TRBAC: A temporal role-based access control model E Bertino, PA Bonatti, E Ferrari ACM Transactions on Information and System Security (TISSEC) 4 (3), 191-233, 2001 | 907 | 2001 |
State-of-the-art in privacy preserving data mining VS Verykios, E Bertino, IN Fovino, LP Provenza, Y Saygin, Y Theodoridis ACM Sigmod Record 33 (1), 50-57, 2004 | 738 | 2004 |
The specification and enforcement of authorization constraints in workflow management systems E Bertino, E Ferrari, V Atluri ACM Transactions on Information and System Security (TISSEC) 2 (1), 65-104, 1999 | 628 | 1999 |
A generalized temporal role-based access control model JBD Joshi, E Bertino, U Latif, A Ghafoor Knowledge and Data Engineering, IEEE Transactions on 17 (1), 4-23, 2005 | 603 | 2005 |
Association rule hiding VS Verykios, AK Elmagarmid, E Bertino, Y Saygin, E Dasseni Knowledge and Data Engineering, IEEE Transactions on 16 (4), 434-447, 2004 | 448 | 2004 |
A model of authorization for next-generation database systems F Rabitti, E Bertino, W Kim, D Woelk ACM Transactions on Database Systems (TODS) 16 (1), 88-131, 1991 | 433 | 1991 |
Secure and selective dissemination of XML documents E Bertino, E Ferrari ACM Transactions on Information and System Security (TISSEC) 5 (3), 290-331, 2002 | 406 | 2002 |
Disclosure limitation of sensitive rules M Atallah, E Bertino, A Elmagarmid, M Ibrahim, V Verykios Knowledge and Data Engineering Exchange, 1999.(KDEX'99) Proceedings. 1999 ..., 1999 | 395 | 1999 |
A unified framework for enforcing multiple access control policies S Jajodia, P Samarati, VS Subrahmanian, E Bertino ACM Sigmod Record 26 (2), 474-485, 1997 | 384 | 1997 |
Composite objects revisited W Kim, E Bertino, JF Garza ACM Sigmod Record 18 (2), 337-347, 1989 | 381 | 1989 |
Database security-concepts, approaches, and challenges E Bertino, R Sandhu Dependable and Secure Computing, IEEE Transactions on 2 (1), 2-19, 2005 | 377 | 2005 |
Indexing techniques for queries on nested objects E Bertino, W Kim Knowledge and Data Engineering, IEEE Transactions on 1 (2), 196-214, 1989 | 343 | 1989 |
A view mechanism for object-oriented databases E Bertino Advances in Database Technology—EDBT'92, 136-151, 1992 | 300 | 1992 |
Trust-𝒳;: a peer-to-peer framework for trust establishment E Bertino, E Ferrari, AC Squicciarini Knowledge and Data Engineering, IEEE Transactions on 16 (7), 827-842, 2004 | 295 | 2004 |
Object-oriented database systems: concepts and architectures E Bertino, L Martino Addison-Wesley Longman Publishing Co., Inc., 1993 | 290 | 1993 |
A logical framework for reasoning about access control models E Bertino, B Catania, E Ferrari, P Perlasca ACM Transactions on Information and System Security (TISSEC) 6 (1), 71-127, 2003 | 287 | 2003 |
Hiding association rules by using confidence and support E Dasseni, VS Verykios, AK Elmagarmid, E Bertino Information Hiding, 369-383, 2001 | 275 | 2001 |
An access control model supporting periodicity constraints and temporal reasoning E Bertino, C Bettini, E Ferrari, P Samarati ACM Transactions on Database Systems (TODS) 23 (3), 231-285, 1998 | 275 | 1998 |
Privacy-aware role-based access control Q Ni, E Bertino, J Lobo, C Brodie, CM Karat, J Karat, A Trombeta ACM Transactions on Information and System Security (TISSEC) 13 (3), 24, 2010 | 263 | 2010 |
Securing XML documents with Author-X E Bertino, S Castano, E Ferrari Internet Computing, IEEE 5 (3), 21-31, 2001 | 262 | 2001 |
GEO-RBAC: a spatially aware RBAC E Bertino, B Catania, ML Damiani, P Perlasca Proceedings of the tenth ACM symposium on Access control models and ..., 2005 | 252 | 2005 |
Specifying and enforcing access control policies for XML document sources E Bertino, S Castano, E Ferrari, M Mesiti World Wide Web 3 (3), 139-151, 2000 | 251 | 2000 |
Purpose based access control of complex data for privacy protection JW Byun, E Bertino, N Li Proceedings of the tenth ACM symposium on Access control models and ..., 2005 | 238 | 2005 |
Preserving user location privacy in mobile data management infrastructures R Cheng, Y Zhang, E Bertino, S Prabhakar Privacy Enhancing Technologies, 393-412, 2006 | 235 | 2006 |
Object-oriented database management systems: concepts and issues E Bertino, L Martino Computer 24 (4), 33-47, 1991 | 235 | 1991 |
Efficient k-anonymization using clustering techniques JW Byun, A Kamra, E Bertino, N Li Advances in Databases: Concepts, Systems and Applications, 188-200, 2007 | 213 | 2007 |
Secure interoperation in a multidomain environment employing RBAC policies B Shafiq, JBD Joshi, E Bertino, A Ghafoor Knowledge and Data Engineering, IEEE Transactions on 17 (11), 1557-1577, 2005 | 207 | 2005 |
A trust-based context-aware access control model for web-services R Bhatti, E Bertino, A Ghafoor Distributed and Parallel Databases 18 (1), 83-105, 2005 | 198 | 2005 |
Geo-rbac: A spatially aware rbac ML Damiani, E Bertino, B Catania, P Perlasca ACM Transactions on Information and System Security (TISSEC) 10 (1), 2, 2007 | 195 | 2007 |
Object-oriented query languages: The notion and the issues E Bertino, M Negri, G Pelagatti, L Sbattella Knowledge and Data Engineering, IEEE Transactions on 4 (3), 223-237, 1992 | 189 | 1992 |
An advanced commit protocol for MLS distributed database systems I Ray, E Bertino, S Jajodia, L Mancini Proceedings of the 3rd ACM conference on Computer and communications ..., 1996 | 170 | 1996 |
Query processing in a multimedia document system E Bertino, F Rabbiti, S Gibbs ACM Transactions on Information Systems (TOIS) 6 (1), 1-41, 1988 | 170 | 1988 |
Access-control language for multidomain environments JBD Joshi Internet Computing, IEEE 8 (6), 40-50, 2004 | 165 | 2004 |
Secure anonymization for incremental datasets JW Byun, Y Sohn, E Bertino, N Li Secure Data Management, 48-63, 2006 | 163 | 2006 |
A content-based authorization model for digital libraries NR Adam, V Atluri, E Bertino, E Ferrari Knowledge and Data Engineering, IEEE Transactions on 14 (2), 296-315, 2002 | 150 | 2002 |
A flexible authorization mechanism for relational data management systems E Bertino, S Jajodia, P Samarati ACM Transactions on Information Systems (TOIS) 17 (2), 101-140, 1999 | 148 | 1999 |
Selective and authentic third-party distribution of XML documents E Bertino, B Carminati, E Ferrari, B Thuraisingham, A Gupta Knowledge and Data Engineering, IEEE Transactions on 16 (10), 1263-1278, 2004 | 147 | 2004 |
Indexing techniques for advanced database systems E Bertino, BC Ooi, R Sacks-Davis, KL Tan, J Zobel, B Shidlovsky, ... Springer Science & Business Media, 2012 | 145 | 2012 |
A temporal access control mechanism for database systems E Bertino, C Bettini, E Ferrari, P Samarati Knowledge and Data Engineering, IEEE Transactions on 8 (1), 67-80, 1996 | 144 | 1996 |
A framework for evaluating privacy preserving data mining algorithms* E Bertino, IN Fovino, LP Provenza Data Mining and Knowledge Discovery 11 (2), 121-154, 2005 | 142 | 2005 |
X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control R Bhatti, A Ghafoor, E Bertino, JBD Joshi ACM Transactions on Information and System Security (TISSEC) 8 (2), 187-227, 2005 | 142 | 2005 |
A matching algorithm for measuring the structural similarity between an XML document and a DTD and its applications E Bertino, G Guerrini, M Mesiti Information Systems 29 (1), 23-46, 2004 | 141 | 2004 |
On specifying security policies for web documents with an XML-based language E Bertino, S Castano, E Ferrari Proceedings of the sixth ACM symposium on Access control models and ..., 2001 | 141 | 2001 |
An extended authorization model for relational databases E Bertino, P Samarati, S Jajodia Knowledge and Data Engineering, IEEE Transactions on 9 (1), 85-101, 1997 | 139 | 1997 |
Integrating XML and databases E Bertino, B Catania Internet Computing, IEEE 5 (4), 84-88, 2001 | 135 | 2001 |
Supporting multiple access control policies in database systems E Bertino, S Jajodia, P Samarati Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on, 94-107, 1996 | 135 | 1996 |
A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems E Bertino, E Ferrari, V Atluri Proceedings of the second ACM workshop on Role-based access control, 1-12, 1997 | 131 | 1997 |
Privacy-preserving Digital Identity Management for Cloud Computing. E Bertino, F Paci, R Ferrini, N Shang IEEE Data Eng. Bull. 32 (1), 21-27, 2009 | 122 | 2009 |
Temporal hierarchies and inheritance semantics for GTRBAC JBD Joshi, E Bertino, A Ghafoor Proceedings of the seventh ACM symposium on Access control models and ..., 2002 | 122 | 2002 |
Detecting anomalous access patterns in relational databases A Kamra, E Terzi, E Bertino The VLDB Journal 17 (5), 1063-1077, 2008 | 120 | 2008 |
Mining roles with semantic meanings I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo Proceedings of the 13th ACM symposium on Access control models and ..., 2008 | 120 | 2008 |
Intrusion detection in RBAC-administered databases E Bertino, E Terzi, A Kamra, A Vakali Computer security applications conference, 21st annual, 10 pp.-182, 2005 | 116 | 2005 |
An authorization model for a distributed hypertext system P Samarati, E Bertino, S Jajodia Knowledge and Data Engineering, IEEE Transactions on 8 (4), 555-562, 1996 | 110 | 1996 |
Security for web services and service-oriented architectures E Bertino, L Martino, F Paci, A Squicciarini Springer Science & Business Media, 2009 | 109 | 2009 |
Intelligent database systems E Bertino, B Catania, GP Zarri ACM Press; Addison-Wesley, 2001 | 109 | 2001 |
Secure knowledge management: confidentiality, trust, and privacy E Bertino, LR Khan, R Sandhu, B Thuraisingham Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions ..., 2006 | 107 | 2006 |
Privacy preserving schema and data matching M Scannapieco, I Figotin, E Bertino, AK Elmagarmid Proceedings of the 2007 ACM SIGMOD international conference on Management of ..., 2007 | 104 | 2007 |
Privacy and ownership preserving of outsourced medical data E Bertino, BC Ooi, Y Yang, RH Deng Data Engineering, 2005. ICDE 2005. Proceedings. 21st International ..., 2005 | 103 | 2005 |
Controlled access and dissemination of XML documents E Bertino, S Castano, E Ferrari, M Mesiti Proceedings of the 2nd international workshop on Web information and data ..., 1999 | 102 | 1999 |
Watermarking relational databases using optimization-based techniques M Shehab, E Bertino, A Ghafoor Knowledge and Data Engineering, IEEE Transactions on 20 (1), 116-129, 2008 | 101 | 2008 |
Information flow control in object-oriented systems P Samarati, E Bertino, A Ciampichetti, S Jajodia Knowledge and Data Engineering, IEEE Transactions on 9 (4), 524-538, 1997 | 101 | 1997 |
Trust negotiations: concepts, systems, and languages E Bertino, E Ferrari, A Squicciarini Computing in science & engineering 6 (4), 27-34, 2004 | 100 | 2004 |
XML-based specification for Web services document security R Bhatti, E Bertino, A Ghafoor, JBD Joshi Computer 37 (4), 41-49, 2004 | 100 | 2004 |
Author-χ: A Java-Based System For XML Data Protection E Bertino, M Braun, S Castano, E Ferrari, M Mesiti Data and Application Security, 15-26, 2001 | 97 | 2001 |
Index organizations for object-oriented database systems E Bertino, P Foscoli IEEE Transactions on knowledge and data engineering 7 (2), 193-209, 1995 | 94 | 1995 |
Privacy preserving multi-factor authentication with biometrics A Bhargav-Spantzel, A Squicciarini, E Bertino Proceedings of the second ACM workshop on Digital identity management, 63-72, 2006 | 92 | 2006 |
A roadmap for comprehensive online privacy policy management AI Antón, E Bertino, N Li, T Yu Communications of the ACM 50 (7), 109-116, 2007 | 91* | 2007 |
Temporal synchronization models for multimedia data E Bertino, E Ferrari Knowledge and Data Engineering, IEEE Transactions on 10 (4), 612-631, 1998 | 91 | 1998 |
An obligation model bridging access control policies and privacy policies Q Ni, E Bertino, J Lobo Proceedings of the 13th ACM symposium on Access control models and ..., 2008 | 90 | 2008 |
A critique of the ANSI standard on role-based access control N Li, JW Byun, E Bertino Security & Privacy, IEEE 5 (6), 41-49, 2007 | 90 | 2007 |
Access Control in Dynamic XML-Based Web-Services with X-RBAC. R Bhatti, J Joshi, E Bertino, A Ghafoor ICWS 3, 243-249, 2003 | 89 | 2003 |
Dependencies and separation of duty constraints in GTRBAC JBD Joshi, B Shafiq, A Ghafoor, E Bertino Proceedings of the eighth ACM symposium on Access control models and ..., 2003 | 89 | 2003 |
Access control and authorization constraints for ws-bpel E Bertino, J Crampton, F Paci Web Services, 2006. ICWS'06. International Conference on, 275-284, 2006 | 88 | 2006 |
Providing flexibility in information flow control for object oriented systems E Ferrari, P Samarati, E Bertino, S Jajodia Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium on, 130-140, 1997 | 85 | 1997 |
Security analysis of the SASI protocol T Cao, E Bertino, H Lei Dependable and Secure Computing, IEEE Transactions on 6 (1), 73-77, 2009 | 83 | 2009 |
Integration of heterogeneous data repositories by using object-oriented views E Bertino Interoperability in Multidatabase Systems, 1991. IMS'91. Proceedings., First ..., 1991 | 83 | 1991 |
A privacy-preserving approach to policy-based content dissemination N Shang, M Nabeel, F Paci, E Bertino Data Engineering (ICDE), 2010 IEEE 26th International Conference on, 944-955, 2010 | 82 | 2010 |
Establishing and protecting digital identity in federation systems A Bhargav-Spantzel, AC Squicciarini, E Bertino Proceedings of the 2005 workshop on Digital identity management, 11-19, 2005 | 82 | 2005 |
A logical framework for reasoning on data access control policies E Bertino, F Buccafurri, E Ferrari, P Rullo Computer Security Foundations Workshop, 1999. Proceedings of the 12th IEEE ..., 1999 | 82 | 1999 |
Private record matching using differential privacy A Inan, M Kantarcioglu, G Ghinita, E Bertino Proceedings of the 13th International Conference on Extending Database ..., 2010 | 79 | 2010 |
On the correctness criteria of fine-grained access control in relational databases Q Wang, T Yu, N Li, J Lobo, E Bertino, K Irwin, JW Byun Proceedings of the 33rd international conference on Very large data bases ..., 2007 | 77 | 2007 |
Objects with multiple most specific classes E Bertino, G Guerrini ECOOP’95—Object-Oriented Programming, 9th European Conference, Åarhus ..., 1995 | 77 | 1995 |
The PROBE Framework for the Personalized Cloaking of Private Locations. ML Damiani, E Bertino, C Silvestri Transactions on Data Privacy 3 (2), 123-148, 2010 | 76 | 2010 |
Access Control Systems for Geospatial Data and Applications ML Damiani, E Bertino Spatial Data on the Web, 189-214, 2007 | 76 | 2007 |
XML and data integration E Bertino, E Ferrari Internet Computing, IEEE 5 (6), 75-76, 2001 | 75 | 2001 |
Integration of heterogeneous database applications through an object-oriented interface E Bertino, M Negri, G Pelagatti, L Sbattella Information systems 14 (5), 407-420, 1989 | 75 | 1989 |
Risk-based access control systems built on fuzzy inferences Q Ni, E Bertino, J Lobo Proceedings of the 5th ACM Symposium on Information, Computer and ..., 2010 | 74 | 2010 |
𝒳-TNL: an XML-based language for trust negotiations E Bertino, E Ferrari, A Squicciarini Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY ..., 2003 | 73 | 2003 |
XACML policy integration algorithms P Mazzoleni, B Crispo, S Sivasubramanian, E Bertino ACM Transactions on Information and System Security (TISSEC) 11 (1), 4, 2008 | 71 | 2008 |
An indexing techniques for object-oriented databases E Bertino Data Engineering, 1991. Proceedings. Seventh International Conference on ..., 1991 | 71 | 1991 |
Access control policy combining: theory meets practice N Li, Q Wang, W Qardaji, E Bertino, P Rao, J Lobo, D Lin Proceedings of the 14th ACM symposium on Access control models and ..., 2009 | 70 | 2009 |
Data security E Bertino, E Ferrari Computer Software and Applications Conference, 1998. COMPSAC'98. Proceedings ..., 1998 | 70 | 1998 |
Challenges and opportunities with big data D Agrawal, P Bernstein, E Bertino, S Davidson, U Dayal, M Franklin, ... A community white paper developed by leading researchers across the United ..., 2012 | 69 | 2012 |
An algebra for fine-grained integration of XACML policies P Rao, D Lin, E Bertino, N Li, J Lobo Proceedings of the 14th ACM symposium on Access control models and ..., 2009 | 69 | 2009 |
A hybrid approach to private record linkage A Inan, M Kantarcioglu, E Bertino, M Scannapieco Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on ..., 2008 | 69 | 2008 |
A survey of quantification of privacy preserving data mining algorithms E Bertino, D Lin, W Jiang Privacy-preserving data mining, 183-205, 2008 | 69 | 2008 |
An approach to evaluate data trustworthiness based on data provenance C Dai, D Lin, E Bertino, M Kantarcioglu Secure Data Management, 82-98, 2008 | 69 | 2008 |
A formal model of views for object-oriented database systems G Guerrini, E Bertino, B Catania, J Garcia-Molina Theory and Practice of Object Systems 3 (3), 157-183, 1997 | 69 | 1997 |
Database security: research and practice E Bertino, S Jajodia, P Samarati Information systems 20 (7), 537-556, 1995 | 68 | 1995 |
Secure collaboration in mediator-free environments M Shehab, E Bertino, A Ghafoor Proceedings of the 12th ACM conference on Computer and communications ..., 2005 | 67 | 2005 |