Information driven evaluation of data hiding algorithms E Bertino, IN Fovino Data Warehousing and Knowledge Discovery, 418-427, 2005 | 7 | 2005 |
Grid based methods for estimating spatial join selectivity A Belussi, E Bertino, A Nucita Proceedings of the 12th annual ACM international workshop on Geographic ..., 2004 | 7 | 2004 |
Refined rules termination analysis through transactions D Montesi, E Bertino, M Bagnato Information Systems 28 (5), 435-456, 2003 | 7 | 2003 |
Author-X–A System for Secure Dissemination and Update of XML Documents E Bertino, B Carminati, E Ferrari, G Mella Databases in Networked Information Systems, 66-85, 2003 | 7 | 2003 |
Asep: A secure and flexible commit protocol for mls distributed database systems I Ray, LV Mancini, S Jajodia, E Bertino Knowledge and Data Engineering, IEEE Transactions on 12 (6), 880-899, 2000 | 7 | 2000 |
A logical approach to cooperative information systems E Bertino, B Catania, V Gervasi, A Raffaetà The Journal of Logic Programming 43 (1), 15-48, 2000 | 7 | 2000 |
Mandatory security and object‐oriented systems: A multilevel entity model and its mapping onto a single‐level object model E Bertino, E Ferrari, P Samarati Theory and Practice of Object Systems 4 (3), 183-204, 1998 | 7 | 1998 |
Approaches to Handling Temporal Data in Object-Oriented Databases E Bertino, M Bevilacqua, E Ferrari, G Guerrini Milano: Dipartimento di Scienze dell’Informazione Universit’a di Milano, 192-97, 1997 | 7 | 1997 |
Decentralized administration for a temporal access control model E Bertino, C Bettini, E Ferrari, P Samarati Information Systems 22 (4), 223-248, 1997 | 7 | 1997 |
Query processing E Bertino, B Catania, E Ferrari Multimedia Databases in Perspective, 181-217, 1997 | 7 | 1997 |
A decentralized temporal authorization model E Bertino, C Bettini, E Ferrari, P Samarati Information systems security, 271-280, 1996 | 7 | 1996 |
A formal representation for state diagrams in the OMT methodology E Bertino, D Castelli, F Vitale SOFSEM'96: Theory and Practice of Informatics, 327-334, 1996 | 7 | 1996 |
Query decomposition in an object-oriented database system distributed on a local area network E Bertino Research Issues in Data Engineering, 1995: Distributed Object Management ..., 1995 | 7 | 1995 |
MULTOS: A document server for distributed office systems E Bertino, F Rabitti, C Thanos Advances in Database Technology—EDBT'88, 606-615, 1988 | 7 | 1988 |
Efficient and accurate strategies for differentially-private sliding window queries J Cao, Q Xiao, G Ghinita, N Li, E Bertino, KL Tan Proceedings of the 16th International Conference on Extending Database ..., 2013 | 6 | 2013 |
Adaptive data protection in distributed systems AC Squicciarini, G Petracca, E Bertino Proceedings of the third ACM conference on Data and application security and ..., 2013 | 6 | 2013 |
Demonstrating a lightweight data provenance for sensor networks B Shebaro, S Sultana, S Reddy Gopavaram, E Bertino Proceedings of the 2012 ACM conference on Computer and communications ..., 2012 | 6 | 2012 |
Marlin: Making it harder to fish for gadgets A Gupta, S Kerr, MS Kirkpatrick, E Bertino Proceedings of the 2012 ACM conference on Computer and communications ..., 2012 | 6 | 2012 |
Efficient Leakage-free Authentication of Trees, Graphs and Forests. A Kundu, MJ Atallah, E Bertino IACR Cryptology ePrint Archive 2012, 36, 2012 | 6 | 2012 |
PUF ROKs: A hardware approach to read-once keys MS Kirkpatrick, S Kerr, E Bertino Proceedings of the 6th ACM Symposium on Information, Computer and ..., 2011 | 6 | 2011 |
Challenges and Opportunities with Big Data E Bertino, P Bernstein, D Agrawal, S Davidson, U Dayal, M Franklin, ... | 6 | 2011 |
Privacy-aware location-aided routing in mobile ad hoc networks G Ghinita, M Azarmi, E Bertino Mobile Data Management (MDM), 2010 Eleventh International Conference on, 65-74, 2010 | 6 | 2010 |
PUF ROKs: generating read-once keys from physically unclonable functions MS Kirkpatrick, E Bertino, S Kerr Proceedings of the Sixth Annual Workshop on Cyber Security and Information ..., 2010 | 6 | 2010 |
Digital identity enrolment and assurance support for VeryIDX J Yong, E Bertino Computer Supported Cooperative Work in Design (CSCWD), 2010 14th ..., 2010 | 6 | 2010 |
Standards for web services security E Bertino, LD Martino, F Paci, AC Squicciarini Security for Web Services and Service-Oriented Architectures, 45-77, 2010 | 6 | 2010 |
Assuring data trustworthiness-concepts and research challenges E Bertino, HS Lim Secure Data Management, 1-12, 2010 | 6 | 2010 |
Physically restricted authentication with trusted hardware MS Kirkpatrick, E Bertino Proceedings of the 2009 ACM workshop on Scalable trusted computing, 55-60, 2009 | 6 | 2009 |
Research issues in data provenance for streaming environments HS Lim, YS Moon, E Bertino Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on ..., 2009 | 6 | 2009 |
Query mesh: Multi-route query processing technology RV Nehme, KE Works, EA Rundensteiner, E Bertino Proceedings of the VLDB Endowment 2 (2), 1530-1533, 2009 | 6 | 2009 |
Interactive location cloaking with the probe obfuscator G Ghinita, ML Damiani, E Bertino, C Silvestri Mobile Data Management: Systems, Services and Middleware, 2009. MDM'09 ..., 2009 | 6 | 2009 |
An Overview of VeryIDX-A Privacy-Preserving Digital Identity Management System for Mobile Devices F Paci, E Bertino, S Kerr, A Squicciarini, J Woo Journal of Software 4 (7), 696-706, 2009 | 6 | 2009 |
VeryIDX-A privacy preserving digital identity management system for mobile devices N Shang 2009 Tenth International Conference on Mobile Data Management: Systems ..., 2009 | 6 | 2009 |
Some usability considerations in access control systems E Bertino, S Calo, H Chen, N Li, T Li, J Lobo, I Molloy, Q Wang Symposium on Usable Privacy and Security (SOUPS) 2008, 2008 | 6 | 2008 |
P-CDN: Extending access control capabilities of P2P systems to provide CDN services F Turkmen, P Mazzoleni, B Crispo, E Bertino Computers and Communications, 2008. ISCC 2008. IEEE Symposium on, 480-486, 2008 | 6 | 2008 |
A semantic approach to build personalized interfaces in the cultural heritage domain S Valtolina, P Mazzoleni, S Franzoni, E Bertino Proceedings of the working conference on Advanced visual interfaces, 306-309, 2006 | 6 | 2006 |
Advances in Database Technology-EDBT 2004: 9th International Conference on Extending Database Technology, Heraklion, Crete, Greece, March 14-18, 2004, Proceedings Springer Science & Business Media, 2004 | 6 | 2004 |
Access to multigranular temporal objects E Bertino, E Camossi, G Guerrini Flexible Query Answering Systems, 320-333, 2004 | 6 | 2004 |
Signature and access control policies for XML documents E Bertino, E Ferrari, LP Provenza Computer Security–ESORICS 2003, 1-22, 2003 | 6 | 2003 |
A structural similarity measure for XML documents: theory and applications M Mesiti | 6 | 2002 |
Flexible transaction dependencies in database systems LV Mancini, I Ray, S Jajodia, E Bertino Distributed and Parallel Databases 8 (4), 399-446, 2000 | 6 | 2000 |
Computer Security-ESORICS 98: 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings Springer Science & Business Media, 1998 | 6 | 1998 |
Deadlock detection in the face of transaction and data dependencies E Bertino, G Chiola, LV Mancini Application and Theory of Petri Nets 1998, 266-285, 1998 | 6 | 1998 |
Sistemi di basi di dati: concetti e architetture E Bertino, B Catania, E Ferrari Città Studi Edizioni, 1997 | 6 | 1997 |
Integrity constraint checking in Chimera E Bertino, B Catania, S Bressan Constraint Databases and Applications, 160-186, 1996 | 6 | 1996 |
An Overview of the Comandos Integration System E Bertino, M Negri, L Sbattella Object-oriented multidatabase systems, 379-422, 1995 | 6 | 1995 |
Multimedia Data Handling in a Knowledge Representation System. E Bertino, M Damiani, P Randi Future Databases, 133-141, 1992 | 6 | 1992 |
The Update Problem in the Distributed Database System Hermes/1. E Bertino, C Meghini, C Thanos ICOD, 317-331, 1983 | 6 | 1983 |
A roadmap for privacy-enhanced secure data provenance E Bertino, G Ghinita, M Kantarcioglu, D Nguyen, J Park, R Sandhu, ... Journal of Intelligent Information Systems 43 (3), 481-501, 2014 | 5 | 2014 |
Provenance-aware security risk analysis for hosts and network flows M Rezvani, A Ignjatovic, E Bertino, S Jha Network Operations and Management Symposium (NOMS), 2014 IEEE, 1-8, 2014 | 5 | 2014 |
A lightweight secure scheme for detecting provenance forgery and packet drop attacks in wireless sensor networks S Sultana, G Ghinita, E Bertino, M Shehab IEEE, 2014 | 5 | 2014 |
On XACML’s adequacy to specify and to enforce HIPAA O Chowdhury, H Chen, J Niu, N Li, E Bertino USENIX Workshop on Health Security and Privacy, 2012 | 5 | 2012 |
Resilient authenticated execution of critical applications in untrusted environments MS Kirkpatrick, G Ghinita, E Bertino Dependable and Secure Computing, IEEE Transactions on 9 (4), 597-609, 2012 | 5 | 2012 |
A framework for verification and optimal reconfiguration of event-driven role based access control policies B Shafiq, JS Vaidya, A Ghafoor, E Bertino Proceedings of the 17th ACM symposium on Access Control Models and ..., 2012 | 5 | 2012 |
Privacy-Preserving Fine-Grained Access Control in Public Clouds. M Nabeel, E Bertino IEEE Data Eng. Bull. 35 (4), 21-30, 2012 | 5 | 2012 |
Proactive defense of insider threats through authorization management Y Sun, N Li, E Bertino Proceedings of 2011 international workshop on Ubiquitous affective awareness ..., 2011 | 5 | 2011 |
Broadcast group key management with access control vectors N Shang, M Nabeel, E Bertino, X Zou Department of Computer Science, Tech. Rep 4, 2010 | 5 | 2010 |
Tiamat: a tool for interactive analysis of microdata anonymization techniques C Dai, G Ghinita, E Bertino, JW Byun, N Li Proceedings of the VLDB Endowment 2 (2), 1618-1621, 2009 | 5 | 2009 |
Privacy-preserving techniques for location-based services E Bertino SIGSPATIAL Special 1 (2), 2-3, 2009 | 5 | 2009 |
Privacy-preserving management of transactions' receipts for mobile environments F Paci, N Shang, S Kerr, K Steuer Jr, J Woo, E Bertino Proceedings of the 8th Symposium on Identity and Trust on the Internet, 73-84, 2009 | 5 | 2009 |
Context-dependent authentication and access control M Kirkpatrick, E Bertino iNetSec 2009–Open Research Problems in Network Security, 63-75, 2009 | 5 | 2009 |
Spatio-temporal multi-granularity: modelling and implementation challenges E Camossi, M Bertolotto, E Bertino University College Dublin. School of Computer Science and Informatics, 2009 | 5 | 2009 |
A Comprehensive Approach for Solving Policy Heterogeneity R Ferrini, E Bertino | 5 | 2009 |
Role mining for engineering and optimizing role based access control systems N Li, T Li, I Molloy, Q Wang, E Bertino, S Calo, J Lobo Technical report, November, 2007 | 5 | 2007 |
Policy languages for digital identity management in federation systems E Bertino, A Bhargav-Spantzel, AC Squicciarini Policies for Distributed Systems and Networks, 2006. Policy 2006. Seventh ..., 2006 | 5 | 2006 |
Hippocratic data streams-concepts, architectures and issues MH Ali, MY ElTabakh, E Bertino | 5 | 2005 |
An XML-based approach to document flow verification E Bertino, E Ferrari, G Mella Information Security, 207-218, 2004 | 5 | 2004 |
Advances in Database Technology-EDBT 2002: 8th International Conference on Extending Database Technology, Prague, Czech Republic, March 25-27, Proceedings Springer, 2003 | 5 | 2003 |
Grid Based Methods for the Spatial Join Estimation. A Belussi, E Bertino, A Nucita SEBD, 49-60, 2003 | 5 | 2003 |
A database approach to quality of service specification in video databases E Bertino, AK Elmagarmid, MS Hacid ACM SIGMOD Record 32 (1), 35-40, 2003 | 5 | 2003 |
Hierarchical data placement for navigational multimedia applications A Vakali, E Terzi, E Bertino, A Elmagarmid Data & Knowledge Engineering 44 (1), 49-80, 2003 | 5 | 2003 |
ST_ODMG: A Multigranular Spatiotemporal Extension of ODMG Model E Camossi, M Bertolotto, E Bertino, G Guerrini TR. DISI-TR, Uv. degli Studi Genova, 2003 | 5 | 2003 |
Evolution specification of multigranular temporal objects E Camossi, E Bertino, G Guerrini, M Mesiti Temporal Representation and Reasoning, 2002. TIME 2002. Proceedings. Ninth ..., 2002 | 5 | 2002 |
Triggers in Java-based Databases E Bertino, G Guerrini, I Merlo L’OBJET 6 (3), 2000 | 5 | 2000 |
A semantic based redesigning of distributed workflows V Atluri, WK Huang, E Bertino 9th International Conference on Management of Data, 328-345, 1998 | 5 | 1998 |
On Using Materialization Strategies for a Temporal Authorization Model. E Ferrari, E Bertino, C Bettini, A Motta, P Samarati VIEWS, 34-42, 1996 | 5 | 1996 |
Providing different degrees of recency options to transactions in multilevel secure databases V Atluri, E Bertino, S Jajodia Proceedings of the ninth annual IFIP TC11 WG11. 3 working conference on ..., 1996 | 5 | 1996 |
Generalized relational algebra: Modeling spatial queries in constraint databases A Belussi, E Bertino, M Bertolotto, B Catania Constraint Databases and Application, 40-67, 1996 | 5 | 1996 |
Research issues in authorization models for hypertext systems E Bertino, P Samarati New Security Paradigms Workshop, 1995. Proceedings, 22-28, 1995 | 5 | 1995 |
Static Analysis of Transactional Intensional Databases. E Bertino, B Catania, G Guerrini, D Montesi Workshop on Deductive Databases and Logic Programming, 57-73, 1994 | 5 | 1994 |
Queries, constraints, updates and transactions within a logic-based language D Montesi, E Bertino Proceedings of the second international conference on Information and ..., 1993 | 5 | 1993 |
CLP (\ mathcal {A}\ mathcal {D}) as a deductive database language with updates E Bertino, M Martelli, D Montesi Extensions of Logic Programming, 80-99, 1993 | 5 | 1993 |
An evaluation of text access methods E Bertino, F Marinaro System Sciences, 1989. Vol. II: Software Track, Proceedings of the Twenty ..., 1989 | 5 | 1989 |
Effective key management in dynamic wireless sensor networks SH Seo, J Won, S Sultana, E Bertino Information Forensics and Security, IEEE Transactions on 10 (2), 371-383, 2015 | 4 | 2015 |
A supermodularity-based differential privacy preserving algorithm for data anonymization MR Fouad, K Elbassioni, E Bertino Knowledge and Data Engineering, IEEE Transactions on 26 (7), 1591-1601, 2014 | 4 | 2014 |
Privacy of outsourced k-means clustering D Liu, E Bertino, X Yi Proceedings of the 9th ACM symposium on Information, computer and ..., 2014 | 4 | 2014 |
Privacy-preserving assessment of social network data trustworthiness C Dai, FY Rao, TM Truta, E Bertino International Journal of Cooperative Information Systems 23 (02), 1441004, 2014 | 4 | 2014 |
Practical k nearest neighbor queries with location privacy X Yi, R Paulet, E Bertino, V Varadharajan Data Engineering (ICDE), 2014 IEEE 30th International Conference on, 640-651, 2014 | 4 | 2014 |
Representation and querying of unfair evaluations in social rating systems M Allahbakhsh, A Ignjatovic, B Benatallah, N Foo, E Bertino Computers & Security 41, 68-88, 2014 | 4 | 2014 |
A file provenance system S Sultana, E Bertino Proceedings of the third ACM conference on Data and application security and ..., 2013 | 4 | 2013 |
An analytic approach to people evaluation in crowdsourcing systems M Allahbakhsh, A Ignjatovic, B Benatallah, SMR Beheshti, N Foo, ... arXiv preprint arXiv:1211.3200, 2012 | 4 | 2012 |
Authenticated top-k aggregation in distributed and outsourced databases S Choi, HS Lim, E Bertino Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on ..., 2012 | 4 | 2012 |
Method and system for determining policy similarities E Bertino, D Lin, J Lobo, PR Rao US Patent 8,020,191, 2011 | 4 | 2011 |
Dependable and Secure Computing G Xu, C Borcea, L Iftode, J Cao, B Carminati, E Ferrari, KL Tan, CW Lee, ... | 4 | 2011 |
Efficient privacy preserving reputation protocols inspired by secure sum O Hasan, E Bertino, L Brunie Privacy Security and Trust (PST), 2010 Eighth Annual International ..., 2010 | 4 | 2010 |
High-performance TTL bipolar integrated circuits in 4H-SiC S Singh PURDUE UNIVERSITY, 2010 | 4 | 2010 |
A role-involved conditional purpose-based access control model ME Kabir, H Wang, E Bertino E-Government, E-Services and Global Processes, 167-180, 2010 | 4 | 2010 |
Assessing the trustworthiness of streaming data HS Lim, YS Moon, E Bertino Technical Report TR 2010-09, CERIAS, 2010 | 4 | 2010 |
Privilege states based access control for fine-grained intrusion response A Kamra, E Bertino Recent Advances in Intrusion Detection, 402-421, 2010 | 4 | 2010 |
Towards location-based access control in healthcare emergency response CR Vicente, M Kirkpatrick, G Ghinita, E Bertino, CS Jensen Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on ..., 2009 | 4 | 2009 |
Exposing copy-pasteblur forgeries based on color coherence B WANG, X Kong, E Bertino, H Fu Chinese Journal of Electronics 18 (3), 487-490, 2009 | 4 | 2009 |