Towards structure discovering in video data E Bertino*, MS Hacid, F Toumani Journal of Experimental & Theoretical Artificial Intelligence 17 (1-2), 5-18, 2005 | 2 | 2005 |
Measuring Structural Divergences in XML Documents G Guerrini, M Mesiti, E Bertino First International Workshop CLIP, 2005 | 2 | 2005 |
An integrated approach to rating and filtering web content E Bertino, E Ferrari, A Perego, GP Zarri Innovations in Applied Artificial Intelligence, 749-751, 2005 | 2 | 2005 |
A Framework for Management of secure and adaptive Workflows B Shafiq, A Samuel, E Bertino, A Ghafoor Vision paper CERIAS Tech Report 73, 47907-2086, 2005 | 2 | 2005 |
A secure publishing protocol for virtual community contracts AC Squicciarini, F Paci, E Bertino Proceedings of Web Based Communities 2005 (IADIS), 2005 | 2 | 2005 |
A Policy Framework for Access Management in Federated Information Sharing R Bhatti, E Bertino, A Ghafoor Security Management, Integrity, and Internal Control in Information Systems ..., 2005 | 2 | 2005 |
Diχeminator: a profile-based selective dissemination system for XML documents E Bertino, G Guerrini, M Mesiti Current Trends in Database Technology-EDBT 2004 Workshops, 578-587, 2005 | 2 | 2005 |
A trigger-based approach for communication personalization E Bertino, M Mesiti, M Cochinwala Database Engineering and Applications Symposium, 2004. IDEAS'04. Proceedings ..., 2004 | 2 | 2004 |
Security for grid-based computing systems issues and challenges E Bertino, B Crispo, J Joshi, WK Du, R Sandhu Proceedings of the ninth ACM symposium on Access control models and ..., 2004 | 2 | 2004 |
A Logical Approach to Quality of Service Specification in Video Databases E Bertino, AK Elmagarmid, MS Hacid Multimedia Tools and Applications 23 (2), 75-101, 2004 | 2 | 2004 |
A Decentralized Administration Model for Enterprise Wide Access Control R Bhatti, JBD Joshi, E Bertino, A Ghafoor | 2 | 2004 |
A decentralized approach for controlled sharing of resources in virtual communities E Ferrari, AC Squicciarini, E Bertino Data and Applications Security XVII, 176-189, 2004 | 2 | 2004 |
Flow policies: specification and enforcement E Bertino, E Ferrari, G Mella Performance, Computing, and Communications, 2004 IEEE International ..., 2004 | 2 | 2004 |
Ordering and path constraints over semistructured data E Bertino, AK Elmagarmid, MS Hacid Journal of intelligent information systems 20 (2), 181-206, 2003 | 2 | 2003 |
Static analysis of logical languages with deferred update semantics B Catania, E Bertino Knowledge and Data Engineering, IEEE Transactions on 15 (2), 386-404, 2003 | 2 | 2003 |
Answer Set Programming for the Semantic Web E Bertino, A Provetti, F Salvetti Proceedings of IJCAI, 1-5, 2003 | 2 | 2003 |
A knowledge-based approach to visual information E Bertino, AK Elmagarmid, MS Hacid Journal of Intelligent Information Systems 19 (3), 319-341, 2002 | 2 | 2002 |
Directions for Web and E-commerce Applications Security C Clifton, C Clifton, A Gupta, E Bertino, E Ferrari in ‘Proceedings of Tenth IEEE International Workshops on Enabling ..., 2001 | 2 | 2001 |
Representing and Querying Imprecise Data A Trombetta, E Bertino, M Demarie Ph. D. Thesis, Computer Science Dept., University of Turin, 2001 | 2 | 2001 |
Exception Handling in Object-Orienteda Databases E Bertino, G Guerrini, I Merlo Advances in exception handling techniques, 234-250, 2001 | 2 | 2001 |
Introducing external functions in constraint query languages B Catania, A Belussi, E Bertino Principles and Practice of Constraint Programming—CP98, 132-146, 1998 | 2 | 1998 |
Text databases E Bertino, BC Ooi, R Sacks-Davis, KL Tan, J Zobel, B Shidlovsky, ... Indexing Techniques for Advanced Database Systems, 151-183, 1997 | 2 | 1997 |
A Set-Oriented Method Definition Language for Object Databases E Bertino, G Guerrini, I Merlo Technical Report DISI-TR-97-11, Dipartimento di Informatica e Scienze dell ..., 1997 | 2 | 1997 |
Maintaining secrecy and integrity in multilevel databases: A practical approach S Jajodia, D Marks, E Bertino Proc. 18th National Information Systems Security Conference, 37-49, 1996 | 2 | 1996 |
A data access structure for filtering distance queries in image retrieval A Belussi, E Bertino, A Biavasco, S Rizzo Multimedia database systems, 185-213, 1996 | 2 | 1996 |
Mark-and-sweep garbage collection in multilevel secure object-oriented database systems A Ciampichetti, E Bertino, L Mancini Computer Security—ESORICS 94, 357-373, 1994 | 2 | 1994 |
On the Selection of Optimaf Index Configuration in 00 Databases S Choenni, E Bertino, HM Blanken, T Chang Proc. ICDE, 526-537, 0 | 2 | |
Generalized Temporal Role Based Access Control Model (GTRBAC)(Part II)–Expressiveness and Design Issues JBD Joshi, E Bertino, U Latif, A Ghafoor Submitted to the IEEE Transaction on Knowledge and Data Engineering, 0 | 2 | |
Temporal Role Hierarchies in GTRBAC JBD Joshi, E Bertino, A Ghafoor Submitted to ACM Transactions on Information and System Security, 0 | 2 | |
Privacy-Preserving Detection of Sensitive Data Exposure X Shu, D Yao, E Bertino Information Forensics and Security, IEEE Transactions on 10 (5), 1092-1103, 2015 | 1 | 2015 |
Marlin: Mitigating code reuse attacks using code randomization A Gupta, J Habibi, MS Kirkpatrick, E Bertino IEEE, 2015 | 1 | 2015 |
Privacy-Preserving Association Rule Mining in Cloud Computing X Yi, FY Rao, E Bertino, A Bouguettaya Proceedings of the 10th ACM Symposium on Information, Computer and ..., 2015 | 1 | 2015 |
A Secure Communication Protocol for Drones and Smart Objects J Won, SH Seo, E Bertino Proceedings of the 10th ACM Symposium on Information, Computer and ..., 2015 | 1 | 2015 |
Robust Aggregation of Inconsistent Information: Concepts and Research Directions A Ignjatovic, M Rezvani, M Allahbakhsh, E Bertino Transparency in Social Media, 29-49, 2015 | 1 | 2015 |
Building access control policy model for privacy preserving and testing policy conflicting problems H Wang, L Sun, E Bertino Journal of Computer and System Sciences 80 (8), 1493-1503, 2014 | 1 | 2014 |
Poster: Protecting against data exfiltration insider attacks through application programs A Sallam, E Bertino Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications ..., 2014 | 1 | 2014 |
Kinesis: a security incident response and prevention system for wireless sensor networks S Sultana, D Midi, E Bertino Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems ..., 2014 | 1 | 2014 |
System on chip and method for cryptography using a physically unclonable function MS Kirkpatrick, S Kerr, E Bertino US Patent 8,750,502, 2014 | 1 | 2014 |
Protecting outsourced data in cloud computing through access management H Wang, X Yi, E Bertino, L Sun Concurrency and computation: Practice and Experience, 2014 | 1 | 2014 |
Identity, Privacy, and Deception in Social Networks E Bertino, J Caverlee, E Ferrari Internet Computing, IEEE 18 (2), 7-9, 2014 | 1 | 2014 |
Dictionary based secure provenance compression for wireless sensor networks C Wang, S Hussain, E Bertino IEEE, 2014 | 1 | 2014 |
Roles, Trust, and Reputation in Social Media Knowledge Markets E Bertino, SA Matei Springer, 2014 | 1 | 2014 |
Privacy-preserving complex query evaluation over semantically secure encrypted data BK Samanthula, W Jiang, E Bertino Computer Security-ESORICS 2014, 400-418, 2014 | 1 | 2014 |
ID-based two-server password-authenticated key exchange X Yi, F Hao, E Bertino Computer Security-ESORICS 2014, 257-276, 2014 | 1 | 2014 |
Multiparty privacy protection for electronic health records X Yi, Y Miao, E Bertino, J Willemson Global Communications Conference (GLOBECOM), 2013 IEEE, 2730-2735, 2013 | 1 | 2013 |
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks M Rezvani, A Ignjatovic, E Bertino, S Jha Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, 30, 2013 | 1 | 2013 |
Fine-grained analysis of packet loss symptoms in wireless sensor networks B Shebaro, D Midi, E Bertino Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, 38, 2013 | 1 | 2013 |
Secure and resilient proximity-based access control S Choi, C Gutierrez, HS Lim, S Bagchi, E Bertino Proceedings of the 2013 international workshop on Data management ..., 2013 | 1 | 2013 |
Private Information Retrieval X Yi, R Paulet, E Bertino Synthesis Lectures on Information Security, Privacy, and Trust 4 (2), 1-114, 2013 | 1 | 2013 |
Private data warehouse queries X Yi, R Paulet, E Bertino, G Xu Proceedings of the 18th ACM symposium on Access control models and ..., 2013 | 1 | 2013 |
Secure sensor network SUM aggregation with detection of malicious nodes SM Choi, G Ghinita, E Bertino Local Computer Networks (LCN), 2012 IEEE 37th Conference on, 19-27, 2012 | 1 | 2012 |
Adaptive data management for self-protecting objects in cloud computing systems AC Squicciarini, G Petracca, E Bertino Proceedings of the 8th International Conference on Network and Service ..., 2012 | 1 | 2012 |
Query processing with K-anonymity MY Eltabakh, J Padma, YN Silva, P He, WG Aref, E Bertino International Journal of Data Engineering (IJDE) 3 (2), 48-65, 2012 | 1 | 2012 |
Trusted identities in cyberspace E Bertino IEEE Internet Computing, 3-6, 2012 | 1 | 2012 |
On Hashing Graphs. A Kundu, E Bertino IACR Cryptology ePrint Archive 2012, 352, 2012 | 1 | 2012 |
Cryptographic Key Management for Smart Power Grids M Nabeel, S Kerr, E Bertino, MA Kulatunga, US Navaratne, M Duren | 1 | 2012 |
Privacy-preserving assessment of location data trustworthiness C Dai, FY Rao, G Ghinita, E Bertino Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances ..., 2011 | 1 | 2011 |
Secure cryptographic key management system (CKMS) considerations for smart grid devices R Abercrombie, F Sheldon, H Aldridge, M Duren, T Ricci, E Bertino, ... Proceedings of the Seventh Annual Workshop on Cyber Security and Information ..., 2011 | 1 | 2011 |
A New Approach to Weighted Multi-Secret Sharing X Zou, F Maino, E Bertino, Y Sui, K Wang, F Li Computer Communications and Networks (ICCCN), 2011 Proceedings of 20th ..., 2011 | 1 | 2011 |
Aggregated Privacy-Preserving Identity Verification for Composite Web Services N Guo, T Gao, B Zhang, R Fernando, E Bertino 2011 IEEE International Conference on Web Services, 692-693, 2011 | 1 | 2011 |
Analyzing semantic locations cloaking techniques in a probabilistic grid-based map ML Damiani, C Silvestri, E Bertino Proceedings of the 18th SIGSPATIAL International Conference on Advances in ..., 2010 | 1 | 2010 |
A policy-based approach for assuring data integrity in DBMSs HS Lim, C Dai, E Bertino Collaborative Computing: Networking, Applications and Worksharing ..., 2010 | 1 | 2010 |
Credibility-enhanced curated database: Improving the value of curated databases Q Ni, E Bertino IEEE, 2010 | 1 | 2010 |
Securing the execution environment applications and data from multi-trusted components E Bertino, G Ghinita, K Hamlen, M Kantarcioglu, HHS Lee, N Li, C Pu, ... UTD technical report, UTDCS-03-10, 2010 | 1 | 2010 |
Digital identity management and trust negotiation E Bertino, LD Martino, F Paci, AC Squicciarini Security for Web Services and Service-Oriented Architectures, 79-114, 2010 | 1 | 2010 |
Web Services Threats, Vulnerabilities, and Countermeasures E Bertino, LD Martino, F Paci, AC Squicciarini Security for Web Services and Service-Oriented Architectures, 25-44, 2010 | 1 | 2010 |
Access control for business processes E Bertino, LD Martino, F Paci, AC Squicciarini Security for Web Services and Service-Oriented Architectures, 159-177, 2010 | 1 | 2010 |
Aggregating uncertain access risk estimations from different sources invited paper Q Ni, E Bertino Collaborative Computing: Networking, Applications and Worksharing, 2009 ..., 2009 | 1 | 2009 |
Collaborative Computing: Networking, Applications and Worksharing: 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers Springer Science & Business Media, 2009 | 1 | 2009 |
An assessment of accountability policies for large-scale distributed computing systems W Lee, AC Squicciarini, E Bertino Proceedings of the 5th Annual Workshop on Cyber Security and Information ..., 2009 | 1 | 2009 |
Access Control-Privacy-Aware Role-Based Access Control-A privacy-aware role-based access control model extends RBAC to express complex privacy-related policies, including such features as conditions and obligations. P-RBAC is easy to deploy in systems already adopting RBAC, thus allowing seamless integration of access control and privacy policies. Q Ni, E Bertino, J Lobo, SB Calo Ieee Security & Privacy 7 (4), 35, 2009 | 1 | 2009 |
Leakage-Free Integrity Assurance for Tree Data Structures A Kundu, E Bertino Technical Report 2009-1, CERIAS, 2009 | 1 | 2009 |
Implementation Challenges in Spatio-temporal Multigranularity E Camossi, M Bertolotto, E Bertino Technical report, 2009 | 1 | 2009 |
Security for Content Distribution Networks—Concepts, Systems and Research Issues E Bertino, Y Koglin Security in Distributed, Grid, Mobile, and Pervasive Computing, 1, 2007 | 1 | 2007 |
Article 14 (39 pages)-Formal Foundations for Hybrid Hierarchies in GTRBAC JBD Joshi, E Bertino, A Ghafoor, Y Zhang ACM Transactions on Information and System Security-TISSEC 10 (4), 2007 | 1 | 2007 |
Privacy-Preserving Updates to Confidential and Anonymous Databases A Trombetta, W Jiang, E Bertino, L Bossi | 1 | 2007 |
Privacy Preserving Multi-Factor Authentication with Biometrics A Squicciarini, E Bertino, A BhargavSpantze Association for Computing Machinery, 2006 | 1 | 2006 |
Digital identity management and protection E Bertino Proceedings of the 2006 International Conference on Privacy, Security and ..., 2006 | 1 | 2006 |
Architectural issues for a location-aware role-based access control system ML Damiani, E Bertino Proceedings of the 2006 ACM symposium on Applied computing, 1184-1185, 2006 | 1 | 2006 |
Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints B Shafiq, A Samuel, E Bertino, A Ghafoor Data Engineering, 2006. ICDE'06. Proceedings of the 22nd International ..., 2006 | 1 | 2006 |
Policies and IT technologies: a puzzle of two pieces E Bertino, S Ruth Internet Computing, IEEE 10 (1), 65-67, 2006 | 1 | 2006 |
A secure framework for publishing virtual community contracts AC Squicciarini, F Paci, E Bertino International Journal of Web Based Communities 2 (2), 237-255, 2006 | 1 | 2006 |
A Comprehensive XML Based Approach to Trust Negotiations E Bertino, E Ferrari, AC Squicciarini TeAM YYePG, 109, 2005 | 1 | 2005 |
Sanctioning mechanisms in virtual communities E Bertino, A Squicciarini, E Ferrari Encyclopedia of Virtual Communities and Technologies. Edited By: Subhasish ..., 2005 | 1 | 2005 |
An optimal conflict resolution strategy for event-driven role based access control policies B Shafiq, E Bertino, A Ghafoor CERIAS, Purdue University, Tech. Rep 8, 2005, 2005 | 1 | 2005 |
Supporting Multi-Dimensional Trustworthiness for Grid Workflows. E Bertino, B Crispo, P Mazzoleni DELOS Workshop: Digital Library Architectures, 195-204, 2004 | 1 | 2004 |
Database Security C Dai, G Ghinita, E Bertino, J Byun, N Li | 1 | 2004 |
A set‐oriented method definition language for object databases and its semantics E Bertino, G Guerrini, I Merlo Concurrency and Computation: Practice and Experience 15 (14), 1275-1335, 2003 | 1 | 2003 |
Optimal Secure Interoperation in a Multi-Domain Environment Employing RBAC Policies B Shafiq, J Joshi, E Bertino, A Ghafoor Technical Report 2003-24, CERIAS, Purdue University, 2003 | 1 | 2003 |
An access control system for digital libraries and the web: The max prototype demonstration E Bertino, E Ferrari, A Perego Research and Advanced Technology for Digital Libraries, 656-657, 2002 | 1 | 2002 |
Introducing cooperation and actions in amalgamated knowledge bases E Bertino, B Catania, P Perlasca Database Systems for Advanced Applications, 2001. Proceedings. Seventh ..., 2001 | 1 | 2001 |
Detailed description of the Milan model E Bertino Circulation 4, 1, 2001 | 1 | 2001 |
Metadata, Intelligent Indexing, and Repository Management for Multimedia Digital Libraries E Bertino, B Catania, GP Zarri Fundamenta Informaticae 47 (1-2), 155-173, 2001 | 1 | 2001 |
A linguistic framework for querying dimensional data E Bertino, TS Cheng, SK Gadia, G Guerrini Temporal Representation and Reasoning, 2001. TIME 2001. Proceedings. Eighth ..., 2001 | 1 | 2001 |
Specifying and computing hierarchies of temporal authorizations E Bertino, PA Bonatti, E Ferrari, ML Sapino Research Advances in Database and Information Systems Security, 285-300, 2000 | 1 | 2000 |
“Do Triggers Have Anything To Do With Exceptions? E Bertino, G Guerrini, I Merlo ECOOP Workshop on Exception Handling in Object Oriented Systems. Available ..., 2000 | 1 | 2000 |
An Extended Authorization Model for Object Databases E Bertino, F Origgi, P Samarati Journal of Computer Security 3 (2-3), 169-206, 1995 | 1 | 1995 |
Distributed and parallel database object management Kluwer Academic Publishers, 1994 | 1 | 1994 |
A view mechanism for a knowledge-based information system E Bertino, M Damiani, A Paganini Integrated Computer-Aided Engineering 1 (5), 397-420, 1994 | 1 | 1994 |
A knowledge based information system E Bertino, S Bottarelli, M Damiani, M Marcadella, M Migliorati, P Randi Proceedings of the IFIP 12th World Computer Congress on Personal Computers ..., 1992 | 1 | 1992 |