Scholarly papers authored faculty from the Department of Computer Science at Purdue University.

Follow

Submissions from 2007

Link

A System for the Specification and Enforcement of Quality-Based Authentication Policies, Anna Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, and Alexie Czeskis

Link

A privacy preserving assertion based policy language for federation systems, Anna Squicciarini, Ayca Azgin Hintoqlu, Elisa Bertino, and Yucel Saygin

Link

Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations, Anna Squicciarini, Alberto Trombetta, and Elisa Bertino

Link

User Tasks and Access Control overWeb Services, Jacques Thomas, Federica Paci, Elisa Bertino, and Patrick Eugster

Link

Modeling and language support for the management of pattern-bases, Panos Vassiliadis, Spiros Skiadopoulos, Elisa Bertino, Barbara Catania, Anna Maddalena, and Stefano Rizzi

Link

Information carrying identity proof trees, Wiliam Winsborough, Anna Squicciarini, and Elisa Bertino

Link

An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks, Xiaoxin Wu and Elisa Bertino

Link

R-trees with Update Memos, Xiaopeng Xiong and Walid G. Aref

Link

Place: A Distributed Spatio-Temporal Data Stream Management System for Moving Objects, Xiaopeng Xiong, Hicham Elmongui, Xiaoyong Chai, and Walid G. Aref

Link

Decentralized authorization and data security in web content delivery, Danfeng Yao, Yunhua Koglin, Elisa Bertino, and Roberto Tamassia

Link

Replacing Lost or Stolen E-Passports, Jianming Yong and Elisa Bertino

Link

A dynamic key management solution to access hierarchy, Xukai Zou, Yogesh Karandikar, and Elisa Bertino

Submissions from 2006

Scalability Management in Sensor-Network PhenomenaBases, Mohamed Ali, Walid G. Aref, and Ibrahim Kamel

Link

Digital identity management and protection, Elisa Bertino

Link

Policy Languages for Digital Identity Management in Federation Systems, Elisa Bertino, Abhilasha Bhargav-Spantzel, and Anna Squicciarini

Link

Access Control and Authorization Constraints for WS-BPEL, Elisa Bertino, Jason Crampton, and Federica Paci

Link

Secure knowledge management: confidentiality, trust, and privacy, Elisa Bertino, Latifur Khan, Ravi Sandhu, and Bhavani Thuraisingham

Link

Security in SOA and Web Services, Elisa Bertino and Lorenzo D. Martino

Link

Policies and IT Technologies: A Puzzle of Two Pieces, Elisa Bertino and Steve Ruth

Link

A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities, Elisa Bertino and Anna Squicciarini

Link

Ws-AC: A Fine Grained Access Control System for Web Services, Elisa Bertino, Anna Squicciarini, Ivan Paloscia, and Lorenzo D. Martino

Link

Privacy preserving multi-factor authentication with biometrics, Abhilasha Bhargav-Spantzel, Anna Squicciarini, and Elisa Bertino

Link

X-FEDERATE: A Policy Engineering Framework for Federated Access Management, Rafae Bhatti, Elisa Bertino, and Arif Ghafoor

Link

Micro-views, or on how to protect privacy while enhancing data usability: concepts and challenges, Ji-Won Byun and Elisa Bertino

Link

Systematic control and management of data integrity, Ji-Won Byun, Yonglak Sohn, and Elisa Bertino

Link

Secure Anonymization for Incremental Datasets, Ji-Won Byun, Yonglak Sohn, Elisa Bertino, and Ninghui Li

Link

A multigranular object-oriented framework supporting spatio-temporal granularity conversions, Elena Camossi, Mario Bertolotti, and Elisa Bertino

Link

Preserving User Location Privacy in Mobile Data Management Infrastructures, Reynold Cheng, Yu Zhang, Elisa Bertino, and Sunil Prabhakar

Link

Access Control and Privacy in Location-Aware Services forMobile Organizations, Maria Luisa Damiani and Elisa Bertino

Link

Architectural issues for a location-aware role-based access control system, Maria Luisa Damiani and Elisa Bertino

Link

STAGGER: Periodicity Mining of Data Streams Using Expanding Sliding Windows, Mohamed Elfeky, Walid G. Aref, and Ahmed Elmagarmid

Link

Challenges in spatiotemporal stream query optimization, Hicham Elmongui, Mourad Ouzzani, and Walid G. Aref

Link

Discovering Consensus Patterns in Biological Databases, Mohamed Eltabakh, Walid G. Aref, Mourad Ouzzani, and Mohamed Ali

Link

bdbms -- A Database Management System for Biological Data, Mohamed Eltabakh, Mourad Ouzzani, and Walid G. Aref

Link

Exploiting predicate-window semantics over data streams, Thanaa Ghanem, Walid G. Aref, and Ahmed Elmagarmid

Link

Adaptive rank-aware query optimization in relational databases, Ihab Ilyas, Walid G. Aref, Ahmed Elmagarmid, Hicham Elmongui, Rahul Shah, and Jeffrey S. Vitter

Link

Adaptive rank-aware query optimization in relational databases, Ihab Ilyas, Walid G. Aref, Ahmed Elmagarmid, Hicham Elmongui, Rahul Shah, and Jeffrey S. Vitter

Link

Fine-grained role-based delegation in presence of the hybrid role hierarchy, James Joshi and Elisa Bertino

Link

Secure Dissemination of XML Content Using Structure-based Routing, Ashish Kundu and Elisa Bertino

Link

Beyond k-Anonymity A Decision Theoretic Framework for Assessing Privacy Risk, Guy Lebanon, Monica Scannapieco, Mohamed Fouad, and Elisa Bertino

Link

XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!, Pietro Mazzoleni, Elisa Bertino, Bruno Crispo, and Swaminathan Sivasubramanian

Link

Access control enforcement for conversation-based web services, Massimo Mecella, Mourad Ouzzani, Federica Paci, and Elisa Bertino

Link

ABSTRACT Access Control Enforcement for Conversation-based Web Services, Massimo Mecella, Federica Paci, Mourad Ouzzani, and Elisa Bertino

Link

Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems, Giovanni Mella, Elena Ferrari, Elisa Bertino, and Yunhua Koglin

Link

Executing MPI programs on virtual machines in an Internet sharing system, Zhelong Pan, Xiaojuan Ren, Rudolf Eigenmann, and Dongyan Xu

Link

Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints, Basit Shafiq, Arjmand Samuel, Elisa Bertino, and Arif Ghafoor

Link

Achieving Privacy in Trust Negotiations with an Ontology-Based Approach, Anna Squicciarini, Elisa Bertino, Elena Ferrari, and Indrakshi Ray

Link

Trust Negotiations with Customizable Anonymity, Anna Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, and Indrakshi Ray

Link

Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management, Anna Squicciarini, Abhilasha Bhargav-Spantzel, Alexie Czeskis, and Elisa Bertino

Link

Access control, confidentiality and privacy for video surveillance databases, Bhavani Thuraisingham, Gal Lavee, Elisa Bertino, Jianoping Fan, and Latifur Khan

Link

Private Updates to Anonymous Databases, Alberto Trombetta and Elisa Bertino

Link

A semantic approach to build personalized interfaces in the cultural heritage domain, Stefano Valtolina, Pietro Mazzoleni, Stefano Franzoni, and Elisa Bertino

Link

Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information, Xiaoxin Wu, Jun Liu, Xiaoyan Hong, and Elisa Bertino

Link

LUGrid: Update-tolerant Grid-based Indexing for Moving Objects, Xiopeng Xiong, Mohamed Mokbel, and Walid G. Aref