Transactions and updates in deductive databases D Montesi, E Bertino, M Martelli Knowledge and Data Engineering, IEEE Transactions on 9 (5), 784-797, 1997 | 11 | 1997 |
Secure knn query processing in untrusted cloud environments S Choi, G Ghinita, HS Lim, E Bertino Knowledge and Data Engineering, IEEE Transactions on 26 (11), 2818-2831, 2014 | 10 | 2014 |
Marlin: A fine grained randomization approach to defend against ROP attacks A Gupta, S Kerr, MS Kirkpatrick, E Bertino Network and System Security, 293-306, 2013 | 10 | 2013 |
Collusion Detection in Online Rating Systems. M Allahbakhsh, A Ignjatovic, B Benatallah, ... APWeb, 196-207, 2013 | 10 | 2013 |
Privacy preserving olap over distributed xml data: A theoretically-sound secure-multiparty-computation approach A Cuzzocrea, E Bertino Journal of Computer and System Sciences 77 (6), 965-987, 2011 | 10 | 2011 |
A general framework for web content filtering E Bertino, E Ferrari, A Perego World Wide Web 13 (3), 215-249, 2010 | 10 | 2010 |
Guest Editors' Introduction: Data Quality in the Internet Era E Bertino, A Maurino, M Scannapieco IEEE Internet Computing, 11-13, 2010 | 10* | 2010 |
Tiupam: A framework for trustworthiness-centric information sharing S Xu, R Sandhu, E Bertino Trust Management III, 164-175, 2009 | 10 | 2009 |
End-to-end accountability in grid computing systems for coalition information sharing E Bertino, W Lee, AC Squicciarini, B Thuraisingham Proceedings of the 4th annual workshop on Cyber security and information ..., 2008 | 10 | 2008 |
Efficient and secure content processing and distribution by cooperative intermediaries Y Koglin, D Yao, E Bertino Parallel and Distributed Systems, IEEE Transactions on 19 (5), 615-626, 2008 | 10 | 2008 |
Hierarchical domains for decentralized administration of spatially-aware RBAC systems ML Damiani, C Silvestri, E Bertino Availability, Reliability and Security, 2008. ARES 08. Third International ..., 2008 | 10 | 2008 |
High-assurance integrity techniques for databases E Bertino, C Dai, HS Lim, D Lin Sharing Data, Information and Knowledge, 244-256, 2008 | 10 | 2008 |
Managing risks in RBAC employed distributed environments E Celikel, M Kantarcioglu, B Thuraisingham, E Bertino On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA ..., 2007 | 10 | 2007 |
Integrating federated digital identity management and trust negotiation A Bhargav-Spantzel, AC Squicciarini, E Bertino review IEEE Security and Privacy Magazine, 2005 | 10 | 2005 |
Xjoin index: Indexing xml data for efficient handling of branching path expressions E Bertino, B Catania, WQ Wang Data Engineering, 2004. Proceedings. 20th International Conference on, 828, 2004 | 10 | 2004 |
Local Closed-World Assumptions for reasoning about Semantic Web data. E Bertino, A Provetti, F Salvetti APPIA-GULP-PRODE, 314-323, 2003 | 10 | 2003 |
Trust-\ mathcal {X}: An XML Framework for Trust Negotiations E Bertino, E Ferrari, AC Squicciarini Communications and Multimedia Security. Advanced Techniques for Network and ..., 2003 | 10 | 2003 |
Matching an XML Document against a Set of DTDs E Bertino, G Guerrini, M Mesiti Foundations of Intelligent Systems, 412-422, 2002 | 10 | 2002 |
An access control mechanism for large scale data dissemination systems E Bertino, E Ferrari, E Pitoura Research Issues in Data Engineering, 2001. Proceedings. Eleventh ..., 2001 | 10 | 2001 |
Integrated document and knowledge management for the knowledge-based enterprise J McNaught, W Black, F Rinaldi, E Bertino, A Brasher, D Deavin, ... Proceedings of the 3rd International Conference on the practical application ..., 2000 | 10 | 2000 |
Towards optimal indexing for segment databases E Bertino, B Catania, B Shidlovsky Advances in Database Technology—EDBT'98, 39-53, 1998 | 10 | 1998 |
Static analysis of intensional databases in U-Datalog E Bertino, B Catania Proceedings of the fifteenth ACM SIGACT-SIGMOD-SIGART symposium on ..., 1996 | 10 | 1996 |
A non-timestamped authorization model for data management systems E Bertino, S Jajodia, P Samarati Proceedings of the 3rd ACM Conference on Computer and Communications ..., 1996 | 10 | 1996 |
Achieving stricter correctness requirements in multilevel secure databases V Atluri, E Bertino, S Jajodia Research in Security and Privacy, 1993. Proceedings., 1993 IEEE Computer ..., 1993 | 10 | 1993 |
An object-oriented approach to the interconnection of heterogenous databases E Bertino, G Pelagatti, L Sbattella Proceedings of the Workshop on Heterogenous Databases. NSF, 1989 | 10 | 1989 |
Document query processing strategies: cost evaluation and heuristics E Bertino, S Gibbs, F Rabitti ACM SIGOIS Bulletin 9 (2-3), 169-181, 1988 | 10 | 1988 |
Integrity aspects in database management systems E Bertino, D Apuzzo Proc. IEEE Trends and Applications Conference, Making Database Work,(43 {52), 1984 | 10 | 1984 |
Privacy-preserving authentication of trees and graphs A Kundu, E Bertino International journal of information security 12 (6), 467-494, 2013 | 9 | 2013 |
ACConv--An Access Control Model for Conversational Web Services F Paci, M Mecella, M Ouzzani, E Bertino ACM Transactions on the Web (TWEB) 5 (3), 13, 2011 | 9 | 2011 |
xfACL: An extensible functional language for access control Q Ni, E Bertino Proceedings of the 16th ACM symposium on Access control models and ..., 2011 | 9 | 2011 |
Efficient systematic clustering method for k-anonymization ME Kabir, H Wang, E Bertino Acta Informatica 48 (1), 51-66, 2011 | 9 | 2011 |
Biometrics-based identifiers for digital identity management A Bhargav-Spantzel, A Squicciarini, E Bertino, X Kong, W Zhang Proceedings of the 9th Symposium on Identity and Trust on the Internet, 84-96, 2010 | 9 | 2010 |
k-shares: A privacy preserving reputation protocol for decentralized environments O Hasan, L Brunie, E Bertino Security and Privacy–Silver Linings in the Cloud, 253-264, 2010 | 9 | 2010 |
Efficient integration of fine-grained access control and resource brokering in grid P Mazzoleni, B Crispo, S Sivasubramanian, E Bertino The Journal of Supercomputing 49 (1), 108-126, 2009 | 9 | 2009 |
Digital identity protection-concepts and issues E Bertino, F Paci, N Shang 4th International Conference on Availability, Reliability and Security ..., 2009 | 9 | 2009 |
Effective and efficient implementation of an information flow control protocol for service composition W She, I Yen, B Thuraisingham, E Bertino Service-Oriented Computing and Applications (SOCA), 2009 IEEE International ..., 2009 | 9 | 2009 |
A policy-based accountability tool for grid computing systems AC Squicciarini, W Lee, E Bertino, CX Song Asia-Pacific Services Computing Conference, 2008. APSCC'08. IEEE, 95-100, 2008 | 9 | 2008 |
Multigranular spatio-temporal models: implementation challenges E Camossi, M Bertolotto, E Bertino Proceedings of the 16th ACM SIGSPATIAL international conference on Advances ..., 2008 | 9 | 2008 |
Automatic compliance of privacy policies in federated digital identity management A Squicciarini, MC Mont, A Bhargav-Spantzel, E Bertino Policies for Distributed Systems and Networks, 2008. POLICY 2008. IEEE ..., 2008 | 9 | 2008 |
Security for distributed systems—foundations of access control E Bertino, J Crampton Information Assurance: Dependability and Security in Networked Systems, 2008 | 9 | 2008 |
Replacing lost or stolen E-passports J Yong, E Bertino Computer 40 (10), 89-91, 2007 | 9 | 2007 |
Traceable and automatic compliance of privacy policies in federated digital identity management A Squicciarini, A Bhargav-Spantzel, A Czeskis, E Bertino Privacy Enhancing Technologies, 78-98, 2006 | 9 | 2006 |
Towards a contextualized access to the cultural heritage world using 360 Panoramic Images. P Mazzoleni, S Valtolina, S Franzoni, P Mussio, E Bertino SEKE, 416-419, 2006 | 9 | 2006 |
A multi-strategy approach to rating and filtering online resources E Bertino, E Ferrari, A Perego, GP Zarri Database and Expert Systems Applications, 2005. Proceedings. Sixteenth ..., 2005 | 9 | 2005 |
An approach to cooperative updates of XML documents in distributed systems E Bertino, E Ferrari, G Mella Journal of Computer Security 13 (2), 191-242, 2005 | 9 | 2005 |
CiVeDi: a customized virtual environment for database interaction P Mazzoleni, E Bertino, E Ferrari, S Valtolina ACM SIGMOD Record 33 (3), 15-20, 2004 | 9 | 2004 |
PAtterns for Next-generation DAtabase systems: preliminary results of the PANDA project. I Bartolini, E Bertino, B Catania, P Ciaccia, M Golfarelli, M Patella, S Rizzi SEBD, 293-300, 2003 | 9 | 2003 |
UCS-Router: a policy engine for enforcing message routing rules in a universal communication system E Bertino, M Cochinwala, M Mesiti Mobile Data Management, 2002. Proceedings. Third International Conference on ..., 2002 | 9 | 2002 |
Rule termination analysis investigating the interaction between transactions and triggers D Montesi, E Bertino, M Bagnato, P Dearnley Database Engineering and Applications Symposium, 2002. Proceedings ..., 2002 | 9 | 2002 |
A secure publishing service for digital libraries of XML documents E Bertino, B Carminati, E Ferrari Information Security, 347-362, 2001 | 9 | 2001 |
Navigating through multiple temporal granularity objects E Bertino, E Ferrari, G Guerrini, I Merlo Temporal Representation and Reasoning, 2001. TIME 2001. Proceedings. Eighth ..., 2001 | 9 | 2001 |
Enhancing the expressive power of the U-Datalog language E Bertino, B Catania, R Gori Theory and Practice of Logic Programming 1 (01), 105-122, 2001 | 9 | 2001 |
A conceptual annotation approach to indexing in a web-based information system E Bertino, B Catania, GP Zarri Netnomics 2 (3), 247-264, 2000 | 9 | 2000 |
CONCERTO, conceptual indexing, querying and retrieval of digital documents E Bertino, B Black, A Brasher, V Candela, B Catania, D Deavin, LD Pace, ... Multimedia Computing and Systems, 1999. IEEE International Conference on 2 ..., 1999 | 9 | 1999 |
Object evolution in object databases E Bertino, G Guerrini, L Rusca Dynamic Worlds, 219-246, 1999 | 9 | 1999 |
Fault tolerance and recovery in mobile computing systems E Bertino, E Pagani, GP Rossi Recovery Mechanisms in Database Systems (Eds. V. Kumar and M. Hsu). Prentice ..., 1997 | 9 | 1997 |
Trigger inheritance and overriding in active object database systems E Bertino, G Guerrini, I Merlo Deductive and Object-Oriented Databases, 193-210, 1997 | 9 | 1997 |
Performance evaluation of two concurrency control mechanisms in a distributed database system C Thanos, C Carlesi, E Bertino Trends in Information Processing Systems, 266-279, 1981 | 9 | 1981 |
A formal proximity model for RBAC systems A Gupta, MS Kirkpatrick, E Bertino Computers & Security 41, 52-67, 2014 | 8 | 2014 |
Security-aware service composition with fine-grained information flow control W She, IL Yen, B Thuraisingham, E Bertino Services Computing, IEEE Transactions on 6 (3), 330-343, 2013 | 8 | 2013 |
Efficient tree pattern queries on encrypted xml documents J Cao, FY Rao, M Kuzu, E Bertino, M Kantarcioglu Proceedings of the Joint EDBT/ICDT 2013 Workshops, 111-120, 2013 | 8 | 2013 |
PEAR: a hardware based protocol authentication system S Kerr, MS Kirkpatrick, E Bertino Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and ..., 2010 | 8 | 2010 |
Efficient and privacy-preserving enforcement of attribute-based access control N Shang, F Paci, E Bertino Proceedings of the 9th Symposium on Identity and Trust on the Internet, 63-68, 2010 | 8 | 2010 |
Controlling data disclosure in computational PIR protocols N Shang, G Ghinita, Y Zhou, E Bertino Proceedings of the 5th ACM Symposium on Information, Computer and ..., 2010 | 8 | 2010 |
Identity attribute-based role provisioning for human ws-bpel processes F Paci, R Ferrini, E Bertino Web Services, 2009. ICWS 2009. IEEE International Conference on, 535-542, 2009 | 8 | 2009 |
Secure collaboration in a mediator-free distributed environment M Shehab, A Ghafoor, E Bertino Parallel and Distributed Systems, IEEE Transactions on 19 (10), 1338-1351, 2008 | 8 | 2008 |
Secure delta-publishing of XML content M Nabeel, E Bertino Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on ..., 2008 | 8 | 2008 |
Trust evaluation of data provenance C Dai, D Lin, E Bertino, M Kantarcioglu Computer, 2008 | 8 | 2008 |
A privacy preserving assertion based policy language for federation systems AC Squicciarini, AA Hintoglu, E Bertino, Y Saygin Proceedings of the 12th ACM symposium on Access control models and ..., 2007 | 8 | 2007 |
Decentralized authorization and data security in web content delivery D Yao, Y Koglin, E Bertino, R Tamassia Proceedings of the 2007 ACM symposium on Applied computing, 1654-1661, 2007 | 8 | 2007 |
Achieving anonymity in mobile ad hoc networks using fuzzy position information X Wu, J Liu, X Hong, E Bertino Mobile Ad-hoc and Sensor Networks, 461-472, 2006 | 8 | 2006 |
An apples-to-apples comparison of two database journals PA Bernstein, E Bertino, A Heuer, CS Jensen, H Meyer, MT Özsu, ... ACM SIGMOD Record 34 (4), 61-64, 2005 | 8 | 2005 |
An update protocol for XML documents in distributed and cooperative systems Y Koglin, G Mella, E Bertino, E Ferrari Distributed Computing Systems, 2005. ICDCS 2005. Proceedings. 25th IEEE ..., 2005 | 8 | 2005 |
Extending the ODMG object model with triggers E Bertino, G Guerrini, I Merlo Knowledge and Data Engineering, IEEE Transactions on 16 (2), 170-188, 2004 | 8 | 2004 |
An abstraction-based approach to measuring the structural similarity between two unordered XML documents M Mesiti, E Bertino, G Guerrini Proceedings of the 1st international symposium on Information and ..., 2003 | 8 | 2003 |
PDL with Maximum Consistency Monitors E Bertino, A Mileo, A Provetti Foundations of Intelligent Systems, 65-74, 2003 | 8 | 2003 |
Using spatial data access structures for filtering nearest neighbor queries A Belussi, E Bertino, B Catania Data & Knowledge Engineering 40 (1), 1-31, 2002 | 8 | 2002 |
Finitely representable nested relations E Bertino, B Catania, L Wong Information Processing Letters 70 (4), 165-173, 1999 | 8 | 1999 |
Flexible commit protocols for advanced transaction processing L Mancini, I Ray, S Jajodia, E Bertino Advanced Transaction Models and Architectures, 91-124, 1997 | 8 | 1997 |
Context-based Access Control Systems for Mobile Devices B Shebaro, O Oluwatimi, E Bertino Dependable and Secure Computing, IEEE Transactions on 12 (2), 150-163, 2015 | 7 | 2015 |
Identidroid: Android can finally wear its anonymous suit B Shebaro, O Ogunwuyi, D Midi, E Bertino | 7 | 2014 |
Multi-route query processing and optimization RV Nehme, K Works, C Lei, EA Rundensteiner, E Bertino Journal of computer and system sciences 79 (3), 312-329, 2013 | 7 | 2013 |
A lightweight secure provenance scheme for wireless sensor networks S Sultana, G Ghinita, E Bertino, M Shehab Parallel and Distributed Systems (ICPADS), 2012 IEEE 18th International ..., 2012 | 7 | 2012 |
Emerging trends around big data analytics and security: panel R Bhatti, R LaSalle, R Bird, T Grance, E Bertino Proceedings of the 17th ACM symposium on Access Control Models and ..., 2012 | 7 | 2012 |
A flexible approach to multisession trust negotiations AC Squicciarini, E Bertino, A Trombetta, S Braghin Dependable and Secure Computing, IEEE Transactions on 9 (1), 16-29, 2012 | 7 | 2012 |
Towards a differentially private data anonymization MR Fouad, K Elbassioni, E Bertino Purdue Univ., West Lafayette, IN, USA, Tech. Rep. CERIAS 1, 2012, 2012 | 7 | 2012 |
Privacy preserving identity attribute verification in windows cardspace K Steuer Jr, R Fernando, E Bertino Proceedings of the 6th ACM workshop on Digital identity management, 13-16, 2010 | 7 | 2010 |
Mask: a system for privacy-preserving policy-based access to published content M Nabeel, N Shang, J Zage, E Bertino Proceedings of the 2010 ACM SIGMOD International Conference on Management of ..., 2010 | 7 | 2010 |
Systematic clustering method for l-diversity model ME Kabir, H Wang, E Bertino, Y Chi Proceedings of the Twenty-First Australasian Conference on Database ..., 2010 | 7 | 2010 |
Trustworthy information: concepts and mechanisms S Xu, H Qian, F Wang, Z Zhan, E Bertino, R Sandhu Web-Age Information Management, 398-404, 2010 | 7 | 2010 |
Repository management in an intelligent indexing approach for multimedia digital libraries B Armani, B Catania, E Bertino, D Laradi, B Marin, GP Zarri Foundations of Intelligent Systems, 431-440, 2010 | 7 | 2010 |
A distributed approach to enabling privacy-preserving model-based classifier training H Luo, J Fan, X Lin, A Zhou, E Bertino Knowledge and information systems 20 (2), 157-185, 2009 | 7 | 2009 |
Visualization for access control policy analysis results using multi-level grids P Rao, G Ghinita, E Bertino, J Lobo Policies for Distributed Systems and Networks, 2009. POLICY 2009. IEEE ..., 2009 | 7 | 2009 |
Adaptive management of multigranular spatio-temporal object attributes E Camossi, E Bertino, G Guerrini, M Bertolotto Advances in Spatial and Temporal Databases, 320-337, 2009 | 7 | 2009 |
Query processing techniques for compliance with data confidence policies C Dai, D Lin, M Kantarcioglu, E Bertino, E Celikel, B Thuraisingham Secure Data Management, 49-67, 2009 | 7 | 2009 |
Protecting databases from query flood attacks AC Squicciarini, I Paloscia, E Bertino Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on ..., 2008 | 7 | 2008 |
Authorization and user failure resiliency for ws-bpel business processes F Paci, R Ferrini, Y Sun, E Bertino Service-Oriented Computing–ICSOC 2008, 116-131, 2008 | 7 | 2008 |
A system for securing push-based distribution of XML documents E Bertino, E Ferrari, F Paci, LP Provenza International Journal of Information Security 6 (4), 255-284, 2007 | 7 | 2007 |
XACML function annotations P Rao, D Lin, E Bertino Policies for Distributed Systems and Networks, 2007. POLICY'07. Eighth IEEE ..., 2007 | 7 | 2007 |
Access control strategies for virtualized environments in grid computing systems AC Squicciarini, E Bertino, S Goasguen Future Trends of Distributed Computing Systems, 2007. FTDCS'07. 11th IEEE ..., 2007 | 7 | 2007 |