Privacy-aware RBAC-leveraging RBAC for privacy Q Ni, E Bertino, J Lobo IEEE Security and Privacy to appear, 2009 | 4 | 2009 |
Assured information sharing life cycle T Finin, A Joshi, H Kargupta, Y Yesha, J Sachs, E Bertino, N Li, C Clifton, ... Intelligence and Security Informatics, 2009. ISI'09. IEEE International ..., 2009 | 4 | 2009 |
Restricted authentication and encryption for cyber-physical systems M Kirkpatrick, E Bertino, FT Sheldon DHS CPS Workshop Restricted Authentication and Encryption for Cyber-physical ..., 2009 | 4 | 2009 |
Beyond k-anonymity: A decision theoretic framework for assessing privacy risk G Lebanon, M Scannapieco, M Fouad, E Bertino Transactions on Data Privacy, 2009 | 4 | 2009 |
Proactive role discovery in mediator-free environments M Shehab, E Bertino, A Ghafoor Peer-to-Peer Computing, 2008. P2P'08. Eighth International Conference on ..., 2008 | 4 | 2008 |
EXAM: an environment for access control policy analysis and management P Rao, D Lin, E Bertino, N Li, J Lobo Policies for Distributed Systems and Networks, 2008. POLICY 2008. IEEE ..., 2008 | 4 | 2008 |
Semantics-aware obfuscation for location privacy ML Damiani, C Silvestri, E Bertino Journal of Computing Science and Engineering 2 (2), 137-160, 2008 | 4 | 2008 |
" Offizielle" elektronische Version der Publikation (entsprechend ihrem Digital Object Identifier-DOI) N Popovic, D Praetorius, A Schlömerkemper Continuum Mech. Thermodyn 19 (1/2), 67-80, 2007 | 4 | 2007 |
Database security E Bertino, JW Byun, A Kamra Security, Privacy, and Trust in Modern Data Management, 87-101, 2007 | 4 | 2007 |
Structural similarity measures in sources of XML documents G Guerrini, M Mesiti, E Bertino Processing and Managing Complex Data for Decision Support, 247-279, 2006 | 4 | 2006 |
Web content filtering E Bertino, E Ferrari, A Perego Web and Information Security, 112-132, 2006 | 4 | 2006 |
Purpose based access control for privacy protection in database systems E Bertino Database Systems for Advanced Applications, 2-2, 2005 | 4 | 2005 |
Querying private data in moving-object environments R Cheng, Y Zhang, E Bertino, S Prabhakar | 4 | 2005 |
Quality of service specification in video databases E Bertino, T Catarci, AK Elmagarmid IEEE MultiMedia, 71-81, 2003 | 4 | 2003 |
User Preferences VS Minimality in PPDL. E Bertino, A Mileo, A Provetti APPIA-GULP-PRODE, 110-122, 2003 | 4 | 2003 |
Issues on modelling spatial granularity E Camossi, M Bertolotto, E Bertino, G Guerrini in Workshop on fundamental issues in spatial and geographic ontologies, 2003 | 4 | 2003 |
Guest Editors' Introduction: Database Technology on the Web E Bertino, A Bouguettaya IEEE Internet Computing, 31-32, 2002 | 4 | 2002 |
Trbac: A temporal role-based access control model JBD Joshi, E Bertino, U Latif, A Ghafoor ACM Transactions on Information and System Security (TISSEC, 2001 | 4 | 2001 |
Fuzzy and presentation algebras for web and multimedia data E Bertino, D Montesi, A Trombetta Database Engineering and Applications Symposium, 2000 International, 134-142, 2000 | 4 | 2000 |
Computer Security-ESORICS 96: 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings Springer Science & Business Media, 1996 | 4 | 1996 |
Generic Methods in Deductive Object Databases E Bertino, G Guerrini, D Montesi OOIS’94, 210-213, 1995 | 4 | 1995 |
An Approach to Integrate Multimedi Data in a Knowledge Representation System. E Bertino, M Damiani, P Randi Advanced Visual Interfaces, 109-123, 1992 | 4 | 1992 |
Performance Evaluation of Two-Phase Locking Algorithms in a System for Distributed Databases. C Thanos, C Carlesi, E Bertino Symposium on Reliability in Distributed Software and Database Systems, 57-69, 1983 | 4 | 1983 |
A research agenda for the study of entropic social structural evolution, functional roles, adhocratic leadership styles, and credibility in online organizations and knowledge markets SA Matei, E Bertino, M Zhu, C Liu, L Si, B Britt Roles, Trust, and Reputation in Social Media Knowledge Markets, 3-33, 2015 | 3 | 2015 |
Robust multi-factor authentication for fragile communications X Huang, Y Xiang, E Bertino, J Zhou, L Xu Dependable and Secure Computing, IEEE Transactions on 11 (6), 568-581, 2014 | 3 | 2014 |
POSTER: A pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures SH Seo, J Won, E Bertino Proceedings of the 4th ACM conference on data and application security and ..., 2014 | 3 | 2014 |
Private searching on streaming data based on keyword frequency X Yi, E Bertino, J Vaidya, C Xing Dependable and Secure Computing, IEEE Transactions on 11 (2), 155-167, 2014 | 3 | 2014 |
POSTER: Data quality evaluation: integrating security and accuracy L Reznik, E Bertino Proceedings of the 2013 ACM SIGSAC conference on Computer & communications ..., 2013 | 3 | 2013 |
PostgreSQL anomalous query detector B Shebaro, A Sallam, A Kamra, E Bertino Proceedings of the 16th International Conference on Extending Database ..., 2013 | 3 | 2013 |
Elliptic curve cryptography based certificateless hybrid signcryption scheme without pairing S Seo, E Bertino CERIAS, West Lafayette, IN, USA, Tech. Rep. CERIAS TR 10, 2013, 2013 | 3 | 2013 |
Detecting, representing and querying collusion in online rating systems M Allahbakhsh, A Ignjatovic, B Benatallah, SMR Beheshti, N Foo, ... arXiv preprint arXiv:1211.0963, 2012 | 3 | 2012 |
A comprehensive model for provenance S Sultana, E Bertino Advances in Conceptual Modeling, 121-130, 2012 | 3 | 2012 |
Protecting information systems from insider threats-concepts and issues E Bertino Information Reuse and Integration (IRI), 2011 IEEE International Conference ..., 2011 | 3 | 2011 |
A New Class of Buffer Overflow Attacks A Kundu, E Bertino Distributed Computing Systems (ICDCS), 2011 31st International Conference on ..., 2011 | 3 | 2011 |
Profile-Based Selection of Accountability Policies in Grid Computing Systems W Lee, AC Squicciarini, E Bertino Policies for Distributed Systems and Networks (POLICY), 2011 IEEE ..., 2011 | 3 | 2011 |
A federated digital identity management approach for business processes E Bertino, R Ferrini, A Musci, F Paci, KJ Steuer Collaborative Computing: Networking, Applications and Worksharing, 194-206, 2009 | 3 | 2009 |
An architecture for contextual insider threat detection M Kirkpatrick, E Bertino, F Sheldon cspurdueedu, 2009 | 3 | 2009 |
VeryIDX-A digital identity management system for pervasive computing environments F Paci, E Bertino, S Kerr, A Lint, A Squicciarini, J Woo Software Technologies for Embedded and Ubiquitous Systems, 268-279, 2008 | 3 | 2008 |
Trust negotiations with customizable anonymity AC Squicciarini, A Barghav-Spantzel, E Bertino, E Ferrari, I Ray Web Intelligence and Intelligent Agent Technology Workshops, 2006. WI-IAT ..., 2006 | 3 | 2006 |
A policy-based authorization system for web services: integrating x-gtrbac and ws-policy R Bhatti, D Sanz, E Bertino, A Ghafoor Tech. Rep. 2006-03, Center for Education and Research in Information ..., 2006 | 3 | 2006 |
Integration of virtual reality and database system techniques E Bertino, S Franzoni, P Mazzoleni, S Valtolina Databases in Networked Information Systems, 92-103, 2005 | 3 | 2005 |
Spatial knowledge-based applications and technologies: Research issues E Bertino, ML Damiani Knowledge-Based Intelligent Information and Engineering Systems, 324-328, 2005 | 3 | 2005 |
Reasoning about RDF statements with default rules E Bertino, A Provetti, F Salvetti Proc. of the Rule Languages for Interoperability Conf, 2005 | 3 | 2005 |
Vision paper: Micro-views, or on how to protect privacy while enhancing data usability JW Byun, E Bertino in SIGMOD Record, 2005 | 3 | 2005 |
Distributed and cooperative updates of xml documents G Mella, E Bertino, E Ferrari, N Li, J Joshi Ph. D. thesis, University of Milano, DICO Department, Milano, Italy ..., 2004 | 3 | 2004 |
Special issue on web data integration MS Hacid Information Systems 29 (1), 1-2, 2004 | 3 | 2004 |
PBMS Querying and Storage Issues E Bertino, B Catania, E Kotsifakos, A Maddalena, I Ntoutsi, Y Theodoridis PANDA Technical Report PANDA-TR-2004-02, 2004 | 3 | 2004 |
A flexible access control model for web services E Bertino, AC Squicciarini Flexible Query Answering Systems, 13-16, 2004 | 3 | 2004 |
Guest Editors' Introduction: Data Dissemination on the Web K Ramamritham, E Bertino IEEE Internet Computing 8 (3), 0027-28, 2004 | 3 | 2004 |
Towards improved federated identity and privilege management in open systems R Bhatti, E Bertino, A Ghafoor | 3 | 2004 |
ViRdB: integrating virtual reality and multimedia databases for customized visualization of cultural heritage P Mazzoleni, E Bertino, S Valtolina, E Ferrari, C Boeri ACM SIGGRAPH 2003 Sketches & Applications, 1-1, 2003 | 3 | 2003 |
A Flexible Authentication Method for UDDI Registries. E Bertino, B Carminati, E Ferrari ICWS, 218-226, 2003 | 3 | 2003 |
Information security E Bertino, E Ferrari Practical Handbook of, 2003 | 3 | 2003 |
Workflow architecture for interactive video management systems E Bertino, A Trombetta, D Montesi Distributed and Parallel Databases 11 (1), 33-51, 2002 | 3 | 2002 |
Indexing constraint databases by using a dual representation E Bertino, B Catania, B Chidlovskii Data Engineering, 1999. Proceedings., 15th International Conference on, 618-627, 1999 | 3 | 1999 |
OO Databases and applications (selected papers from ICDE'98) E Bertino, S Urban, EA Rundensteiner Theory and Practice of Object Systems 5 (3), 125-125, 1999 | 3 | 1999 |
Enhanced nested-inherited index for OODBMS E Bertino, S Salerno, B Shidlovsky Proceedings of the fourth international conference on Information and ..., 1995 | 3 | 1995 |
Enforcing Mandatory Access Control in Object Bases E Bertino, S Jajodiat, P Samarati Security for Object-Oriented Systems, 96-116, 1994 | 3 | 1994 |
Achieving stricter correctness requirements in multilevel secure databases: The dynamic case V Atluri, E Bertino, S Jajodia Proceedings of the IFIP WG11. 3 Working Conference on Database Security VII ..., 1993 | 3 | 1993 |
The ADKMS Knowledge Acquisition System. E Bertino, S Bottarelli, M Damiani, M Marcadella, M Migliorati, P Randi Future Databases, 298-314, 1992 | 3 | 1992 |
The AIMS project: an information server architecture integrating data, knowledge and multimedia information M Damiani, P Randi, E Bertino, L Spampinato Enterprise Integration Modeling: Proceedings of the First International ..., 1992 | 3 | 1992 |
An evaluation of precompilation and interpretation in distributed database management systems E Bertino The Computer Journal 30 (6), 519-528, 1987 | 3 | 1987 |
Query processing based on complex object types E Bertino, F Rabitti IEEE Database Eng. Bull. 9 (4), 22-29, 1986 | 3 | 1986 |
Distributed database design using the entity-relationship model. E Bertino Proc. of the third international conference on Entity-relationship approach ..., 1983 | 3 | 1983 |
Secure data provenance compression using arithmetic coding in wireless sensor networks SR Hussain, C Wang, S Sultana, E Bertino Performance Computing and Communications Conference (IPCCC), 2014 IEEE ..., 2014 | 2 | 2014 |
Homomorphic Encryption and Applications X Yi, R Paulet, E Bertino SpringerBriefs in Computer Science (, 2014 | 2 | 2014 |
Security with privacy-opportunities and challenges E Bertino | 2 | 2014 |
RFID Security and Privacy Y Li, RH Deng, E Bertino Synthesis Lectures on Information Security, Privacy, & Trust 4 (3), 1-157, 2013 | 2 | 2013 |
Encryption key management for secure communication in smart advanced metering infrastructures SH Seo, X Ding, E Bertino Smart Grid Communications (SmartGridComm), 2013 IEEE International ..., 2013 | 2 | 2013 |
Further Theoretical Contributions to a Privacy Preserving Distributed OLAP Framework A Cuzzocrea, E Bertino Computer Software and Applications Conference (COMPSAC), 2013 IEEE 37th ..., 2013 | 2 | 2013 |
Big Data-Opportunities and Challenges E Bertino IEEE 37th Annual Computer Software and Applications Conference, 2013 | 2 | 2013 |
Privacy preserving context aware publish subscribe systems M Nabeel, S Appel, E Bertino, A Buchmann Network and System Security, 465-478, 2013 | 2 | 2013 |
Modeling the Risk & Utility of Information Sharing in Social Networks MR Fouad, K Elbassioni, E Bertino Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on ..., 2012 | 2 | 2012 |
Defending against insider threats and internal data leakage I You, G Lenzini, MR Ogiela, E Bertino Security and Communication Networks 5 (8), 831-833, 2012 | 2 | 2012 |
Cryptographic Key Management for Smart Power Grids-Approaches and Issues M Nabeel, J Zage, S Kerr, E Bertino, NA Kulatunga, US Navaratne, ... arXiv preprint arXiv:1206.3880, 2012 | 2 | 2012 |
Towards a theory for privacy preserving distributed OLAP A Cuzzocrea, E Bertino, D Saccà Proceedings of the 2012 Joint EDBT/ICDT Workshops, 221-226, 2012 | 2 | 2012 |
Detection and protection against distributed denial of service attacks in accountable grid computing systems W Lee, AC Squicciarini, E Bertino Proceedings of the 2011 11th IEEE/ACM International Symposium on Cluster ..., 2011 | 2 | 2011 |
A conditional role-involved purpose-based access control model ME Kabir, H Wang, E Bertino Journal of Organizational Computing and Electronic Commerce 21 (1), 71-91, 2011 | 2 | 2011 |
A selective encryption approach to fine-grained access control for P2P file sharing A Gupta, S Sultana, M Kirkpatrick, E Bertino Collaborative Computing: Networking, Applications and Worksharing ..., 2010 | 2 | 2010 |
Vulnerabilities leading to denial of services attacks in grid computing systems: a survey W Lee, A Squicciarini, E Bertino Proceedings of the Sixth Annual Workshop on Cyber Security and Information ..., 2010 | 2 | 2010 |
Web Service Technologies, Principles, Architectures, and Standards E Bertino, LD Martino, F Paci, AC Squicciarini Security for Web Services and Service-Oriented Architectures, 9-23, 2010 | 2 | 2010 |
Privacy preserving OLAP over distributed XML documents E Bertino, A Cuzzocrea Parallel Processing Workshops, 2009. ICPPW'09. International Conference on ..., 2009 | 2 | 2009 |
Physically Restricted Authentication and Encryption for Cyber-physical Systems M Kirkpatrick, E Bertino, FT Sheldon DHS Workshop on Future Directions in Cyber-physical Systems Security, 2009 | 2 | 2009 |
Foreword for the special issue of selected papers from the 1st ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS E Bertino, ML Damiani Transactions on Data Privacy 2 (1), 1-2, 2009 | 2 | 2009 |
Attribute refinement in a multigranular temporal object data model E Bertino, E Camossi, G Guerrini Purdue University. Center for Education and Research in Information ..., 2009 | 2 | 2009 |
Cryptanalysis of the LCSS RFID authentication protocol T Cao, P Shen, E Bertino Electronic Commerce and Security, 2008 International Symposium on, 305-309, 2008 | 2 | 2008 |
Privately updating suppression and generalization based k-anonymous databases A Trombetta, W Jiang, E Bertino, L Bossi Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on ..., 2008 | 2 | 2008 |
Policy mapper: A simplified approach for administration of location-based access control policies R Bhatti, ML Damiani, D Bettis, E Bertino IEEE internet Computing 12 (2), 2008 | 2 | 2008 |
Query mesh: An efficient multi-route approach to query optimization RV Nehme, K Works, EA Rundensteiner, E Bertino | 2 | 2008 |
A structure preserving approach for securing XML documents M Nabeel, E Bertino Collaborative Computing: Networking, Applications and Worksharing, 2007 ..., 2007 | 2 | 2007 |
On the correctness criteria of fine-grained access control in relational databases T Yu, N Li, Q Wang, J Lobo, E Bertino, K Irwin, JW Byun Technical Report, Available at “www. cs. purdue. edu/homes/wangq/papers/fgdb ..., 2007 | 2 | 2007 |
Integrating Data Management and Panoramic Images for an Effective Representation of Cultural Heritage Information S Valtonia, E Bertino International Cultural Heritage Informatics Meeting (ICHIM07): Proceedings ..., 2007 | 2 | 2007 |
Achieving Privacy with an Ontology-Based Approach in Trust Negotiations AC Squicciarini, E Bertino, E Ferrari, I Ray IEEE Transaction on Dependable and Secure Computing (TDSC) 3 (1), 13C30, 2006 | 2 | 2006 |
Integration of virtual reality and database systems for cultural heritage dissemination E Bertino, S Franzoni, P Mazzoleni, P Mussio, S Valtolina International Journal of Computational Science and Engineering 2 (5-6), 307-316, 2006 | 2 | 2006 |
Authorization Strategies for Virtualized Environments in Grid Computing Systems∗ X Ou, A Squicciarini, S Goasguen, E Bertino | 2 | 2006 |
Anonymity preserving techniques in trust negotiations I Ray, E Bertino, AC Squicciarini, E Ferrari Privacy Enhancing Technologies, 93-109, 2006 | 2 | 2006 |
A modular framework for administering spatial constraints in context-aware rbac R Bhatti, M Damiani, DW Bettis, E Bertino, A Ghafoor Tech. Rep. 2006-04, Center for Education and Research in Information ..., 2006 | 2 | 2006 |
Advances in Spatial and Temporal Databases: 9th International Symposium, SSTD 2005, Angra Dos Reis, Brazil, August 22-24, 2005, Proceedings Springer, 2005 | 2 | 2005 |
CoCoMA: Content and Context Aware Multimedia Content Retrieval, Delivery and Presentation S Christodoulakis, C Tsinaraki, C Breiteneder, H Eidenberger, D Divotkey, ... DELOS Research Activities 2005, 37, 2005 | 2 | 2005 |
Anonymity preserving techniques in trust negotiations E Bertino, I Ray, AC Squicciarini, E Ferrari Proc. Fifth Privacy Enhancing Technologies Workshop, 2005 | 2 | 2005 |