A hybrid technique for private location-based queries with database protection G Ghinita, P Kalnis, M Kantarcioglu, E Bertino Advances in Spatial and Temporal Databases, 98-116, 2009 | 30 | 2009 |
Multi-domain and privacy-aware role based access control in ehealth LD Martino, Q Ni, D Lin, E Bertino Pervasive Computing Technologies for Healthcare, 2008. PervasiveHealth 2008 ..., 2008 | 30 | 2008 |
PDL with Preferences E Bertino, A Mileo, A Provetti Policies for Distributed Systems and Networks, 2005. Sixth IEEE ..., 2005 | 30 | 2005 |
A formal definition of the chimera object-oriented data model G Guerrini, E Bertino, R Bal Journal of Intelligent Information Systems 11 (1), 5-40, 1998 | 30 | 1998 |
An authorization model and its formal semantics E Bertino, F Buccafurri, E Ferrari, P Rullo Computer Security—ESORICS 98, 127-142, 1998 | 30 | 1998 |
XML security E Bertino, B Carminati, E Ferrari Information security technical report 6 (2), 44-58, 2001 | 29 | 2001 |
Deductive object databases E Bertino, G Guerrini, D Montesi Object-Oriented Programming, 213-235, 1994 | 29 | 1994 |
Views and security in distributed database management systems E Bertino, LM Haas Advances in Database Technology—EDBT'88, 155-169, 1988 | 29 | 1988 |
Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection G Ghinita, P Kalnis, M Kantarcioglu, E Bertino GeoInformatica 15 (4), 699-726, 2011 | 28 | 2011 |
Mechanisms for database intrusion detection and response A Kamra, E Bertino, G Lebanon Proceedings of the 2nd SIGMOD PhD workshop on Innovative database research ..., 2008 | 28 | 2008 |
A new model for secure dissemination of xml content A Kundu, E Bertino Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE ..., 2008 | 28 | 2008 |
P-Hera: Scalable fine-grained access control for P2P infrastructures B Crispo, S Sivasubramanian, P Mazzoleni, E Bertino Parallel and Distributed Systems, 2005. Proceedings. 11th International ..., 2005 | 28 | 2005 |
Transaction processing in multilevel secure databases with kernelized architecture: Challenges and solutions V Atluri, S Jajodia, E Bertino Knowledge and Data Engineering, IEEE Transactions on 9 (5), 697-708, 1997 | 28 | 1997 |
A novel approach for privacy-preserving video sharing J Fan, H Luo, MS Hacid, E Bertino Proceedings of the 14th ACM international conference on Information and ..., 2005 | 27 | 2005 |
A nested transaction model for multilevel secure database management systems E Bertino, B Catania, E Ferrari ACM Transactions on Information and System Security (TISSEC) 4 (4), 321-370, 2001 | 27 | 2001 |
A logic-based approach for enforcing access control [1] A preliminary version of this paper appears in the Proceedings of the 5th European Symposium on Research in Computer Security (ESORICS’98), Louvain-La-Neuve, Belgium, September 1998 under the title “An Authorization Model and its Formal Semantics”. E Bertino, F Buccafurri, E Ferrari, P Rullo Journal of Computer Security 8 (2, 3), 109-139, 2000 | 27 | 2000 |
An approach to model and query event-based temporal data E Bertino, E Ferrari, G Guerrini Temporal Representation and Reasoning, 1998. Proceedings. Fifth ..., 1998 | 27 | 1998 |
Securing XML documents: the author-X project demonstration E Bertino, S Castano, E Ferrari SIGMOD RECORD 30 (2), 605-605, 2001 | 26 | 2001 |
Applications of object-oriented technology to the integration of heterogeneous database systems E Bertino, M Negri, G Pelagatti, L Sbattella Distributed and Parallel Databases 2 (4), 343-370, 1994 | 26 | 1994 |
PROBE: an obfuscation system for the protection of sensitive location information in LBS M Damiani, E Bertino, C Silvestri TR2001-145, CERIAS, 2008 | 25 | 2008 |
Formal foundations for hybrid hierarchies in GTRBAC JBD Joshi, E Bertino, A Ghafoor, Y Zhang ACM Transactions on Information and System Security (TISSEC) 10 (4), 2, 2008 | 25 | 2008 |
Modeling and language support for the management of pattern-bases M Terrovitis, P Vassiliadis, S Skiadopoulos, E Bertino, B Catania, ... Data & Knowledge Engineering 62 (2), 368-397, 2007 | 25 | 2007 |
Challenges of testing web services and security in SOA implementations A Barbir, C Hobbs, E Bertino, F Hirsch, L Martino Test and Analysis of Web Services, 395-440, 2007 | 25 | 2007 |
Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems G Mella, E Ferrari, E Bertino, Y Koglin ACM Transactions on Information and System Security (TISSEC) 9 (4), 421-460, 2006 | 25 | 2006 |
Access control management in a distributed environment supporting dynamic collaboration B Shafiq, E Bertino, A Ghafoor Proceedings of the 2005 workshop on Digital identity management, 104-112, 2005 | 25 | 2005 |
Efficient hierarchical key generation and key diffusion for sensor networks. M Shehab, E Bertino, A Ghafoor SECON, 76-84, 2005 | 25 | 2005 |
Modeling spatio-temporal constraints for multimedia objects YM Kwon, E Ferrari, E Bertino Data & Knowledge Engineering 30 (3), 217-238, 1999 | 25 | 1999 |
Poster: towards attribute based group key management M Nabeel, E Bertino Proceedings of the 18th ACM conference on Computer and communications ..., 2011 | 24 | 2011 |
Analysis of privacy and security policies E Bertino, C Brodie, S Calo, LF Cranor, CM Karat, J Karat, N Li, D Lin, ... IBM Journal of Research and Development 53 (2), 3: 1-3: 18, 2009 | 24 | 2009 |
Definition and analysis of index organizations for object-oriented database systems E Bertino, B Catania, L Chiesa Information Systems 23 (2), 65-108, 1998 | 24 | 1998 |
Semantic assumptions and query evaluation in temporal databases C Bettini, XS Wang, E Bertino, S Jajodia ACM SIGMOD Record 24 (2), 257-268, 1995 | 24 | 1995 |
A new authorization model for object-oriented databases E Bertino, F Origgi, P Samarati Proceedings of the IFIP WG11. 3 Working Conference on Database Security VII ..., 1994 | 24 | 1994 |
View management in distributed data base systems E Bertino, LM Haas, BG Lindsay IBM Thomas J. Watson Research Division, 1983 | 24 | 1983 |
Efficient privacy-aware record integration M Kuzu, M Kantarcioglu, A Inan, E Bertino, E Durham, B Malin Proceedings of the 16th International Conference on Extending Database ..., 2013 | 23 | 2013 |
Protecting location privacy against spatial inferences: the PROBE approach ML Damiani, E Bertino, C Silvestri Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on ..., 2009 | 23 | 2009 |
Improving scalability of software cloud for composite web services J Wu, Q Liang, E Bertino Cloud Computing, 2009. CLOUD'09. IEEE International Conference on, 143-146, 2009 | 23 | 2009 |
Access control for XML documents and data E Bertino, B Carminati, E Ferrari Information Security Technical Report 9 (3), 19-34, 2004 | 23 | 2004 |
An infrastructure for managing secure update operations on XML data E Bertino, G Mella, G Correndo, E Ferrari Proceedings of the eighth ACM symposium on Access control models and ..., 2003 | 23 | 2003 |
Active-U-Datalog: Integrating active rules in a logical update language E Bertino, B Catania, V Gervasi, A Raffaetà Transactions and Change in Logic Databases, 107-133, 1998 | 23 | 1998 |
Modeling multilevel entities using single level objects E Bertino, S Jajodia Deductive and Object-Oriented Databases, 415-428, 1993 | 23 | 1993 |
Cryptanalysis of some RFID authentication protocols T Cao, P Shen, E Bertino Journal of Communications 3 (7), 20-27, 2008 | 22 | 2008 |
An adaptive access control model for web services E Bertino, AC Squicciarini, L Martino, F Paci International Journal of Web Services Research 3 (3), 27-60, 2006 | 22 | 2006 |
Beyond k-anonymity: A decision theoretic framework for assessing privacy risk G Lebanon, M Scannapieco, MR Fouad, E Bertino Privacy in Statistical Databases, 217-232, 2006 | 22 | 2006 |
The indispensability of dispensable indexes E Bertino, BC Ooi Knowledge and Data Engineering, IEEE Transactions on 11 (1), 17-27, 1999 | 22 | 1999 |
Privacy Preserving Delegated access control in Public clouds M Nabeel, E Bertino Knowledge and Data Engineering, IEEE Transactions on 26 (9), 2268-2280, 2014 | 21 | 2014 |
A decentralized privacy preserving reputation protocol for the malicious adversarial model O Hasan, L Brunie, E Bertino, N Shang Information Forensics and Security, IEEE Transactions on 8 (6), 949-962, 2013 | 21 | 2013 |
Policy-driven service composition with information flow control W She, I Yen, B Thuraisingham, E Bertino Web Services (ICWS), 2010 IEEE International Conference on, 50-57, 2010 | 21 | 2010 |
How to authenticate graphs without leaking A Kundu, E Bertino Proceedings of the 13th International Conference on Extending Database ..., 2010 | 21 | 2010 |
Sine: Cache-friendly integrity for the web C Gaspard, S Goldberg, W Itani, E Bertino, C Nita-Rotaru Secure Network Protocols, 2009. NPSec 2009. 5th IEEE Workshop on, 7-12, 2009 | 21 | 2009 |
Automating role-based provisioning by learning from examples Q Ni, J Lobo, S Calo, P Rohatgi, E Bertino Proceedings of the 14th ACM symposium on Access control models and ..., 2009 | 21 | 2009 |
Policy framework for security and privacy management. J Karat, CM Karat, E Bertino, N Li, Q Ni, C Brodie, J Lobo, SB Calo, ... IBM Journal of Research and Development 53 (2), 4, 2009 | 21 | 2009 |
Responding to anomalous database requests A Kamra, E Bertino, R Nehme Secure Data Management, 50-66, 2008 | 21 | 2008 |
A Service-Oriented Approach to Security--Concepts and Issues E Bertino, LD Martino Future Trends of Distributed Computing Systems, 2007. FTDCS'07. 11th IEEE ..., 2007 | 21 | 2007 |
Data security in location-aware applications: an approach based on RBAC ML Damiani, E Bertino, P Perlasca International Journal of Information and Computer Security 1 (1-2), 5-38, 2007 | 21 | 2007 |
Achieving k-anonymity in mobile ad hoc networks X Wu, E Bertino Secure Network Protocols, 2005.(NPSec). 1st IEEE ICNP Workshop on, 37-42, 2005 | 21 | 2005 |
A framework for data mining pattern management B Catania, A Maddalena, M Mazza, E Bertino, S Rizzi Knowledge Discovery in Databases: PKDD 2004, 87-98, 2004 | 21 | 2004 |
Directions for web and e-commerce applications security B Thuraisingham, C Clifton, A Gupta, E Bertino, E Ferrari MIT Sloan Working Paper, 2002 | 21 | 2002 |
Modelling Database Updates with Constraint Logic Programming E Bertino, M Martelli, D Montesi Modelling Database Dynamics, 121-132, 1993 | 21 | 1993 |
Detecting mobile malware threats to homeland security through static analysis SH Seo, A Gupta, AM Sallam, E Bertino, K Yim Journal of Network and Computer Applications 38, 43-53, 2014 | 20 | 2014 |
Preserving privacy of feedback providers in decentralized reputation systems O Hasan, L Brunie, E Bertino Computers & Security 31 (7), 816-826, 2012 | 20 | 2012 |
A provenance based mechanism to identify malicious packet dropping adversaries in sensor networks S Sultana, E Bertino, M Shehab Distributed Computing Systems Workshops (ICDCSW), 2011 31st International ..., 2011 | 20 | 2011 |
Location privacy in moving-object environments D Lin, E Bertino, R Cheng, S Prabhakar | 20 | 2009 |
Towards supporting fine-grained access control for Grid Resources E Bertino, P Mazzoleni, B Crispo, S Sivasubramanian Distributed Computing Systems, 2004. FTDCS 2004. Proceedings. 10th IEEE ..., 2004 | 20 | 2004 |
Object-oriented databases E Bertino, BC Ooi, R Sacks-Davis, KL Tan, J Zobel, B Shidlovsky, ... Indexing Techniques for Advanced Database Systems, 1-38, 1997 | 20 | 1997 |
Supporting periodic authorizations and temporal reasoning in database access control E Bertino, C Bettini, E Ferrari, P Samarati VLDB, 472-483, 1996 | 20 | 1996 |
Towards deductive object databases E Bertino, G Guerrini, D Montesi Theory and Practice of Object Systems 1 (1), 19-39, 1995 | 20 | 1995 |
Research issues in discretionary authorizations for object bases E Bertino, P Samarati Security for Object-Oriented Systems, 183-199, 1994 | 20 | 1994 |
On practical specification and enforcement of obligations N Li, H Chen, E Bertino Proceedings of the second ACM conference on Data and Application Security ..., 2012 | 19 | 2012 |
Privacy-Preserving Updates to Anonymous and Confidential Databases A Trombetta, W Jiang, E Bertino, L Bossi Dependable and Secure Computing, IEEE Transactions on 8 (4), 578-587, 2011 | 19 | 2011 |
Trust establishment in the formation of Virtual Organizations AC Squicciarini, F Paci, E Bertino Computer Standards & Interfaces 33 (1), 13-23, 2011 | 19 | 2011 |
Self-tuning query mesh for adaptive multi-route query processing RV Nehme, EA Rundensteiner, E Bertino Proceedings of the 12th International Conference on Extending Database ..., 2009 | 19 | 2009 |
An analysis study on zone-based anonymous communication in mobile ad hoc networks X Wu, E Bertino Dependable and Secure Computing, IEEE Transactions on 4 (4), 252-265, 2007 | 19 | 2007 |
Secure dissemination of XML content using structure-based routing A Kundu, E Bertino Enterprise Distributed Object Computing Conference, 2006. EDOC'06. 10th IEEE ..., 2006 | 19 | 2006 |
A lava flow simulation model for the development of volcanic hazard maps for Mount Etna (Italy) ML Damiani, G Groppelli, G Norini, E Bertino, A Gigliuto, A Nucita Computers & geosciences 32 (4), 512-526, 2006 | 19 | 2006 |
Protecting information on the Web E Bertino, E Pagani, GP Rossi, P Samarati Communications of the ACM 43 (11es), 3, 2000 | 19 | 2000 |
Trigger inheritance and overriding in an active object database system E Bertino, G Guerrini, I Merlo Knowledge and Data Engineering, IEEE Transactions on 12 (4), 588-608, 2000 | 19 | 2000 |
The COMANDOS integration system: an object oriented approach to the interconnection of heterogeneous applications E Bertino, R Gagliardi, M Negri, G Pelagatti, L Sbattella Advances in Object-Oriented Database Systems, 213-218, 1988 | 19 | 1988 |
Authentication and key management for advanced metering infrastructures utilizing physically unclonable functions M Nabeel, S Kerr, X Ding, E Bertino Smart Grid Communications (SmartGridComm), 2012 IEEE Third International ..., 2012 | 18 | 2012 |
A game-theoretic approach for high-assurance of data trustworthiness in sensor networks HS Lim, G Ghinita, E Bertino, M Kantarcioglu Data Engineering (ICDE), 2012 IEEE 28th International Conference on, 1192-1203, 2012 | 18 | 2012 |
On the complexity of authorization in RBAC under qualification and security constraints Y Sun, Q Wang, N Li, E Bertino, M Atallah Dependable and Secure Computing, IEEE Transactions on 8 (6), 883-897, 2011 | 18 | 2011 |
Access control for databases: concepts and systems E Bertino, G Ghinita, A Kamra Now Publishers Inc, 2011 | 18 | 2011 |
Privacy-preserving matching of spatial datasets with protection against background knowledge G Ghinita, CR Vicente, N Shang, E Bertino Proceedings of the 18th SIGSPATIAL International Conference on Advances in ..., 2010 | 18 | 2010 |
Context-aware adaptation of access-control policies A Samuel, A Ghafoor, E Bertino Internet Computing, IEEE 12 (1), 51-54, 2008 | 18 | 2008 |
An authorization system for digital libraries E Ferrari, NR Adam, V Atluri, E Bertino, U Capuozzo The VLDB journal 11 (1), 58-67, 2002 | 18 | 2002 |
A temporal object-oriented data model with multiple granularities I Merlo, E Bertino, E Ferrari, G Guerrini Temporal Representation and Reasoning, 1999. TIME-99. Proceedings. Sixth ..., 1999 | 18 | 1999 |
A constraint-based approach to shape management in multimedia databases E Bertino, B Catania Multimedia Systems 6 (1), 2-16, 1998 | 18 | 1998 |
A conditional purpose-based access control model with dynamic roles ME Kabir, H Wang, E Bertino Expert Systems with Applications 38 (3), 1482-1489, 2011 | 17 | 2011 |
Towards mechanisms for detection and prevention of data exfiltration by insiders: keynote talk paper E Bertino, G Ghinita Proceedings of the 6th ACM Symposium on Information, Computer and ..., 2011 | 17 | 2011 |
DECHO—a framework for the digital exploration of cultural heritage objects DG Aliaga, E Bertino, S Valtolina Journal on Computing and Cultural Heritage (JOCCH) 3 (3), 12, 2011 | 17 | 2011 |
Security for web services: Standards and research issues LD Martino, E Bertino International Journal of Web Services Research (IJWSR) 6 (4), 48-74, 2009 | 17 | 2009 |
StreamShield: a stream-centric approach towards security and privacy in data stream environments RV Nehme, HS Lim, E Bertino, EA Rundensteiner Proceedings of the 2009 ACM SIGMOD International Conference on Management of ..., 2009 | 17 | 2009 |
The challenge of assuring data trustworthiness E Bertino, C Dai, M Kantarcioglu Database Systems for Advanced Applications, 22-33, 2009 | 17 | 2009 |
Security and privacy for geospatial data: concepts and research directions E Bertino, B Thuraisingham, M Gertz, ML Damiani Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on ..., 2008 | 17 | 2008 |
Password policy simulation and analysis R Shay, A Bhargav-Spantzel, E Bertino Proceedings of the 2007 ACM workshop on Digital identity management, 1-10, 2007 | 17 | 2007 |
Supporting robust and secure interactions in open domains through recovery of trust negotiations AC Squicciarini, A Trombett, E Bertino Distributed Computing Systems, 2007. ICDCS'07. 27th International Conference ..., 2007 | 17 | 2007 |
Access control and privacy in location-aware services formobile organizations ML Damiani, E Bertino null, 11, 2006 | 17 | 2006 |
T-ODMG: an ODMG compliant temporal object model supporting multiple granularity management E Bertino, E Ferrari, G Guerrini, I Merlo Information Systems 28 (8), 885-927, 2003 | 17 | 2003 |
Temporal authorization bases: From specification to integration E Bertino, PA Bonatti, E Ferrari, ML Sapino Journal of Computer Security 8 (4), 309-353, 2000 | 17 | 2000 |
A graph-theoretic approach to indexing in object-oriented databases B Shidlovsky, E Bertino Data Engineering, 1996. Proceedings of the Twelfth International Conference ..., 1996 | 17 | 1996 |
Collecting garbage in multilevel secure object stores E Bertino, V Luigi, LV Mancini, S Jajodia null, 106, 1994 | 17 | 1994 |