Optimization of object-oriented queries using path indices E Bertino, C Guglielmina Research Issues on Data Engineering, 1992: Transaction and Query Processing ..., 1992 | 17 | 1992 |
Reputation management in crowdsourcing systems M Allahbakhsh, A Ignjatovic, B Benatallah, S Beheshti, E Bertino, N Foo Collaborative Computing: Networking, Applications and Worksharing ..., 2012 | 16 | 2012 |
Fine-grained integration of access control policies P Rao, D Lin, E Bertino, N Li, J Lobo Computers & Security 30 (2), 91-107, 2011 | 16 | 2011 |
Location-aware authentication and access control E Bertino, M Kirkpatrick 2009 International Conference on Advanced Information Networking and ..., 2009 | 16 | 2009 |
Towards a fine-grained access control model and mechanisms for semantic databases S Franzoni, P Mazzoleni, S Valtolina, E Bertino Web Services, 2007. ICWS 2007. IEEE International Conference on, 993-1000, 2007 | 16 | 2007 |
Securing dbms: characterizing and detecting query floods E Bertino, T Leggieri, E Terzi Information Security, 195-206, 2004 | 16 | 2004 |
A reference framework for integrating multiple representations of geographical maps A Belussi, B Catania, E Bertino Proceedings of the 11th ACM international symposium on Advances in ..., 2003 | 16 | 2003 |
CONCERTO, an environment for the “intelligent’indexing, querying and retrieval of digital documents GP Zarri, E Bertino, B Black, A Brasher, B Catania, D Deavin, L Di Pace, ... Foundations of Intelligent Systems, 226-234, 1999 | 16 | 1999 |
Towards optimal two-dimensional indexing for constraint databases E Bertino, B Catania, B Shidlovsky Information Processing Letters 64 (1), 1-8, 1997 | 16 | 1997 |
Clustering techniques in object bases: a survey E Bertino, AA Saad, MA Ismail Data & knowledge engineering 12 (3), 255-275, 1994 | 16 | 1994 |
Attribute based group key management M Nabeel, M Yoosuf, E Bertino | 15 | 2014 |
Using automated individual white-list to protect web digital identities W Han, Y Cao, E Bertino, J Yong Expert Systems with Applications 39 (15), 11861-11869, 2012 | 15 | 2012 |
Group-based negotiations in p2p systems AC Squicciarini, F Paci, E Bertino, A Trombetta, S Braghin Parallel and Distributed Systems, IEEE Transactions on 21 (10), 1473-1486, 2010 | 15 | 2010 |
A comprehensive simulation tool for the analysis of password policies R Shay, E Bertino International Journal of Information Security 8 (4), 275-289, 2009 | 15 | 2009 |
Specification and enforcement of flexible security policy for active cooperation Y Sun, B Gong, X Meng, Z Lin, E Bertino Information Sciences 179 (15), 2629-2642, 2009 | 15 | 2009 |
A characterization of the problem of secure provenance management S Xu, Q Ni, E Bertino, R Sandhu Intelligence and Security Informatics, 2009. ISI'09. IEEE International ..., 2009 | 15 | 2009 |
An interoperable approach to multifactor identity verification F Paci, R Ferrini, A Musci, K Steuer Jr, E Bertino Computer, 50-57, 2009 | 15 | 2009 |
Elimination of subjectivity from trust recommendation O Hasan, L Brunie, JM Pierson, E Bertino Trust Management III, 65-80, 2009 | 15 | 2009 |
Access control policy analysis and visualization tools for security professionals K Vaniea, Q Ni, L Cranor, E Bertino Proceedings of the 4th Symposium on Usable Privacy and Security (SOUPS'08), 2008 | 15 | 2008 |
Access control, confidentiality and privacy for video surveillance databases B Thuraisingham, G Lavee, E Bertino, J Fan, L Khan Proceedings of the eleventh ACM symposium on Access control models and ..., 2006 | 15 | 2006 |
Private updates to anonymous databases A Trombetta, E Bertino Data Engineering, 2006. ICDE'06. Proceedings of the 22nd International ..., 2006 | 15 | 2006 |
Querying multiple temporal granularity data I Merlo, E Bertino, E Ferrari, S Gadia, G Guerrini Temporal Representation and Reasoning, 2000. TIME 2000. Proceedings. Seventh ..., 2000 | 15 | 2000 |
A theoretical formulation for degrees of isolation in databases V Atluri, E Bertino, S Jajodia Information and Software Technology 39 (1), 47-53, 1997 | 15 | 1997 |
An analytical model of object-oriented query costs E Bertino, P Foscoli Persistent Object Systems, 241-261, 1993 | 15 | 1993 |
Single-database private information retrieval from fully homomorphic encryption X Yi, MG Kaosar, R Paulet, E Bertino Knowledge and Data Engineering, IEEE Transactions on 25 (5), 1125-1134, 2013 | 14 | 2013 |
Privacy-preserving enforcement of spatially aware RBAC MS Kirkpatrick, G Ghinita, E Bertino Dependable and Secure Computing, IEEE Transactions on 9 (5), 627-640, 2012 | 14 | 2012 |
A role-involved purpose-based access control model ME Kabir, H Wang, E Bertino Information Systems Frontiers 14 (3), 809-822, 2012 | 14 | 2012 |
Publishing time-series data under preservation of privacy and distance orders YS Moon, HS Kim, SP Kim, E Bertino Database and Expert Systems Applications, 17-31, 2010 | 14 | 2010 |
Minimal credential disclosure in trust negotiations F Paci, D Bauer, E Bertino, DM Blough, A Squicciarini, A Gupta Identity in the Information Society 2 (3), 221-239, 2009 | 14 | 2009 |
Privacy-preserving filtering and covering in content-based publish subscribe systems M Nabeel, N Shang, E Bertino Tech. Rep, 2009 | 14 | 2009 |
A policy-based authorization framework for web services: Integrating xgtrbac and ws-policy R Bhatti, D Sanz, E Bertino, A Ghafoor Web Services, 2007. ICWS 2007. IEEE International Conference on, 447-454, 2007 | 14 | 2007 |
Auth-SL-a system for the specification and enforcement of quality-based authentication policies AC Squicciarini, A Bhargav-Spantzel, E Bertino, AB Czeksis Information and Communications Security, 386-397, 2007 | 14 | 2007 |
Workflow authorisation in mediator-free environments M Shehab, E Bertino, A Ghafoor International Journal of Security and Networks 1 (1-2), 2-12, 2006 | 14 | 2006 |
A constraint-based approach for the authoring of multi-topic multimedia presentations E Bertino, E Ferrari, A Perego, D Santi Multimedia and Expo, 2005. ICME 2005. IEEE International Conference on, 578-581, 2005 | 14 | 2005 |
A framework for contractual resource sharing in coalitions BS Firozabadi, M Sergot, A Squicciarin, E Bertino Policies for Distributed Systems and Networks, 2004. POLICY 2004 ..., 2004 | 14 | 2004 |
Max: An access control system for digital libraries and the web E Bertino, E Ferrari, A Perego Computer Software and Applications Conference, 2002. COMPSAC 2002 ..., 2002 | 14 | 2002 |
Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases V Atluri, S Jajodia, E Bertino Knowledge and Data Engineering, IEEE Transactions on 8 (5), 839-854, 1996 | 14 | 1996 |
Sistemas de bases de datos orientadas a objetos: conceptos y arquitecturas E Bertino, L Martino Ediciones Díaz de Santos, 1995 | 14 | 1995 |
Transaction Optimization in Rule Databases EBBCG Guerrini, D Montesi Proc. Fourth IEEE Research Issues in Data Eng.: Active Database Systems ..., 1994 | 14 | 1994 |
An object-oriented data model for distributed office applications E Bertino, M Negri, G Pelagatti, L Sbattella ACM SIGOIS Bulletin 11 (2-3), 216-226, 1990 | 14 | 1990 |
The effects of two-phase locking on the performance of a distributed database management system C Thanos, E Bertino, C Carlesi Performance Evaluation 8 (2), 129-157, 1988 | 14 | 1988 |
Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks M Rezvani, A Ignjatovic, E Bertino, S Jha Dependable and Secure Computing, IEEE Transactions on 12 (1), 98-110, 2015 | 13 | 2015 |
An efficient certificateless encryption for secure data sharing in public clouds SH Seo, M Nabeel, X Ding, E Bertino Knowledge and Data Engineering, IEEE Transactions on 26 (9), 2107-2119, 2014 | 13 | 2014 |
Secure provenance transmission for streaming data S Sultana, M Shehab, E Bertino Knowledge and Data Engineering, IEEE Transactions on 25 (8), 1890-1903, 2013 | 13 | 2013 |
FENCE: Continuous access control enforcement in dynamic data stream environments RV Nehme, HS Lim, E Bertino Proceedings of the third ACM conference on Data and application security and ..., 2013 | 13 | 2013 |
Data protection from insider threats E Bertino Synthesis Lectures on Data Management 4 (4), 1-91, 2012 | 13 | 2012 |
Prox-RBAC: a proximity-based spatially aware RBAC MS Kirkpatrick, ML Damiani, E Bertino Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances ..., 2011 | 13 | 2011 |
Private searching for single and conjunctive keywords on streaming data X Yi, E Bertino Proceedings of the 10th annual ACM workshop on Privacy in the electronic ..., 2011 | 13 | 2011 |
Software techniques to combat drift in puf-based authentication systems MS Kirkpatrick, E Bertino Workshop on Secure Component and System Identification (SECSI 2010), 9, 2010 | 13 | 2010 |
Tagging stream data for rich real-time services RV Nehme, EA Rundensteiner, E Bertino Proceedings of the VLDB Endowment 2 (1), 73-84, 2009 | 13 | 2009 |
Identity-based long running negotiations AC Squicciarini, A Trombetta, E Bertino, S Braghin Proceedings of the 4th ACM workshop on Digital identity management, 97-106, 2008 | 13 | 2008 |
Verification of receipts from M-commerce transactions on NFC cellular phones J Woo, A Bhargav-Spantzel, AC Squicciarini, E Bertino E-Commerce Technology and the Fifth IEEE Conference on Enterprise Computing ..., 2008 | 13 | 2008 |
ARUBA: A risk-utility-based algorithm for data disclosure MR Fouad, G Lebanon, E Bertino Secure Data Management, 32-49, 2008 | 13 | 2008 |
Protecting location privacy through semantics-aware obfuscation techniques ML Damiani, E Bertino, C Silvestri Trust Management II, 231-245, 2008 | 13 | 2008 |
Receipt management-transaction history based trust establishment A Bhargav-Spantzel, J Woo, E Bertino Proceedings of the 2007 ACM workshop on Digital identity management, 82-91, 2007 | 13 | 2007 |
Security in SOA and web services E Bertino, L Martino Services Computing, 2006. SCC'06. IEEE International Conference on, xli-xli, 2006 | 13 | 2006 |
Efficient integration of fine-grained access control in large-scale grid services P Mazzoleni, B Crispo, S Sivasubramanian, E Bertino Services Computing, 2005 IEEE International Conference on 1, 77-84, 2005 | 13 | 2005 |
Secure third party distribution of XML data B Carminati, E Ferrari, E Bertino Data Engineering, 2005. ICDE 2005. Proceedings. 21st International ..., 2005 | 13 | 2005 |
An object-relational approach to the representation of multi-granular spatio-temporal data E Bertino, D Cuadra, P Martínez Advanced Information Systems Engineering, 119-134, 2005 | 13 | 2005 |
A controlled access to spatial data on web E Bertino, ML Damiani 7th AGILE Conference on Geographic Information Science, 82-91, 2004 | 13 | 2004 |
Supporting delegation in secure workflow management systems V Atluri, E Bertino, E Ferrari, P Mazzoleni Data and Applications Security XVII, 190-202, 2004 | 13 | 2004 |
Policy monitoring with user-preferences in PDL E Bertino, A Mileo, A Provetti Proceedings of IJCAI-03 Workshop for Nonmonotonic Reasoning, Action and ..., 2003 | 13 | 2003 |
Selective and authentic third-party distribution of XML documents E Bertino, B Carminati, E Ferrari, B Thuraisingham, A Gupta MIT Sloan working paper, 2002 | 13 | 2002 |
Role based access control models C Bellettini, E Bertino, E Ferrari Information Security Technical Report 6 (2), 21-29, 2001 | 13 | 2001 |
Degrees of isolation, concurrency control protocols, and commit protocols V Atluri, E Bertino, S Jajodia Proceedings of the IFIP WG11. 3 Working Conference on Database Security VII ..., 1994 | 13 | 1994 |
A discretionary access control model with temporal authorizations E Bertino, C Bettini, P Samarati Proceedings of the 1994 workshop on New security paradigms, 102-107, 1994 | 13 | 1994 |
A Bottom-Up Interpreter for a Database Language with Updates and Transactions. E Bertino, B Catania, G Guerrini, M Martelli, D Montesi GULP-PRODE (2), 206-220, 1994 | 13 | 1994 |
Query optimization by using knowledge about data semantics E Bertino, D Musto Data & knowledge engineering 9 (2), 121-155, 1992 | 13 | 1992 |
An approach to support method invocations in object-oriented queries E Bertino, A Quarati Research Issues on Data Engineering, 1992: Transaction and Query Processing ..., 1992 | 13 | 1992 |
A hybrid approach to private record matching A Inan, M Kantarcioglu, G Ghinita, E Bertino Dependable and Secure Computing, IEEE Transactions on 9 (5), 684-698, 2012 | 12 | 2012 |
Leakage-free redactable signatures A Kundu, MJ Atallah, E Bertino Proceedings of the second ACM conference on Data and Application Security ..., 2012 | 12 | 2012 |
A secure multiparty computation privacy preserving OLAP framework over distributed XML data A Cuzzocrea, E Bertino Proceedings of the 2010 ACM symposium on applied computing, 1666-1673, 2010 | 12 | 2010 |
Multi-granular spatio-temporal object models: concepts and research directions E Bertino, E Camossi, M Bertolotto Object Databases, 132-148, 2010 | 12 | 2010 |
Position transformation: a location privacy protection method for moving objects D Lin, E Bertino, R Cheng, S Prabhakar Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on ..., 2008 | 12 | 2008 |
Policy mapper: Administering location-based access-control policies R Bhatti, ML Damiani, DW Bettis, E Bertino Internet Computing, IEEE 12 (2), 38-45, 2008 | 12 | 2008 |
Querying multigranular spatio-temporal objects E Camossi, M Bertolotto, E Bertino Database and Expert Systems Applications, 390-403, 2008 | 12 | 2008 |
A dynamic key management solution to access hierarchy X Zou, Y Karandikar, E Bertino International Journal of Network Management 17 (6), 437-450, 2007 | 12 | 2007 |
Systematic control and management of data integrity JW Byun, Y Sohn, E Bertino Proceedings of the eleventh ACM symposium on Access control models and ..., 2006 | 12 | 2006 |
Dissemination of cultural heritage content through virtual reality and multimedia techniques: a case study S Valtolina, S Franzoni, P Mazzoleni, E Bertino Multimedia Modelling Conference, 2005. MMM 2005. Proceedings of the 11th ..., 2005 | 12 | 2005 |
Threat modelling for SQL Servers E Bertino, D Bruschi, S Franzoni, I Nai-Fovino, S Valtolina Communications and Multimedia Security, 159-171, 2005 | 12 | 2005 |
Merkle tree authentication in UDDI registries E Bertino, B Carminati, E Ferrari Int. J. Web Service Res. 1 (2), 37-57, 2004 | 12 | 2004 |
Viewpoints in object database systems E Bertino, G Guerrini Joint proceedings of the second international software architecture workshop ..., 1996 | 12 | 1996 |
Correctness of semantic integrity checking in database management systems E Bertino, D Musto Acta Informatica 26 (1-2), 25-57, 1988 | 12 | 1988 |
A similarity measure for comparing XACML policies D Lin, P Rao, R Ferrini, E Bertino, J Lobo Knowledge and Data Engineering, IEEE Transactions on 25 (9), 1946-1959, 2013 | 11 | 2013 |
Location-based access control systems for mobile users: concepts and research directions E Bertino, MS Kirkpatrick Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and ..., 2011 | 11 | 2011 |
Privacy-preserving similarity measurement for access control policies E Cho, G Ghinita, E Bertino Proceedings of the 6th ACM workshop on Digital identity management, 3-12, 2010 | 11 | 2010 |
Multifactor identity verification using aggregated proof of knowledge A Bhargav-Spantzel, AC Squicciarini, R Xue, E Bertino Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE ..., 2010 | 11 | 2010 |
Assessing the trustworthiness of location data based on provenance C Dai, HS Lim, E Bertino, YS Moon Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances ..., 2009 | 11 | 2009 |
Approach to supporting continuity of usage in location-based access control ML Damiani, E Bertino, C Silvestri Future Trends of Distributed Computing Systems, 2008. FTDCS'08. 12th IEEE ..., 2008 | 11 | 2008 |
Spatial domains for the administration of location-based access control policies ML Damiani, E Bertino, C Silvestri Journal of Network and Systems Management 16 (3), 277-302, 2008 | 11 | 2008 |
Privacy requirements in identity management solutions A Bhargav-Spantzel, AC Squicciarini, M Young, E Bertino Human Interface and the Management of Information. Interacting in ..., 2007 | 11 | 2007 |
Extended RBAC with role attributes J Yong, E Bertino, MTD Roberts PACIS 2006 Proceedings, 8, 2006 | 11 | 2006 |
Towards a Language for Pattern Manipulation and Querying. E Bertino, B Catania, A Maddalena PaRMa, 2004 | 11 | 2004 |
Handling expiration of multigranular temporal objects E Camossi, E Bertino, M Mesiti, G Guerrini Journal of Logic and Computation 14 (1), 23-50, 2004 | 11 | 2004 |
Content-based filtering of Web documents: The MaX system and the EUFORBIA project E Bertino, E Ferrari, A Perego International Journal of Information Security 2 (1), 45-58, 2003 | 11 | 2003 |
Issues on modeling spatial granularities E Camossi, M Bertolotto, E Bertino, G Guerrini COSIT, 2003 | 11 | 2003 |
Quality of service in multimedia digital libraries E Bertino, AK Elmagarmid, MS Hacid SIGMOD Record 30 (1), 35-40, 2001 | 11 | 2001 |
Measuring the structural similarity among XML documents and DTDs E Bertino, G Guerrini, M Mesiti, I Rivara | 11 | 2001 |
Applying data mining techniques to wafer manufacturing E Bertino, B Catania, E Caglio Principles of Data Mining and Knowledge Discovery, 41-50, 1999 | 11 | 1999 |
Navigational accesses in a temporal object model E Bertino, E Ferrari, G Guerrini Knowledge and Data Engineering, IEEE Transactions on 10 (4), 656-665, 1998 | 11 | 1998 |