The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2012

PDF

Whole-genome resequencing of two elite sires for the detection of haplotypes under selection in dairy cattle Supporting Information, Denis M. Larkin, Hans D. Daetwyler, Alvaro G. Hernandez, Chris L. Wright, Lorie A. Hetrick, Lisa Boucek, Sharon Bachman, and Jyothi Thimmapuram

Submissions from 2011

Link

Access Control for Databases: Concepts and Systems, Elisa Bertino, Gabriel Ghinita, and Ashish Kamra

Link

ACConv -- An Access Control Model for Conversational Web Services, Federica Paci, Massimo Mecella, Mourad Ouzzani, and Elisa Bertino

Link

A conditional purpose-based access control model with dynamic roles, Enamul Kabir, Hua Wang, and Elisa Bertino

Link

A conditional purpose-based access control model with dynamic roles, Md. Enamul Kabir, Hua Wang, and Elisa Bertino

Link

Aggregated Privacy-Preserving Identity Verification for Composite Web Services, Nan Guo, Tianhan Gao, Ben Zhang, Ruchith Fernando, and Elisa Bertino

Link

Analysis of an Expert Search Query Log, Yi Fang, Naveen Somasundaram, Luo Si, Jeongwoo Ko, and Aditya P. Mathur

Link

A New Class of Buffer Overflow Attacks, Ashish Kundu and Elisa Bertino

Link

Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection, Gabriel Ghinita, Panos Kalnis, Murat Kantarcioglu, and Elisa Bertino

Link

A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks, Salmin Sultana, Elisa Bertino, and Mohamed Shehab

Link

A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks, Salmin Sultana, Elisa Bertino, and Mohamed Shehab

Link

A Weighted Curve Fitting Method for Result Merging in Federated Search, Chuan He, Dzung Hong, and Luo Si

Link

BGP molecules: Understanding and predicting prefix failures, Ravish Khosla, Sonia Fahmy, and Y.C. Hu

Link

Composite Hashing with Multiple Information Sources, Dan Zhang, Fei Wang, and Luo Si

Link

DECHO—a framework for the digital exploration of cultural heritage objects, Daniel G. Aliaga, Elisa Bertino, and Stefano Valtolina

Link

Design and Implementation of an Intrusion Response System for Relational Databases, Ashish Kamra and Elisa Bertino

Link

Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems, Wonjun Lee, Anna Squicciarini, and Elisa Bertino

Link

Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems, Wonjun Lee, Anna Squicciarini, and Elisa Bertino

Link

Document clustering with universum, Dan Zhang, Jingdong Wang, and Luo Si

Link

Efficient systematic clustering method for k-anonymization, Enamul Kabir, Hua Wang, and Elisa Bertino

Link

Energy-efficient provenance transmission in large-scale wireless sensor networks, S.M.I. Alam and Sonia Fahmy

Link

Federated Search”. Foundations and Trends in Information Retrieval (FTIR), Milad Shokouhi and Luo Si

Link

Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications, Maria Luisa Damiani, Claudio Silvestri, and Elisa Bertino

Link

Fine-grained integration of access control policies, Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, and Jorge Lobo

Link

Forecasting Counts of User Visits for Online Display Advertising with Prob. Latent Class Models, Suleyman Cetintas, Datong Chen, Luo Si, Ben Chen, and Zhanibek Datbayev