Data hiding and security in object-oriented databases E Bertino Data Engineering, 1992. Proceedings. Eighth International Conference on, 338-347, 1992 | 67 | 1992 |
A formal temporal object-oriented data model E Bertino, E Ferrari, G Guerrini Advances in Database Technology—EDBT'96, 342-356, 1996 | 66 | 1996 |
Authorizations in relational database management systems E Bertino, P Samarati, S Jajodia Proceedings of the 1st ACM conference on Computer and communications ..., 1993 | 66 | 1993 |
XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! P Mazzoleni, E Bertino, B Crispo, S Sivasubramanian Proceedings of the eleventh ACM symposium on Access control models and ..., 2006 | 65 | 2006 |
A temporal key management scheme for secure broadcasting of XML documents E Bertino, B Carminati, E Ferrari Proceedings of the 9th ACM conference on Computer and communications ..., 2002 | 65 | 2002 |
Preventing velocity-based linkage attacks in location-aware applications G Ghinita, ML Damiani, C Silvestri, E Bertino Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances ..., 2009 | 64 | 2009 |
PP-trust-X: A system for privacy preserving trust negotiations A Squicciarini, E Bertino, E Ferrari, F Paci, B Thuraisingham ACM Transactions on Information and System Security (TISSEC) 10 (3), 12, 2007 | 64 | 2007 |
Trust negotiation in identity management AB Spantzel, AC Squicciarini, E Bertino Security & Privacy, IEEE 5 (2), 55-63, 2007 | 62 | 2007 |
A temporal authorization model E Bertino, C Bettini, P Samarati Proceedings of the 2nd ACM Conference on Computer and Communications ..., 1994 | 62 | 1994 |
Supporting rbac with xacml+ owl R Ferrini, E Bertino Proceedings of the 14th ACM symposium on Access control models and ..., 2009 | 61 | 2009 |
X-gtrbac admin: A decentralized administration model for enterprise-wide access control R Bhatti, B Shafiq, E Bertino, A Ghafoor, JBD Joshi ACM Transactions on Information and System Security (TISSEC) 8 (4), 388-423, 2005 | 61 | 2005 |
Towards a logical model for patterns S Rizzi, E Bertino, B Catania, M Golfarelli, M Halkidi, M Terrovitis, ... Conceptual Modeling-ER 2003, 77-90, 2003 | 61 | 2003 |
Structural signatures for tree data structures A Kundu, E Bertino Proceedings of the VLDB Endowment 1 (1), 138-150, 2008 | 60 | 2008 |
RBAC models—concepts and trends E Bertino Computers & Security 22 (6), 511-514, 2003 | 60 | 2003 |
A practical and flexible key management mechanism for trusted collaborative computing X Zou, YS Dai, E Bertino INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 2008 | 59 | 2008 |
An approach to evaluate policy similarity D Lin, P Rao, E Bertino, J Lobo Proceedings of the 12th ACM symposium on Access control models and ..., 2007 | 58 | 2007 |
Access control enforcement for conversation-based web services M Mecella, M Ouzzani, F Paci, E Bertino Proceedings of the 15th international conference on World Wide Web, 257-266, 2006 | 57 | 2006 |
Privacy preserving policy-based content sharing in public clouds M Nabeel, N Shang, E Bertino Knowledge and Data Engineering, IEEE Transactions on 25 (11), 2602-2614, 2013 | 56 | 2013 |
Using anonymized data for classification A Inan, M Kantarcioglu, E Bertino Data Engineering, 2009. ICDE'09. IEEE 25th International Conference on, 429-440, 2009 | 56 | 2009 |
SERAT: SEcure role mApping technique for decentralized secure interoperability M Shehab, E Bertino, A Ghafoor Proceedings of the tenth ACM symposium on Access control models and ..., 2005 | 56 | 2005 |
Quality control in crowdsourcing systems: Issues and directions M Allahbakhsh, B Benatallah, A Ignjatovic, HR Motahari-Nezhad, ... IEEE Internet Computing, 76-81, 2013 | 54 | 2013 |
Conditional privacy-aware role based access control Q Ni, D Lin, E Bertino, J Lobo Computer Security–ESORICS 2007, 72-89, 2007 | 54 | 2007 |
Privacy-preserving database systems E Bertino, JW Byun, N Li Foundations of Security Analysis and Design III, 178-206, 2005 | 54 | 2005 |
Extending the ODMG object model with time E Bertino, E Ferrari, G Guerrini, I Merlo ECOOP’98—Object-Oriented Programming, 41-66, 1998 | 54 | 1998 |
Identity Management: Concepts, Technologies, and Systems E Bertino, K Takahashi Artech House, 2011 | 53 | 2011 |
Provenance-based trustworthiness assessment in sensor networks HS Lim, YS Moon, E Bertino Proceedings of the Seventh International Workshop on Data Management for ..., 2010 | 53 | 2010 |
An access-control framework for WS-BPEL F Paci, E Bertino, J Crampton International Journal of Web Services Research 5 (3), 20-43, 2008 | 53 | 2008 |
An integrated approach to federated identity and privilege management in open systems R Bhatti, E Bertino, A Ghafoor Communications of the ACM 50 (2), 81-87, 2007 | 53 | 2007 |
D-algebra for composing access control policy decisions Q Ni, E Bertino, J Lobo Proceedings of the 4th International Symposium on Information, Computer, and ..., 2009 | 52 | 2009 |
A multigranular spatiotemporal data model E Camossi, M Bertolotto, E Bertino, G Guerrini Proceedings of the 11th ACM international symposium on Advances in ..., 2003 | 52 | 2003 |
Collaborative commerce and knowledge management B Thuraisingham, A Gupta, E Bertino, E Ferrari MIT Sloan Working Paper, 2001 | 51 | 2001 |
Index configuration in object-oriented databases E Bertino The VLDB Journal—The International Journal on Very Large Data Bases 3 (3 ..., 1994 | 51 | 1994 |
An approach to authorization modeling in object-oriented database systems E Bertino, H Weigand Data & Knowledge Engineering 12 (1), 1-29, 1994 | 51 | 1994 |
Fine-grained role-based delegation in presence of the hybrid role hierarchy JBD Joshi, E Bertino Proceedings of the eleventh ACM symposium on Access control models and ..., 2006 | 50 | 2006 |
Achieving privacy in trust negotiations with an ontology-based approach AC Squicciarini, E Bertino, E Ferrari, I Ray Dependable and Secure Computing, IEEE Transactions on 3 (1), 13-30, 2006 | 50 | 2006 |
A system to specify and manage multipolicy access control models E Bertino, B Catania, E Ferrari, P Perlasca Policies for Distributed Systems and Networks, 2002. Proceedings. Third ..., 2002 | 50 | 2002 |
Anonymous geo-forwarding in manets through location cloaking X Wu, J Liu, X Hong, E Bertino Parallel and Distributed Systems, IEEE Transactions on 19 (10), 1297-1309, 2008 | 49 | 2008 |
A hierarchical access control model for video database systems E Bertino, J Fan, E Ferrari, MS Hacid, AK Elmagarmid, X Zhu ACM Transactions on Information Systems (TOIS) 21 (2), 155-191, 2003 | 49 | 2003 |
Hybrid role hierarchy for generalized temporal role based access control model JBD Joshi, E Bertino, A Ghafoor Computer Software and Applications Conference, 2002. COMPSAC 2002 ..., 2002 | 49 | 2002 |
An access control language for a general provenance model Q Ni, S Xu, E Bertino, R Sandhu, W Han Secure Data Management, 68-88, 2009 | 48 | 2009 |
Manipulating spatial data in constraint databases A Belussi, E Bertino, B Catania Advances in Spatial Databases, 113-141, 1997 | 48 | 1997 |
Towards a logical-object oriented programming language for databases E Bertino, D Montesi Advances in Database Technology—EDBT'92, 168-183, 1992 | 47 | 1992 |
Exception-based information flow control in object-oriented systems E Bertino, S De Capitani Di Vimercati, E Ferrari, P Samarati ACM Transactions on Information and System Security (TISSEC) 1 (1), 26-65, 1998 | 46 | 1998 |
High assurance discretionary access control for object bases E Bertino, P Samarati, S Jajodia Proceedings of the 1st ACM conference on Computer and communications ..., 1993 | 46 | 1993 |
On modeling cost functions for object-oriented databases E Bertino, P Foscoli Knowledge and Data Engineering, IEEE Transactions on 9 (3), 500-508, 1997 | 45 | 1997 |
A Survey of Indexing Techniques for Object-Oriented Database Management Systems. E Bertino Query Processing for Advanced Database Systems, Dagstuhl, 383-418, 1991 | 45 | 1991 |
Privacy-aware role-based access control Q Ni, E Bertino, J Lobo, SB Calo IEEE Security & Privacy, 35-43, 2009 | 44 | 2009 |
A security punctuation framework for enforcing access control on streaming data RV Nehme, E Rundensteiner, E Bertino Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on ..., 2008 | 44 | 2008 |
An extended algebra for constraint databases A Belussi, E Bertino, B Catania Knowledge and Data Engineering, IEEE Transactions on 10 (5), 686-705, 1998 | 44 | 1998 |
An efficient time-bound hierarchical key management scheme for secure broadcasting E Bertino, N Shang, SS Wagstaff Jr Dependable and Secure Computing, IEEE Transactions on 5 (2), 65-70, 2008 | 43 | 2008 |
Micro-views, or on how to protect privacy while enhancing data usability: concepts and challenges JW Byun, E Bertino ACM SIGMOD Record 35 (1), 9-13, 2006 | 43 | 2006 |
An authorization model for geographical maps A Belussi, E Bertino, B Catania, ML Damiani, A Nucita Proceedings of the 12th annual ACM international workshop on Geographic ..., 2004 | 43 | 2004 |
Mining roles with multiple objectives I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo ACM Transactions on Information and System Security (TISSEC) 13 (4), 36, 2010 | 42 | 2010 |
Profiling database application to detect sql injection attacks E Bertino, A Kamra, JP Early Performance, Computing, and Communications Conference, 2007. IPCCC 2007 ..., 2007 | 41 | 2007 |
Privacy-preserving trust negotiations E Bertino, E Ferrari, AC Squicciarini Privacy Enhancing Technologies, 283-301, 2005 | 41 | 2005 |
On the selection of optimal index configuration in OO databases S Choenni, E Bertino, HM Blanken, T Chang Data Engineering, 1994. Proceedings. 10th International Conference, 526-537, 1994 | 41 | 1994 |
Path-index: An approach to the efficient execution of object-oriented queries E Bertino, C Guglielmina Data & Knowledge Engineering 10 (1), 1-27, 1993 | 41 | 1993 |
EXAM: a comprehensive environment for the analysis of access control policies D Lin, P Rao, E Bertino, N Li, J Lobo International Journal of Information Security 9 (4), 253-273, 2010 | 40 | 2010 |
Continuous intersection joins over moving objects R Zhang, D Lin, K Ramamohanarao, E Bertino Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on ..., 2008 | 40 | 2008 |
T_Chimera: a temporal object-oriented data model E Bertino, E Ferrari, G Guerrini TAPOS 3 (2), 103-125, 1997 | 40 | 1997 |
Method precomputation in object-oriented databases E Bertino ACM SIGOIS Bulletin 12 (2-3), 199-212, 1991 | 40 | 1991 |
Development of a Multimedia Jnformation S3stem for an Offke Environment S Christodoulakis, J Vanderbroek, J Li, TLS Wan, Y Wang, M Papa, ... | 40 | 1984 |
Collaboration in multicloud computing environments: Framework and security issues M Singhal, S Chandrasekhar, T Ge, R Sandhu, R Krishnan, GJ Ahn, ... Computer, 76-84, 2013 | 39 | 2013 |
Fine-grained cloaking of sensitive positions in location-sharing applications ML Damiani, C Silvestri, E Bertino IEEE Pervasive Computing, 64-72, 2011 | 39 | 2011 |
Challenges and Opportunities with Big Data 2011-1 D Agrawal, P Bernstein, E Bertino, S Davidson, U Dayal, M Franklin, ... | 39 | 2011 |
Privacy-preserving incremental data dissemination JW Byun, T Li, E Bertino, N Li, Y Sohn Journal of Computer Security 17 (1), 43-68, 2009 | 39 | 2009 |
Data management in RFID applications D Lin, HG Elmongui, E Bertino, BC Ooi Database and Expert Systems Applications, 434-444, 2007 | 39 | 2007 |
An analysis of expressiveness and design issues for the generalized temporal role-based access control model JBD Joshi, E Bertino, A Ghafoor Dependable and Secure Computing, IEEE Transactions on 2 (2), 157-175, 2005 | 39 | 2005 |
An access control model for video database systems E Bertino, MA Hammad, WG Aref, AK Elmagarmid Proceedings of the ninth international conference on Information and ..., 2000 | 39 | 2000 |
Towards privacy preserving access control in the cloud M Nabeel, E Bertino, M Kantarcioglu, B Thuraisingham Collaborative Computing: Networking, Applications and Worksharing ..., 2011 | 38 | 2011 |
Enforcing spatial constraints for mobile RBAC systems MS Kirkpatrick, E Bertino Proceedings of the 15th ACM symposium on Access control models and ..., 2010 | 38 | 2010 |
Policy decomposition for collaborative access control D Lin, P Rao, E Bertino, N Li, J Lobo Proceedings of the 13th ACM symposium on Access control models and ..., 2008 | 38 | 2008 |
A framework for specification and verification of generalized spatio-temporal role based access control model A Samuel, A Ghafoor, E Bertino | 38 | 2007 |
MPGS: An interactive tool for the specification and generation of multimedia presentations E Bertino, E Ferrari, M Stolf Knowledge and Data Engineering, IEEE Transactions on 12 (1), 102-125, 2000 | 38 | 2000 |
A risk management approach to RBAC E Celikela, M Kantarcioglua, B Thuraisingham, E Bertinob | 37 | 2009 |
Measuring the structural similarity among XML documents and DTDs E Bertino, G Guerrini, M Mesiti Journal of Intelligent Information Systems 30 (1), 55-92, 2008 | 37 | 2008 |
X-FEDERATE: a policy engineering framework for federated access management R Bhatti, E Bertino, A Ghafoor Software Engineering, IEEE Transactions on 32 (5), 330-346, 2006 | 37 | 2006 |
A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations S Choi, G Ghinita, E Bertino Database and Expert Systems Applications, 368-384, 2010 | 36 | 2010 |
The SCIFC model for information flow control in web service composition W She, I Yen, B Thuraisingham, E Bertino Web Services, 2009. ICWS 2009. IEEE International Conference on, 1-8, 2009 | 36 | 2009 |
Securing XML data in third-party distribution systems B Carminati, E Ferrari, E Bertino Proceedings of the 14th ACM international conference on Information and ..., 2005 | 36 | 2005 |
Protection and administration of XML data sources E Bertino, S Castano, E Ferrari, M Mesiti Data & Knowledge Engineering 43 (3), 237-260, 2002 | 36 | 2002 |
The design and evaluation of accountable grid computing system W Lee, AC Squicciarini, E Bertino Distributed Computing Systems, 2009. ICDCS'09. 29th IEEE International ..., 2009 | 34 | 2009 |
User tasks and access control overweb services J Thomas, F Paci, E Bertino, P Eugster Web Services, 2007. ICWS 2007. IEEE International Conference on, 60-69, 2007 | 34 | 2007 |
A multigranular object‐oriented framework supporting spatio‐temporal granularity conversions E Camossi, M Bertolotto, E Bertino International Journal of Geographical Information Science 20 (05), 511-534, 2006 | 34 | 2006 |
A fine-grained access control model for web services E Bertino, AC Squicciarini, D Mevi Services Computing, 2004.(SCC 2004). Proceedings. 2004 IEEE International ..., 2004 | 34 | 2004 |
An access control system for a web map management service E Bertino, ML Damiani, D Momini Research Issues on Data Engineering: Web Services for e-Commerce and e ..., 2004 | 34 | 2004 |
A semantic-based execution model for multilevel secure workflows V Atluri, WK Huang, E Bertino Journal of Computer Security 8 (1), 3-41, 2000 | 34 | 2000 |
An execution model for multilevel secure workflows V Atluri, W Huang, E Bertino DBSec, 151-165, 1997 | 34 | 1997 |
Design and implementation of an intrusion response system for relational databases A Kamra, E Bertino Knowledge and Data Engineering, IEEE Transactions on 23 (6), 875-888, 2011 | 33 | 2011 |
R*: A Research Project on Distributed Relational DBMS. LM Haas, PG Selinger, E Bertino, D Daniels, BG Lindsay, GM Lohman, ... IEEE Database Eng. Bull. 5 (4), 28-32, 1982 | 33 | 1982 |
Privacy preserving delegated access control in the storage as a service model M Nabeel, E Bertino Information Reuse and Integration (IRI), 2012 IEEE 13th International ..., 2012 | 32 | 2012 |
Efficient privacy preserving content based publish subscribe systems M Nabeel, N Shang, E Bertino Proceedings of the 17th ACM symposium on Access Control Models and ..., 2012 | 32 | 2012 |
Evolving a Set of DTDs according to a Dynamic Set of XML Documents E Bertino, G Guerrini, M Mesiti, L Tosetto XML-Based Data Management and Multimedia Engineering—EDBT 2002 Workshops, 45-66, 2002 | 32 | 2002 |
Extending the ODMG object model with composite objects E Bertino, G Guerrini ACM SIGPLAN Notices 33 (10), 259-270, 1998 | 32 | 1998 |
Advanced transaction processing in multilevel secure file stores E Bertino, S Jajodia, L Mancini, I Ray Knowledge and Data Engineering, IEEE Transactions on 10 (1), 120-135, 1998 | 32 | 1998 |
Ws-ac: A fine grained access control system for web services E Bertino, AC Squicciarini, I Paloscia, L Martino World Wide Web 9 (2), 143-171, 2006 | 31 | 2006 |
An approach to classify semi-structured objects E Bertino, G Guerrini, I Merlo, M Mesiti ECOOP’99—Object-Oriented Programming, 416-440, 1999 | 31 | 1999 |
Access controls in object-oriented database systems—Some approaches and issues E Bertino, S Jajodia, P Samarati Advanced Database Systems, 17-44, 1993 | 31 | 1993 |
Optimization of queries using nested indices E Bertino Advances in Database Technology—EDBT'90, 44-59, 1990 | 31 | 1990 |
Privacy-preserving and content-protecting location based queries R Paulet, MG Kaosar, X Yi, E Bertino Knowledge and Data Engineering, IEEE Transactions on 26 (5), 1200-1210, 2014 | 30 | 2014 |