Submissions from 2009
The RUM-tree: supporting frequent updates in R-trees using memos, Yasin Silva, Xiaopeng Xiong, and Walid G. Aref
Specification and enforcement of flexible security policy for active cooperation, Yuqing Sun, Bin Gong, Xiangxu Meng, Zongkai Lin, and Elisa Bertino
Privacy-Preserving Accountable Accuracy Management Systems (PAAMS), Roshan Thomas, Ravi Sandhu, Elisa Bertino, Budak Arpinar, and Shouhuai Xu
A Characterization of the problem of secure provenance management, Shouhuai Xu, Qun Ni, Elisa Bertino, and Ravi Sandhu
Efficient Private Record Linkage, Mohamed Yakout, Mikhail J. Atallah, and Ahmed Elmagarmid
Submissions from 2008
Data management challenges for computational transportation, Walid G. Aref and Mourad Ouzzani
The leaf ionome as a multivariable system to detect a plant's physiological status, Ivan Baxter, Olga Vitek, Brett Lahner, Balasubramaniam Muthukumar, Monica Borghi, Joe Morrissey, May Lou Guerinot, and David Salt
High-Assurance Integrity Techniques for Databases, Elisa Bertino, Chenyun Dai, Hyo-Sang Lim, and Dan Lin
A Federated Digital Identity Management Approach for Business Processes, Elisa Bertino, Rodolfo Ferrini, Andrea Musci, Federica Paci, and Kevin Steuer Jr
Object-Oriented Databases, Elisa Bertino and Giovanna Guerrini
An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting, Elisa Bertino, Ning Shang, and Samuel S. Wagstaff Jr
Security and privacy for geospatial data: concepts and research directions, Elisa Bertino, Bhavani Thuraisingham, Michael Gertz, and Maria Luisa Damiani
Multigranular spatio-temporal models: implementation challenges, Elena Camossi, Michela Bertolotto, and Elisa Bertino
Querying Multigranular Spatio-temporal Objects, Elena Camossi, Michela Bertolotto, and Elisa Bertino
Cryptanalysis of Some RFID Authentication Protocols, Tianjie Cao, Peng Shen, and Elisa Bertino
An Approach to Evaluate Data Trustworthiness Based on Data Provenance, Chenyun Dai, Dan Lin, Elisa Bertino, and Murat Kantarcioglu
Spatial Domains for the Administration of Location-based Access Control Policies, Maria Luisa Damiani, Elisa Bertino, and Claudio Silvestri
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems, Maria Luisa Damiani, Claudio Silvestri, and Elisa Bertino
Community-Cyberinfrastructure-Enabled Discovery in Science and Engineering, Ahmed Elmagarmid, Arjmand Samuel, and Mourad Ouzzani
Usage-Based Schema Matching, Hazem Elmeleegy, Mourad Ouzzani, and Ahmed Elmagarmid
The SBC-tree: an index for run-length compressed sequences, Mohamed Eltabakh, Wing-Kai Hon, Rahul Shah, Walid G. Aref, and Jeffrey S. Vitter
The SBC-tree: an index for run-length compressed sequences, Mohamed Eltabakh, Wing-Kai Hon, Rahul Shah, Walid G. Aref, and Jeffrey S. Vitter
Managing Biological Data using bdbms, Mohamed Eltabakh, Mourad Ouzzani, Walid G. Aref, Ahmed Elmagarmid, Yasin Silva, Mohamed Arshad, David Salt, and Ivan Baxter
ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure, Mohamed Fouad, Guy Lebanon, and Elisa Bertino
A Hybrid Approach to Private Record Linkage, Ali Inan, Murat Kantarcioglu, Elisa Bertino, and Maria Scannapieco
Formal foundations for hybrid hierarchies in GTRBAC, James Joshi, Elisa Bertino, Arif Ghafoor, and Yue Zhang
Database Intrusion Detection and Response, Ashish Kamra and Elisa Bertino
Responding to Anomalous Database Requests, Ashish Kamra, Elisa Bertino, and Rimma Nehme
Detecting anomalous access patterns in relational databases, Ashish Kamra, Evimaria Terzi, and Elisa Bertino
Detecting anomalous access patterns in relational databases, Ashish Kamra, Evimaria Terzi, and Elisa Bertino
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries, Yunhua Koglin, Denfeng Yao, and Elisa Bertino
A New Model for Secure Dissemination of XML Content, Ashish Kundu and Elisa Bertino
Structural Signatures for Tree Data Structures, Ashish Kundu and Elisa Bertino
Position transformation: a location privacy protection method for moving objects, Dan Lin, Elisa Bertino, Reynold Cheng, and Sunil Prabhakar
Policy decomposition for collaborative access control, Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, and Jorge Lobo
XACML Policy Integration Algorithms, Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, and Elisa Bertino
Space-Filling Curves, Mohamed Mokbel and Walid G. Aref
Mining roles with semantic meanings, Ian Molloy, Hong Chen, Tiancheng Li, Elisa Bertino, Seraphin Calo, and Jorge Lobo
Secure Delta-Publishing of XML Content, Mohamed Nabeel and Elisa Bertino
A Security Punctuation Framework for Enforcing Access Control on Streaming Data, Rimma Nehme, Elisa Bertino, and Elke Rundensteiner
An obligation model bridging access control policies and privacy policies, Qun Ni, Elisa Bertino, and Jorge Lobo
Minimal credential disclosure in trust negotiations, Federica Paci, David Bauer, Elisa Bertino, Douglas Blough, and Anna Squicciarini
An Access-Control Framework for WS-BPEL, Federica Paci, Elisa Bertino, and Jason Crampton
VeryIDX - A Digital Identity Management System for Pervasive Computing Environments, Federica Paci, Elisa Bertino, Sam Kerr, Aaron Lint, Anna Squicciarini, and Jungha Woo
Authorization and User Failure Resiliency for WS-BPEL Business Processes, Federica Paci, Rodolfo Ferrini, Yuqing Sun, and Elisa Bertino
EXAM: An Environment for Access Control Policy Analysis and Management, Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, and Jorge Lobo
Context-Aware Adaptation of Access-Control Policies, Arjmand Samuel, Arif Ghafoor, and Elisa Bertino
Proactive Role Discovery in Mediator-Free Environments, Mohamed Shehab, Elisa Bertino, and Arif Ghafoor
Watermarking Relational Databases Using Optimization-Based Techniques, Mohamed Shehab, Elisa Bertino, and Arif Ghafoor
Secure Collaboration in a Mediator-Free Distributed Environment, Mohamed Shehab, Arif Ghafoor, and Elisa Bertino
A Policy-Based Accountability Tool for Grid Computing Systems, Anna Squicciarini, Wonjun Lee, Elisa Bertino, and Carol Song
Automatic Compliance of Privacy Policies in Federated Digital Identity Management, Anna Squicciarini, Marco Casassa Mont, Abhilasha Bhargav-Spantzel, and Elisa Bertino
Trust establishment in the formation of Virtual Organizations, Anna Squicciarini, Federica Paci, and Elisa Bertino
Protecting Databases from Query Flood Attacks, Anna Squicciarini, Ivan Paloscia, and Elisa Bertino
Identity-based long running negotiations, Anna Squicciarini, Alberto Trombetta, Elisa Bertino, and Stefano Braghin
Privately Updating Suppression and Generalization based k-Anonymous Databases, Alberto Trombetta, Wei Jiang, Elisa Bertino, and Lorenzo Bossi
P-CDN: Extending access control capabilities of P2P systems to provide CDN services, Fatih Turkmen, Pietro Mazzoleni, Bruno Crispo, and Elisa Bertino
Verification of Receipts from M-commerce Transactions on NFC Cellular Phones, Jungha Woo, Abhilasha Bhargav-Spantzel, Anna Squicciarini, and Elisa Bertino
Anonymous Geo-Forwarding in MANETs through Location Cloaking, Xiaoxin Wu, Jun Liu, Xiaoyan Hong, and Elisa Bertino
Continuous Queries in Spatio-temporal Databases, Xiaopeng Xiong, Mohamed Mokbel, and Walid G. Aref
Spatio-temporal Database, Xiaopeng Xiong, Mohamed Mokbel, and Walid G. Aref
Continuous Intersection Joins Over Moving Objects, Rui Zhang, Dan Lin, Kotagiri Ramamohanarao, and Elisa Bertino
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing, Xukai Zou, Yuan-Shun Dai, and Elisa Bertino
Submissions from 2007
Phenomenon-Aware Stream Query Processing, Mohamed Ali, Mohamed Mokbel, and Walid G. Aref
A roadmap for comprehensive online privacy policy management, Annie Anton, Elisa Bertino, Ninghui Li, and Ting Yu
Pipelined spatial join processing for quadtree-based indexes, Walid G. Aref
Challenges of Testing Web Services and Security in SOA Implementations, Abbie Barbir, Chris Hobbs, Elisa Bertino, Frederick Hirsch, and Lorenzo D. Martino
Collaborative Computing: Networking, Applications and Worksharing, 2007. CollaborateCom 2007. International Conference on, Elisa Bertino
A system for securing push-based distribution of XML documents, Elisa Bertino, Elena Ferrari, Federica Paci, and Loredana Provenza
Profiling Database Application to Detect SQL Injection Attacks, Elisa Bertino, Ashish Kamra, and James Early
Trust Negotiation in Identity Management, Abhilasha Bhargav-Spantzel, Anna Squicciarini, and Elisa Bertino
Privacy Requirements in Identity Management Solutions, Abhilasha Bhargav-Spantzel, Anna Squicciarini, Matthew Young, and Elisa Bertino
Receipt management- transaction history based trust establishment, Abhilasha Bhargav-Spantzel, Jungha Woo, and Elisa Bertino
An integrated approach to federated identity and privilege management in open systems, Rafae Bhatti, Elisa Bertino, and Arif Ghafoor
A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy, Rafae Bhatti, Daniel Sanz, Elisa Bertino, and Arif Ghafoor
A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy, Rafae Bhatti, Daniel Sanz, Elisa Bertino, and Arif Ghafoor
Efficient k-Anonymization Using Clustering Techniques, Ji-Won Byun, Ashish Kamra, Elisa Bertino, and Ninghui Li
Managing Risks in RBAC Employed Distributed Environments, Ebru Celikel, Murat Kantarcioglu, Bhavani Thuraisingham, and Elisa Bertino
GEO-RBAC: A spatially aware RBAC, Maria Luisa Damiani, Elisa Bertino, Barbara Catania, and Paolo Perlasca
Space-Partitioning Trees in PostgreSQL: Realization and Performance, Mohamed Eltabakh, Ramy Eltarras, and Walid G. Aref
Duplicate Elimination in Space-partitioning Tree Indexes, Mohamed Eltabakh, Mourad Ouzzani, and Walid G. Aref
Incremental Evaluation of Sliding-Window Queries over Data Streams, Thanaa Ghanem, Moustafa Hammad, Mohamed Mokbel, Walid G. Aref, and Ahmed Elmagarmid
Efficient query execution on broadcasted index tree structures, Susanne E. Hambrusch, Chuan-Ming Liu, Walid G. Aref, and Sunil Prabhakar
Query processing of multi-way stream window joins, Moustafa Hammad, Walid G. Aref, and Ahmed Elmagarmid
Data Management in RFID Applications, Dan Lin, Hicham Elmongui, Elisa Bertino, and Beng Chin Ooi
An approach to evaluate policy similarity, Dan Lin, Prathima Rao, Elisa Bertino, and Jorge Lobo
A Critique of the ANSI Standard on Role-Based Access Control, Ninghui Li, Ji-Won Byun, and Elisa Bertino
LAHVA: Linked Animal-Human Health Visual Analytics, Ross Maciejewski, Benjamin Tyner, Yun Jang, Cheng Zheng, Rimma Nehme, David S. Ebert, William S. Cleveland, Mourad Ouzzani, Shaun Grannis, and Lawrence Glickman
Location-Aware Query Processing and Optimization, Mohamed Mokbel and Walid G. Aref
SOLE: scalable on-line execution of continuous queries on spatio-temporal data streams, Mohamed Mokbel and Walid G. Aref
The New Casper: A Privacy-Aware Location-Based Database Server, Mohamed Mokbel, Chin-Yin Chow, and Walid G. Aref
A structure preserving approach for securing XML documents, Mohamed Nabeel and Elisa Bertino
A structure preserving approach for securing XML documents, Mohamed Nabeel and Elisa Bertino
Privacy-aware role based access control, Qun Ni, Alberto Trombetta, Elisa Bertino, and Jorge Lobo
XACML Function Annotations, Prathima Rao, Dan Lin, and Elisa Bertino
Privacy preserving schema and data matching, Monica Scannapieco, Ilya Figotin, Elisa Bertino, and Ahmed Elmagarmid
Password policy simulation and analysis, Richard Shay, Abhilasha Bhargav-Spantzel, and Elisa Bertino
Realizing Privacy-Preserving Features in Hippocratic Databases, Yasin Silva and Walid G. Aref
PP-trust-X: A system for privacy preserving trust negotiations, Anna Squicciarini, Elisa Bertino, Elena Ferrari, Federica Paci, and Bhavani Thuraisingham
A System for the Specification and Enforcement of Quality-Based Authentication Policies, Anna Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, and Alexie Czeskis