![]() | 2009 | |
---|---|---|
528 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Thomas Groß, Kenji Takahashi: Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009l ACM 2009 |
527 | ![]() ![]() ![]() ![]() ![]() ![]() | Sheikh Iqbal Ahamed, Elisa Bertino, Carl K. Chang, Vladimir Getov, Lin Liu, Hua Ming, Rajesh Subramanyan: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, 20-24 July 2009 IEEE Computer Society 2009 |
526 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, James B. D. Joshi: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers Springer 2009 |
525 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Michael S. Kirkpatrick: Location-Aware Authentication and Access Control. AINA 2009: 10-15 |
524 | ![]() ![]() ![]() ![]() ![]() ![]() | Qun Ni, Elisa Bertino, Jorge Lobo: D-algebra for composing access control policy decisions. ASIACCS 2009: 298-309 |
523 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Chenyun Dai, Murat Kantarcioglu: The Challenge of Assuring Data Trustworthiness. DASFAA 2009: 22-33 |
522 | ![]() ![]() ![]() ![]() ![]() ![]() | Rimma V. Nehme, Elke A. Rundensteiner, Elisa Bertino: Self-tuning query mesh for adaptive multi-route query processing. EDBT 2009: 803-814 |
521 | ![]() ![]() ![]() ![]() ![]() ![]() | Gabriel Ghinita, Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino: Preventing velocity-based linkage attacks in location-aware applications. GIS 2009: 246-255 |
520 | ![]() ![]() ![]() ![]() ![]() ![]() | Chenyun Dai, Hyo-Sang Lim, Elisa Bertino, Yang-Sae Moon: Assessing the trustworthiness of location data based on provenance. GIS 2009: 276-285 |
519 | ![]() ![]() ![]() ![]() ![]() ![]() | Wonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino: The Design and Evaluation of Accountable Grid Computing System. ICDCS 2009: 145-154 |
518 | ![]() ![]() ![]() ![]() ![]() ![]() | Ali Inan, Murat Kantarcioglu, Elisa Bertino: Using Anonymized Data for Classification. ICDE 2009: 429-440 |
517 | ![]() ![]() ![]() ![]() ![]() ![]() | Rodolfo Ferrini, Elisa Bertino: A Comprehensive Approach for Solving Policy Heterogeneity. ICEIS (3) 2009: 63-68 |
516 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Alfredo Cuzzocrea: Privacy Preserving OLAP over Distributed XML Documents. ICPP Workshops 2009: 603-611 |
515 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei She, I-Ling Yen, Bhavani M. Thuraisingham, Elisa Bertino: The SCIFC Model for Information Flow Control in Web Service Composition. ICWS 2009: 1-8 |
514 | ![]() ![]() ![]() ![]() ![]() ![]() | Federica Paci, Rodolfo Ferrini, Elisa Bertino: Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. ICWS 2009: 535-542 |
513 | ![]() ![]() ![]() ![]() ![]() ![]() | Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer Jr., Jungha Woo, Elisa Bertino: Privacy-preserving management of transactions' receipts for mobile environments. IDtrust 2009: 73-84 |
512 | ![]() ![]() ![]() ![]() ![]() ![]() | Gabriel Ghinita, Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri: Interactive Location Cloaking with the PROBE Obfuscator. Mobile Data Management 2009: 355-356 |
511 | ![]() ![]() ![]() ![]() ![]() ![]() | Federica Paci, Ning Shang, Kevin Steuer Jr., Ruchith Fernando, Elisa Bertino: VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices. Mobile Data Management 2009: 367-368 |
510 | ![]() ![]() ![]() ![]() ![]() ![]() | Prathima Rao, Gabriel Ghinita, Elisa Bertino, Jorge Lobo: Visualization for Access Control Policy Analysis Results Using Multi-level Grids. POLICY 2009: 25-28 |
509 | ![]() ![]() ![]() ![]() ![]() ![]() | Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, Dan Lin: Access control policy combining: theory meets practice. SACMAT 2009: 135-144 |
508 | ![]() ![]() ![]() ![]() ![]() ![]() | Rodolfo Ferrini, Elisa Bertino: Supporting RBAC with XACML+OWL. SACMAT 2009: 145-154 |
507 | ![]() ![]() ![]() ![]() ![]() ![]() | Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo: An algebra for fine-grained integration of XACML policies. SACMAT 2009: 63-72 |
506 | ![]() ![]() ![]() ![]() ![]() ![]() | Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohatgi, Elisa Bertino: Automating role-based provisioning by learning from examples. SACMAT 2009: 75-84 |
505 | ![]() ![]() ![]() ![]() ![]() ![]() | Rimma V. Nehme, Hyo-Sang Lim, Elisa Bertino, Elke A. Rundensteiner: StreamShield: a stream-centric approach towards security and privacy in data stream environments. SIGMOD Conference 2009: 1027-1030 |
504 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino: Assured information sharing: concepts and issues. SIN 2009: 19-20 |
503 | ![]() ![]() ![]() ![]() ![]() ![]() | Elena Camossi, Elisa Bertino, Giovanna Guerrini, Michela Bertolotto: Adaptive Management of Multigranular Spatio-Temporal Object Attributes. SSTD 2009: 320-337 |
502 | ![]() ![]() ![]() ![]() ![]() ![]() | Gabriel Ghinita, Panos Kalnis, Murat Kantarcioglu, Elisa Bertino: A Hybrid Technique for Private Location-Based Queries with Database Protection. SSTD 2009: 98-116 |
501 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael S. Kirkpatrick, Elisa Bertino: Physically restricted authentication with trusted hardware. STC 2009: 55-60 |
500 | ![]() ![]() ![]() ![]() ![]() ![]() | Chenyun Dai, Dan Lin, Murat Kantarcioglu, Elisa Bertino, Ebru Celikel, Bhavani M. Thuraisingham: Query Processing Techniques for Compliance with Data Confidence Policies. Secure Data Management 2009: 49-67 |
499 | ![]() ![]() ![]() ![]() ![]() ![]() | Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu, Weili Han: An Access Control Language for a General Provenance Model. Secure Data Management 2009: 68-88 |
498 | ![]() ![]() ![]() ![]() ![]() ![]() | Federica Paci, Rodolfo Ferrini, Andrea Musci, Kevin Steuer Jr., Elisa Bertino: An Interoperable Approach to Multifactor Identity Verification. IEEE Computer 42(5): 50-57 (2009) |
497 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Federica Paci, Rodolfo Ferrini, Ning Shang: Privacy-preserving Digital Identity Management for Cloud Computing. IEEE Data Eng. Bull. 32(1): 21-27 (2009) |
496 | ![]() ![]() ![]() ![]() ![]() ![]() | Qun Ni, Elisa Bertino, Jorge Lobo, Seraphin B. Calo: Privacy-Aware Role-Based Access Control. IEEE Security & Privacy 7(4): 35-43 (2009) |
495 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, William Cheng-Chung Chu: Guest Editorial: Special Section on Service-Oriented Distributed Computing Systems. IEEE T. Services Computing 2(3): 245-246 (2009) |
494 | ![]() ![]() ![]() ![]() ![]() ![]() | Tianjie Cao, Elisa Bertino, Hong Lei: Security Analysis of the SASI Protocol. IEEE Trans. Dependable Sec. Comput. 6(1): 73-77 (2009) |
493 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuqing Sun, Bin Gong, Xiangxu Meng, Zongkai Lin, Elisa Bertino: Specification and enforcement of flexible security policy for active cooperation. Inf. Sci. 179(15): 2629-2642 (2009) |
492 | ![]() ![]() ![]() ![]() ![]() ![]() | Richard Shay, Elisa Bertino: A comprehensive simulation tool for the analysis of password policies. Int. J. Inf. Sec. 8(4): 275-289 (2009) |
491 | ![]() ![]() ![]() ![]() ![]() ![]() | Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, Yonglak Sohn: Privacy-preserving incremental data dissemination. Journal of Computer Security 17(1): 43-68 (2009) |
490 | ![]() ![]() ![]() ![]() ![]() ![]() | Hangzai Luo, Jianping Fan, Xiaodong Lin, Aoying Zhou, Elisa Bertino: A distributed approach to enabling privacy-preserving model-based classifier training. Knowl. Inf. Syst. 20(2): 157-185 (2009) |
489 | ![]() ![]() ![]() ![]() ![]() ![]() | Rimma V. Nehme, Elke A. Rundensteiner, Elisa Bertino: Tagging Stream Data for Rich Real-Time Services. PVLDB 2(1): 73-84 (2009) |
488 | ![]() ![]() ![]() ![]() ![]() ![]() | Rimma V. Nehme, Karen Works, Elke A. Rundensteiner, Elisa Bertino: Query Mesh: Multi-Route Query Processing Technology. PVLDB 2(2): 1530-1533 (2009) |
487 | ![]() ![]() ![]() ![]() ![]() ![]() | Chenyun Dai, Gabriel Ghinita, Elisa Bertino, Ji-Won Byun, Ninghui Li: TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques. PVLDB 2(2): 1618-1621 (2009) |
486 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino: Privacy-preserving techniques for location-based services. SIGSPATIAL Special 1(2): 2-3 (2009) |
485 | ![]() ![]() ![]() ![]() ![]() ![]() | Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino: Efficient integration of fine-grained access control and resource brokering in grid. The Journal of Supercomputing 49(1): 108-126 (2009) |
484 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Maria Luisa Damiani: Foreword for the special issue of selected papers from the 1st ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS. Transactions on Data Privacy 2(1): 1-2 (2009) |
483 | ![]() ![]() ![]() ![]() ![]() ![]() | Dan Lin, Elisa Bertino, Reynold Cheng, Sunil Prabhakar: Location Privacy in Moving-Object Environments. Transactions on Data Privacy 2(1): 21-46 (2009) |
482 | ![]() ![]() ![]() ![]() ![]() ![]() | Guy Lebanon, Monica Scannapieco, Mohamed R. Fouad, Elisa Bertino: Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk. Transactions on Data Privacy 2(3): 153-183 (2009) |
2008 | ||
481 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Kenji Takahashi: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008 ACM 2008 |
480 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Maria Luisa Damiani: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2008, November 4, 2008, Irvine, California, USA, Proceedings ACM 2008 |
479 | ![]() ![]() ![]() ![]() ![]() ![]() | Yanchun Zhang, Ge Yu, Elisa Bertino, Guandong Xu: Progress in WWW Research and Development, 10th Asia-Pacific Web Conference, APWeb 2008, Shenyang, China, April 26-28, 2008. Proceedings Springer 2008 |
478 | ![]() ![]() ![]() ![]() ![]() ![]() | Anna Cinzia Squicciarini, Wonjun Lee, Elisa Bertino, Carol X. Song: A Policy-Based Accountability Tool for Grid Computing Systems. APSCC 2008: 95-100 |
477 | ![]() ![]() ![]() ![]() ![]() ![]() | Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino: Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems. ARES 2008: 153-160 |
476 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Chenyun Dai, Hyo-Sang Lim, Dan Lin: High-Assurance Integrity Techniques for Databases. BNCOD 2008: 244-256 |
475 | ![]() ![]() ![]() ![]() ![]() ![]() | Jungha Woo, Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino: Verification of Receipts from M-commerce Transactions on NFC Cellular Phones. CEC/EEE 2008: 36-43 |
474 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Rodolfo Ferrini, Andrea Musci, Federica Paci, Kevin J. Steuer: A Federated Digital Identity Management Approach for Business Processes. CollaborateCom 2008: 194-206 |
473 | ![]() ![]() ![]() ![]() ![]() ![]() | Elena Camossi, Michela Bertolotto, Elisa Bertino: Querying Multigranular Spatio-temporal Objects. DEXA 2008: 390-403 |
472 | ![]() ![]() ![]() ![]() ![]() ![]() | Federica Paci, David Bauer, Elisa Bertino, Douglas M. Blough, Anna Cinzia Squicciarini: Minimal credential disclosure in trust negotiations. Digital Identity Management 2008: 89-96 |
471 | ![]() ![]() ![]() ![]() ![]() ![]() | Anna Cinzia Squicciarini, Alberto Trombetta, Elisa Bertino, Stefano Braghin: Identity-based long running negotiations. Digital Identity Management 2008: 97-106 |
470 | ![]() ![]() ![]() ![]() ![]() ![]() | Elena Camossi, Michela Bertolotto, Elisa Bertino: Multigranular spatio-temporal models: implementation challenges. GIS 2008: 63 |
469 | ![]() ![]() ![]() ![]() ![]() ![]() | Anna Cinzia Squicciarini, Ivan Paloscia, Elisa Bertino: Protecting Databases from Query Flood Attacks. ICDE 2008: 1358-1360 |
468 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohamed Nabeel, Elisa Bertino: Secure Delta-Publishing of XML Content. ICDE 2008: 1361-1363 |
467 | ![]() ![]() ![]() ![]() ![]() ![]() | Alberto Trombetta, Wei Jiang, Elisa Bertino, Lorenzo Bossi: Privately Updating Suppression and Generalization based k-Anonymous Databases. ICDE 2008: 1370-1372 |
466 | ![]() ![]() ![]() ![]() ![]() ![]() | Rimma V. Nehme, Elke A. Rundensteiner, Elisa Bertino: A Security Punctuation Framework for Enforcing Access Control on Streaming Data. ICDE 2008: 406-415 |
465 | ![]() ![]() ![]() ![]() ![]() ![]() | Ali Inan, Murat Kantarcioglu, Elisa Bertino, Monica Scannapieco: A Hybrid Approach to Private Record Linkage. ICDE 2008: 496-505 |
464 | ![]() ![]() ![]() ![]() ![]() ![]() | Rui Zhang, Dan Lin, Kotagiri Ramamohanarao, Elisa Bertino: Continuous Intersection Joins Over Moving Objects. ICDE 2008: 863-872 |
463 | ![]() ![]() ![]() ![]() ![]() ![]() | Anna Cinzia Squicciarini, Federica Paci, Elisa Bertino: Trust establishment in the formation of Virtual Organizations. ICDE Workshops 2008: 454-461 |
462 | ![]() ![]() ![]() ![]() ![]() ![]() | Federica Paci, Rodolfo Ferrini, Yuqing Sun, Elisa Bertino: Authorization and User Failure Resiliency for WS-BPEL Business Processes. ICSOC 2008: 116-131 |
461 | ![]() ![]() ![]() ![]() ![]() ![]() | Xukai Zou, Yuan-Shun Dai, Elisa Bertino: A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing. INFOCOM 2008: 538-546 |
460 | ![]() ![]() ![]() ![]() ![]() ![]() | Fatih Turkmen, Pietro Mazzoleni, Bruno Crispo, Elisa Bertino: P-CDN: Extending access control capabilities of P2P systems to provide CDN services. ISCC 2008: 480-486 |
459 | ![]() ![]() ![]() ![]() ![]() ![]() | Tianjie Cao, Peng Shen, Elisa Bertino: Cryptanalysis of the LCSS RFID Authentication Protocol. ISECS 2008: 305-309 |
458 | ![]() ![]() ![]() ![]() ![]() ![]() | Roshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Budak Arpinar, Shouhuai Xu: Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). ISIPS 2008: 115-121 |
457 | ![]() ![]() ![]() ![]() ![]() ![]() | Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo: EXAM: An Environment for Access Control Policy Analysis and Management. POLICY 2008: 238-240 |
456 | ![]() ![]() ![]() ![]() ![]() ![]() | Anna Cinzia Squicciarini, Marco Casassa Mont, Abhilasha Bhargav-Spantzel, Elisa Bertino: Automatic Compliance of Privacy Policies in Federated Digital Identity Management. POLICY 2008: 89-92 |
455 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohamed Shehab, Elisa Bertino, Arif Ghafoor: Proactive Role Discovery in Mediator-Free Environments. Peer-to-Peer Computing 2008: 150-159 |
454 | ![]() ![]() ![]() ![]() ![]() ![]() | Ashish Kamra, Elisa Bertino: Database Intrusion Detection and Response. RAID 2008: 400-401 |
453 | ![]() ![]() ![]() ![]() ![]() ![]() | Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo: Policy decomposition for collaborative access control. SACMAT 2008: 103-112 |
452 | ![]() ![]() ![]() ![]() ![]() ![]() | Qun Ni, Elisa Bertino, Jorge Lobo: An obligation model bridging access control policies and privacy policies. SACMAT 2008: 133-142 |
451 | ![]() ![]() ![]() ![]() ![]() ![]() | Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo: Mining roles with semantic meanings. SACMAT 2008: 21-30 |
450 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino: Privacy-Preserving Techniques for Location-Based Services. SEBD 2008: 7-8 |
449 | ![]() ![]() ![]() ![]() ![]() ![]() | Federica Paci, Elisa Bertino, Sam Kerr, Aaron Lint, Anna Cinzia Squicciarini, Jungha Woo: VeryIDX - A Digital Identity Management System for Pervasive Computing Environments. SEUS 2008: 268-279 |
448 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Bhavani M. Thuraisingham, Michael Gertz, Maria Luisa Damiani: Security and privacy for geospatial data: concepts and research directions. SPRINGL 2008: 6-19 |
447 | ![]() ![]() ![]() ![]() ![]() ![]() | Dan Lin, Elisa Bertino, Reynold Cheng, Sunil Prabhakar: Position transformation: a location privacy protection method for moving objects. SPRINGL 2008: 62-71 |
446 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohamed R. Fouad, Guy Lebanon, Elisa Bertino: ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure. Secure Data Management 2008: 32-49 |
445 | ![]() ![]() ![]() ![]() ![]() ![]() | Ashish Kamra, Elisa Bertino, Rimma V. Nehme: Responding to Anomalous Database Requests. Secure Data Management 2008: 50-66 |
444 | ![]() ![]() ![]() ![]() ![]() ![]() | Chenyun Dai, Dan Lin, Elisa Bertino, Murat Kantarcioglu: An Approach to Evaluate Data Trustworthiness Based on Data Provenance. Secure Data Management 2008: 82-98 |
443 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Giovanna Guerrini: Object-Oriented Databases. Wiley Encyclopedia of Computer Science and Engineering 2008 |
442 | ![]() ![]() ![]() ![]() ![]() ![]() | James B. D. Joshi, Elisa Bertino, Arif Ghafoor, Yue Zhang: Formal foundations for hybrid hierarchies in GTRBAC. ACM Trans. Inf. Syst. Secur. 10(4): (2008) |
441 | ![]() ![]() ![]() ![]() ![]() ![]() | Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino: XACML Policy Integration Algorithms. ACM Trans. Inf. Syst. Secur. 11(1): (2008) |
440 | ![]() ![]() ![]() ![]() ![]() ![]() | Arjmand Samuel, Arif Ghafoor, Elisa Bertino: Context-Aware Adaptation of Access-Control Policies. IEEE Internet Computing 12(1): 51-54 (2008) |
439 | ![]() ![]() ![]() ![]() ![]() ![]() | Rafae Bhatti, Maria Luisa Damiani, David W. Bettis, Elisa Bertino: Policy Mapper: Administering Location-Based Access-Control Policies. IEEE Internet Computing 12(2): 38-45 (2008) |
438 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Ning Shang, Samuel S. Wagstaff Jr.: An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting. IEEE Trans. Dependable Sec. Comput. 5(2): 65-70 (2008) |
437 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohamed Shehab, Elisa Bertino, Arif Ghafoor: Watermarking Relational Databases Using Optimization-Based Techniques. IEEE Trans. Knowl. Data Eng. 20(1): 116-129 (2008) |
436 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino: Anonymous Geo-Forwarding in MANETs through Location Cloaking. IEEE Trans. Parallel Distrib. Syst. 19(10): 1297-1309 (2008) |
435 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohamed Shehab, Arif Ghafoor, Elisa Bertino: Secure Collaboration in a Mediator-Free Distributed Environment. IEEE Trans. Parallel Distrib. Syst. 19(10): 1338-1351 (2008) |
434 | ![]() ![]() ![]() ![]() ![]() ![]() | Yunhua Koglin, Danfeng Yao, Elisa Bertino: Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries. IEEE Trans. Parallel Distrib. Syst. 19(5): 615-626 (2008) |
433 | ![]() ![]() ![]() ![]() ![]() ![]() | Ashish Kundu, Elisa Bertino: A New Model for Secure Dissemination of XML Content. IEEE Transactions on Systems, Man, and Cybernetics, Part C 38(3): 292-301 (2008) |
432 | ![]() ![]() ![]() ![]() ![]() ![]() | Federica Paci, Elisa Bertino, Jason Crampton: An Access-Control Framework for WS-BPEL. Int. J. Web Service Res. 5(3): 20-43 (2008) |
431 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Giovanna Guerrini, Marco Mesiti: Measuring the structural similarity among XML documents and DTDs. J. Intell. Inf. Syst. 30(1): 55-92 (2008) |
430 | ![]() ![]() ![]() ![]() ![]() ![]() | Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri: Spatial Domains for the Administration of Location-based Access Control Policies. J. Network Syst. Manage. 16(3): 277-302 (2008) |
429 | ![]() ![]() ![]() ![]() ![]() ![]() | Tianjie Cao, Peng Shen, Elisa Bertino: Cryptanalysis of Some RFID Authentication Protocols. JCM 3(7): 20-27 (2008) |
428 | ![]() ![]() ![]() ![]() ![]() ![]() | Ashish Kundu, Elisa Bertino: Structural signatures for tree data structures. PVLDB 1(1): 138-150 (2008) |
427 | ![]() ![]() ![]() ![]() ![]() ![]() | Ashish Kamra, Evimaria Terzi, Elisa Bertino: Detecting anomalous access patterns in relational databases. VLDB J. 17(5): 1063-1077 (2008) |
2007 | ||
426 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohamed Nabeel, Elisa Bertino: A structure preserving approach for securing XML documents. CollaborateCom 2007: 8-15 |
425 | ![]() ![]() ![]() ![]() ![]() ![]() | Ji-Won Byun, Ashish Kamra, Elisa Bertino, Ninghui Li: Efficient k -Anonymization Using Clustering Techniques. DASFAA 2007: 188-200 |
424 | ![]() ![]() ![]() ![]() ![]() ![]() | Dan Lin, Hicham G. Elmongui, Elisa Bertino, Beng Chin Ooi: Data Management in RFID Applications. DEXA 2007: 434-444 |
423 | ![]() ![]() ![]() ![]() ![]() ![]() | Richard Shay, Abhilasha Bhargav-Spantzel, Elisa Bertino: Password policy simulation and analysis. Digital Identity Management 2007: 1-10 |
422 | ![]() ![]() ![]() ![]() ![]() ![]() | Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bertino: Receipt management- transaction history based trust establishment. Digital Identity Management 2007: 82-91 |
421 | ![]() ![]() ![]() ![]() ![]() ![]() | Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo: Conditional Privacy-Aware Role Based Access Control. ESORICS 2007: 72-89 |
420 | ![]() ![]() ![]() ![]() ![]() ![]() | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Matthew Young, Elisa Bertino: Privacy Requirements in Identity Management Solutions. HCI (9) 2007: 694-702 |
419 | ![]() ![]() ![]() ![]() ![]() ![]() | Anna Cinzia Squicciarini, Alberto Trombetta, Elisa Bertino: Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations. ICDCS 2007: 57 |
418 | ![]() ![]() ![]() ![]() ![]() ![]() | Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Alexei B. Czeksis: Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies. ICICS 2007: 386-397 |
417 | ![]() ![]() ![]() ![]() ![]() ![]() | Rafae Bhatti, Daniel Sanz, Elisa Bertino, Arif Ghafoor: A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy. ICWS 2007: 447-454 |
416 | ![]() ![]() ![]() ![]() ![]() ![]() | Jacques Thomas, Federica Paci, Elisa Bertino, Patrick Eugster: User Tasks and Access Control overWeb Services. ICWS 2007: 60-69 |
415 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Ashish Kamra, James P. Early: Profiling Database Application to Detect SQL Injection Attacks. IPCCC 2007: 449-458 |
414 | ![]() ![]() ![]() ![]() ![]() ![]() | Ebru Celikel, Murat Kantarcioglu, Bhavani M. Thuraisingham, Elisa Bertino: Managing Risks in RBAC Employed Distributed Environments. OTM Conferences (2) 2007: 1548-1566 |
413 | ![]() ![]() ![]() ![]() ![]() ![]() | Prathima Rao, Dan Lin, Elisa Bertino: XACML Function Annotations. POLICY 2007: 178-182 |
412 | ![]() ![]() ![]() ![]() ![]() ![]() | Danfeng Yao, Yunhua Koglin, Elisa Bertino, Roberto Tamassia: Decentralized authorization and data security in web content delivery. SAC 2007: 1654-1661 |
411 | ![]() ![]() ![]() ![]() ![]() ![]() | Dan Lin, Prathima Rao, Elisa Bertino, Jorge Lobo: An approach to evaluate policy similarity. SACMAT 2007: 1-10 |
410 | ![]() ![]() ![]() ![]() ![]() ![]() | Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo: Privacy-aware role based access control. SACMAT 2007: 41-50 |
409 | ![]() ![]() ![]() ![]() ![]() ![]() | Anna Cinzia Squicciarini, Ayça Azgin Hintoglu, Elisa Bertino, Yücel Saygin: A privacy preserving assertion based policy language for federation systems. SACMAT 2007: 51-60 |
408 | ![]() ![]() ![]() ![]() ![]() ![]() | Monica Scannapieco, Ilya Figotin, Elisa Bertino, Ahmed K. Elmagarmid: Privacy preserving schema and data matching. SIGMOD Conference 2007: 653-664 |
407 | ![]() ![]() ![]() ![]() ![]() ![]() | Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun: On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566 |
406 | ![]() ![]() ![]() ![]() ![]() ![]() | William H. Winsborough, Anna Cinzia Squicciarini, Elisa Bertino: Information carrying identity proof trees. WPES 2007: 76-79 |
405 | ![]() ![]() ![]() ![]() ![]() ![]() | Abbie Barbir, Chris Hobbs, Elisa Bertino, Frederick Hirsch, Lorenzo Martino: Challenges of Testing Web Services and Security in SOA Implementations. Test and Analysis of Web Services 2007: 395-440 |
404 | ![]() ![]() ![]() ![]() ![]() ![]() | Maria Luisa Damiani, Elisa Bertino, Barbara Catania, Paolo Perlasca: GEO-RBAC: A spatially aware RBAC. ACM Trans. Inf. Syst. Secur. 10(1): (2007) |
403 | ![]() ![]() ![]() ![]() ![]() ![]() | Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Federica Paci, Bhavani M. Thuraisingham: PP-trust-X: A system for privacy preserving trust negotiations. ACM Trans. Inf. Syst. Secur. 10(3): (2007) |
402 | ![]() ![]() ![]() ![]() ![]() ![]() | Rafae Bhatti, Elisa Bertino, Arif Ghafoor: An integrated approach to federated identity and privilege management in open systems. Commun. ACM 50(2): 81-87 (2007) |
401 | ![]() ![]() ![]() ![]() ![]() ![]() | Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu: A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7): 109-116 (2007) |
400 | ![]() ![]() ![]() ![]() ![]() ![]() | Manolis Terrovitis, Panos Vassiliadis, Spiros Skiadopoulos, Elisa Bertino, Barbara Catania, Anna Maddalena, Stefano Rizzi: Modeling and language support for the management of pattern-bases. Data Knowl. Eng. 62(2): 368-397 (2007) |
399 | ![]() ![]() ![]() ![]() ![]() ![]() | Jianming Yong, Elisa Bertino: Replacing Lost or Stolen E-Passports. IEEE Computer 40(10): 89-91 (2007) |
398 | ![]() ![]() ![]() ![]() ![]() ![]() | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino: Trust Negotiation in Identity Management. IEEE Security & Privacy 5(2): 55-63 (2007) |
397 | ![]() ![]() ![]() ![]() ![]() ![]() | Ninghui Li, Ji-Won Byun, Elisa Bertino: A Critique of the ANSI Standard on Role-Based Access Control. IEEE Security & Privacy 5(6): 41-49 (2007) |
396 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaoxin Wu, Elisa Bertino: An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks. IEEE Trans. Dependable Sec. Comput. 4(4): 252-265 (2007) |
395 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Elena Ferrari, Federica Paci, Loredana Parasiliti Provenza: A system for securing push-based distribution of XML documents. Int. J. Inf. Sec. 6(4): 255-284 (2007) |
394 | ![]() ![]() ![]() ![]() ![]() ![]() | Xukai Zou, Yogesh Karandikar, Elisa Bertino: A dynamic key management solution to access hierarchy. Int. Journal of Network Management 17(6): 437-450 (2007) |
393 | ![]() ![]() ![]() ![]() ![]() ![]() | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Shimon K. Modi, Matthew Young, Elisa Bertino, Stephen J. Elliott: Privacy preserving multi-factor authentication with biometrics. Journal of Computer Security 15(5): 529-560 (2007) |
2006 | ||
392 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefano Valtolina, Pietro Mazzoleni, Stefano Franzoni, Elisa Bertino: A semantic approach to build personalized interfaces in the cultural heritage domain. AVI 2006: 306-309 |
391 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Anna Cinzia Squicciarini: A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities. CSCWD 2006: 14 |
390 | ![]() ![]() ![]() ![]() ![]() ![]() | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino: Privacy preserving multi-factor authentication with biometrics. Digital Identity Management 2006: 63-72 |
389 | ![]() ![]() ![]() ![]() ![]() ![]() | Ashish Kundu, Elisa Bertino: Secure Dissemination of XML Content Using Structure-based Routing. EDOC 2006: 153-164 |
388 | ![]() ![]() ![]() ![]() ![]() ![]() | Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, Indrakshi Ray: Trust Negotiations with Customizable Anonymity. IAT Workshops 2006: 69-72 |
387 | ![]() ![]() ![]() ![]() ![]() ![]() | Alberto Trombetta, Elisa Bertino: Private Updates to Anonymous Databases. ICDE 2006: 116 |
386 | ![]() ![]() ![]() ![]() ![]() ![]() | Basit Shafiq, Arjmand Samuel, Elisa Bertino, Arif Ghafoor: Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints. ICDE 2006: 119 |
385 | ![]() |