Li
Secure Dissemination of XML Content Using Structure-based Routing, Ashish Kundu and Elisa Bertino
Secure knowledge management: confidentiality, trust, and privacy, Elisa Bertino, Latifur Khan, Ravi Sandhu, and Bhavani Thuraisingham
Security in SOA and Web Services, Elisa Bertino and Lorenzo D. Martino
SIZ1 Small Ubiquitin-Like Modifier E3 Ligase Facilitates Basal Thermotolerance in Arabidopsis Independent of Salicylic Acid, Chan Yul Yoo, Kenji Miura, Jing Bo Jin, Jiyoung Lee, Hyeong Park, David Salt, Dae-Jin Yun, Ray Bressan, and Paul Hasegawa
STAGGER: Periodicity Mining of Data Streams Using Expanding Sliding Windows, Mohamed Elfeky, Walid G. Aref, and Ahmed Elmagarmid
Systematic control and management of data integrity, Ji-Won Byun, Yonglak Sohn, and Elisa Bertino
Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints, Basit Shafiq, Arjmand Samuel, Elisa Bertino, and Arif Ghafoor
Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management, Anna Squicciarini, Abhilasha Bhargav-Spantzel, Alexie Czeskis, and Elisa Bertino
Trust Negotiations with Customizable Anonymity, Anna Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, and Indrakshi Ray
Ws-AC: A Fine Grained Access Control System for Web Services, Elisa Bertino, Anna Squicciarini, Ivan Paloscia, and Lorenzo D. Martino
XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!, Pietro Mazzoleni, Elisa Bertino, Bruno Crispo, and Swaminathan Sivasubramanian
X-FEDERATE: A Policy Engineering Framework for Federated Access Management, Rafae Bhatti, Elisa Bertino, and Arif Ghafoor