Submissions from 2012
Matching Phosphorylation Response Patterns of Antigen-Receptor-Stimulated T Cells Via Flow Cytometry, Ariful Azad, Saumyadipta Pyne, and Alex Pothen
Submissions from 2011
Privacy-Preserving Assessment of Location Data Trustworthiness, Chenyun Dai, Fang-Yu Rao, Gabriel Ghinita, and Elisa Bertino
A conditional purpose-based access control model with dynamic roles, Enamul Kabir, Hua Wang, and Elisa Bertino
Efficient systematic clustering method for k-anonymization, Enamul Kabir, Hua Wang, and Elisa Bertino
Two approximate Minkowski sum algorithms, Victor Milenkovic and Elisha P. Sacks
Fine-grained integration of access control policies, Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, and Jorge Lobo
Controlled linear perturbation, Elisha P. Sacks, Victor Milenkovic, and Min-Ho Kyung
Trust establishment in the formation of Virtual Organizations, Anna Squicciarini, Federica Paci, and Elisa Bertino
Submissions from 2010
A General Framework for Web Content Filtering, Elisa Bertino, Elena Ferrari, and Andrea Perego
Assuring Data Trustworthiness - Concepts and Research Challenges, Elisa Bertino and Hyo-Sang Lim
Guest Editors' Introduction: Data Quality in the Internet Era, Elisa Bertino, Andrea Maurino, and Monica Scannapieco
Biometrics-based identifiers for digital identity management, Abhilasha Bhargav-Spantzel, Anna Squicciarini, Elisa Bertino, and Xiangwei Kong
A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations, Sunoh Choi, Gabriel Ghinita, and Elisa Bertino
A secure multiparty computation privacy preserving OLAP framework over distributed XML data, Alfredo Cuzzocrea and Elisa Bertino
Preserving privacy and fairness in peer-to-peer data integration, Hazem Elmeleegy, Mourad Ouzzani, Ahmed Elmagarmid, and Ahmad Abusalah
A database server for next-generation scientific data management, Mohamed Eltabakh, Walid G. Aref, and Ahmed Elmagarmid
Supporting real-world activities in database management systems, Mohamed Eltabakh, Walid G. Aref, Ahmed Elmagarmid, Yasin Silva, and Mourad Ouzzani
Supporting views in data stream management systems, Thanaa Ghanem, Ahmed Elmagarmid, Per-Ake Larson, and Walid G. Aref
Privacy-Aware Location-Aided Routing in Mobile Ad Hoc Networks, Gabriel Ghinita, Mehdi Azarmi, and Elisa Bertino
Private record matching using differential privacy, Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, and Elisa Bertino
Privilege States Based Access Control for Fine-Grained Intrusion Response, Ashish Kamra and Elisa Bertino
Enforcing spatial constraints for mobile RBAC systems, Michael Kirkpatrick and Elisa Bertino
How to authenticate graphs without leaking, Ashish Kundu and Elisa Bertino
Provenance-based trustworthiness assessment in sensor networks, Hyo-Sang Lim, Yang-Sae Moon, and Elisa Bertino
EXAM: a comprehensive environment for the analysis of access control policies, Dan Lin, Prathima Rao, Elisa Bertino, and Ninghui Li
A Visual Analytics Approach to Understanding Spatiotemporal Hotspots, Ross Maciejewski, Stephen Rudolph, Ryan Hafen, Ahmad Abusalah, Mohamed Yakout, Mourad Ouzzani, William S. Cleveland, Shaun Grannis, and David S. Ebert
Publishing Time-Series Data under Preservation of Privacy and Distance Orders, Yang-Sae Moon, Hea-Suk Kim, Sang-Pil Kim, and Elisa Bertino
Mask: a system for privacy-preserving policy-based access to published content, Mohamed Nabeel, Ning Shang, John Zage, and Elisa Bertino
FENCE: Continuous access control enforcement in dynamic data stream environments, Rimma Nehme, Hyo-Sang Lim, and Elisa Bertino
Spatio-Temporal Access Methods: Part 2 (2003 - 2010), Long-Van Nguyen-Dinh, Walid G. Aref, and Mohamed Mokbel
Credibility-enhanced curated database: Improving the value of curated databases, Qun Ni and Elisa Bertino
Risk-based access control systems built on fuzzy inferences, Qun Ni, Elisa Bertino, and Jorge Lobo
Privacy-aware role-based access control, Qun Ni, Elisa Bertino, Jorge Lobo, and Carolyn Brodie
Controlling data disclosure in computational PIR protocols, Ning Shang, Gabriel Ghinita, Yongbin Zhou, and Elisa Bertino
A privacy-preserving approach to policy-based content dissemination, Ning Shang, Mohamed Nabeel, Federica Paci, and Elisa Bertino
Efficient and privacy-preserving enforcement of attribute-based access control, Ning Shang, Federica Paci, and Elisa Bertino
Policy-Driven Service Composition with Information Flow Control, Wei She, I-Ling Yen, Bhavani Thuraisingham, and Elisa Bertino
SimDB: a similarity-aware database system, Yasin Silva, Ahmed Aly, Walid G. Aref, and Per-Ake Larson
The similarity join database operator, Yasin Silva, Walid G. Aref, and Mohamed Ali
Group-Based Negotiations in P2P Systems, Anna Squicciarini, Federica Paci, Elisa Bertino, and Alberto Trombetta
Privometer: Privacy protection in social networks, Nilothpal Talukder, Mourad Ouzzani, Ahmed Elmagarmid, and Hazem Elmeleegy
GDR: a system for guided data repair, Mohamed Yakout, Ahmed Elmagarmid, Jennifer Neville, and Mourad Ouzzani
Submissions from 2009
Electronic Ink Indexing, Walid G. Aref
Window-based Query Processing, Walid G. Aref
Assured information sharing: concepts and issues, Elisa Bertino
Privacy-preserving techniques for location-based services, Elisa Bertino
Multi-granular Spatio-temporal Object Models: Concepts and Research Directions, Elisa Bertino, Elena Camossi, and Michela Bertolotto
Guest Editorial: Special Section on Service-Oriented Distributed Computing Systems, Elisa Bertino and William Cheng-Chung Chu
Privacy Preserving OLAP over Distributed XML Documents, Elisa Bertino and Alfredo Cuzzocrea
The Challenge of Assuring Data Trustworthiness, Elisa Bertino, Chenyun Dai, and Murat Kantarcioglu
Foreword for the special issue of selected papers from the 1st ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS, Elisa Bertino and Maria Luisa Damiani
Measuring the structural similarity among XML documents and DTDs, Elisa Bertino, Giovanna Guerrini, and Michela Bertolotto
Location-Aware Authentication and Access Control, Elisa Bertino and Michael Kirkpatrick
Collaborative Computing: Networking, Applications and Worksharing-A structure preserving approach for securing XML documents, Elisa Bertino and Mohamed Nabeel
Privacy-preserving Digital Identity Management for Cloud Computing, Elisa Bertino, Federica Paci, Rodolfo Ferrini, and Ning Shang
Multi-dimensional phenomenon-aware stream query processing, Ashish Bindra, Ankur Teredesai, Mohamed Ali, and Walid G. Aref
Privacy-preserving incremental data dissemination, Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, and Yonglak Sohn
Adaptive Management of Multigranular Spatio-Temporal Object Attributes, Elena Camossi, Elisa Bertino, Giovanna Guerrini, and Michela Bertolotto
Security Analysis of the SASI Protocol, Tianjie Cao, Elisa Bertino, and Hong Lei
Casper: Query processing for location services without compromising privacy, Chin-Yin Chow, Mohamed Mokbel, and Walid G. Aref
Assessing the trustworthiness of location data based on provenance, Chenyun Dai, Hyo-Sang Lim, Elisa Bertino, and Yang-Sae Moon
Query Processing Techniques for Compliance with Data Confidence Policies, Chenyun Dai, Dan Lin, Murat Kantarcioglu, and Elisa Bertino
Online Piece-wise Linear Approximation of Numerical Streams with Precision Guarantees, Hazem Elmeleegy, Ahmed Elmagarmid, Emmanuel Cecchet, Walid G. Aref, and Willy Zwaenepoel
Chameleon: Context-Awareness inside DBMSs, Hicham Elmongui, Walid G. Aref, and Mohamed Mokbel
Supporting annotations on relations, Mohamed Eltabakh, Walid G. Aref, Ahmed Elmagarmid, Mourad Ouzzani, and Yasin Silva
Supporting RBAC with XACML+OWL, Rodolfo Ferrini and Elisa Bertino
Interactive Location Cloaking with the PROBE Obfuscator, Gabriel Ghinita, Maria Luisa Damiani, Elisa Bertino, and Claudio Silvestri
Preventing velocity-based linkage attacks in location-aware applications, Gabriel Ghinita, Maria Luisa Damiani, Claudio Silvestri, and Elisa Bertino
A Hybrid Technique for Private Location-Based Queries with Database Protection, Gabriel Ghinita, Panos Kalnis, Kantarcioglu Kantarcioglu, and Elisa Bertino
L'Elimination de la subjectivité dans la recommandation de confiance, Omar Hasan, Lionel Brunie, Jean-Marc Pierson, and Elisa Bertino
Using Anonymized Data for Classification, Ali Inan, Murat Kantarcioglu, and Elisa Bertino
Physically restricted authentication with trusted hardware, Michael Kirkpatrick and Elisa Bertino
Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk, Guy Lebanon, Monica Scannapieco, Mohamed Fouad, and Elisa Bertino
The Design and Evaluation of Accountable Grid Computing System, Wonjun Lee, Anna Squicciarini, and Elisa Bertino
Location Privacy in Moving-Object Environments, Dan Lin, Elisa Bertino, Reynold Cheng, and Sunil Prabhakar
Access control policy combining: theory meets practice, Ninghui Li, Qihua Wang, Wahbeh Qardaji, and Elisa Bertino
A distributed approach to enabling privacy-preserving model-based classifier training, Hangzai Luo, Xiaodong Lin, Aoying Zhou, and Elisa Bertino
Security for Web Services: Standards and Research Issues, Lorenzo D. Martino and Elisa Bertino
Scalable and Effective Test Generation for Role-Based Access Control Systems, Ammar Masood, Rafae Bhatti, Arif Ghafoor, and Aditya P. Mathur
Efficient integration of fine-grained access control and resource brokering in grid, Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, and Elisa Bertino
Generalization of ACID Properties, Brahim Medjahed, Mourad Ouzzani, and Ahmed Elmagarmid
Indexing Historical Spatio-Temporal Data, Mohamed Mokbel and Walid G. Aref
Space-Filling Curves for Query Processing, Mohamed Mokbel and Walid G. Aref
StreamShield: a stream-centric approach towards security and privacy in data stream environments, Rimma Nehme, Hyo-Sang Lim, Elisa Bertino, and Elke Rundensteiner
Self-tuning query mesh for adaptive multi-route query processing, Rimma Nehme, Elke Rundensteiner, and Elisa Bertino
Query Mesh: MultiRoute, Rimma Nehme, Karen Works, Elke Rundensteiner, and Elisa Bertino
D-algebra for composing access control policy decisions, Qun Ni, Elisa Bertino, and Jorge Lobo
An Access Control Language for a General Provenance Model, Qun Ni, Shouhuai Xu, Elisa Bertino, and Ravi Sandhu
Correctness Criteria Beyond Serializability, Mourad Ouzzani, Brahim Medjahed, and Ahmed Elmagarmid
An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices, Federica Paci, Elisa Bertino, Sam Kerr, Anna Squicciarini, and Jungha Woo
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes, Federica Paci, Rodolfo Ferrini, and Elisa Bertino
Privacy-preserving management of transactions' receipts for mobile environments, Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer Jr, Jungha Woo, and Elisa Bertino
Hippocratic PostgreSQL, J Padma, Yasin Silva, Mohamed Arshad, and Walid G. Aref
Visualization for Access Control Policy Analysis Results Using Multi-level Grids, Prathima Rao, Gabriel Ghinita, Elisa Bertino, and Jorge Lobo
An algebra for fine-grained integration of XACML policies, Prathima Rao, Dan Lin, Elisa Bertino, and Ninghui Li
Workshop Organizers’ Message, Shazia Sadiq, Ke Deng, Xiaofang Zhou, Xiaochun Yang, Walid G. Aref, Alex Delis, Qing Liu, and Kai Xu
A comprehensive simulation tool for the analysis of password policies, Richard Shay and Elisa Bertino
The SCIFC Model for Information Flow Control in Web Service Composition, Wei She, I-Ling Yen, Bhavani Thuraisingham, and Elisa Bertino
Similarity Group-By, Yasin Silva, Walid G. Aref, and Mohamed Ali
Exploiting similarity-aware grouping in decision support systems, Yasin Silva, Muhammed Arshad, and Walid G. Aref