Submissions from 2007
A privacy preserving assertion based policy language for federation systems, Anna Squicciarini, Ayca Azgin Hintoqlu, Elisa Bertino, and Yucel Saygin
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations, Anna Squicciarini, Alberto Trombetta, and Elisa Bertino
User Tasks and Access Control overWeb Services, Jacques Thomas, Federica Paci, Elisa Bertino, and Patrick Eugster
Modeling and language support for the management of pattern-bases, Panos Vassiliadis, Spiros Skiadopoulos, Elisa Bertino, Barbara Catania, Anna Maddalena, and Stefano Rizzi
Information carrying identity proof trees, Wiliam Winsborough, Anna Squicciarini, and Elisa Bertino
An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks, Xiaoxin Wu and Elisa Bertino
R-trees with Update Memos, Xiaopeng Xiong and Walid G. Aref
Place: A Distributed Spatio-Temporal Data Stream Management System for Moving Objects, Xiaopeng Xiong, Hicham Elmongui, Xiaoyong Chai, and Walid G. Aref
Decentralized authorization and data security in web content delivery, Danfeng Yao, Yunhua Koglin, Elisa Bertino, and Roberto Tamassia
Replacing Lost or Stolen E-Passports, Jianming Yong and Elisa Bertino
A dynamic key management solution to access hierarchy, Xukai Zou, Yogesh Karandikar, and Elisa Bertino
Submissions from 2006
Scalability Management in Sensor-Network PhenomenaBases, Mohamed Ali, Walid G. Aref, and Ibrahim Kamel
Digital identity management and protection, Elisa Bertino
Policy Languages for Digital Identity Management in Federation Systems, Elisa Bertino, Abhilasha Bhargav-Spantzel, and Anna Squicciarini
Access Control and Authorization Constraints for WS-BPEL, Elisa Bertino, Jason Crampton, and Federica Paci
Secure knowledge management: confidentiality, trust, and privacy, Elisa Bertino, Latifur Khan, Ravi Sandhu, and Bhavani Thuraisingham
Security in SOA and Web Services, Elisa Bertino and Lorenzo D. Martino
Policies and IT Technologies: A Puzzle of Two Pieces, Elisa Bertino and Steve Ruth
A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities, Elisa Bertino and Anna Squicciarini
Ws-AC: A Fine Grained Access Control System for Web Services, Elisa Bertino, Anna Squicciarini, Ivan Paloscia, and Lorenzo D. Martino
Privacy preserving multi-factor authentication with biometrics, Abhilasha Bhargav-Spantzel, Anna Squicciarini, and Elisa Bertino
X-FEDERATE: A Policy Engineering Framework for Federated Access Management, Rafae Bhatti, Elisa Bertino, and Arif Ghafoor
Micro-views, or on how to protect privacy while enhancing data usability: concepts and challenges, Ji-Won Byun and Elisa Bertino
Systematic control and management of data integrity, Ji-Won Byun, Yonglak Sohn, and Elisa Bertino
Secure Anonymization for Incremental Datasets, Ji-Won Byun, Yonglak Sohn, Elisa Bertino, and Ninghui Li
A multigranular object-oriented framework supporting spatio-temporal granularity conversions, Elena Camossi, Mario Bertolotti, and Elisa Bertino
Preserving User Location Privacy in Mobile Data Management Infrastructures, Reynold Cheng, Yu Zhang, Elisa Bertino, and Sunil Prabhakar
Access Control and Privacy in Location-Aware Services forMobile Organizations, Maria Luisa Damiani and Elisa Bertino
Architectural issues for a location-aware role-based access control system, Maria Luisa Damiani and Elisa Bertino
STAGGER: Periodicity Mining of Data Streams Using Expanding Sliding Windows, Mohamed Elfeky, Walid G. Aref, and Ahmed Elmagarmid
Challenges in spatiotemporal stream query optimization, Hicham Elmongui, Mourad Ouzzani, and Walid G. Aref
Discovering Consensus Patterns in Biological Databases, Mohamed Eltabakh, Walid G. Aref, Mourad Ouzzani, and Mohamed Ali
bdbms -- A Database Management System for Biological Data, Mohamed Eltabakh, Mourad Ouzzani, and Walid G. Aref
Exploiting predicate-window semantics over data streams, Thanaa Ghanem, Walid G. Aref, and Ahmed Elmagarmid
Adaptive rank-aware query optimization in relational databases, Ihab Ilyas, Walid G. Aref, Ahmed Elmagarmid, Hicham Elmongui, Rahul Shah, and Jeffrey S. Vitter
Adaptive rank-aware query optimization in relational databases, Ihab Ilyas, Walid G. Aref, Ahmed Elmagarmid, Hicham Elmongui, Rahul Shah, and Jeffrey S. Vitter
Fine-grained role-based delegation in presence of the hybrid role hierarchy, James Joshi and Elisa Bertino
Secure Dissemination of XML Content Using Structure-based Routing, Ashish Kundu and Elisa Bertino
Beyond k-Anonymity A Decision Theoretic Framework for Assessing Privacy Risk, Guy Lebanon, Monica Scannapieco, Mohamed Fouad, and Elisa Bertino
XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!, Pietro Mazzoleni, Elisa Bertino, Bruno Crispo, and Swaminathan Sivasubramanian
Access control enforcement for conversation-based web services, Massimo Mecella, Mourad Ouzzani, Federica Paci, and Elisa Bertino
ABSTRACT Access Control Enforcement for Conversation-based Web Services, Massimo Mecella, Federica Paci, Mourad Ouzzani, and Elisa Bertino
Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems, Giovanni Mella, Elena Ferrari, Elisa Bertino, and Yunhua Koglin
Executing MPI programs on virtual machines in an Internet sharing system, Zhelong Pan, Xiaojuan Ren, Rudolf Eigenmann, and Dongyan Xu
Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints, Basit Shafiq, Arjmand Samuel, Elisa Bertino, and Arif Ghafoor
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach, Anna Squicciarini, Elisa Bertino, Elena Ferrari, and Indrakshi Ray
Trust Negotiations with Customizable Anonymity, Anna Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, and Indrakshi Ray
Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management, Anna Squicciarini, Abhilasha Bhargav-Spantzel, Alexie Czeskis, and Elisa Bertino
Access control, confidentiality and privacy for video surveillance databases, Bhavani Thuraisingham, Gal Lavee, Elisa Bertino, Jianoping Fan, and Latifur Khan
Private Updates to Anonymous Databases, Alberto Trombetta and Elisa Bertino
A semantic approach to build personalized interfaces in the cultural heritage domain, Stefano Valtolina, Pietro Mazzoleni, Stefano Franzoni, and Elisa Bertino
Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information, Xiaoxin Wu, Jun Liu, Xiaoyan Hong, and Elisa Bertino
LUGrid: Update-tolerant Grid-based Indexing for Moving Objects, Xiopeng Xiong, Mohamed Mokbel, and Walid G. Aref