2009 | ||
---|---|---|
528 | Elisa Bertino, Thomas Groß, Kenji Takahashi: Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009l ACM 2009 | |
527 | Sheikh Iqbal Ahamed, Elisa Bertino, Carl K. Chang, Vladimir Getov, Lin Liu, Hua Ming, Rajesh Subramanyan: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, 20-24 July 2009 IEEE Computer Society 2009 | |
526 | Elisa Bertino, James B. D. Joshi: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers Springer 2009 | |
525 | Elisa Bertino, Michael S. Kirkpatrick: Location-Aware Authentication and Access Control. AINA 2009: 10-15 | |
524 | Qun Ni, Elisa Bertino, Jorge Lobo: D-algebra for composing access control policy decisions. ASIACCS 2009: 298-309 | |
523 | Elisa Bertino, Chenyun Dai, Murat Kantarcioglu: The Challenge of Assuring Data Trustworthiness. DASFAA 2009: 22-33 | |
522 | Rimma V. Nehme, Elke A. Rundensteiner, Elisa Bertino: Self-tuning query mesh for adaptive multi-route query processing. EDBT 2009: 803-814 | |
521 | Gabriel Ghinita, Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino: Preventing velocity-based linkage attacks in location-aware applications. GIS 2009: 246-255 | |
520 | Chenyun Dai, Hyo-Sang Lim, Elisa Bertino, Yang-Sae Moon: Assessing the trustworthiness of location data based on provenance. GIS 2009: 276-285 | |
519 | Wonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino: The Design and Evaluation of Accountable Grid Computing System. ICDCS 2009: 145-154 | |
518 | Ali Inan, Murat Kantarcioglu, Elisa Bertino: Using Anonymized Data for Classification. ICDE 2009: 429-440 | |
517 | Rodolfo Ferrini, Elisa Bertino: A Comprehensive Approach for Solving Policy Heterogeneity. ICEIS (3) 2009: 63-68 | |
516 | Elisa Bertino, Alfredo Cuzzocrea: Privacy Preserving OLAP over Distributed XML Documents. ICPP Workshops 2009: 603-611 | |
515 | Wei She, I-Ling Yen, Bhavani M. Thuraisingham, Elisa Bertino: The SCIFC Model for Information Flow Control in Web Service Composition. ICWS 2009: 1-8 | |
514 | Federica Paci, Rodolfo Ferrini, Elisa Bertino: Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. ICWS 2009: 535-542 | |
513 | Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer Jr., Jungha Woo, Elisa Bertino: Privacy-preserving management of transactions' receipts for mobile environments. IDtrust 2009: 73-84 | |
512 | Gabriel Ghinita, Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri: Interactive Location Cloaking with the PROBE Obfuscator. Mobile Data Management 2009: 355-356 | |
511 | Federica Paci, Ning Shang, Kevin Steuer Jr., Ruchith Fernando, Elisa Bertino: VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices. Mobile Data Management 2009: 367-368 | |
510 | Prathima Rao, Gabriel Ghinita, Elisa Bertino, Jorge Lobo: Visualization for Access Control Policy Analysis Results Using Multi-level Grids. POLICY 2009: 25-28 | |
509 | Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, Dan Lin: Access control policy combining: theory meets practice. SACMAT 2009: 135-144 | |
508 | Rodolfo Ferrini, Elisa Bertino: Supporting RBAC with XACML+OWL. SACMAT 2009: 145-154 | |
507 | Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo: An algebra for fine-grained integration of XACML policies. SACMAT 2009: 63-72 | |
506 | Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohatgi, Elisa Bertino: Automating role-based provisioning by learning from examples. SACMAT 2009: 75-84 | |
505 | Rimma V. Nehme, Hyo-Sang Lim, Elisa Bertino, Elke A. Rundensteiner: StreamShield: a stream-centric approach towards security and privacy in data stream environments. SIGMOD Conference 2009: 1027-1030 | |
504 | Elisa Bertino: Assured information sharing: concepts and issues. SIN 2009: 19-20 | |
503 | Elena Camossi, Elisa Bertino, Giovanna Guerrini, Michela Bertolotto: Adaptive Management of Multigranular Spatio-Temporal Object Attributes. SSTD 2009: 320-337 | |
502 | Gabriel Ghinita, Panos Kalnis, Murat Kantarcioglu, Elisa Bertino: A Hybrid Technique for Private Location-Based Queries with Database Protection. SSTD 2009: 98-116 | |
501 | Michael S. Kirkpatrick, Elisa Bertino: Physically restricted authentication with trusted hardware. STC 2009: 55-60 | |
500 | Chenyun Dai, Dan Lin, Murat Kantarcioglu, Elisa Bertino, Ebru Celikel, Bhavani M. Thuraisingham: Query Processing Techniques for Compliance with Data Confidence Policies. Secure Data Management 2009: 49-67 | |
499 | Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu, Weili Han: An Access Control Language for a General Provenance Model. Secure Data Management 2009: 68-88 | |
498 | Federica Paci, Rodolfo Ferrini, Andrea Musci, Kevin Steuer Jr., Elisa Bertino: An Interoperable Approach to Multifactor Identity Verification. IEEE Computer 42(5): 50-57 (2009) | |
497 | Elisa Bertino, Federica Paci, Rodolfo Ferrini, Ning Shang: Privacy-preserving Digital Identity Management for Cloud Computing. IEEE Data Eng. Bull. 32(1): 21-27 (2009) | |
496 | Qun Ni, Elisa Bertino, Jorge Lobo, Seraphin B. Calo: Privacy-Aware Role-Based Access Control. IEEE Security & Privacy 7(4): 35-43 (2009) | |
495 | Elisa Bertino, William Cheng-Chung Chu: Guest Editorial: Special Section on Service-Oriented Distributed Computing Systems. IEEE T. Services Computing 2(3): 245-246 (2009) | |
494 | Tianjie Cao, Elisa Bertino, Hong Lei: Security Analysis of the SASI Protocol. IEEE Trans. Dependable Sec. Comput. 6(1): 73-77 (2009) | |
493 | Yuqing Sun, Bin Gong, Xiangxu Meng, Zongkai Lin, Elisa Bertino: Specification and enforcement of flexible security policy for active cooperation. Inf. Sci. 179(15): 2629-2642 (2009) | |
492 | Richard Shay, Elisa Bertino: A comprehensive simulation tool for the analysis of password policies. Int. J. Inf. Sec. 8(4): 275-289 (2009) | |
491 | Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, Yonglak Sohn: Privacy-preserving incremental data dissemination. Journal of Computer Security 17(1): 43-68 (2009) | |
490 | Hangzai Luo, Jianping Fan, Xiaodong Lin, Aoying Zhou, Elisa Bertino: A distributed approach to enabling privacy-preserving model-based classifier training. Knowl. Inf. Syst. 20(2): 157-185 (2009) | |
489 | Rimma V. Nehme, Elke A. Rundensteiner, Elisa Bertino: Tagging Stream Data for Rich Real-Time Services. PVLDB 2(1): 73-84 (2009) | |
488 | Rimma V. Nehme, Karen Works, Elke A. Rundensteiner, Elisa Bertino: Query Mesh: Multi-Route Query Processing Technology. PVLDB 2(2): 1530-1533 (2009) | |
487 | Chenyun Dai, Gabriel Ghinita, Elisa Bertino, Ji-Won Byun, Ninghui Li: TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques. PVLDB 2(2): 1618-1621 (2009) | |
486 | Elisa Bertino: Privacy-preserving techniques for location-based services. SIGSPATIAL Special 1(2): 2-3 (2009) | |
485 | Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino: Efficient integration of fine-grained access control and resource brokering in grid. The Journal of Supercomputing 49(1): 108-126 (2009) | |
484 | Elisa Bertino, Maria Luisa Damiani: Foreword for the special issue of selected papers from the 1st ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS. Transactions on Data Privacy 2(1): 1-2 (2009) | |
483 | Dan Lin, Elisa Bertino, Reynold Cheng, Sunil Prabhakar: Location Privacy in Moving-Object Environments. Transactions on Data Privacy 2(1): 21-46 (2009) | |
482 | Guy Lebanon, Monica Scannapieco, Mohamed R. Fouad, Elisa Bertino: Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk. Transactions on Data Privacy 2(3): 153-183 (2009) | |
2008 | ||
481 | Elisa Bertino, Kenji Takahashi: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008 ACM 2008 | |
480 | Elisa Bertino, Maria Luisa Damiani: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2008, November 4, 2008, Irvine, California, USA, Proceedings ACM 2008 | |
479 | Yanchun Zhang, Ge Yu, Elisa Bertino, Guandong Xu: Progress in WWW Research and Development, 10th Asia-Pacific Web Conference, APWeb 2008, Shenyang, China, April 26-28, 2008. Proceedings Springer 2008 | |
478 | Anna Cinzia Squicciarini, Wonjun Lee, Elisa Bertino, Carol X. Song: A Policy-Based Accountability Tool for Grid Computing Systems. APSCC 2008: 95-100 | |
477 | Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino: Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems. ARES 2008: 153-160 | |
476 | Elisa Bertino, Chenyun Dai, Hyo-Sang Lim, Dan Lin: High-Assurance Integrity Techniques for Databases. BNCOD 2008: 244-256 | |
475 | Jungha Woo, Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino: Verification of Receipts from M-commerce Transactions on NFC Cellular Phones. CEC/EEE 2008: 36-43 | |
474 | Elisa Bertino, Rodolfo Ferrini, Andrea Musci, Federica Paci, Kevin J. Steuer: A Federated Digital Identity Management Approach for Business Processes. CollaborateCom 2008: 194-206 | |
473 | Elena Camossi, Michela Bertolotto, Elisa Bertino: Querying Multigranular Spatio-temporal Objects. DEXA 2008: 390-403 | |
472 | Federica Paci, David Bauer, Elisa Bertino, Douglas M. Blough, Anna Cinzia Squicciarini: Minimal credential disclosure in trust negotiations. Digital Identity Management 2008: 89-96 | |
471 | Anna Cinzia Squicciarini, Alberto Trombetta, Elisa Bertino, Stefano Braghin: Identity-based long running negotiations. Digital Identity Management 2008: 97-106 | |
470 | Elena Camossi, Michela Bertolotto, Elisa Bertino: Multigranular spatio-temporal models: implementation challenges. GIS 2008: 63 | |
469 | Anna Cinzia Squicciarini, Ivan Paloscia, Elisa Bertino: Protecting Databases from Query Flood Attacks. ICDE 2008: 1358-1360 | |
468 | Mohamed Nabeel, Elisa Bertino: Secure Delta-Publishing of XML Content. ICDE 2008: 1361-1363 | |
467 | Alberto Trombetta, Wei Jiang, Elisa Bertino, Lorenzo Bossi: Privately Updating Suppression and Generalization based k-Anonymous Databases. ICDE 2008: 1370-1372 | |
466 | Rimma V. Nehme, Elke A. Rundensteiner, Elisa Bertino: A Security Punctuation Framework for Enforcing Access Control on Streaming Data. ICDE 2008: 406-415 | |
465 | Ali Inan, Murat Kantarcioglu, Elisa Bertino, Monica Scannapieco: A Hybrid Approach to Private Record Linkage. ICDE 2008: 496-505 | |
464 | Rui Zhang, Dan Lin, Kotagiri Ramamohanarao, Elisa Bertino: Continuous Intersection Joins Over Moving Objects. ICDE 2008: 863-872 | |
463 | Anna Cinzia Squicciarini, Federica Paci, Elisa Bertino: Trust establishment in the formation of Virtual Organizations. ICDE Workshops 2008: 454-461 | |
462 | Federica Paci, Rodolfo Ferrini, Yuqing Sun, Elisa Bertino: Authorization and User Failure Resiliency for WS-BPEL Business Processes. ICSOC 2008: 116-131 | |
461 | Xukai Zou, Yuan-Shun Dai, Elisa Bertino: A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing. INFOCOM 2008: 538-546 | |
460 | Fatih Turkmen, Pietro Mazzoleni, Bruno Crispo, Elisa Bertino: P-CDN: Extending access control capabilities of P2P systems to provide CDN services. ISCC 2008: 480-486 | |
459 | Tianjie Cao, Peng Shen, Elisa Bertino: Cryptanalysis of the LCSS RFID Authentication Protocol. ISECS 2008: 305-309 | |
458 | Roshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Budak Arpinar, Shouhuai Xu: Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). ISIPS 2008: 115-121 | |
457 | Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo: EXAM: An Environment for Access Control Policy Analysis and Management. POLICY 2008: 238-240 | |
456 | Anna Cinzia Squicciarini, Marco Casassa Mont, Abhilasha Bhargav-Spantzel, Elisa Bertino: Automatic Compliance of Privacy Policies in Federated Digital Identity Management. POLICY 2008: 89-92 | |
455 | Mohamed Shehab, Elisa Bertino, Arif Ghafoor: Proactive Role Discovery in Mediator-Free Environments. Peer-to-Peer Computing 2008: 150-159 | |
454 | Ashish Kamra, Elisa Bertino: Database Intrusion Detection and Response. RAID 2008: 400-401 | |
453 | Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo: Policy decomposition for collaborative access control. SACMAT 2008: 103-112 | |
452 | Qun Ni, Elisa Bertino, Jorge Lobo: An obligation model bridging access control policies and privacy policies. SACMAT 2008: 133-142 | |
451 | Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo: Mining roles with semantic meanings. SACMAT 2008: 21-30 | |
450 | Elisa Bertino: Privacy-Preserving Techniques for Location-Based Services. SEBD 2008: 7-8 | |
449 | Federica Paci, Elisa Bertino, Sam Kerr, Aaron Lint, Anna Cinzia Squicciarini, Jungha Woo: VeryIDX - A Digital Identity Management System for Pervasive Computing Environments. SEUS 2008: 268-279 | |
448 | Elisa Bertino, Bhavani M. Thuraisingham, Michael Gertz, Maria Luisa Damiani: Security and privacy for geospatial data: concepts and research directions. SPRINGL 2008: 6-19 | |
447 | Dan Lin, Elisa Bertino, Reynold Cheng, Sunil Prabhakar: Position transformation: a location privacy protection method for moving objects. SPRINGL 2008: 62-71 | |
446 | Mohamed R. Fouad, Guy Lebanon, Elisa Bertino: ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure. Secure Data Management 2008: 32-49 | |
445 | Ashish Kamra, Elisa Bertino, Rimma V. Nehme: Responding to Anomalous Database Requests. Secure Data Management 2008: 50-66 | |
444 | Chenyun Dai, Dan Lin, Elisa Bertino, Murat Kantarcioglu: An Approach to Evaluate Data Trustworthiness Based on Data Provenance. Secure Data Management 2008: 82-98 | |
443 | Elisa Bertino, Giovanna Guerrini: Object-Oriented Databases. Wiley Encyclopedia of Computer Science and Engineering 2008 | |
442 | James B. D. Joshi, Elisa Bertino, Arif Ghafoor, Yue Zhang: Formal foundations for hybrid hierarchies in GTRBAC. ACM Trans. Inf. Syst. Secur. 10(4): (2008) | |
441 | Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino: XACML Policy Integration Algorithms. ACM Trans. Inf. Syst. Secur. 11(1): (2008) | |
440 | Arjmand Samuel, Arif Ghafoor, Elisa Bertino: Context-Aware Adaptation of Access-Control Policies. IEEE Internet Computing 12(1): 51-54 (2008) | |
439 | Rafae Bhatti, Maria Luisa Damiani, David W. Bettis, Elisa Bertino: Policy Mapper: Administering Location-Based Access-Control Policies. IEEE Internet Computing 12(2): 38-45 (2008) | |
438 | Elisa Bertino, Ning Shang, Samuel S. Wagstaff Jr.: An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting. IEEE Trans. Dependable Sec. Comput. 5(2): 65-70 (2008) | |
437 | Mohamed Shehab, Elisa Bertino, Arif Ghafoor: Watermarking Relational Databases Using Optimization-Based Techniques. IEEE Trans. Knowl. Data Eng. 20(1): 116-129 (2008) | |
436 | Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino: Anonymous Geo-Forwarding in MANETs through Location Cloaking. IEEE Trans. Parallel Distrib. Syst. 19(10): 1297-1309 (2008) | |
435 | Mohamed Shehab, Arif Ghafoor, Elisa Bertino: Secure Collaboration in a Mediator-Free Distributed Environment. IEEE Trans. Parallel Distrib. Syst. 19(10): 1338-1351 (2008) | |
434 | Yunhua Koglin, Danfeng Yao, Elisa Bertino: Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries. IEEE Trans. Parallel Distrib. Syst. 19(5): 615-626 (2008) | |
433 | Ashish Kundu, Elisa Bertino: A New Model for Secure Dissemination of XML Content. IEEE Transactions on Systems, Man, and Cybernetics, Part C 38(3): 292-301 (2008) | |
432 | Federica Paci, Elisa Bertino, Jason Crampton: An Access-Control Framework for WS-BPEL. Int. J. Web Service Res. 5(3): 20-43 (2008) | |
431 | Elisa Bertino, Giovanna Guerrini, Marco Mesiti: Measuring the structural similarity among XML documents and DTDs. J. Intell. Inf. Syst. 30(1): 55-92 (2008) | |
430 | Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri: Spatial Domains for the Administration of Location-based Access Control Policies. J. Network Syst. Manage. 16(3): 277-302 (2008) | |
429 | Tianjie Cao, Peng Shen, Elisa Bertino: Cryptanalysis of Some RFID Authentication Protocols. JCM 3(7): 20-27 (2008) | |
428 | Ashish Kundu, Elisa Bertino: Structural signatures for tree data structures. PVLDB 1(1): 138-150 (2008) | |
427 | Ashish Kamra, Evimaria Terzi, Elisa Bertino: Detecting anomalous access patterns in relational databases. VLDB J. 17(5): 1063-1077 (2008) | |
2007 | ||
426 | Mohamed Nabeel, Elisa Bertino: A structure preserving approach for securing XML documents. CollaborateCom 2007: 8-15 | |
425 | Ji-Won Byun, Ashish Kamra, Elisa Bertino, Ninghui Li: Efficient k -Anonymization Using Clustering Techniques. DASFAA 2007: 188-200 | |
424 | Dan Lin, Hicham G. Elmongui, Elisa Bertino, Beng Chin Ooi: Data Management in RFID Applications. DEXA 2007: 434-444 | |
423 | Richard Shay, Abhilasha Bhargav-Spantzel, Elisa Bertino: Password policy simulation and analysis. Digital Identity Management 2007: 1-10 | |
422 | Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bertino: Receipt management- transaction history based trust establishment. Digital Identity Management 2007: 82-91 | |
421 | Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo: Conditional Privacy-Aware Role Based Access Control. ESORICS 2007: 72-89 | |
420 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Matthew Young, Elisa Bertino: Privacy Requirements in Identity Management Solutions. HCI (9) 2007: 694-702 | |
419 | Anna Cinzia Squicciarini, Alberto Trombetta, Elisa Bertino: Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations. ICDCS 2007: 57 | |
418 | Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Alexei B. Czeksis: Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies. ICICS 2007: 386-397 | |
417 | Rafae Bhatti, Daniel Sanz, Elisa Bertino, Arif Ghafoor: A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy. ICWS 2007: 447-454 | |
416 | Jacques Thomas, Federica Paci, Elisa Bertino, Patrick Eugster: User Tasks and Access Control overWeb Services. ICWS 2007: 60-69 | |
415 | Elisa Bertino, Ashish Kamra, James P. Early: Profiling Database Application to Detect SQL Injection Attacks. IPCCC 2007: 449-458 | |
414 | Ebru Celikel, Murat Kantarcioglu, Bhavani M. Thuraisingham, Elisa Bertino: Managing Risks in RBAC Employed Distributed Environments. OTM Conferences (2) 2007: 1548-1566 | |
413 | Prathima Rao, Dan Lin, Elisa Bertino: XACML Function Annotations. POLICY 2007: 178-182 | |
412 | Danfeng Yao, Yunhua Koglin, Elisa Bertino, Roberto Tamassia: Decentralized authorization and data security in web content delivery. SAC 2007: 1654-1661 | |
411 | Dan Lin, Prathima Rao, Elisa Bertino, Jorge Lobo: An approach to evaluate policy similarity. SACMAT 2007: 1-10 | |
410 | Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo: Privacy-aware role based access control. SACMAT 2007: 41-50 | |
409 | Anna Cinzia Squicciarini, Ayça Azgin Hintoglu, Elisa Bertino, Yücel Saygin: A privacy preserving assertion based policy language for federation systems. SACMAT 2007: 51-60 | |
408 | Monica Scannapieco, Ilya Figotin, Elisa Bertino, Ahmed K. Elmagarmid: Privacy preserving schema and data matching. SIGMOD Conference 2007: 653-664 | |
407 | Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun: On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566 | |
406 | William H. Winsborough, Anna Cinzia Squicciarini, Elisa Bertino: Information carrying identity proof trees. WPES 2007: 76-79 | |
405 | Abbie Barbir, Chris Hobbs, Elisa Bertino, Frederick Hirsch, Lorenzo Martino: Challenges of Testing Web Services and Security in SOA Implementations. Test and Analysis of Web Services 2007: 395-440 | |
404 | Maria Luisa Damiani, Elisa Bertino, Barbara Catania, Paolo Perlasca: GEO-RBAC: A spatially aware RBAC. ACM Trans. Inf. Syst. Secur. 10(1): (2007) | |
403 | Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Federica Paci, Bhavani M. Thuraisingham: PP-trust-X: A system for privacy preserving trust negotiations. ACM Trans. Inf. Syst. Secur. 10(3): (2007) | |
402 | Rafae Bhatti, Elisa Bertino, Arif Ghafoor: An integrated approach to federated identity and privilege management in open systems. Commun. ACM 50(2): 81-87 (2007) | |
401 | Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu: A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7): 109-116 (2007) | |
400 | Manolis Terrovitis, Panos Vassiliadis, Spiros Skiadopoulos, Elisa Bertino, Barbara Catania, Anna Maddalena, Stefano Rizzi: Modeling and language support for the management of pattern-bases. Data Knowl. Eng. 62(2): 368-397 (2007) | |
399 | Jianming Yong, Elisa Bertino: Replacing Lost or Stolen E-Passports. IEEE Computer 40(10): 89-91 (2007) | |
398 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino: Trust Negotiation in Identity Management. IEEE Security & Privacy 5(2): 55-63 (2007) | |
397 | Ninghui Li, Ji-Won Byun, Elisa Bertino: A Critique of the ANSI Standard on Role-Based Access Control. IEEE Security & Privacy 5(6): 41-49 (2007) | |
396 | Xiaoxin Wu, Elisa Bertino: An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks. IEEE Trans. Dependable Sec. Comput. 4(4): 252-265 (2007) | |
395 | Elisa Bertino, Elena Ferrari, Federica Paci, Loredana Parasiliti Provenza: A system for securing push-based distribution of XML documents. Int. J. Inf. Sec. 6(4): 255-284 (2007) | |
394 | Xukai Zou, Yogesh Karandikar, Elisa Bertino: A dynamic key management solution to access hierarchy. Int. Journal of Network Management 17(6): 437-450 (2007) | |
393 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Shimon K. Modi, Matthew Young, Elisa Bertino, Stephen J. Elliott: Privacy preserving multi-factor authentication with biometrics. Journal of Computer Security 15(5): 529-560 (2007) | |
2006 | ||
392 | Stefano Valtolina, Pietro Mazzoleni, Stefano Franzoni, Elisa Bertino: A semantic approach to build personalized interfaces in the cultural heritage domain. AVI 2006: 306-309 | |
391 | Elisa Bertino, Anna Cinzia Squicciarini: A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities. CSCWD 2006: 14 | |
390 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino: Privacy preserving multi-factor authentication with biometrics. Digital Identity Management 2006: 63-72 | |
389 | Ashish Kundu, Elisa Bertino: Secure Dissemination of XML Content Using Structure-based Routing. EDOC 2006: 153-164 | |
388 | Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, Indrakshi Ray: Trust Negotiations with Customizable Anonymity. IAT Workshops 2006: 69-72 | |
387 | Alberto Trombetta, Elisa Bertino: Private Updates to Anonymous Databases. ICDE 2006: 116 | |
386 | Basit Shafiq, Arjmand Samuel, Elisa Bertino, Arif Ghafoor: Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints. ICDE 2006: 119 | |
385 |