The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.
This series contains publications published through The Cyber Center at Purdue University.
Submissions from 2012
A Flexible Approach to Multisession Trust Negotiations, Anna Squicciarini, Elisa Bertino, Alberto Trombetta, and Stefano Braghin
A framework for verification and optimal reconfiguration of event-driven role based access control policies, Basit Shafiq, Jaideep Vaidya, Arif Ghafoor, and Elisa Bertino
A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks, Hyo-Sang Lim, Gabriel Ghinita, Elisa Bertino, and Murat Kantarcioglu
A hybrid approach of OpenMP for clusters, Okwan Kwon, Fahed Jubair, Rudolf Eigenmann, and Samuel Midkiff
A Hybrid Approach to Private Record Matching, Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, and Elisa Bertino
A latent pairwise preference learning approach for recommendation from implicit feedback, Yi Fang and Luo Si
An Access Control Framework for WS-BPEL Processes, Federica Paci, Elisa Bertino, and Jason Crampton
An Analytic Approach to People Evaluation in Crowdsourcing Systems, Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Seyed-Mehdi-Reza Beheshti, and Elisa Bertino
An energy-efficient approach for provenance transmission in wireless sensor networks, S.M.I. Alam and Sonia Fahmy
ARES Conference - Message from ARES Conference Officers, Elisa Bertino, A Min Tjoa, and Gerald Quirchmayr
A role-involved purpose-based access control model, Md. Enamul Kabir, Hua Wang, and Elisa Bertino
ARTL@ S and BasArt: A loose coupling strategy for digital humanities, Sorin Matei
Authenticated Top-K Aggregation in Distributed and Authenticated Top-K Aggregation in Distributed and, Sunoh Choi, Hyo-Sang Lim, and Elisa Bertino
Auxin and ABA act as central regulators of developmental networks associated with paradormancy in Canada thistle (Cirsium arvense)., JV Anderson, M Dogramaci, DP Horvath, ME Foley, WS Chao, JC Suttle, Jyothi Thimmapuram, AG Hernandez, S Ali, and MA Mikel
Collaborative Computing: Networking, Applications and Worksharing, James Joshi, Elisa Bertino, Calton Pu, and Heri Ramampiaro
Collaborative Computing: Networking, Applications and Worksharing, James Joshi, Elisa Bertino, Calton Pu, and Heri Ramampiaro
Content retrieval using cloud-based DNS, Ravish Khosla, Sonia Fahmy, and Y.C. Hu
Cryptographic Key Management for Smart Power Grids, Mohamed Nabeel, John Zage, Sam Kerr, Elisa Bertino, Athula Kulatunga, U. Sudheera Navaratne, and May Lou Duren
Data Protection from Insider Threats, Elisa Bertino
Deep Web Query Interface Understanding and Integration, Eduard Dragut, Weiyi Meng, and Clement Yu
Defending against insider threats and internal data leakage, Elisa Bertino, Ilsun You, Gabriele Lenzini, and Marek Ogiela
Demonstrating a lightweight data provenance for sensor networks, Bilal Shebaro, Salmin Sultana, Shakthidhar Gopavaram, and Elisa Bertino
Design and evaluation of the S3 monitor network measurement service on GENI, Ethan Blanton, S Chatterjee, S Gangam, S Kala, D Sharma, Sonia Fahmy, and P Sharma
Detecting the unintended in BGP policies, Debbie Perouli, Timmothy Griffin, Olaf Maennel, Sonia Fahmy, Iain Phillips, and Cristel Pelsser
Detecting unsafe BGP policies in a flexible world, Debbie Perouli, Timmothy Griffin, Olaf Maennel, Sonia Fahmy, Cristel Pelsser, Alexander Gurney, and Iain Phillips