default search action
Elisa Bertino
Person information
- affiliation: Purdue University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j397]Sonam Bhardwaj, Adrian Shuai Li, Mayank Dave, Elisa Bertino:
Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation. Comput. Secur. 140: 103769 (2024) - [j396]Antonino Rullo, Daniele Midi, Anand Mudgerikar, Elisa Bertino:
Kalis2.0 - A SECaaS-Based Context-Aware Self-Adaptive Intrusion Detection System for IoT. IEEE Internet Things J. 11(7): 12579-12601 (2024) - [j395]Yiwei Zhang, Siqi Ma, Tiancheng Chen, Juanru Li, Robert H. Deng, Elisa Bertino:
EvilScreen Attack: Smart TV Hijacking via Multi-Channel Remote Control Mimicry. IEEE Trans. Dependable Secur. Comput. 21(4): 1544-1556 (2024) - [j394]Yong-Feng Ge, Hua Wang, Elisa Bertino, Zhi-Hui Zhan, Jinli Cao, Yanchun Zhang, Jun Zhang:
Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility. IEEE Trans. Dependable Secur. Comput. 21(4): 2296-2311 (2024) - [j393]Jie Wang, Zheng Yan, Jiahe Lan, Elisa Bertino, Witold Pedrycz:
TrustGuard: GNN-Based Robust and Explainable Trust Evaluation With Dynamicity Support. IEEE Trans. Dependable Secur. Comput. 21(5): 4433-4450 (2024) - [j392]Alian Yu, Jian Kang, Joshua Morris, Elisa Bertino, Dan Lin:
Fight Malware Like Malware: A New Defense Method Against Crypto Ransomware. IEEE Trans. Dependable Secur. Comput. 21(5): 4953-4966 (2024) - [j391]Ruidong Han, Huihui Gong, Siqi Ma, Juanru Li, Chang Xu, Elisa Bertino, Surya Nepal, Zhuo Ma, Jianfeng Ma:
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects. IEEE Trans. Inf. Forensics Secur. 19: 722-734 (2024) - [j390]Mengdie Huang, Hyunwoo Lee, Ashish Kundu, Xiaofeng Chen, Anand Mudgerikar, Ninghui Li, Elisa Bertino:
ARIoTEDef: Adversarially Robust IoT Early Defense System Based on Self-Evolution against Multi-step Attacks. ACM Trans. Internet Things 5(3): 15:1-15:34 (2024) - [j389]Hasini Gunasinghe, Mikhail J. Atallah, Elisa Bertino:
PEBASI: A Privacy preserving, Efficient Biometric Authentication Scheme based on Irises. ACM Trans. Priv. Secur. 27(3): 25:1-25:31 (2024) - [j388]Yong-Feng Ge, Elisa Bertino, Hua Wang, Jinli Cao, Yanchun Zhang:
Distributed Cooperative Coevolution of Data Publishing Privacy and Transparency. ACM Trans. Knowl. Discov. Data 18(1): 20:1-20:23 (2024) - [j387]Huan Rong, Gongchi Chen, Tinghuai Ma, Victor S. Sheng, Elisa Bertino:
FuFaction: Fuzzy Factual Inconsistency Correction on Crowdsourced Documents With Hybrid-Mask at the Hidden-State Level. IEEE Trans. Knowl. Data Eng. 36(1): 167-183 (2024) - [c671]Elisa Bertino, Carl K. Chang, Rong N. Chang, Peter Chen, Ernesto Damiani, Sumi Helal, Dennis Gannon, Frank Leymann, Hong Mei, Dejan S. Milojicic, Stephen S. Yau:
2024 IEEE World Congress on Services. CLOUD 2024: xii - [c670]Elisa Bertino, Carl K. Chang, Rong N. Chang, Peter Chen, Ernesto Damiani, Sumi Helal, Dennis Gannon, Frank Leymann, Hong Mei, Dejan S. Milojicic, Stephen S. Yau:
Message from Rong N. Chang, Steering Committee Chair. SSE 2024: xi - [c669]Zilin Shen, Imtiaz Karim, Elisa Bertino:
Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode. AsiaCCS 2024 - [c668]Charalampos Katsis, Xin Jin, Fan Sang, Jiahao Sun, Elisa Bertino, Ramana Rao Kompella, Ashish Kundu:
Graphene: Towards Data-driven Holistic Security Posture Analysis using AI-generated Attack Graphs. CIC 2024: 9-18 - [c667]Mirza Masfiqur Rahman, Ashish Kundu, Elisa Bertino:
Poster: Benchmarking of Code Generative LLMs. ICDCS 2024: 1448-1449 - [c666]Mir Imtiaz Mostafiz, Eunseob Kim, Adrian Shuai Li, Elisa Bertino, Martin Byung-Guk Jun, Ali Shakouri:
Adversarial Domain Adaptation for Metal Cutting Sound Detection: Leveraging Abundant Lab Data for Scarce Industry Data. INDIN 2024: 1-8 - [c665]Beomjin Jin, Eunsoo Kim, Hyunwoo Lee, Elisa Bertino, Doowon Kim, Hyoungshick Kim:
Sharing cyber threat intelligence: Does it really help? NDSS 2024 - [c664]Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino:
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge. SP 2024: 1646-1664 - [c663]Mirza Masfiqur Rahman, Imtiaz Karim, Elisa Bertino:
CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications. USENIX Security Symposium 2024 - [i49]Kazi Samin Mubasshir, Imtiaz Karim, Elisa Bertino:
FBSDetector: Fake Base Station and Multi Step Attack Detection in Cellular Networks using Machine Learning. CoRR abs/2401.04958 (2024) - [i48]Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino:
Transfer Learning for Security: Challenges and Future Directions. CoRR abs/2403.00935 (2024) - [i47]Pradip Kunwar, Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Elisa Bertino:
SoK: Leveraging Transformers for Malware Analysis. CoRR abs/2405.17190 (2024) - [i46]Mirza Masfiqur Rahman, Imtiaz Karim, Elisa Bertino:
CellularLint: A Systematic Approach to Identify Inconsistent Behavior in Cellular Network Specifications. CoRR abs/2407.13742 (2024) - [i45]Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino:
Improving Malware Detection with Adversarial Domain Adaptation and Control Flow Graphs. CoRR abs/2407.13918 (2024) - [i44]Yiwei Zhang, Rouzbeh Behnia, Attila A. Yavuz, Reza Ebrahimi, Elisa Bertino:
Uncovering Attacks and Defenses in Secure Aggregation for Federated Deep Learning. CoRR abs/2410.09676 (2024) - [i43]Mir Imtiaz Mostafiz, Eunseob Kim, Adrian Shuai Li, Elisa Bertino, Martin Byung-Guk Jun, Ali Shakouri:
Adversarial Domain Adaptation for Metal Cutting Sound Detection: Leveraging Abundant Lab Data for Scarce Industry Data. CoRR abs/2410.17574 (2024) - [i42]Charalampos Katsis, Elisa Bertino:
ZT-SDN: An ML-powered Zero-Trust Architecture for Software-Defined Networks. CoRR abs/2411.15020 (2024) - [i41]Joshua Groen, Simone Di Valerio, Imtiaz Karim, Davide Villa, Yiewi Zhang, Leonardo Bonati, Michele Polese, Salvatore D'Oro, Tommaso Melodia, Elisa Bertino, Francesca Cuomo, Kaushik R. Chowdhury:
TIMESAFE: Timing Interruption Monitoring and Security Assessment for Fronthaul Environments. CoRR abs/2412.13049 (2024) - [i40]Panpan Han, Zheng Yan, Laurence T. Yang, Elisa Bertino:
P2C2T: Preserving the Privacy of Cross-Chain Transfer. IACR Cryptol. ePrint Arch. 2024: 1467 (2024) - 2023
- [j386]Mostafa Mirzaie, Behshid Behkamal, Mohammad Allahbakhsh, Samad Paydar, Elisa Bertino:
State of the art on quality control for data streams: A systematic literature review. Comput. Sci. Rev. 48: 100554 (2023) - [j385]Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang:
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols. ACM Comput. Surv. 55(2): 3:1-3:36 (2023) - [j384]Omar Hasan, Lionel Brunie, Elisa Bertino:
Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey. ACM Comput. Surv. 55(2): 32:1-32:37 (2023) - [j383]Elisa Bertino:
Privacy in the Era of 5G, IoT, Big Data, and Machine Learning. IEEE Secur. Priv. 21(1): 91-92 (2023) - [j382]Elisa Bertino, Suparna Bhattacharya, Elena Ferrari, Dejan S. Milojicic:
Trustworthy AI and Data Lineage. IEEE Internet Comput. 27(6): 5-6 (2023) - [j381]Antonino Rullo, Elisa Bertino, Kui Ren:
Guest Editorial Special Issue on Intrusion Detection for the Internet of Things. IEEE Internet Things J. 10(10): 8327-8330 (2023) - [j380]Mingshan You, Jiao Yin, Hua Wang, Jinli Cao, Kate N. Wang, Yuan Miao, Elisa Bertino:
A knowledge graph empowered online learning framework for access control decision-making. World Wide Web (WWW) 26(2): 827-848 (2023) - [c662]Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Dinesh C. Verma, Seraphin B. Calo, Alessandra Russo:
FLAP - A Federated Learning Framework for Attribute-based Access Control Policies. CODASPY 2023: 263-272 - [c661]Elisa Bertino, Hyunwoo Lee, Mengdie Huang, Charalampos Katsis, Zilin Shen, Bruno Ribeiro, Daniel De Mello, Ashish Kundu:
A Pro-Active Defense Framework for IoT Systems. CIC 2023: 125-132 - [c660]Weicheng Wang, Hyunwoo Lee, Yan Huang, Elisa Bertino, Ninghui Li:
Towards Efficient Privacy-Preserving Deep Packet Inspection. ESORICS (2) 2023: 166-192 - [c659]Anand Mudgerikar, Elisa Bertino:
Intelligent Security Aware Routing: Using Model-Free Reinforcement Learning. ICCCN 2023: 1-10 - [c658]Elisa Bertino, Baochun Li, Ophir Frieder, Xiaohua Jia:
Welcome Message. ICDCS 2023: xxii-xxiii - [c657]Adrian Shuai Li, Elisa Bertino, Rih-Teng Wu, Ting-Yan Wu:
Building Manufacturing Deep Learning Models with Minimal and Imbalanced Training Data Using Domain Adaptation and Data Augmentation. ICIT 2023: 1-8 - [c656]Imtiaz Karim, Kazi Samin Mubasshir, Mirza Masfiqur Rahman, Elisa Bertino:
SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis. IJCNLP (Findings) 2023: 20-38 - [c655]Abubakar Sadiq Sani, Elisa Bertino, Dong Yuan, Zhao Yang Dong:
A Universally Composable Key Exchange Framework for Operational Technology Communication Protocols. SmartGridComm 2023: 1-6 - [c654]Imtiaz Karim, Abdullah Al Ishtiaq, Syed Rafiul Hussain, Elisa Bertino:
BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations. SP 2023: 3209-3227 - [c653]Xing Han, Yuheng Zhang, Xue Zhang, Zeyuan Chen, Mingzhe Wang, Yiwei Zhang, Siqi Ma, Yu Yu, Elisa Bertino, Juanru Li:
Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning. USENIX Security Symposium 2023: 4607-4624 - [c652]Sanghak Oh, Minwook Lee, Hyunwoo Lee, Elisa Bertino, Hyoungshick Kim:
AppSniffer: Towards Robust Mobile App Fingerprinting Against VPN. WWW 2023: 2318-2328 - [i39]Imtiaz Karim, Kazi Samin Mubasshir, Mirza Masfiqur Rahman, Elisa Bertino:
SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis. CoRR abs/2301.09201 (2023) - [i38]Adrian Shuai Li, Elisa Bertino, Rih-Teng Wu, Ting-Yan Wu:
Building Manufacturing Deep Learning Models with Minimal and Imbalanced Training Data Using Domain Adaptation and Data Augmentation. CoRR abs/2306.00202 (2023) - [i37]Adrian Shuai Li, Elisa Bertino, Xuan-Hong Dang, Ankush Singla, Yuhai Tu, Mark N. Wegman:
Maximal Domain Independent Representations Improve Transfer Learning. CoRR abs/2306.00262 (2023) - [i36]Jie Wang, Zheng Yan, Jiahe Lan, Elisa Bertino, Witold Pedrycz:
TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support. CoRR abs/2306.13339 (2023) - [i35]Diane Jackson, Sorin Adam Matei, Elisa Bertino:
Artificial Intelligence Ethics Education in Cybersecurity: Challenges and Opportunities: a focus group report. CoRR abs/2311.00903 (2023) - [i34]Sorin Adam Matei, Elisa Bertino:
Educating for AI Cybersecurity Work and Research: Ethics, Systems Thinking, and Communication Requirements. CoRR abs/2311.04326 (2023) - [i33]Zilin Shen, Imtiaz Karim, Elisa Bertino:
Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode. CoRR abs/2312.07877 (2023) - [i32]Jiahe Lan, Jie Wang, Baochen Yan, Zheng Yan, Elisa Bertino:
FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge. CoRR abs/2312.09665 (2023) - [i31]Xin Jin, Charalampos Katsis, Fan Sang, Jiahao Sun, Elisa Bertino, Ramana Rao Kompella, Ashish Kundu:
Prometheus: Infrastructure Security Posture Analysis with AI-generated Attack Graphs. CoRR abs/2312.13119 (2023) - 2022
- [j379]Abubakar Sadiq Sani, Elisa Bertino, Dong Yuan, Ke Meng, Zhao Yang Dong:
SPrivAD: A secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. Comput. Secur. 115: 102610 (2022) - [j378]Adnan Ahmad, Brian Whitworth, Elisa Bertino:
A framework for the application of socio-technical design methodology. Ethics Inf. Technol. 24(4): 46 (2022) - [j377]Srinibas Swain, Deepak Puthal, Elisa Bertino:
CryptoCliqIn: Graph-Theoretic Cryptography Using Clique Injection. IEEE Intell. Syst. 37(5): 59-65 (2022) - [j376]Elisa Bertino:
The Persistent Problem of Software Insecurity. IEEE Secur. Priv. 20(3): 107-108 (2022) - [j375]Xu Yang, Xun Yi, Ibrahim Khalil, Junwei Luo, Elisa Bertino, Surya Nepal, Xinyi Huang:
Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs. IEEE Internet Things J. 9(14): 12563-12572 (2022) - [j374]Elisa Bertino, Haya Schulmann, Michael Waidner:
Special issue ESORICS 2021. J. Comput. Secur. 30(6): 753-755 (2022) - [j373]Mahmoud Barhamgi, Elisa Bertino:
Editorial: Special Issue on Data Transparency - Data Quality, Annotation, and Provenance. ACM J. Data Inf. Qual. 14(1): 1:1-1:3 (2022) - [j372]Mahmoud Barhamgi, Elisa Bertino:
Editorial: Special Issue on Data Transparency - Uses Cases and Applications. ACM J. Data Inf. Qual. 14(2): 6:1-6:3 (2022) - [j371]Huawei Huang, Salil S. Kanhere, Jiawen Kang, Zehui Xiong, Lei Zhang, Bhaskar Krishnamachari, Elisa Bertino, Sichao Yang:
Guest Editorial Special Issue on Intelligent Blockchain for Future Communications and Networking: Technologies, Trends, and Applications. IEEE J. Sel. Areas Commun. 40(12): 3299-3304 (2022) - [j370]Fabrizio Cicala, Elisa Bertino:
Analysis of Encryption Key Generation in Modern Crypto Ransomware. IEEE Trans. Dependable Secur. Comput. 19(2): 1239-1253 (2022) - [j369]Siqi Ma, Juanru Li, Surya Nepal, Diethelm Ostry, David Lo, Sanjay K. Jha, Robert H. Deng, Elisa Bertino:
Orchestration or Automation: Authentication Flaw Detection in Android Apps. IEEE Trans. Dependable Secur. Comput. 19(4): 2165-2178 (2022) - [j368]Qinbao Xu, Elisa Bertino, Changda Wang:
Compact Provenance Scheme Through Packet Path Index Differences in WSNs. IEEE Trans. Inf. Forensics Secur. 17: 3511-3524 (2022) - [j367]Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman, Elisa Bertino:
A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living. ACM Trans. Internet Techn. 22(3): 57:1-57:25 (2022) - [j366]Changda Wang, Xiaowei Li, Elisa Bertino:
Network Temperature: A Novel Statistical Index for Networks Measurement and Management. ACM Trans. Internet Techn. 22(3): 66:1-66:20 (2022) - [j365]Andrzej Goscinski, Elisa Bertino, Shangguang Wang:
Guest Editor's Introduction: Special Section on EdgeAI as a Service. IEEE Trans. Serv. Comput. 15(2): 588-590 (2022) - [j364]Mohammad Allahbakhsh, Haleh Amintoosi, Aleksandar Ignjatovic, Elisa Bertino:
A Trust-Based Experience-Aware Framework for Integrating Fuzzy Recommendations. IEEE Trans. Serv. Comput. 15(2): 698-709 (2022) - [j363]Mohammad Allahbakhsh, Haleh Amintoosi, Behshid Behkamal, Salil S. Kanhere, Elisa Bertino:
AQA: An Adaptive Quality Assessment Framework for Online Review Systems. IEEE Trans. Serv. Comput. 15(3): 1486-1497 (2022) - [c651]Hyunwoo Lee, Imtiaz Karim, Ninghui Li, Elisa Bertino:
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol. AsiaCCS 2022: 182-195 - [c650]Laurent d'Orazio, Jalil Boukhobza, Omer F. Rana, Juba Agoun, Le Gruenwald, Hervé Rannou, Elisa Bertino, Mohand-Saïd Hacid, Taofik Saïdi, Georges Bossert, Van Long Nguyen Huu, Dimitri Tombroff, Makoto Onizuka:
The Lannion report on Big Data and Security Monitoring Research. IEEE Big Data 2022: 2960-2969 - [c649]Charalampos Katsis, Fabrizio Cicala, Dan Thomsen, Nathan Ringo, Elisa Bertino:
NEUTRON: A Graph-based Pipeline for Zero-trust Network Architectures. CODASPY 2022: 167-178 - [c648]Elisa Bertino, Ravi S. Sandhu, Bhavani Thuraisingham, Indrakshi Ray, Wenjia Li, Maanak Gupta, Sudip Mittal:
Security and Privacy for Emerging IoT and CPS Domains. CODASPY 2022: 336-337 - [c647]Sen Lin, Ming Shi, Anish Arora, Raef Bassily, Elisa Bertino, Constantine Caramanis, Kaushik R. Chowdhury, Eylem Ekici, Atilla Eryilmaz, Stratis Ioannidis, Nan Jiang, Gauri Joshi, Jim Kurose, Yingbin Liang, Zhiqiang Lin, Jia Liu, Mingyan Liu, Tommaso Melodia, Aryan Mokhtari, Rob Nowak, Sewoong Oh, Srini Parthasarathy, Chunyi Peng, Hulya Seferoglu, Ness B. Shroff, Sanjay Shakkottai, Kannan Srinivasan, Ameet Talwalkar, Aylin Yener, Lei Ying:
Leveraging Synergies Between AI and Networking to Build Next Generation Edge Networks. CIC 2022: 16-25 - [c646]Ankush Singla, Elisa Bertino:
DP-ADA: Differentially Private Adversarial Domain Adaptation for Training Deep Learning based Network Intrusion Detection Systems. CIC 2022: 89-98 - [c645]Yiwei Zhang, Siqi Ma, Juanru Li, Dawu Gu, Elisa Bertino:
KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications. DSN 2022: 488-500 - [c644]Hyunwoo Lee, Anand Mudgerikar, Ashish Kundu, Ninghui Li, Elisa Bertino:
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks. ESORICS (2) 2022: 549-568 - [c643]Yi Xie, Wen Li, Yuqing Sun, Elisa Bertino, Bin Gong:
Subspace Embedding Based New Paper Recommendation. ICDE 2022: 1767-1780 - [c642]Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. ICSE 2022: 462-473 - [c641]Yunlong Lyu, Yi Fang, Yiwei Zhang, Qibin Sun, Siqi Ma, Elisa Bertino, Kangjie Lu, Juanru Li:
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis. SP 2022: 2096-2113 - [c640]Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino:
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. USENIX Security Symposium 2022: 4579-4596 - [e76]Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13338, Springer 2022, ISBN 978-3-031-06793-8 [contents] - [e75]Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13339, Springer 2022, ISBN 978-3-031-06787-7 [contents] - [e74]Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13340, Springer 2022, ISBN 978-3-031-06790-7 [contents] - [i30]Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino:
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. CoRR abs/2201.09370 (2022) - [i29]Yiwei Zhang, Siqi Ma, Tiancheng Chen, Juanru Li, Robert H. Deng, Elisa Bertino:
EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry. CoRR abs/2210.03014 (2022) - 2021
- [j362]Elisa Bertino:
An excellent venue for multidisciplinary research in civil and infrastructure engineering. Comput. Aided Civ. Infrastructure Eng. 36(6): 677 (2021) - [j361]Elisa Bertino, Mohammad R. Jahanshahi, Ankush Singla, Rih-Teng Wu:
Intelligent IoT systems for civil infrastructure health monitoring: a research roadmap. Discov. Internet Things 1(1) (2021) - [j360]Elisa Bertino:
Attacks on Artificial Intelligence [Last Word]. IEEE Secur. Priv. 19(1): 103-104 (2021) - [j359]Elisa Bertino:
Zero Trust Architecture: Does It Help? IEEE Secur. Priv. 19(5): 95-96 (2021) - [j358]Mohammad Allahbakhsh, Haleh Amintoosi, Behshid Behkamal, Amin Beheshti, Elisa Bertino:
SCiMet: Stable, sCalable and reliable Metric-based framework for quality assessment in collaborative content generation systems. J. Informetrics 15(2): 101127 (2021) - [j357]Yinghui Zhang, Robert H. Deng, Elisa Bertino, Dong Zheng:
Robust and Universal Seamless Handover Authentication in 5G HetNets. IEEE Trans. Dependable Secur. Comput. 18(2): 858-874 (2021) - [j356]Shagufta Mehnaz, Elisa Bertino:
A Fine-Grained Approach for Anomaly Detection in File System Accesses With Enhanced Temporal User Profiles. IEEE Trans. Dependable Secur. Comput. 18(6): 2535-2550 (2021) - [j355]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Elisa Bertino, Kwok-Yan Lam:
Privacy Preserving Location-Aware Personalized Web Service Recommendations. IEEE Trans. Serv. Comput. 14(3): 791-804 (2021) - [j354]Amani Abu Jabal, Maryam Davari, Elisa Bertino, Christian Makaya, Seraphin B. Calo, Dinesh C. Verma, Christopher Williams:
ProFact: A Provenance-Based Analytics Framework for Access Control Policies. IEEE Trans. Serv. Comput. 14(6): 1914-1928 (2021) - [c639]Abubakar Sadiq Sani, Dong Yuan, Elisa Bertino, Zhao Yang Dong:
Crypto-Chain: A Relay Resilience Framework for Smart Vehicles. ACSAC 2021: 439-454 - [c638]Ankush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila A. Yavuz, Elisa Bertino:
Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations. AsiaCCS 2021: 501-515 - [c637]Syed Rafiul Hussain, Imtiaz Karim, Abdullah Al Ishtiaq, Omar Chowdhury, Elisa Bertino:
Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices. CCS 2021: 1082-1099 - [c636]Elisa Bertino, Murat Kantarcioglu, Cuneyt Gurcan Akcora, Sagar Samtani, Sudip Mittal, Maanak Gupta:
AI for Security and Security for AI. CODASPY 2021: 333-334 - [c635]Anand Mudgerikar, Elisa Bertino, Jorge Lobo, Dinesh C. Verma:
A Security-Constrained Reinforcement Learning Framework for Software Defined Networks. ICC 2021: 1-6 - [c634]Imtiaz Karim, Syed Rafiul Hussain, Elisa Bertino:
ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations. ICDCS 2021: 773-785 - [c633]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. ICSE 2021: 1671-1682 - [c632]Elisa Bertino, Kenneth Brancik:
Services for Zero Trust Architectures - A Research Roadmap. ICWS 2021: 14-20 - [c631]Mark Law, Alessandra Russo, Krysia Broda, Elisa Bertino:
Scalable Non-observational Predicate Learning in ASP. IJCAI 2021: 1936-1943 - [c630]Elisa Bertino, Imtiaz Karim:
AI-powered Network Security: Approaches and Research Directions. NSysS 2021: 97-105 - [c629]Charalampos Katsis, Fabrizio Cicala, Dan Thomsen, Nathan Ringo, Elisa Bertino:
Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing. SACMAT 2021: 165-174 - [c628]Yi Xie, Yuqing Sun, Elisa Bertino:
Learning Domain Semantics and Cross-Domain Correlations for Paper Recommendation. SIGIR 2021: 706-715 - [c627]Mortada Al-Banna, Boualem Benatallah, Moshe Chai Barukh, Elisa Bertino, Salil S. Kanhere:
Crowdsourcing Software Vulnerability Discovery: Models, Dimensions, and Directions. WISE (1) 2021: 3-13 - [e73]Elisa Bertino, Haya Schulmann, Michael Waidner:
Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12972, Springer 2021, ISBN 978-3-030-88417-8 [contents] - [e72]Elisa Bertino, Haya Schulmann, Michael Waidner:
Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12973, Springer 2021, ISBN 978-3-030-88427-7 [contents] - [e71]Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino:
Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12736, Springer 2021, ISBN 978-3-030-78608-3 [contents] - [e70]Xingming Sun, Xiaorui Zhang, Zhihua Xia, Elisa Bertino:
Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12737, Springer 2021, ISBN 978-3-030-78611-3 [contents] - [i28]Elisa Bertino, Daniel W. Bliss, Daniel Lopresti, Larry Peterson, Henning Schulzrinne:
Computing Research Challenges in Next Generation Wireless Networking. CoRR abs/2101.01279 (2021) - [i27]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. CoRR abs/2103.05758 (2021) - [i26]Nicholas Malecki, Hye-young Paik, Aleksandar Ignjatovic, Alan Blair, Elisa Bertino:
Simeon - Secure Federated Machine Learning Through Iterative Filtering. CoRR abs/2103.07704 (2021) - [i25]Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. CoRR abs/2112.03511 (2021) - 2020
- [j353]Elisa Bertino:
Security of cellular networks position paper. CCF Trans. Netw. 3(2): 93-96 (2020) - [j352]Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino:
ATFuzzer: Dynamic Analysis Framework of AT Interface for Android Smartphones. DTRAP 1(4): 23:1-23:29 (2020) - [j351]Elisa Bertino:
The Quest for Data Transparency. IEEE Secur. Priv. 18(3): 67-68 (2020) - [j350]Zheng Yan, Willy Susilo, Elisa Bertino, Jun Zhang, Laurence T. Yang:
AI-driven data security and privacy. J. Netw. Comput. Appl. 172: 102842 (2020) - [j349]Ankush Singla, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino, Ninghui Li:
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks. Proc. Priv. Enhancing Technol. 2020(1): 126-142 (2020) - [j348]Xun Yi, Elisa Bertino, Fang-Yu Rao, Kwok-Yan Lam, Surya Nepal, Athman Bouguettaya:
Privacy-Preserving User Profile Matching in Social Networks. IEEE Trans. Knowl. Data Eng. 32(8): 1572-1585 (2020) - [j347]Jongho Won, Seung-Hyun Seo, Elisa Bertino:
A Secure Shuffling Mechanism for White-Box Attack-Resistant Unmanned Vehicles. IEEE Trans. Mob. Comput. 19(5): 1023-1039 (2020) - [j346]Anand Mudgerikar, Puneet Sharma, Elisa Bertino:
Edge-Based Intrusion Detection for IoT devices. ACM Trans. Manag. Inf. Syst. 11(4): 18:1-18:21 (2020) - [c626]Mark Law, Alessandra Russo, Elisa Bertino, Krysia Broda, Jorge Lobo:
FastLAS: Scalable Inductive Logic Programming Incorporating Domain-Specific Optimisation Criteria. AAAI 2020: 2877-2885 - [c625]Charalampos Katsis, Ankush Singla, Elisa Bertino:
Real-time Digital Signatures for Named Data Networking. ICN 2020: 149-151 - [c624]Siqi Ma, Hehao Li, Wenbo Yang, Juanru Li, Surya Nepal, Elisa Bertino:
Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services. ACSAC 2020: 320-331 - [c623]Ankush Singla, Elisa Bertino, Dinesh C. Verma:
Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation. AsiaCCS 2020: 127-140 - [c622]Elisa Bertino, Anoop Singhal, Srivathsan Srinivasagopalan, Rakesh M. Verma:
Developing A Compelling Vision for Winning the Cybersecurity Arms Race. CODASPY 2020: 220-222 - [c621]Hong Mei, Elisa Bertino:
IEEE 2020 World Congress on Services Welcome Message from Congress 2020 General Chairs. EDGE 2020: 1 - [c620]Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Mark Law, Alessandra Russo, Seraphin B. Calo, Dinesh C. Verma:
Polisma - A Framework for Learning Attribute-Based Access Control Policies. ESORICS (1) 2020: 523-544 - [c619]Anand Mudgerikar, Elisa Bertino:
Jarvis: Moving Towards a Smarter Internet of Things. ICDCS 2020: 122-134 - [c618]Xun Yi, Russell Paulet, Elisa Bertino, Fang-Yu Rao:
Practical Anonymous Subscription with Revocation Based on Broadcast Encryption. ICDE 2020: 241-252 - [c617]Daren Fadolalkarim, Elisa Bertino, Asmaa Sallam:
An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs. ICDE 2020: 265-276 - [c616]Shagufta Mehnaz, Elisa Bertino:
Privacy-preserving Real-time Anomaly Detection Using Edge Computing. ICDE 2020: 469-480 - [c615]Jorge Lobo, Elisa Bertino, Alessandra Russo:
On Security Policy Migrations. SACMAT 2020: 179-188 - [c614]Hong Mei, Elisa Bertino:
IEEE 2020 World Congress on Services Welcome Message from Congress 2020 General Chairs. SERVICES 2020: 1-2 - [c613]Elisa Bertino:
Privacy in the Era of 5G, IoT, Big Data and Machine Learning. TPS-ISA 2020: 134-137 - [c612]Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, Ninghui Li:
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy. WISEC 2020: 133-143 - [e69]Xingming Sun, Jinwei Wang, Elisa Bertino:
Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12239, Springer 2020, ISBN 978-3-030-57883-1 [contents] - [e68]Xingming Sun, Jinwei Wang, Elisa Bertino:
Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12240, Springer 2020, ISBN 978-3-030-57880-0 [contents] - [i24]Elisa Bertino, Syed Rafiul Hussain, Omar Chowdhury:
5G Security and Privacy: A Research Roadmap. CoRR abs/2003.13604 (2020) - [i23]Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Dinesh C. Verma, Seraphin B. Calo, Alessandra Russo:
FLAP - A Federated Learning Framework for Attribute-based Access Control Policies. CoRR abs/2010.09767 (2020) - [i22]Shagufta Mehnaz, Ninghui Li, Elisa Bertino:
Black-box Model Inversion Attribute Inference Attacks on Classification Models. CoRR abs/2012.03404 (2020) - [i21]Elisa Bertino, Sujata Banerjee:
Artificial Intelligence at the Edge. CoRR abs/2012.05410 (2020) - [i20]Elisa Bertino, Finale Doshi-Velez, Maria L. Gini, Daniel Lopresti, David C. Parkes:
Artificial Intelligence & Cooperation. CoRR abs/2012.06034 (2020) - [i19]Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang:
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols. CoRR abs/2012.09520 (2020)
2010 – 2019
- 2019
- [j345]Rih-Teng Wu, Ankush Singla, Mohammad R. Jahanshahi, Elisa Bertino, Bong Jun Ko, Dinesh C. Verma:
Pruning deep convolutional neural networks for efficient edge computing in condition assessment of infrastructures. Comput. Aided Civ. Infrastructure Eng. 34(9): 774-789 (2019) - [j344]Daren Fadolalkarim, Elisa Bertino:
A-PANDDE: Advanced Provenance-based ANomaly Detection of Data Exfiltration. Comput. Secur. 84: 276-287 (2019) - [j343]Elisa Bertino, Shawn Merrill, Alina Nesen, Christine Utz:
Redefining Data Transparency: A Multidimensional Approach. Computer 52(1): 16-26 (2019) - [j342]Amani Abu Jabal, Maryam Davari, Elisa Bertino, Christian Makaya, Seraphin B. Calo, Dinesh C. Verma, Alessandra Russo, Christopher Williams:
Methods and Tools for Policy Analysis. ACM Comput. Surv. 51(6): 121:1-121:35 (2019) - [j341]Ankush Singla, Elisa Bertino:
How Deep Learning Is Making Information Security More Intelligent. IEEE Secur. Priv. 17(3): 56-65 (2019) - [j340]Elisa Bertino:
It Takes a Village to Secure Cellular Networks. IEEE Secur. Priv. 17(5): 96-95 (2019) - [j339]Fenghua Li, Hui Li, Cong Wang, Kui Ren, Elisa Bertino:
Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT. IEEE Internet Things J. 6(2): 1446-1449 (2019) - [j338]Elisa Bertino, Ashish Kundu, Zehra Sura:
Data Transparency with Blockchain and AI Ethics. ACM J. Data Inf. Qual. 11(4): 16:1-16:8 (2019) - [j337]Fang-Yu Rao, Elisa Bertino:
Privacy Techniques for Edge Computing Systems. Proc. IEEE 107(8): 1632-1654 (2019) - [j336]Abubakar Sadiq Sani, Dong Yuan, Wei Bao, Zhao Yang Dong, Branka Vucetic, Elisa Bertino:
Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet. IEEE Trans. Inf. Forensics Secur. 14(8): 2113-2127 (2019) - [j335]Fang-Yu Rao, Jianneng Cao, Elisa Bertino, Murat Kantarcioglu:
Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records. ACM Trans. Priv. Secur. 22(3): 15:1-15:36 (2019) - [j334]Jongho Won, Elisa Bertino:
Robust Sensor Localization against Known Sensor Position Attacks. IEEE Trans. Mob. Comput. 18(12): 2954-2967 (2019) - [c611]Mark Law, Alessandra Russo, Elisa Bertino, Krysia Broda, Jorge Lobo:
Representing and Learning Grammars in Answer Set Programming. AAAI 2019: 2919-2928 - [c610]Siqi Ma, Runhan Feng, Juanru Li, Yang Liu, Surya Nepal, Diethelm Ostry, Elisa Bertino, Robert H. Deng, Zhuo Ma, Sanjay Jha:
An empirical study of SMS one-time password authentication in Android apps. ACSAC 2019: 339-354 - [c609]Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino:
Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones. ACSAC 2019: 529-543 - [c608]Luca Cappelletti, Stefano Valtolina, Giorgio Valentini, Marco Mesiti, Elisa Bertino:
On the Quality of Classification Models for Inferring ABAC Policies from Access Logs. IEEE BigData 2019: 4000-4007 - [c607]Daniel Cunnington, Mark Law, Alessandra Russo, Elisa Bertino, Seraphin B. Calo:
Towards a Neural-Symbolic Generative Policy Model. IEEE BigData 2019: 4008-4016 - [c606]Maryam Davari, Elisa Bertino:
Access Control Model Extensions to Support Data Privacy Protection based on GDPR. IEEE BigData 2019: 4017-4024 - [c605]Dinesh C. Verma, Seraphin B. Calo, Elisa Bertino, Alessandra Russo, Graham White:
Policy based Ensembles for applying ML on Big Data. IEEE BigData 2019: 4038-4044 - [c604]Anand Mudgerikar, Puneet Sharma, Elisa Bertino:
E-Spion: A System-Level Intrusion Detection System for IoT Devices. AsiaCCS 2019: 493-500 - [c603]Syed Rafiul Hussain, Mitziu Echeverria, Imtiaz Karim, Omar Chowdhury, Elisa Bertino:
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol. CCS 2019: 669-684 - [c602]Huan Yang, Tianyuan Liu, Yuqing Sun, Elisa Bertino:
Exploring The Interaction Effects for Temporal Spatial Behavior Prediction. CIKM 2019: 2013-2022 - [c601]Asmaa Sallam, Elisa Bertino:
Result-Based Detection of Insider Threats to Relational Databases. CODASPY 2019: 133-143 - [c600]Elisa Bertino:
IoT Security A Comprehensive Life Cycle Framework. CIC 2019: 196-203 - [c599]Syed Rafiul Hussain, Shahriar Nirjon, Elisa Bertino:
Securing the Insecure Link of Internet-of-Things Using Next-Generation Smart Gateways. DCOSS 2019: 66-73 - [c598]Xun Yi, Kwok-Yan Lam, Elisa Bertino, Fang-Yu Rao:
Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation. ESORICS (2) 2019: 387-411 - [c597]Siqi Ma, Elisa Bertino, Surya Nepal, Juanru Li, Diethelm Ostry, Robert H. Deng, Sanjay Jha:
Finding Flaws from Password Authentication Code in Android Apps. ESORICS (1) 2019: 619-637 - [c596]Dinesh C. Verma, Seraphin B. Calo, Elisa Bertino, Geeth de Mel, Mudhakar Srivatsa:
Generating Client Side Policies for Cyber-Physical Safety. ICCCN 2019: 1-8 - [c595]Elisa Bertino, Graham White, Jorge Lobo, John Ingham, Gregory H. Cirincione, Alessandra Russo, Mark Law, Seraphin B. Calo, Irene Manotas, Dinesh C. Verma, Amani Abu Jabal, Daniel Cunnington, Geeth de Mel:
Generative Policies for Coalition Systems - A Symbolic Learning Framework. ICDCS 2019: 1590-1600 - [c594]Jian Kang, Dan Lin, Elisa Bertino, Ozan K. Tonguz:
From Autonomous Vehicles to Vehicular Clouds: Challenges of Management, Security and Dependability. ICDCS 2019: 1730-1741 - [c593]Abubakar Sadiq Sani, Dong Yuan, Wei Bao, Phee Lep Yeoh, Zhao Yang Dong, Branka Vucetic, Elisa Bertino:
Xyreum: A High-Performance and Scalable Blockchain for IIoT Security and Privacy. ICDCS 2019: 1920-1930 - [c592]Graham White, Daniel Cunnington, Mark Law, Elisa Bertino, Geeth de Mel, Alessandra Russo:
A Comparison Between Statistical and Symbolic Learning Approaches for Generative Policy Models. ICMLA 2019: 1314-1321 - [c591]Daniel Cunnington, Irene Manotas, Mark Law, Geeth de Mel, Seraphin B. Calo, Elisa Bertino, Alessandra Russo:
A Generative Policy Model for Connected and Autonomous Vehicles. ITSC 2019: 1558-1565 - [c590]Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li, Elisa Bertino:
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information. NDSS 2019 - [c589]Ankush Singla, Elisa Bertino, Dinesh C. Verma:
Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning. SMARTCOMP 2019: 69-74 - [c588]Dinesh C. Verma, Elisa Bertino, Geeth de Mel, John Melrose:
On the Impact of Generative Policies on Security Metrics. SMARTCOMP 2019: 104-109 - [c587]Valentina Salapura, David Wood, Shonda Adena Witherspoon, Keith Grueneberg, Elisa Bertino, Amani Abu Jabal, Seraphin B. Calo:
Generative Policy Framework for AI Training Data Curation. SMARTCOMP 2019: 475-477 - [c586]Syed Rafiul Hussain, Mitziu Echeverria, Ankush Singla, Omar Chowdhury, Elisa Bertino:
Insecure connection bootstrapping in cellular networks: the root of all evil. WiSec 2019: 1-11 - [c585]Hasini Gunasinghe, Ashish Kundu, Elisa Bertino, Hugo Krawczyk, Suresh Chari, Kapil Singh, Dong Su:
PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets. WWW 2019: 594-604 - [p12]Antonino Rullo, Edoardo Serra, Elisa Bertino, Jorge Lobo:
Optimal Placement of Security Resources for the Internet of Things. The Internet of Things for Smart Urban Ecosystems 2019: 95-124 - [e67]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
12th IEEE International Conference on Cloud Computing, CLOUD 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2705-7 [contents] - [e66]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
2019 IEEE International Conference on Services Computing, SCC 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2720-0 [contents] - [e65]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
2019 IEEE International Congress on Big Data, BigData Congress 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2772-9 [contents] - [e64]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
3rd IEEE International Conference on Edge Computing, EDGE 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2708-8 [contents] - [e63]Seraphin B. Calo, Elisa Bertino, Dinesh C. Verma:
Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, PADG@ESORICS 2018, September 6, 2018, Barcelona, Spain]. Lecture Notes in Computer Science 11550, Springer 2019, ISBN 978-3-030-17276-3 [contents] - [e62]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11632, Springer 2019, ISBN 978-3-030-24273-2 [contents] - [e61]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11633, Springer 2019, ISBN 978-3-030-24264-0 [contents] - [e60]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part III. Lecture Notes in Computer Science 11634, Springer 2019, ISBN 978-3-030-24270-1 [contents] - [e59]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part IV. Lecture Notes in Computer Science 11635, Springer 2019, ISBN 978-3-030-24267-1 [contents] - [e58]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
2019 IEEE International Congress on Internet of Things, ICIOT 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2714-9 [contents] - [e57]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
2019 IEEE International Conference on Web Services, ICWS 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2717-0 [contents] - [e56]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
2019 IEEE International Conference on Cognitive Computing, ICCC 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2711-8 [contents] - [i18]Dinesh C. Verma, Seraphin B. Calo, Shonda Witherspoon, Elisa Bertino, Amani Abu Jabal, Ananthram Swami, Greg Cirincione, Simon Julier, Graham White, Geeth de Mel, Gavin Pearson:
Federated Learning for Coalition Operations. CoRR abs/1910.06799 (2019) - 2018
- [j333]Elisa Bertino, Valentina Casola, Aniello Castiglione, Willy Susilo:
Editorial: Security and privacy protection vs sustainable development. Comput. Secur. 76: 250-251 (2018) - [j332]Oyindamola Oluwatimi, Maria Luisa Damiani, Elisa Bertino:
A context-aware system to secure enterprise content: Incorporating reliability specifiers. Comput. Secur. 77: 162-178 (2018) - [j331]Amani Abu Jabal, Elisa Bertino:
A Comprehensive Query Language for Provenance Information. Int. J. Cooperative Inf. Syst. 27(3): 1850007:1-1850007:22 (2018) - [j330]Elisa Bertino, Mohammad R. Jahanshahi:
Adaptive and Cost-Effective Collection of High-Quality Data for Critical Infrastructure and Emergency Management in Smart Cities - Framework and Challenges. ACM J. Data Inf. Qual. 10(1): 1:1-1:6 (2018) - [j329]Elisa Bertino, Amani Abu Jabal, Seraphin B. Calo, Dinesh C. Verma, Christopher Williams:
The Challenge of Access Control Policies Quality. ACM J. Data Inf. Qual. 10(2): 6:1-6:6 (2018) - [j328]Jian Kang, Dan Lin, Wei Jiang, Elisa Bertino:
Highly efficient randomized authentication in VANETs. Pervasive Mob. Comput. 44: 31-44 (2018) - [j327]Sorin Adam Matei, Amani Abu Jabal, Elisa Bertino:
Social-collaborative determinants of content quality in online knowledge production systems: comparing Wikipedia and Stack Overflow. Soc. Netw. Anal. Min. 8(1): 36:1-36:16 (2018) - [j326]Bahman Rashidi, Carol J. Fung, Anh Nguyen, Tam Vu, Elisa Bertino:
Android User Privacy Preserving Through Crowdsourcing. IEEE Trans. Inf. Forensics Secur. 13(3): 773-787 (2018) - [j325]Hasini Gunasinghe, Elisa Bertino:
PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones. IEEE Trans. Inf. Forensics Secur. 13(4): 1042-1057 (2018) - [j324]Muhammad Umer Arshad, Ashish Kundu, Elisa Bertino, Arif Ghafoor, Chinmay Kundu:
Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases. IEEE Trans. Knowl. Data Eng. 30(5): 866-879 (2018) - [j323]Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, Elisa Bertino:
Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices. IEEE Trans. Mob. Comput. 17(4): 927-944 (2018) - [j322]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino:
A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems. ACM Trans. Internet Techn. 18(4): 55:1-55:20 (2018) - [j321]Xianqi Yu, Yuqing Sun, Elisa Bertino, Xin Li:
Modeling User Intrinsic Characteristic on Social Media for Identity Linkage. ACM Trans. Soc. Comput. 1(3): 11:1-11:25 (2018) - [c584]Oyindamola Oluwatimi, Elisa Bertino:
A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System. CODASPY 2018: 256-266 - [c583]Ankush Singla, Elisa Bertino:
Blockchain-Based PKI Solutions for IoT. CIC 2018: 9-15 - [c582]Jongho Won, Elisa Bertino:
Securing Mobile Data Collectors by Integrating Software Attestation and Encrypted Data Repositories. CIC 2018: 26-35 - [c581]Asmaa Sallam, Elisa Bertino:
Detection of Temporal Data Ex-Filtration Threats to Relational Databases. CIC 2018: 146-155 - [c580]Antonino Rullo, Elisa Bertino, Domenico Saccà:
PAST: Protocol-Adaptable Security Tool for Heterogeneous IoT Ecosystems. DSC 2018: 1-8 - [c579]Seraphin B. Calo, Irene Manotas, Geeth de Mel, Daniel Cunnington, Mark Law, Dinesh C. Verma, Alessandra Russo, Elisa Bertino:
AGENP: An ASGrammar-based GENerative Policy Framework. PADG@ESORICS 2018: 3-20 - [c578]Dinesh C. Verma, Seraphin B. Calo, Shonda Witherspoon, Irene Manotas, Elisa Bertino, Amani M. Abu Jabal, Greg Cirincione, Ananthram Swami, Gavin Pearson, Geeth de Mel:
Self-Generating Policies for Machine Learning in Coalition Environments. PADG@ESORICS 2018: 42-65 - [c577]Sorin Adam Matei, Elisa Bertino:
Can N-Version Decision-Making Prevent the Rebirth of HAL 9000 in Military Camo? Using a "Golden Rule" Threshold to Prevent AI Mission Individuation. PADG@ESORICS 2018: 69-81 - [c576]Asmaa Sallam, Elisa Bertino:
Techniques and Systems for Anomaly Detection in Database Systems. PADG@ESORICS 2018: 113-133 - [c575]Elisa Bertino, Dinesh C. Verma, Seraphin B. Calo:
A Policy System for Control of Data Fusion Processes and Derived Data. FUSION 2018: 807-813 - [c574]Greg Cirincione, Dinesh C. Verma, Elisa Bertino, Ananthram Swami:
Security Issues for Distributed Fusion in Coalition Environments. FUSION 2018: 830-837 - [c573]Xianqi Yu, Yuqing Sun, Elisa Bertino, Xin Li:
Modeling User Intrinsic Characteristic on Social Media for Identity Linkage. GROUP 2018: 39-50 - [c572]Fang-Yu Rao, Gabriel Ghinita, Elisa Bertino:
Hybrid Differentially-Private String Matching. ICDCS 2018: 478-488 - [c571]Seraphin B. Calo, Dinesh C. Verma, Elisa Bertino, John Ingham, Gregory H. Cirincione:
How to Prevent Skynet from Forming (A Perspective from Policy-Based Autonomic Device Management). ICDCS 2018: 1369-1376 - [c570]Muhammad Umer Arshad, Ashish Kundu, Elisa Bertino, Arif Ghafoor, Chinmay Kundu:
Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases. ICDE 2018: 1821-1822 - [c569]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Elisa Bertino, Sanjay Jha:
Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. LCN 2018: 553-561 - [c568]Xun Yi, Fang-Yu Rao, Gabriel Ghinita, Elisa Bertino:
Privacy-Preserving Spatial Crowdsourcing Based on Anonymous Credentials. MDM 2018: 187-196 - [c567]Jongho Won, Ankush Singla, Elisa Bertino, Greg Bollella:
Decentralized Public Key Infrastructure for Internet-of-Things. MILCOM 2018: 907-913 - [c566]Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, Elisa Bertino:
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE. NDSS 2018 - [c565]Mortada Al-Banna, Boualem Benatallah, Daniel Schlagwein, Elisa Bertino, Moshe Chai Barukh:
Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery. PACIS 2018: 230 - [c564]Shagufta Mehnaz, Anand Mudgerikar, Elisa Bertino:
RWGuard: A Real-Time Detection System Against Cryptographic Ransomware. RAID 2018: 114-136 - [c563]Seraphin B. Calo, Dinesh C. Verma, Supriyo Chakraborty, Elisa Bertino, Emil Lupu, Gregory H. Cirincione:
Self-Generation of Access Control Policies. SACMAT 2018: 39-47 - [c562]Elisa Bertino, Mohamed Nabeel:
Securing Named Data Networks: Challenges and the Way Forward. SACMAT 2018: 51-59 - [c561]Dan Thomsen, Elisa Bertino:
Network Policy Enforcement Using Transactions: The NEUTRON Approach. SACMAT 2018: 129-136 - [c560]Bhavani Thuraisingham, Murat Kantarcioglu, Elisa Bertino, Jonathan Z. Bakdash, Maribel Fernández:
Towards a Privacy-Aware Qunatified Self Data Management Framework. SACMAT 2018: 173-184 - [c559]Maryam Davari, Elisa Bertino:
Reactive Access Control Systems. SACMAT 2018: 205-207 - [p11]Elisa Bertino, Elena Ferrari:
Big Data Security and Privacy. A Comprehensive Guide Through the Italian Database Research 2018: 425-439 - [e55]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I. Lecture Notes in Computer Science 11063, Springer 2018, ISBN 978-3-030-00005-9 [contents] - [e54]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II. Lecture Notes in Computer Science 11064, Springer 2018, ISBN 978-3-030-00008-0 [contents] - [e53]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part III. Lecture Notes in Computer Science 11065, Springer 2018, ISBN 978-3-030-00011-0 [contents] - [e52]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part IV. Lecture Notes in Computer Science 11066, Springer 2018, ISBN 978-3-030-00014-1 [contents] - [e51]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part V. Lecture Notes in Computer Science 11067, Springer 2018, ISBN 978-3-030-00017-2 [contents] - [e50]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part VI. Lecture Notes in Computer Science 11068, Springer 2018, ISBN 978-3-030-00020-2 [contents] - [e49]Elisa Bertino, Dan Lin, Jorge Lobo:
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, June 13-15, 2018. ACM 2018 [contents] - [i17]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Elisa Bertino, Sanjay Jha:
Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. CoRR abs/1807.02593 (2018) - 2017
- [j320]Jongho Won, Seung-Hyun Seo, Elisa Bertino:
Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications. IEEE Access 5: 3721-3749 (2017) - [j319]Muhammad Saleem Khan, Daniele Midi, Majid Iqbal Khan, Elisa Bertino:
Fine-Grained Analysis of Packet Loss in MANETs. IEEE Access 5: 7798-7807 (2017) - [j318]Bahman Rashidi, Carol J. Fung, Elisa Bertino:
Android resource usage risk assessment using hidden Markov model and online learning. Comput. Secur. 65: 90-107 (2017) - [j317]Adnan Ahmad, Brian Whitworth, Furkh Zeshan, Elisa Bertino, Robert S. Friedman:
Extending social networks with delegation. Comput. Secur. 70: 546-564 (2017) - [j316]Elisa Bertino, Nayeem Islam:
Botnets and Internet of Things Security. Computer 50(2): 76-79 (2017) - [j315]Yang Xiang, Elisa Bertino, Miroslaw Kutylowski:
Security and privacy in social networks. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j314]Elisa Bertino:
Editorial. Data Sci. Eng. 2(4): 253-254 (2017) - [j313]Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino:
Overview of Mobile Containerization Approaches and Open Research Directions. IEEE Secur. Priv. 15(1): 22-31 (2017) - [j312]Javid Habibi, Daniele Midi, Anand Mudgerikar, Elisa Bertino:
Heimdall: Mitigating the Internet of Insecure Things. IEEE Internet Things J. 4(4): 968-978 (2017) - [j311]Jason R. C. Nurse, Elisa Bertino:
Guest Editorial: Insider Threat Solutions - Moving from Concept to Reality. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(1): 1-3 (2017) - [j310]Muhammad Saleem Khan, Daniele Midi, Saif Ur Rehman Malik, Majid I. Khan, Nadeem Javaid, Elisa Bertino:
Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy. Mob. Networks Appl. 22(3): 493-509 (2017) - [j309]Asmaa Sallam, Elisa Bertino, Syed Rafiul Hussain, David Landers, Robert Michael Lefler, Donald Steiner:
DBSAFE - An Anomaly Detection System to Protect Databases From Exfiltration Attempts. IEEE Syst. J. 11(2): 483-493 (2017) - [j308]Elisa Bertino:
The State of the Journal Editorial. IEEE Trans. Dependable Secur. Comput. 14(1): 1 (2017) - [j307]Elisa Bertino:
Editor's Note. IEEE Trans. Dependable Secur. Comput. 14(6): 577 (2017) - [j306]Bahman Rashidi, Carol J. Fung, Elisa Bertino:
A Collaborative DDoS Defence Framework Using Network Function Virtualization. IEEE Trans. Inf. Forensics Secur. 12(10): 2483-2497 (2017) - [j305]Attila Altay Yavuz, Anand Mudgerikar, Ankush Singla, Ioannis Papapanagiotou, Elisa Bertino:
Real-Time Digital Signatures for Time-Critical Networks. IEEE Trans. Inf. Forensics Secur. 12(11): 2627-2639 (2017) - [j304]Antonino Rullo, Daniele Midi, Edoardo Serra, Elisa Bertino:
Pareto Optimal Security Resource Allocation for Internet of Things. ACM Trans. Priv. Secur. 20(4): 15:1-15:30 (2017) - [j303]Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Min Lyu, Hongxia Jin:
Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization. ACM Trans. Priv. Secur. 20(4): 16:1-16:33 (2017) - [j302]Daniele Midi, Salmin Sultana, Elisa Bertino:
A System for Response and Prevention of Security Incidents in Wireless Sensor Networks. ACM Trans. Sens. Networks 13(1): 1:1-1:38 (2017) - [j301]Changda Wang, Elisa Bertino:
Sensor Network Provenance Compression Using Dynamic Bayesian Networks. ACM Trans. Sens. Networks 13(1): 5:1-5:32 (2017) - [j300]Lorenzo Bossi, Elisa Bertino, Syed Rafiul Hussain:
A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection. IEEE Trans. Software Eng. 43(5): 415-431 (2017) - [j299]Qian Xiao, Elisa Bertino:
Detecting deceptive engagement in social media by temporal pattern analysis of user behaviors: a survey. WIREs Data Mining Knowl. Discov. 7(5) (2017) - [c558]Shagufta Mehnaz, Elisa Bertino:
Privacy-Preserving Multi-Party Analytics over Arbitrarily Partitioned Data. CLOUD 2017: 342-349 - [c557]Sorin Adam Matei, Amani Abu Jabal, Elisa Bertino:
Do Sticky Elites Produce Online Knowledge of Higher Quality? ASONAM 2017: 72-79 - [c556]Bhavani Thuraisingham, Murat Kantarcioglu, Elisa Bertino, Chris Clifton:
Towards a Framework for Developing Cyber Privacy Metrics: A Vision Paper. BigData Congress 2017: 256-265 - [c555]Elisa Bertino, Geeth de Mel, Alessandra Russo, Seraphin B. Calo, Dinesh C. Verma:
Community-based self generation of policies and processes for assets: Concepts and research directions. IEEE BigData 2017: 2961-2969 - [c554]Seraphin B. Calo, Emil Lupu, Elisa Bertino, Saritha Arunkumar, Gregory H. Cirincione, Brian Rivera, Alan Cullen:
Research challenges in dynamic policy-based autonomous security. IEEE BigData 2017: 2970-2973 - [c553]Daniele Midi, Mathias Payer, Elisa Bertino:
Memory Safety for Embedded Devices with nesCheck. AsiaCCS 2017: 127-139 - [c552]Danfeng (Daphne) Yao, Elisa Bertino:
CCS 2017: Women in Cyber Security (CyberW) Workshop. CCS 2017: 2631-2632 - [c551]Ilsun You, Elisa Bertino:
MIST 2017: 9th International Workshop on Managing Insider Security Threats. CCS 2017: 2635-2636 - [c550]Elisa Bertino:
Security and Privacy in the IoT. Inscrypt 2017: 3-10 - [c549]Bahman Rashidi, Carol J. Fung, Elisa Bertino:
Android malicious application detection using support vector machine and active learning. CNSM 2017: 1-9 - [c548]Shagufta Mehnaz, Elisa Bertino:
Ghostbuster: A Fine-grained Approach for Anomaly Detection in File System Accesses. CODASPY 2017: 3-14 - [c547]Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, Elisa Bertino:
Seamless and Secure Bluetooth LE Connection Migration. CODASPY 2017: 147-149 - [c546]Asmaa Sallam, Elisa Bertino:
Detection of Temporal Insider Threats to Relational Databases. CIC 2017: 406-415 - [c545]Amani Abu Jabal, Elisa Bertino, Geeth de Mel:
Provenance-Based Scientific Workflow Search. eScience 2017: 119-127 - [c544]Antonino Rullo, Edoardo Serra, Elisa Bertino, Jorge Lobo:
Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios. ESORICS (2) 2017: 419-436 - [c543]Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, Elisa Bertino:
SeamBlue: Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices. EWSN 2017: 132-143 - [c542]Daniele Midi, Antonino Rullo, Anand Mudgerikar, Elisa Bertino:
Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things. ICDCS 2017: 656-666 - [c541]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Elisa Bertino:
Privacy Preserving User-Based Recommender System. ICDCS 2017: 1074-1083 - [c540]Elisa Bertino, Seraphin B. Calo, Maroun Touma, Dinesh C. Verma, Christopher Williams, Brian Rivera:
A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions. ICDCS 2017: 1876-1886 - [c539]Antonino Rullo, Edoardo Serra, Elisa Bertino, Jorge Lobo:
Shortfall-Based Optimal Security Provisioning for Internet of Things. ICDCS 2017: 2585-2586 - [c538]Jongho Won, Ankush Singla, Elisa Bertino:
CertificateLess Cryptography-Based Rule Management Protocol for Advanced Mission Delivery Networks. ICDCS Workshops 2017: 7-12 - [c537]Elisa Bertino:
Security and Privacy in the IoT. ICISSP 2017: 5 - [c536]Antonino Rullo, Daniele Midi, Edoardo Serra, Elisa Bertino:
A Game of Things: Strategic Allocation of Security Resources for IoT. IoTDI 2017: 185-190 - [c535]Elisa Bertino, Murat Kantarcioglu:
A Cyber-Provenance Infrastructure for Sensor-Based Data-Intensive Applications. IRI 2017: 108-114 - [c534]Saritha Arunkumar, Mudhakar Srivatsa, Elisa Bertino:
Learning information release policies for preventing intersection attacks. MILCOM 2017: 794-799 - [c533]Alan Cullen, Bill Williams, Elisa Bertino, Saritha Arunkumar, Erisa Karafili, Emil Lupu:
Mission Support for Drones: a Policy Based Approach. DroNet@MobiSys 2017: 7-12 - [c532]Wei Jiang, Feng Li, Dan Lin, Elisa Bertino:
No one can track you: Randomized authentication in Vehicular Ad-hoc Networks. PerCom 2017: 197-206 - [c531]Seraphin B. Calo, Dinesh C. Verma, Elisa Bertino:
Distributed Intelligence: Trends in the Management of Complex Systems. SACMAT 2017: 1-7 - [c530]Shagufta Mehnaz, Gowtham Bellala, Elisa Bertino:
A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics. SACMAT 2017: 219-230 - [c529]Elisa Bertino, Amani Abu Jabal, Seraphin B. Calo, Christian Makaya, Maroun Touma, Dinesh C. Verma, Christopher Williams:
Provenance-Based Analytics Services for Access Control Policies. SERVICES 2017: 94-101 - [c528]Saritha Arunkumar, Stephen Pipes, Christian Makaya, Elisa Bertino, Erisa Karafili, Emil C. Lupu, Christopher Williams:
Next generation firewalls for dynamic coalitions. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c527]Diane Felmlee, Emil Lupu, Cassie McMillan, Erisa Karafili, Elisa Bertino:
Decision-making in policy governed human-autonomous systems teams. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c526]Erisa Karafili, Emil C. Lupu, Saritha Arunkumar, Elisa Bertino:
Argumentation-based policy analysis for drone systems. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c525]Dinesh C. Verma, Seraphin B. Calo, Supriyo Chakraborty, Elisa Bertino, Christopher Williams, J. Tucker, Brian Rivera:
Generative policy model for autonomic management. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c524]Christopher Williams, Elisa Bertino, Seraphin B. Calo, Dinesh C. Verma, K. Leung, Christopher Dearlove:
Towards an architecture for policy-based management of software defined coalitions. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c523]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Elisa Bertino:
Privacy Preserving Location Recommendations. WISE (2) 2017: 502-516 - [e48]Elisa Bertino, Ravi S. Sandhu, Ram Krishnan:
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, ABAC@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017. ACM 2017, ISBN 978-1-4503-4910-9 [contents] - [e47]Xingming Sun, Han-Chieh Chao, Xingang You, Elisa Bertino:
Cloud Computing and Security - Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I. Lecture Notes in Computer Science 10602, Springer 2017, ISBN 978-3-319-68504-5 [contents] - [e46]Xingming Sun, Han-Chieh Chao, Xingang You, Elisa Bertino:
Cloud Computing and Security - Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part II. Lecture Notes in Computer Science 10603, Springer 2017, ISBN 978-3-319-68541-0 [contents] - [e45]Elisa Bertino, Ravi S. Sandhu, Edgar R. Weippl:
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2017, Indianapolis, IN, USA, June 21-23, 2017. ACM 2017, ISBN 978-1-4503-4702-0 [contents] - 2016
- [j298]Arezou Soltani Panah, Ron G. van Schyndel, Timos K. Sellis, Elisa Bertino:
On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques. IEEE Access 4: 2670-2704 (2016) - [j297]Elisa Bertino:
Securing Mobile Applications. Computer 49(2): 9 (2016) - [j296]Elisa Bertino:
Security Threats: Protecting the New Cyberfrontier. Computer 49(6): 11-14 (2016) - [j295]Hua Wang, Xun Yi, Elisa Bertino, Lili Sun:
Protecting outsourced data in cloud computing through access management. Concurr. Comput. Pract. Exp. 28(3): 600-615 (2016) - [j294]Elisa Bertino:
Introduction to Data Science and Engineering. Data Sci. Eng. 1(1): 1-3 (2016) - [j293]Yuqing Sun, Haoran Xu, Elisa Bertino, Chao Sun:
A Data-Driven Evaluation for Insider Threats. Data Sci. Eng. 1(2): 73-85 (2016) - [j292]Elisa Bertino:
Editorial: Introduction to Data Security and Privacy. Data Sci. Eng. 1(3): 125-126 (2016) - [j291]Changda Wang, Wen-yi Zheng, Elisa Bertino:
Provenance for Wireless Sensor Networks: A Survey. Data Sci. Eng. 1(3): 189-200 (2016) - [j290]Shashi Shekhar, Elisa Bertino:
GeoInformatica welcomes a new co-editor-in-chief. GeoInformatica 20(4): 569-570 (2016) - [j289]Feng Hao, Xun Yi, Elisa Bertino:
Editorial of special issue on security and privacy in cloud computing. J. Inf. Secur. Appl. 27-28: 1-2 (2016) - [j288]Xun Yi, Fang-Yu Rao, Zahir Tari, Feng Hao, Elisa Bertino, Ibrahim Khalil, Albert Y. Zomaya:
ID2S Password-Authenticated Key Exchange Protocols. IEEE Trans. Computers 65(12): 3687-3701 (2016) - [j287]Seung-Hyun Seo, Jongho Won, Elisa Bertino:
pCLSC-TKEM: a Pairing-free Certificateless Signcryption-tag Key Encapsulation Mechanism for a Privacy-Preserving IoT. Trans. Data Priv. 9(2): 101-130 (2016) - [j286]Muhammad I. Sarfraz, Mohamed Nabeel, Jianneng Cao, Elisa Bertino:
DBMask: Fine-Grained Access Control on Encrypted Relational Databases. Trans. Data Priv. 9(3): 187-214 (2016) - [j285]Elisa Bertino:
The State of the Journal Editorial. IEEE Trans. Dependable Secur. Comput. 13(1): 1 (2016) - [j284]Elisa Bertino, Dario Catalano, Qi Li, Alex X. Liu, Anna Cinzia Squicciarini, Alexey V. Vinel:
Editor's Note. IEEE Trans. Dependable Secur. Comput. 13(4): 409-410 (2016) - [j283]Xun Yi, Russell Paulet, Elisa Bertino, Guandong Xu:
Private Cell Retrieval From Data Warehouses. IEEE Trans. Inf. Forensics Secur. 11(6): 1346-1361 (2016) - [j282]Xun Yi, Russell Paulet, Elisa Bertino, Vijay Varadharajan:
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy. IEEE Trans. Knowl. Data Eng. 28(6): 1546-1559 (2016) - [j281]Elisa Bertino, Kim-Kwang Raymond Choo, Dimitrios Georgakopoulos, Surya Nepal:
Internet of Things (IoT): Smart and Secure Service Delivery. ACM Trans. Internet Techn. 16(4): 22:1-22:7 (2016) - [j280]Daniele Midi, Elisa Bertino:
Node or Link? Fine-Grained Analysis of Packet-Loss Attacks in Wireless Sensor Networks. ACM Trans. Sens. Networks 12(2): 8:1-8:30 (2016) - [j279]Changda Wang, Syed Rafiul Hussain, Elisa Bertino:
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 27(2): 405-418 (2016) - [j278]Gabriel Ghinita, Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino:
Protecting Against Velocity-Based, Proximity-Based, and External Event Attacks in Location-Centric Social Networks. ACM Trans. Spatial Algorithms Syst. 2(2): 8:1-8:36 (2016) - [j277]Asmaa Sallam, Daren Fadolalkarim, Elisa Bertino, Qian Xiao:
Data and syntax centric anomaly detection for relational databases. WIREs Data Mining Knowl. Discov. 6(6): 231-239 (2016) - [c522]Elisa Bertino:
Big data security and privacy. IEEE BigData 2016: 3 - [c521]Elisa Bertino:
Data privacy for IoT systems: Concepts, approaches, and research directions. IEEE BigData 2016: 3645-3647 - [c520]Jongho Won, Elisa Bertino:
Inside Attack Filtering for Robust Sensor Localization. AsiaCCS 2016: 931-936 - [c519]Ilsun You, Elisa Bertino:
MIST 2016: 8th International Workshop on Managing Insider Security Threats. CCS 2016: 1890-1891 - [c518]Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin:
Differentially Private K-Means Clustering. CODASPY 2016: 26-37 - [c517]Daren Fadolalkarim, Asmaa Sallam, Elisa Bertino:
PANDDE: Provenance-based ANomaly Detection of Data Exfiltration. CODASPY 2016: 267-276 - [c516]Hasini Gunasinghe, Elisa Bertino:
RahasNym: Pseudonymous Identity Management System for Protecting against Linkability. CIC 2016: 74-85 - [c515]Amani Abu Jabal, Elisa Bertino:
QL-SimP: Query Language for Secure Interoperable Multi-Granular Provenance Framework. CIC 2016: 131-138 - [c514]Bhavani Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino:
Message from the SEPT Organizing Committee. COMPSAC 2016: 399 - [c513]Elisa Bertino:
Data Security and Privacy: Concepts, Approaches, and Research Directions. COMPSAC 2016: 400-407 - [c512]Amani Abu Jabal, Elisa Bertino:
SimP: Secure interoperable multi-granular provenance framework. eScience 2016: 270-275 - [c511]Elisa Bertino:
Data Security and Privacy in the IoT. EDBT 2016: 1-3 - [c510]Antonino Rullo, Daniele Midi, Edoardo Serra, Elisa Bertino:
Strategic Security Resource Allocation for Internet of Things. ICDCS 2016: 737-738 - [c509]Xun Yi, Elisa Bertino, Fang-Yu Rao, Athman Bouguettaya:
Practical privacy-preserving user profile matching in social networks. ICDE 2016: 373-384 - [c508]Nariman Ammar, Zaki Malik, Abdelmounaam Rezgui, Elisa Bertino:
XACML policy evaluation with dynamic context handling. ICDE 2016: 1570-1571 - [c507]Yuqing Sun, Haoran Xu, Elisa Bertino, Demin Li:
User Preference Based Link Inference for Social Network. ICWS 2016: 188-195 - [c506]Bhavani Thuraisingham, Murat Kantarcioglu, Kevin W. Hamlen, Latifur Khan, Tim Finin, Anupam Joshi, Tim Oates, Elisa Bertino:
A Data Driven Approach for the Science of Cyber Security: Challenges and Directions. IRI 2016: 1-10 - [c505]Asmaa Sallam, Qian Xiao, Elisa Bertino, Daren Fadolalkarim:
Anomaly Detection Techniques for Database Protection Against Insider Threats (Invited Paper). IRI 2016: 20-29 - [c504]Seung-Hyun Seo, Jongho Won, Elisa Bertino, You Sung Kang, Dooho Choi:
A Security Framework for a Drone Delivery Service. DroNet@MobiSys 2016: 29-34 - [c503]Shagufta Mehnaz, Elisa Bertino:
Building robust temporal user profiles for anomaly detection in file system accesses. PST 2016: 207-210 - [c502]Oyindamola Oluwatimi, Elisa Bertino:
An Application Restriction System for Bring-Your-Own-Device Scenarios. SACMAT 2016: 25-36 - [c501]Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino:
A Context-Aware System to Secure Enterprise Content. SACMAT 2016: 63-72 - [e44]Ilsun You, Elisa Bertino:
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4571-2 [contents] - [e43]Snehasis Mukhopadhyay, ChengXiang Zhai, Elisa Bertino, Fabio Crestani, Javed Mostafa, Jie Tang, Luo Si, Xiaofang Zhou, Yi Chang, Yunyao Li, Parikshit Sondhi:
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, CIKM 2016, Indianapolis, IN, USA, October 24-28, 2016. ACM 2016, ISBN 978-1-4503-4073-1 [contents] - [e42]Elisa Bertino, Ravi S. Sandhu, Alexander Pretschner:
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016. ACM 2016, ISBN 978-1-4503-3935-3 [contents] - [e41]Elisa Bertino, Ravi S. Sandhu, Ram Krishnan:
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA, March 11, 2016. ACM 2016, ISBN 978-1-4503-4079-3 [contents] - [e40]Xingming Sun, Alex X. Liu, Han-Chieh Chao, Elisa Bertino:
Cloud Computing and Security - Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I. Lecture Notes in Computer Science 10039, 2016, ISBN 978-3-319-48670-3 [contents] - [e39]Xingming Sun, Alex X. Liu, Han-Chieh Chao, Elisa Bertino:
Cloud Computing and Security - Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II. Lecture Notes in Computer Science 10040, 2016, ISBN 978-3-319-48673-4 [contents] - 2015
- [j276]Sabine Brunswicker, Elisa Bertino, Sorin Adam Matei:
Big Data for Open Digital Innovation - A Research Roadmap. Big Data Res. 2(2): 53-58 (2015) - [j275]Elisa Bertino, Surya Nepal, Rajiv Ranjan:
Building Sensor-Based Big Data Cyberinfrastructures. IEEE Cloud Comput. 2(5): 64-69 (2015) - [j274]Elisa Bertino:
Denial-of-Service Attacks to UMTS. Computer 48(2): 6 (2015) - [j273]Elisa Bertino, Robert H. Deng, Xinyi Huang, Jianying Zhou:
Security and privacy of electronic health information systems. Int. J. Inf. Sec. 14(6): 485-486 (2015) - [j272]Mohamed Nabeel, Xiaoyu Ding, Seung-Hyun Seo, Elisa Bertino:
Scalable end-to-end security for advanced metering infrastructures. Inf. Syst. 53: 213-223 (2015) - [j271]Salmin Sultana, Elisa Bertino:
A Distributed System for The Management of Fine-grained Provenance. J. Database Manag. 26(2): 32-47 (2015) - [j270]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha:
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. IEEE Trans. Dependable Secur. Comput. 12(1): 98-110 (2015) - [j269]Elisa Bertino:
The State of the Journal Editorial. IEEE Trans. Dependable Secur. Comput. 12(2): 135 (2015) - [j268]Bilal Shebaro, Oyindamola Oluwatimi, Elisa Bertino:
Context-Based Access Control Systems for Mobile Devices. IEEE Trans. Dependable Secur. Comput. 12(2): 150-163 (2015) - [j267]Salmin Sultana, Gabriel Ghinita, Elisa Bertino, Mohamed Shehab:
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 12(3): 256-269 (2015) - [j266]Aditi Gupta, Javid Habibi, Michael S. Kirkpatrick, Elisa Bertino:
Marlin: Mitigating Code Reuse Attacks Using Code Randomization. IEEE Trans. Dependable Secur. Comput. 12(3): 326-337 (2015) - [j265]Seung-Hyun Seo, Jongho Won, Salmin Sultana, Elisa Bertino:
Effective Key Management in Dynamic Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 10(2): 371-383 (2015) - [j264]Xiaokui Shu, Danfeng Yao, Elisa Bertino:
Privacy-Preserving Detection of Sensitive Data Exposure. IEEE Trans. Inf. Forensics Secur. 10(5): 1092-1103 (2015) - [j263]Mohsen Rezvani, Verica Sekulic, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha:
Interdependent Security Risk Analysis of Hosts and Flows. IEEE Trans. Inf. Forensics Secur. 10(11): 2325-2339 (2015) - [j262]Nariman Ammar, Zaki Malik, Elisa Bertino, Abdelmounaam Rezgui:
XACML Policy Evaluation with Dynamic Context Handling. IEEE Trans. Knowl. Data Eng. 27(9): 2575-2588 (2015) - [c500]Elisa Bertino:
Big Data - Security and Privacy. BigData Congress 2015: 757-761 - [c499]Jongho Won, Seung-Hyun Seo, Elisa Bertino:
A Secure Communication Protocol for Drones and Smart Objects. AsiaCCS 2015: 249-260 - [c498]Xun Yi, Fang-Yu Rao, Elisa Bertino, Athman Bouguettaya:
Privacy-Preserving Association Rule Mining in Cloud Computing. AsiaCCS 2015: 439-450 - [c497]Ilsun You, Elisa Bertino:
MIST 2015: 7th International Workshop on Managing Insider Security Threats. CCS 2015: 1707-1708 - [c496]Muhammad I. Sarfraz, Mohamed Nabeel, Jianneng Cao, Elisa Bertino:
DBMask: Fine-Grained Access Control on Encrypted Relational Databases. CODASPY 2015: 1-11 - [c495]Syed Rafiul Hussain, Asmaa Sallam, Elisa Bertino:
DetAnom: Detecting Anomalous Database Transactions by Insiders. CODASPY 2015: 25-35 - [c494]Fang-Yu Rao, Bharath K. Samanthula, Elisa Bertino, Xun Yi, Dongxi Liu:
Privacy-Preserving and Outsourced Multi-user K-Means Clustering. CIC 2015: 80-89 - [c493]Bhavani Thuraisingham, Dianxiang Xu, Hiroki Takakura, Mohammad Zulkernine, Elisa Bertino:
Message from SEPT Symposium Organizing Committee. COMPSAC 2015: 421 - [c492]Daniele Midi, Antonio Tedeschi, Francesco Benedetto, Elisa Bertino:
Statistically-Enhanced Fine-Grained Diagnosis of Packet Losses. FiCloud 2015: 748-753 - [c491]Javid Habibi, Aditi Gupta, Stephen Carlsony, Ajay Panicker, Elisa Bertino:
MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles. ICDCS 2015: 642-652 - [c490]Hasini Gunasinghe, Elisa Bertino:
RahasNym: Protecting against Linkability in the Digital Identity Ecosystem. ICDCS 2015: 772-773 - [c489]Jongho Won, Elisa Bertino:
Inside Attack Filtering for Robust Sensor Localization. ICDCS 2015: 796-797 - [c488]Jianneng Cao, Fang-Yu Rao, Elisa Bertino, Murat Kantarcioglu:
A hybrid private record linkage scheme: Separating differentially private synopses from matching records. ICDE 2015: 1011-1022 - [c487]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha:
A Collaborative Reputation System Based on Credibility Propagation in WSNs. ICPADS 2015: 1-8 - [c486]Muhammad Saleem Khan, Daniele Midi, Majid Iqbal Khan, Elisa Bertino:
Adaptive Trust Update Frequency in MANETs. ICPADS 2015: 132-139 - [c485]Bharath K. Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi:
Privacy-Preserving Protocols for Shortest Path Discovery over Outsourced Encrypted Graph Data. IRI 2015: 427-434 - [c484]Elisa Bertino, Nathan W. Hartman:
Cybersecurity for product lifecycle management a research roadmap. ISI 2015: 114-119 - [c483]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha:
A trust assessment framework for streaming data in WSNs using iterative filtering. ISSNIP 2015: 1-6 - [c482]Jongho Won, Elisa Bertino:
Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks. NSS 2015: 18-31 - [c481]Javid Habibi, Ajay Panicker, Aditi Gupta, Elisa Bertino:
DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices. NSS 2015: 112-129 - [c480]Weili Han, Yin Zhang, Zeqing Guo, Elisa Bertino:
Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking. SACMAT 2015: 135-145 - [c479]Muhammad Saleem Khan, Daniele Midi, Majid Iqbal Khan, Elisa Bertino:
Adaptive Trust Threshold Strategy for Misbehaving Node Detection and Isolation. TrustCom/BigDataSE/ISPA (1) 2015: 718-725 - [c478]Arezou Soltani Panah, Ron G. van Schyndel, Timos K. Sellis, Elisa Bertino:
In the shadows we trust: A secure aggregation tolerant watermark for data streams. WOWMOM 2015: 1-9 - [e38]Elisa Bertino, Ilsun You:
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3824-0 [contents] - [i16]Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin:
Differentially Private $k$-Means Clustering. CoRR abs/1504.05998 (2015) - 2014
- [b9]Xun Yi, Russell Paulet, Elisa Bertino:
Homomorphic Encryption and Applications. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-12228-1, pp. 1-126 - [j261]Aditi Gupta, Michael S. Kirkpatrick, Elisa Bertino:
A formal proximity model for RBAC systems. Comput. Secur. 41: 52-67 (2014) - [j260]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Amin Beheshti, Norman Foo, Elisa Bertino:
Representation and querying of unfair evaluations in social rating systems. Comput. Secur. 41: 68-88 (2014) - [j259]Li Xu, Elisa Bertino, Yi Mu:
Security of new generation computing systems. Concurr. Comput. Pract. Exp. 26(8): 1475-1476 (2014) - [j258]Elisa Bertino, Dimitrios Georgakopoulos, Surya Nepal, Mudhakar Srivatsa, Alessandro Vinciarelli:
Guest Editorial: Selected Papers from IEEE IEEE/EAI CollaborateCom 2013. EAI Endorsed Trans. Collab. Comput. 1(1): e2 (2014) - [j257]Chenyun Dai, Fang-Yu Rao, Traian Marius Truta, Elisa Bertino:
Privacy-Preserving Assessment of Social Network Data Trustworthiness. Int. J. Cooperative Inf. Syst. 23(2) (2014) - [j256]Chengcui Zhang, Elisa Bertino, Bhavani Thuraisingham, James B. D. Joshi:
Guest editorial: Information reuse, integration, and reusable systems. Inf. Syst. Frontiers 16(5): 749-752 (2014) - [j255]Hua Wang, Lili Sun, Elisa Bertino:
Building access control policy model for privacy preserving and testing policy conflicting problems. J. Comput. Syst. Sci. 80(8): 1493-1503 (2014) - [j254]Elisa Bertino, Gabriel Ghinita, Murat Kantarcioglu, Dang Nguyen, Jae Park, Ravi S. Sandhu, Salmin Sultana, Bhavani Thuraisingham, Shouhuai Xu:
A roadmap for privacy-enhanced secure data provenance. J. Intell. Inf. Syst. 43(3): 481-501 (2014) - [j253]Seung-Hyun Seo, Aditi Gupta, Asmaa Mohamed Sallam, Elisa Bertino, Kangbin Yim:
Detecting mobile malware threats to homeland security through static analysis. J. Netw. Comput. Appl. 38: 43-53 (2014) - [j252]Bilal Shebaro, Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino:
IdentiDroid: Android can finally Wear its Anonymous Suit. Trans. Data Priv. 7(1): 27-50 (2014) - [j251]Mohamed Nabeel, Elisa Bertino:
Attribute Based Group Key Management. Trans. Data Priv. 7(3): 309-336 (2014) - [j250]Elisa Bertino:
Editorial. IEEE Trans. Dependable Secur. Comput. 11(1): 1 (2014) - [j249]Xun Yi, Elisa Bertino, Jaideep Vaidya, Chaoping Xing:
Private Searching on Streaming Data Based on Keyword Frequency. IEEE Trans. Dependable Secur. Comput. 11(2): 155-167 (2014) - [j248]Russell Paulet, Md. Golam Kaosar, Xun Yi, Elisa Bertino:
Privacy-Preserving and Content-Protecting Location Based Queries. IEEE Trans. Knowl. Data Eng. 26(5): 1200-1210 (2014) - [j247]Mohamed R. Fouad, Khaled M. Elbassioni, Elisa Bertino:
A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization. IEEE Trans. Knowl. Data Eng. 26(7): 1591-1601 (2014) - [j246]Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino:
An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds. IEEE Trans. Knowl. Data Eng. 26(9): 2107-2119 (2014) - [j245]Mohamed Nabeel, Elisa Bertino:
Privacy Preserving Delegated Access Control in Public Clouds. IEEE Trans. Knowl. Data Eng. 26(9): 2268-2280 (2014) - [j244]Sunoh Choi, Gabriel Ghinita, Hyo-Sang Lim, Elisa Bertino:
Secure kNN Query Processing in Untrusted Cloud Environments. IEEE Trans. Knowl. Data Eng. 26(11): 2818-2831 (2014) - [c477]Dongxi Liu, Elisa Bertino, Xun Yi:
Privacy of outsourced k-means clustering. AsiaCCS 2014: 123-134 - [c476]Daniele Midi, Oyindamola Oluwatimi, Bilal Shebaro, Elisa Bertino:
Demo Overview: Privacy-Enhancing Features of IdentiDroid. CCS 2014: 1481-1483 - [c475]Asmaa Sallam, Elisa Bertino:
POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs. CCS 2014: 1493-1495 - [c474]Seung-Hyun Seo, Jongho Won, Elisa Bertino:
POSTER: a pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures. CODASPY 2014: 143-146 - [c473]Muhammad Umer Arshad, Ashish Kundu, Elisa Bertino, Krishna Madhavan, Arif Ghafoor:
Security of graph data: hashing schemes and definitions. CODASPY 2014: 223-234 - [c472]Elisa Bertino, Bharath Kumar Samanthula:
Security with privacy - A research agenda. CollaborateCom 2014: 144-153 - [c471]Elisa Bertino:
Security with Privacy - Opportunities and Challenges: Panel Position Paper. COMPSAC 2014: 436-437 - [c470]Sorin Adam Matei, Wutao Tan, Michael Yu Zhu, Chuanhai Liu, Elisa Bertino, Jeremy Foote:
Elite size and resilience impact on global system structuration in social media. CTS 2014: 9-10 - [c469]Nariman Ammar, Zaki Malik, Elisa Bertino, Abdelmounaam Rezgui:
Dynamic Privacy Policy Management in Services-Based Interactions. DEXA (2) 2014: 248-262 - [c468]Elisa Bertino:
Data Trustworthiness - Approaches and Research Challenges. DPM/SETOP/QASA 2014: 17-25 - [c467]Xun Yi, Feng Hao, Elisa Bertino:
ID-Based Two-Server Password-Authenticated Key Exchange. ESORICS (2) 2014: 257-276 - [c466]Bharath Kumar Samanthula, Wei Jiang, Elisa Bertino:
Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data. ESORICS (1) 2014: 400-418 - [c465]Sunoh Choi, Gabriel Ghinita, Elisa Bertino:
Secure mutual proximity zone enclosure evaluation. SIGSPATIAL/GIS 2014: 133-142 - [c464]Alfredo Cuzzocrea, Elisa Bertino:
Theory-Inspired Optimizations for Privacy Preserving Distributed OLAP Algorithms. HAIS 2014: 439-453 - [c463]Xun Yi, Russell Paulet, Elisa Bertino, Vijay Varadharajan:
Practical k nearest neighbor queries with location privacy. ICDE 2014: 640-651 - [c462]Syed Rafiul Hussain, Changda Wang, Salmin Sultana, Elisa Bertino:
Secure data provenance compression using arithmetic coding in wireless sensor networks. IPCCC 2014: 1-10 - [c461]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha:
Provenance-aware security risk analysis for hosts and network flows. NOMS 2014: 1-8 - [c460]Hasini Gunasinghe, Elisa Bertino:
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol. NSS 2014: 389-408 - [c459]Alfredo Cuzzocrea, Elisa Bertino:
A Comprehensive Theoretical Framework for Privacy Preserving Distributed OLAP. OTM Workshops 2014: 117-136 - [c458]Bilal Shebaro, Daniele Midi, Elisa Bertino:
Fine-grained analysis of packet losses in wireless sensor networks. SECON 2014: 320-328 - [c457]Salmin Sultana, Daniele Midi, Elisa Bertino:
Kinesis: a security incident response and prevention system for wireless sensor networks. SenSys 2014: 148-162 - [e37]Elisa Bertino, Ravi S. Sandhu, Jaehong Park:
Fourth ACM Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, USA - March 03 - 05, 2014. ACM 2014, ISBN 978-1-4503-2278-2 [contents] - [e36]Elisa Bertino, Shu-Ching Chen, Karl Aberer, Prashant Krishnamurthy, Murat Kantarcioglu:
10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2014, Miami, Florida, USA, October 22-25, 2014. ICST / IEEE 2014, ISBN 978-1-63190-043-3 [contents] - [e35]Isabel F. Cruz, Elena Ferrari, Yufei Tao, Elisa Bertino, Goce Trajcevski:
IEEE 30th International Conference on Data Engineering, Chicago, ICDE 2014, IL, USA, March 31 - April 4, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3480-5 [contents] - [e34]James Joshi, Elisa Bertino, Bhavani Thuraisingham, Ling Liu:
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, IRI 2014, Redwood City, CA, USA, August 13-15, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-5880-1 [contents] - [i15]Bharath K. Samanthula, Wei Jiang, Elisa Bertino:
Lightweight and Secure Two-Party Range Queries over Outsourced Encrypted Databases. CoRR abs/1401.3768 (2014) - [i14]Bharath K. Samanthula, Fang-Yu Rao, Elisa Bertino, Xun Yi, Dongxi Liu:
Privacy-Preserving and Outsourced Multi-User k-Means Clustering. CoRR abs/1412.4378 (2014) - [i13]Wei Jiang, Dan Lin, Feng Li, Elisa Bertino:
Randomized and Efficient Authentication in Mobile Environments. IACR Cryptol. ePrint Arch. 2014: 86 (2014) - 2013
- [b8]Yingjiu Li, Robert H. Deng, Elisa Bertino:
RFID Security and Privacy. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 978-3-031-01212-9 - [b7]Xun Yi, Russell Paulet, Elisa Bertino:
Private Information Retrieval. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2013, ISBN 9781627051538, pp. 1-114 - [j243]Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi S. Sandhu, Ram Krishnan, Gail-Joon Ahn, Elisa Bertino:
Collaboration in Multicloud Computing Environments: Framework and Security Issues. Computer 46(2): 76-84 (2013) - [j242]Ashish Kundu, Elisa Bertino:
Privacy-preserving authentication of trees and graphs. Int. J. Inf. Sec. 12(6): 467-494 (2013) - [j241]Mohammad Allahbakhsh, Boualem Benatallah, Aleksandar Ignjatovic, Hamid R. Motahari Nezhad, Elisa Bertino, Schahram Dustdar:
Quality Control in Crowdsourcing Systems: Issues and Directions. IEEE Internet Comput. 17(2): 76-81 (2013) - [j240]Rimma V. Nehme, Karen Works, Chuan Lei, Elke A. Rundensteiner, Elisa Bertino:
Multi-route query processing and optimization. J. Comput. Syst. Sci. 79(3): 312-329 (2013) - [j239]Fang-Yu Rao, Jianneng Cao, Mehmet Kuzu, Elisa Bertino, Murat Kantarcioglu:
Efficient Tree Pattern Queries On Encrypted XML Documents. Trans. Data Priv. 6(3): 199-226 (2013) - [j238]Omar Hasan, Lionel Brunie, Elisa Bertino, Ning Shang:
A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model. IEEE Trans. Inf. Forensics Secur. 8(6): 949-962 (2013) - [j237]Wonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino:
Agent-based accountable grid computing systems. J. Supercomput. 65(2): 903-929 (2013) - [j236]Xun Yi, Md. Golam Kaosar, Russell Paulet, Elisa Bertino:
Single-Database Private Information Retrieval from Fully Homomorphic Encryption. IEEE Trans. Knowl. Data Eng. 25(5): 1125-1134 (2013) - [j235]Salmin Sultana, Mohamed Shehab, Elisa Bertino:
Secure Provenance Transmission for Streaming Data. IEEE Trans. Knowl. Data Eng. 25(8): 1890-1903 (2013) - [j234]Dan Lin, Prathima Rao, Rodolfo Ferrini, Elisa Bertino, Jorge Lobo:
A Similarity Measure for Comparing XACML Policies. IEEE Trans. Knowl. Data Eng. 25(9): 1946-1959 (2013) - [j233]Mohamed Nabeel, Ning Shang, Elisa Bertino:
Privacy Preserving Policy-Based Content Sharing in Public Clouds. IEEE Trans. Knowl. Data Eng. 25(11): 2602-2614 (2013) - [j232]Wei She, I-Ling Yen, Bhavani Thuraisingham, Elisa Bertino:
Security-Aware Service Composition with Fine-Grained Information Flow Control. IEEE Trans. Serv. Comput. 6(3): 330-343 (2013) - [c456]Lili Sun, Hua Wang, Elisa Bertino:
Role-based access control to outsourced data in could computing. ADC 2013: 119-128 - [c455]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Amin Beheshti, Elisa Bertino, Norman Foo:
Collusion Detection in Online Rating Systems. APWeb 2013: 196-207 - [c454]Leon Reznik, Elisa Bertino:
Data quality evaluation: integrating security and accuracy. CCS 2013: 1367-1370 - [c453]Bilal Shebaro, Di Jin, Elisa Bertino:
Performance signatures of mobile phone browsers. CCS 2013: 1407-1410 - [c452]Sunoh Choi, Christopher N. Gutierrez, Hyo-Sang Lim, Saurabh Bagchi, Elisa Bertino:
Secure and resilient proximity-based access control. DARE@CIKM 2013: 15-20 - [c451]Aditi Gupta, Michael S. Kirkpatrick, Elisa Bertino:
A secure architecture design based on application isolation, code minimization and randomization. CNS 2013: 423-429 - [c450]Salmin Sultana, Elisa Bertino:
A file provenance system. CODASPY 2013: 153-156 - [c449]Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino:
An efficient certificateless cryptography scheme without pairing. CODASPY 2013: 181-184 - [c448]Rimma V. Nehme, Hyo-Sang Lim, Elisa Bertino:
FENCE: continuous access control enforcement in dynamic data stream environments. CODASPY 2013: 243-254 - [c447]Anna Cinzia Squicciarini, Giuseppe Petracca, Elisa Bertino:
Adaptive data protection in distributed systems. CODASPY 2013: 365-376 - [c446]Elisa Bertino, Dimitrios Georgakopoulos:
Preface. CollaborateCom 2013 - [c445]Alfredo Cuzzocrea, Elisa Bertino:
Further Theoretical Contributions to a Privacy Preserving Distributed OLAP Framework. COMPSAC 2013: 234-239 - [c444]Liangxing Liu, Weili Han, Elisa Bertino, Tao Zhou, Xinyi Zhang:
Efficient General Policy Decision by Using Mutable Variable Aware Cache. COMPSAC 2013: 359-368 - [c443]Elisa Bertino:
Big Data - Opportunities and Challenges Panel Position Paper. COMPSAC 2013: 479-480 - [c442]Jianneng Cao, Fang-Yu Rao, Mehmet Kuzu, Elisa Bertino, Murat Kantarcioglu:
Efficient tree pattern queries on encrypted XML documents. EDBT/ICDT Workshops 2013: 111-120 - [c441]Mehmet Kuzu, Murat Kantarcioglu, Ali Inan, Elisa Bertino, Elizabeth Durham, Bradley A. Malin:
Efficient privacy-aware record integration. EDBT 2013: 167-178 - [c440]Jianneng Cao, Qian Xiao, Gabriel Ghinita, Ninghui Li, Elisa Bertino, Kian-Lee Tan:
Efficient and accurate strategies for differentially-private sliding window queries. EDBT 2013: 191-202 - [c439]Bilal Shebaro, Asmaa Sallam, Ashish Kamra, Elisa Bertino:
PostgreSQL anomalous query detector. EDBT 2013: 741-744 - [c438]Xun Yi, Yuan Miao, Elisa Bertino, Jan Willemson:
Multiparty privacy protection for electronic health records. GLOBECOM 2013: 2730-2735 - [c437]Eduard C. Dragut, Peter Baker, Jia Xu, Muhammad I. Sarfraz, Elisa Bertino, Amgad Madkour, Raghu Agarwal, Ahmed R. Mahmood, Sangchun Han:
CRIS - Computational research infrastructure for science. IRI 2013: 301-308 - [c436]Sashi Gurung, Dan Lin, Anna Cinzia Squicciarini, Elisa Bertino:
Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks. NSS 2013: 94-108 - [c435]Aditi Gupta, Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino:
Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks. NSS 2013: 293-306 - [c434]Mohamed Nabeel, Stefan Appel, Elisa Bertino, Alejandro P. Buchmann:
Privacy Preserving Context Aware Publish Subscribe Systems. NSS 2013: 465-478 - [c433]Muhammad I. Sarfraz, Peter Baker, Jia Xu, Elisa Bertino:
A Comprehensive Access Control System for Scientific Applications. NSS 2013: 749-755 - [c432]Daniele Midi, Ashish Kundu, Elisa Bertino:
Towards Authenticated Objects. NSS 2013: 777-783 - [c431]Xun Yi, Russell Paulet, Elisa Bertino, Guandong Xu:
Private data warehouse queries. SACMAT 2013: 25-36 - [c430]Elisa Bertino:
Data Security - Challenges and Research Opportunities. Secure Data Management 2013: 9-13 - [c429]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha:
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks. SenSys 2013: 30:1-30:2 - [c428]Bilal Shebaro, Daniele Midi, Elisa Bertino:
Fine-grained analysis of packet loss symptoms in wireless sensor networks. SenSys 2013: 38:1-38:2 - [c427]Seung-Hyun Seo, Xiaoyu Ding, Elisa Bertino:
Encryption key management for secure communication in smart advanced metering infrastructures. SmartGridComm 2013: 498-503 - [e33]Elisa Bertino, Ravi S. Sandhu, Lujo Bauer, Jaehong Park:
Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013. ACM 2013, ISBN 978-1-4503-1890-7 [contents] - [e32]Elisa Bertino, Dimitrios Georgakopoulos, Mudhakar Srivatsa, Surya Nepal, Alessandro Vinciarelli:
9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013. ICST / IEEE 2013, ISBN 978-1-936968-92-3 [contents] - 2012
- [b6]Elisa Bertino:
Data Protection from Insider Threats. Synthesis Lectures on Data Management, Morgan & Claypool Publishers 2012, ISBN 978-3-031-00762-0 - [j231]Omar Hasan, Lionel Brunie, Elisa Bertino:
Preserving privacy of feedback providers in decentralized reputation systems. Comput. Secur. 31(7): 816-826 (2012) - [j230]Mohamed Nabeel, Elisa Bertino:
Privacy-Preserving Fine-Grained Access Control in Public Clouds. IEEE Data Eng. Bull. 35(4): 21-30 (2012) - [j229]Weili Han, Ye Cao, Elisa Bertino, Jianming Yong:
Using automated individual white-list to protect web digital identities. Expert Syst. Appl. 39(15): 11861-11869 (2012) - [j228]Md. Enamul Kabir, Hua Wang, Elisa Bertino:
A role-involved purpose-based access control model. Inf. Syst. Frontiers 14(3): 809-822 (2012) - [j227]James Joshi, Elisa Bertino, Calton Pu, Heri Ramampiaro:
ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing". Mob. Networks Appl. 17(3): 325-326 (2012) - [j226]Ilsun You, Gabriele Lenzini, Marek R. Ogiela, Elisa Bertino:
Defending against insider threats and internal data leakage. Secur. Commun. Networks 5(8): 831-833 (2012) - [j225]Anna Cinzia Squicciarini, Elisa Bertino, Alberto Trombetta, Stefano Braghin:
A Flexible Approach to Multisession Trust Negotiations. IEEE Trans. Dependable Secur. Comput. 9(1): 16-29 (2012) - [j224]Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino:
Resilient Authenticated Execution of Critical Applications in Untrusted Environments. IEEE Trans. Dependable Secur. Comput. 9(4): 597-609 (2012) - [j223]Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino:
Privacy-Preserving Enforcement of Spatially Aware RBAC. IEEE Trans. Dependable Secur. Comput. 9(5): 627-640 (2012) - [j222]Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Elisa Bertino:
A Hybrid Approach to Private Record Matching. IEEE Trans. Dependable Secur. Comput. 9(5): 684-698 (2012) - [j221]Paolo Atzeni, Elisa Bertino, Masaru Kitsuregawa, Kian-Lee Tan:
Special issue: best papers of VLDB 2010. VLDB J. 21(2): 167-168 (2012) - [c426]Aditi Gupta, Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino:
Marlin: making it harder to fish for gadgets. CCS 2012: 1016-1018 - [c425]Bilal Shebaro, Salmin Sultana, Shakthidhar Reddy Gopavaram, Elisa Bertino:
Demonstrating a lightweight data provenance for sensor networks. CCS 2012: 1022-1024 - [c424]Anna Cinzia Squicciarini, Giuseppe Petracca, Elisa Bertino:
Adaptive data management for self-protecting objects in cloud computing systems. CNSM 2012: 140-144 - [c423]Ninghui Li, Haining Chen, Elisa Bertino:
On practical specification and enforcement of obligations. CODASPY 2012: 71-82 - [c422]Ashish Kundu, Mikhail J. Atallah, Elisa Bertino:
Leakage-free redactable signatures. CODASPY 2012: 307-316 - [c421]Aditi Gupta, Michael S. Kirkpatrick, Elisa Bertino:
A formal proximity model for RBAC systems. CollaborateCom 2012: 1-10 - [c420]Chenyun Dai, Fang-Yu Rao, Traian Marius Truta, Elisa Bertino:
Privacy-preserving assessment of social network data trustworthiness. CollaborateCom 2012: 97-106 - [c419]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Amin Beheshti, Elisa Bertino, Norman Foo:
Reputation management in crowdsourcing systems. CollaborateCom 2012: 664-671 - [c418]Alfredo Cuzzocrea, Elisa Bertino, Domenico Saccà:
Towards a theory for privacy preserving distributed OLAP. EDBT/ICDT Workshops 2012: 221-226 - [c417]Salmin Sultana, Elisa Bertino:
A Comprehensive Model for Provenance. ER Workshops 2012: 121-130 - [c416]Russell Paulet, Md. Golam Kaosar, Xun Yi, Elisa Bertino:
Privacy-Preserving and Content-Protecting Location Based Queries. ICDE 2012: 44-53 - [c415]Hyo-Sang Lim, Gabriel Ghinita, Elisa Bertino, Murat Kantarcioglu:
A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks. ICDE 2012: 1192-1203 - [c414]Salmin Sultana, Gabriel Ghinita, Elisa Bertino, Mohamed Shehab:
A Lightweight Secure Provenance Scheme for Wireless Sensor Networks. ICPADS 2012: 101-108 - [c413]Salmin Sultana, Elisa Bertino:
A Comprehensive Model for Provenance. IPAW 2012: 243-245 - [c412]Gordon K. Lee, Elisa Bertino, Stuart Harvey Rubin, Taghi M. Khoshgoftaar, Bhavani Thuraisingham, James D. McCaffrey:
Panel: Using information re-use and integration principles in big data. IRI 2012 - [c411]Mohamed Nabeel, Elisa Bertino:
Privacy preserving delegated access control in the storage as a service model. IRI 2012: 645-652 - [c410]Sunoh Choi, Gabriel Ghinita, Elisa Bertino:
Secure sensor network SUM aggregation with detection of malicious nodes. LCN 2012: 19-27 - [c409]Rafae Bhatti, Ryan LaSalle, Rob Bird, Tim Grance, Elisa Bertino:
Emerging trends around big data analytics and security: panel. SACMAT 2012: 67-68 - [c408]Mohamed Nabeel, Ning Shang, Elisa Bertino:
Efficient privacy preserving content based publish subscribe systems. SACMAT 2012: 133-144 - [c407]Basit Shafiq, Jaideep Vaidya, Arif Ghafoor, Elisa Bertino:
A framework for verification and optimal reconfiguration of event-driven role based access control policies. SACMAT 2012: 197-208 - [c406]Mohamed Nabeel, Sam Kerr, Xiaoyu Ding, Elisa Bertino:
Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions. SmartGridComm 2012: 324-329 - [c405]Mohamed R. Fouad, Khaled M. Elbassioni, Elisa Bertino:
Modeling the Risk & Utility of Information Sharing in Social Networks. SocialCom/PASSAT 2012: 441-450 - [c404]Sunoh Choi, Hyo-Sang Lim, Elisa Bertino:
Authenticated Top-K Aggregation in Distributed and Outsourced Databases. SocialCom/PASSAT 2012: 779-788 - [c403]Omar Chowdhury, Haining Chen, Jianwei Niu, Ninghui Li, Elisa Bertino:
On XACML's Adequacy to Specify and to Enforce HIPAA. HealthSec 2012 - [e31]Elisa Bertino, Ravi S. Sandhu:
Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012. ACM 2012, ISBN 978-1-4503-1091-8 [contents] - [e30]Xiaoying Bai, Fevzi Belli, Elisa Bertino, Carl K. Chang, Atilla Elçi, Cristina Cerschi Seceleanu, Haihua Xie, Mohammad Zulkernine:
36th Annual IEEE Computer Software and Applications Conference, COMPSAC 2012, Izmir, Turkey, July 16-20, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1990-4 [contents] - [e29]Xiaoying Bai, Fevzi Belli, Elisa Bertino, Carl K. Chang, Atilla Elçi, Cristina Cerschi Seceleanu, Haihua Xie, Mohammad Zulkernine:
36th Annual IEEE Computer Software and Applications Conference Workshops, COMPSAC 2012, Izmir, Turkey, July 16-20, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2714-5 [contents] - [e28]Chengcui Zhang, James Joshi, Elisa Bertino, Bhavani Thuraisingham:
IEEE 13th International Conference on Information Reuse & Integration, IRI 2012, Las Vegas, NV, USA, August 8-10, 2012. IEEE 2012, ISBN 978-1-4673-2282-9 [contents] - [e27]Li Xu, Elisa Bertino, Yi Mu:
Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings. Lecture Notes in Computer Science 7645, Springer 2012, ISBN 978-3-642-34600-2 [contents] - [i12]Mohamed Nabeel, John Zage, Sam Kerr, Elisa Bertino, N. Athula Kulatunga, U. Sudheera Navaratne, Michael Duren:
Cryptographic Key Management for Smart Power Grids - Approaches and Issues. CoRR abs/1206.3880 (2012) - [i11]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Amin Beheshti, Norman Foo, Elisa Bertino:
Detecting, Representing and Querying Collusion in Online Rating Systems. CoRR abs/1211.0963 (2012) - [i10]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Amin Beheshti, Norman Foo, Elisa Bertino:
An Analytic Approach to People Evaluation in Crowdsourcing Systems. CoRR abs/1211.3200 (2012) - [i9]Ashish Kundu, Mikhail J. Atallah, Elisa Bertino:
Efficient Leakage-free Authentication of Trees, Graphs and Forests. IACR Cryptol. ePrint Arch. 2012: 36 (2012) - [i8]Ashish Kundu, Elisa Bertino:
On Hashing Graphs. IACR Cryptol. ePrint Arch. 2012: 352 (2012) - 2011
- [j220]Md. Enamul Kabir, Hua Wang, Elisa Bertino:
Efficient systematic clustering method for k-anonymization. Acta Informatica 48(1): 51-66 (2011) - [j219]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo:
Fine-grained integration of access control policies. Comput. Secur. 30(2-3): 91-107 (2011) - [j218]Anna Cinzia Squicciarini, Federica Paci, Elisa Bertino:
Trust establishment in the formation of Virtual Organizations. Comput. Stand. Interfaces 33(1): 13-23 (2011) - [j217]Md. Enamul Kabir, Hua Wang, Elisa Bertino:
A conditional purpose-based access control model with dynamic roles. Expert Syst. Appl. 38(3): 1482-1489 (2011) - [j216]Elisa Bertino, Gabriel Ghinita, Ashish Kamra:
Access Control for Databases: Concepts and Systems. Found. Trends Databases 3(1-2): 1-148 (2011) - [j215]Gabriel Ghinita, Panos Kalnis, Murat Kantarcioglu, Elisa Bertino:
Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection. GeoInformatica 15(4): 699-726 (2011) - [j214]Alfredo Cuzzocrea, Elisa Bertino:
Privacy Preserving OLAP over Distributed XML Data: A Theoretically-Sound Secure-Multiparty-Computation Approach. J. Comput. Syst. Sci. 77(6): 965-987 (2011) - [j213]Daniel G. Aliaga, Elisa Bertino, Stefano Valtolina:
DECHO - a framework for the digital exploration of cultural heritage objects. ACM Journal on Computing and Cultural Heritage 3(3): 12:1-12:26 (2011) - [j212]Md. Enamul Kabir, Hua Wang, Elisa Bertino:
A Conditional Role-Involved Purpose-Based Access Control Model. J. Organ. Comput. Electron. Commer. 21(1): 71-91 (2011) - [j211]Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino:
Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications. IEEE Pervasive Comput. 10(4): 64-72 (2011) - [j210]Alberto Trombetta, Wei Jiang, Elisa Bertino, Lorenzo Bossi:
Privacy-Preserving Updates to Anonymous and Confidential Databases. IEEE Trans. Dependable Secur. Comput. 8(4): 578-587 (2011) - [j209]Yuqing Sun, Qihua Wang, Ninghui Li, Elisa Bertino, Mikhail J. Atallah:
On the Complexity of Authorization in RBAC under Qualification and Security Constraints. IEEE Trans. Dependable Secur. Comput. 8(6): 883-897 (2011) - [j208]Ashish Kamra, Elisa Bertino:
Design and Implementation of an Intrusion Response System for Relational Databases. IEEE Trans. Knowl. Data Eng. 23(6): 875-888 (2011) - [j207]Federica Paci, Massimo Mecella, Mourad Ouzzani, Elisa Bertino:
ACConv - An Access Control Model for Conversational Web Services. ACM Trans. Web 5(3): 13:1-13:33 (2011) - [c402]Wonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino:
Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems. CCGRID 2011: 534-543 - [c401]Elisa Bertino, Gabriel Ghinita:
Towards mechanisms for detection and prevention of data exfiltration by insiders: keynote talk paper. AsiaCCS 2011: 10-19 - [c400]Michael S. Kirkpatrick, Sam Kerr, Elisa Bertino:
PUF ROKs: a hardware approach to read-once keys. AsiaCCS 2011: 155-164 - [c399]Mohamed Nabeel, Elisa Bertino:
Poster: towards attribute based group key management. CCS 2011: 821-824 - [c398]Mohamed Nabeel, Elisa Bertino, Murat Kantarcioglu, Bhavani Thuraisingham:
Towards privacy preserving access control in the cloud. CollaborateCom 2011: 172-180 - [c397]Robert K. Abercrombie, Frederick T. Sheldon, Hal Aldridge, Michael Duren, Tracy Ricci, Elisa Bertino, N. Athula Kulatunga, Uditha Navaratne:
Secure cryptographic key management system (CKMS) considerations for smart grid devices. CSIIRW 2011: 59 - [c396]Elisa Bertino, Michael S. Kirkpatrick:
Location-based access control systems for mobile users: concepts and research directions. SPRINGL 2011: 49-52 - [c395]Chenyun Dai, Fang-Yu Rao, Gabriel Ghinita, Elisa Bertino:
Privacy-preserving assessment of location data trustworthiness. GIS 2011: 231-240 - [c394]Michael S. Kirkpatrick, Maria Luisa Damiani, Elisa Bertino:
Prox-RBAC: a proximity-based spatially aware RBAC. GIS 2011: 339-348 - [c393]Xukai Zou, Fabio Maino, Elisa Bertino, Yan Sui, Kai Wang, Feng Li:
A New Approach to Weighted Multi-Secret Sharing. ICCCN 2011: 1-6 - [c392]Ashish Kundu, Elisa Bertino:
A New Class of Buffer Overflow Attacks. ICDCS 2011: 730-739 - [c391]Salmin Sultana, Elisa Bertino, Mohamed Shehab:
A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks. ICDCS Workshops 2011: 332-338 - [c390]Nan Guo, Tianhan Gao, Bin Zhang, Ruchith Fernando, Elisa Bertino:
Aggregated Privacy-Preserving Identity Verification for Composite Web Services. ICWS 2011: 692-693 - [c389]Elisa Bertino:
Protecting information systems from insider threats - concepts and issues. IRI 2011 - [c388]Wonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino:
Profile-Based Selection of Accountability Policies in Grid Computing Systems. POLICY 2011: 145-148 - [c387]Qun Ni, Elisa Bertino:
xfACL: an extensible functional language for access control. SACMAT 2011: 61-72 - [c386]Xun Yi, Elisa Bertino:
Private searching for single and conjunctive keywords on streaming data. WPES 2011: 153-158 - [e26]Ravi S. Sandhu, Elisa Bertino:
First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings. ACM 2011, ISBN 978-1-4503-0466-5 [contents] - [e25]Elisa Bertino, Maria Luisa Damiani, Gabriel Ghinita:
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2011, November 1st, 2011, Chicago, IL, USA. ACM 2011, ISBN 978-1-4503-1032-1 [contents] - [e24]Sadagopan Srinivasan, Krithi Ramamritham, Arun Kumar, M. P. Ravindra, Elisa Bertino, Ravi Kumar:
Proceedings of the 20th International Conference on World Wide Web, WWW 2011, Hyderabad, India, March 28 - April 1, 2011. ACM 2011, ISBN 978-1-4503-0632-4 [contents] - [e23]Sadagopan Srinivasan, Krithi Ramamritham, Arun Kumar, M. P. Ravindra, Elisa Bertino, Ravi Kumar:
Proceedings of the 20th International Conference on World Wide Web, WWW 2011, Hyderabad, India, March 28 - April 1, 2011 (Companion Volume). ACM 2011, ISBN 978-1-4503-0637-9 [contents] - 2010
- [b5]Elisa Bertino, Lorenzo Martino, Federica Paci, Anna Cinzia Squicciarini:
Security for Web Services and Service-Oriented Architectures. Springer 2010, ISBN 978-3-540-87741-7, pp. I-XII, 1-226 - [j206]Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo:
EXAM: a comprehensive environment for the analysis of access control policies. Int. J. Inf. Sec. 9(4): 253-273 (2010) - [j205]Elisa Bertino, Andrea Maurino, Monica Scannapieco:
Guest Editors' Introduction: Data Quality in the Internet Era. IEEE Internet Comput. 14(4): 11-13 (2010) - [j204]Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri:
The PROBE Framework for the Personalized Cloaking of Private Locations. Trans. Data Priv. 3(2): 123-148 (2010) - [j203]Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie, Clare-Marie Karat, John Karat, Alberto Trombetta:
Privacy-aware role-based access control. ACM Trans. Inf. Syst. Secur. 13(3): 24:1-24:31 (2010) - [j202]Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo:
Mining Roles with Multiple Objectives. ACM Trans. Inf. Syst. Secur. 13(4): 36:1-36:35 (2010) - [j201]Anna Cinzia Squicciarini, Federica Paci, Elisa Bertino, Alberto Trombetta, Stefano Braghin:
Group-Based Negotiations in P2P Systems. IEEE Trans. Parallel Distributed Syst. 21(10): 1473-1486 (2010) - [j200]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Rui Xue, Elisa Bertino:
Multifactor Identity Verification Using Aggregated Proof of Knowledge. IEEE Trans. Syst. Man Cybern. Part C 40(4): 372-383 (2010) - [j199]Elisa Bertino, Elena Ferrari, Andrea Perego:
A General Framework for Web Content Filtering. World Wide Web 13(3): 215-249 (2010) - [c385]Md. Enamul Kabir, Hua Wang, Elisa Bertino, Yunxiang Chi:
Systematic clustering method for l-diversity model. ADC 2010: 93-102 - [c384]Qun Ni, Elisa Bertino, Jorge Lobo:
Risk-based access control systems built on fuzzy inferences. AsiaCCS 2010: 250-260 - [c383]Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa Bertino:
Controlling data disclosure in computational PIR protocols. AsiaCCS 2010: 310-313 - [c382]Aditi Gupta, Salmin Sultana, Michael S. Kirkpatrick, Elisa Bertino:
A selective encryption approach to fine-grained access control for P2P file sharing. CollaborateCom 2010: 1-10 - [c381]Hyo-Sang Lim, Chenyun Dai, Elisa Bertino:
A policy-based approach for assuring data integrity in DBMSs. CollaborateCom 2010: 1-10 - [c380]Eiji Kawai, Elisa Bertino, Sue Moon:
Panel Description: Joint COMPSAC/SAINT Panel: Future of the Internet. COMPSAC 2010: 21 - [c379]Jianming Yong, Elisa Bertino:
Digital identity enrolment and assurance support for VeryIDX. CSCWD 2010: 734-739 - [c378]Michael S. Kirkpatrick, Elisa Bertino, Sam Kerr:
PUF ROKs: generating read-once keys from physically unclonable functions. CSIIRW 2010: 19 - [c377]Wonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino:
Vulnerabilities leading to denial of services attacks in grid computing systems: a survey. CSIIRW 2010: 54 - [c376]Yang-Sae Moon, Hea-Suk Kim, Sang-Pil Kim, Elisa Bertino:
Publishing Time-Series Data under Preservation of Privacy and Distance Orders. DEXA (2) 2010: 17-31 - [c375]Sunoh Choi, Gabriel Ghinita, Elisa Bertino:
A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations. DEXA (1) 2010: 368-384 - [c374]Eun-Ae Cho, Gabriel Ghinita, Elisa Bertino:
Privacy-preserving similarity measurement for access control policies. Digital Identity Management 2010: 3-12 - [c373]Kevin Steuer Jr., Ruchith Fernando, Elisa Bertino:
Privacy preserving identity attribute verification in windows cardspace. Digital Identity Management 2010: 13-16 - [c372]Hyo-Sang Lim, Yang-Sae Moon, Elisa Bertino:
Provenance-based trustworthiness assessment in sensor networks. DMSN 2010: 2-7 - [c371]Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Elisa Bertino:
Private record matching using differential privacy. EDBT 2010: 123-134 - [c370]Ashish Kundu, Elisa Bertino:
How to authenticate graphs without leaking. EDBT 2010: 609-620 - [c369]Gabriel Ghinita, Carmen Ruiz Vicente, Ning Shang, Elisa Bertino:
Privacy-preserving matching of spatial datasets with protection against background knowledge. GIS 2010: 3-12 - [c368]Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino:
PEAR: a hardware based protocol authentication system. SPRINGL 2010: 18-25 - [c367]Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino:
Analyzing semantic locations cloaking techniques in a probabilistic grid-based map. GIS 2010: 522-523 - [c366]Qun Ni, Elisa Bertino:
Credibility-enhanced curated database: Improving the value of curated databases. ICDE 2010: 784-795 - [c365]Rimma V. Nehme, Hyo-Sang Lim, Elisa Bertino:
FENCE: Continuous access control enforcement in dynamic data stream environments. ICDE 2010: 940-943 - [c364]Ning Shang, Mohamed Nabeel, Federica Paci, Elisa Bertino:
A privacy-preserving approach to policy-based content dissemination. ICDE 2010: 944-955 - [c363]Wei She, I-Ling Yen, Bhavani Thuraisingham, Elisa Bertino:
Policy-Driven Service Composition with Information Flow Control. ICWS 2010: 50-57 - [c362]Ning Shang, Federica Paci, Elisa Bertino:
Efficient and privacy-preserving enforcement of attribute-based access control. IDtrust 2010: 63-68 - [c361]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino, Xiangwei Kong, Weike Zhang:
Biometrics-based identifiers for digital identity management. IDtrust 2010: 84-96 - [c360]Md. Enamul Kabir, Hua Wang, Elisa Bertino:
A Role-Involved Conditional Purpose-Based Access Control Model. EGES/GISP 2010: 167-180 - [c359]Gabriel Ghinita, Mehdi Azarmi, Elisa Bertino:
Privacy-Aware Location-Aided Routing in Mobile Ad Hoc Networks. Mobile Data Management 2010: 65-74 - [c358]Ashish Kamra, Elisa Bertino:
JTAM - A Joint Threshold Administration Model. POLICY 2010: 129-132 - [c357]Omar Hasan, Elisa Bertino, Lionel Brunie:
Efficient privacy preserving reputation protocols inspired by secure sum. PST 2010: 126-133 - [c356]Ashish Kamra, Elisa Bertino:
Privilege States Based Access Control for Fine-Grained Intrusion Response. RAID 2010: 402-421 - [c355]Alfredo Cuzzocrea, Elisa Bertino:
A secure multiparty computation privacy preserving OLAP framework over distributed XML data. SAC 2010: 1666-1673 - [c354]Michael S. Kirkpatrick, Elisa Bertino:
Enforcing spatial constraints for mobile RBAC systems. SACMAT 2010: 99-108 - [c353]Elisa Bertino, Hyo-Sang Lim:
Assuring Data Trustworthiness - Concepts and Research Challenges. Secure Data Management 2010: 1-12 - [c352]Omar Hasan, Lionel Brunie, Elisa Bertino:
k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments. SEC 2010: 253-264 - [c351]Mohamed Nabeel, Ning Shang, John Zage, Elisa Bertino:
Mask: a system for privacy-preserving policy-based access to published content. SIGMOD Conference 2010: 1239-1242 - [c350]Shouhuai Xu, Haifeng Qian, Fengying Wang, Zhenxin Zhan, Elisa Bertino, Ravi S. Sandhu:
Trustworthy Information: Concepts and Mechanisms. WAIM 2010: 398-404 - [e22]Elisa Bertino, Maria Luisa Damiani, Yücel Saygin:
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2010, November 2, 2010, San Jose, California, USA, Proceedings. ACM 2010 [contents]
2000 – 2009
- 2009
- [j198]Federica Paci, Rodolfo Ferrini, Andrea Musci, Kevin Steuer Jr., Elisa Bertino:
An Interoperable Approach to Multifactor Identity Verification. Computer 42(5): 50-57 (2009) - [j197]Elisa Bertino, Federica Paci, Rodolfo Ferrini, Ning Shang:
Privacy-preserving Digital Identity Management for Cloud Computing. IEEE Data Eng. Bull. 32(1): 21-27 (2009) - [j196]Elisa Bertino, Carolyn Brodie, Seraphin B. Calo, Lorrie Faith Cranor, Clare-Marie Karat, John Karat, Ninghui Li, Dan Lin, Jorge Lobo, Qun Ni, Prathima Rao, Xiping Wang:
Analysis of privacy and security policies. IBM J. Res. Dev. 53(2): 3 (2009) - [j195]John Karat, Clare-Marie Karat, Elisa Bertino, Ninghui Li, Qun Ni, Carolyn Brodie, Jorge Lobo, Seraphin B. Calo, Lorrie Faith Cranor, Ponnurangam Kumaraguru, Robert W. Reeder:
Policy framework for security and privacy management. IBM J. Res. Dev. 53(2): 4 (2009) - [j194]Qun Ni, Elisa Bertino, Jorge Lobo, Seraphin B. Calo:
Privacy-Aware Role-Based Access Control. IEEE Secur. Priv. 7(4): 35-43 (2009) - [j193]Richard Shay, Elisa Bertino:
A comprehensive simulation tool for the analysis of password policies. Int. J. Inf. Sec. 8(4): 275-289 (2009) - [j192]Yuqing Sun, Bin Gong, Xiangxu Meng, Zongkai Lin, Elisa Bertino:
Specification and enforcement of flexible security policy for active cooperation. Inf. Sci. 179(15): 2629-2642 (2009) - [j191]Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, Yonglak Sohn:
Privacy-preserving incremental data dissemination. J. Comput. Secur. 17(1): 43-68 (2009) - [j190]Federica Paci, Elisa Bertino, Sam Kerr, Anna Cinzia Squicciarini, Jungha Woo:
An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices. J. Softw. 4(7): 696-706 (2009) - [j189]Lorenzo Martino, Elisa Bertino:
Security for Web Services: Standards and Research Issues. Int. J. Web Serv. Res. 6(4): 48-74 (2009) - [j188]Hangzai Luo, Jianping Fan, Xiaodong Lin, Aoying Zhou, Elisa Bertino:
A distributed approach to enabling privacy-preserving model-based classifier training. Knowl. Inf. Syst. 20(2): 157-185 (2009) - [j187]Rimma V. Nehme, Elke A. Rundensteiner, Elisa Bertino:
Tagging Stream Data for Rich Real-Time Services. Proc. VLDB Endow. 2(1): 73-84 (2009) - [j186]Rimma V. Nehme, Karen Works, Elke A. Rundensteiner, Elisa Bertino:
Query Mesh: Multi-Route Query Processing Technology. Proc. VLDB Endow. 2(2): 1530-1533 (2009) - [j185]Chenyun Dai, Gabriel Ghinita, Elisa Bertino, Ji-Won Byun, Ninghui Li:
TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques. Proc. VLDB Endow. 2(2): 1618-1621 (2009) - [j184]Ebru Celikel, Murat Kantarcioglu, Bhavani Thuraisingham, Elisa Bertino:
A risk management approach to RBAC. Risk Decis. Anal. 1(1): 21-33 (2009) - [j183]Elisa Bertino:
Privacy-preserving techniques for location-based services. ACM SIGSPATIAL Special 1(2): 2-3 (2009) - [j182]Elisa Bertino, Maria Luisa Damiani:
Foreword for the special issue of selected papers from the 1st ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS. Trans. Data Priv. 2(1): 1-2 (2009) - [j181]Dan Lin, Elisa Bertino, Reynold Cheng, Sunil Prabhakar:
Location Privacy in Moving-Object Environments. Trans. Data Priv. 2(1): 21-46 (2009) - [j180]Guy Lebanon, Monica Scannapieco, Mohamed R. Fouad, Elisa Bertino:
Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk. Trans. Data Priv. 2(3): 153-183 (2009) - [j179]Tianjie Cao, Elisa Bertino, Hong Lei:
Security Analysis of the SASI Protocol. IEEE Trans. Dependable Secur. Comput. 6(1): 73-77 (2009) - [j178]Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino:
Efficient integration of fine-grained access control and resource brokering in grid. J. Supercomput. 49(1): 108-126 (2009) - [j177]Elisa Bertino, William Cheng-Chung Chu:
Guest Editorial: Special Section on Service-Oriented Distributed Computing Systems. IEEE Trans. Serv. Comput. 2(3): 245-246 (2009) - [c349]Jian Wu, Qianhui Liang, Elisa Bertino:
Improving Scalability of Software Cloud for Composite Web Services. IEEE CLOUD 2009: 143-146 - [c348]Elisa Bertino, Michael S. Kirkpatrick:
Location-Aware Authentication and Access Control. AINA 2009: 10-15 - [c347]Michael S. Kirkpatrick, Elisa Bertino:
Physically restricted authentication with trusted hardware. STC 2009: 55-60 - [c346]Qun Ni, Elisa Bertino, Jorge Lobo:
D-algebra for composing access control policy decisions. AsiaCCS 2009: 298-309 - [c345]Qun Ni, Elisa Bertino:
Aggregating uncertain access risk estimations from different sources invited paper. CollaborateCom 2009: 1-10 - [c344]Wonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino:
An assessment of accountability policies for large-scale distributed computing systems. CSIIRW 2009: 39 - [c343]Elisa Bertino, Chenyun Dai, Murat Kantarcioglu:
The Challenge of Assuring Data Trustworthiness. DASFAA 2009: 22-33 - [c342]Dimitrios Georgakopoulos, Elisa Bertino, Alistair Barros, Ryszard Kowalczyk:
Information Services: Myth or Silver Bullet? DASFAA 2009: 793-794 - [c341]Rimma V. Nehme, Elke A. Rundensteiner, Elisa Bertino:
Self-tuning query mesh for adaptive multi-route query processing. EDBT 2009: 803-814 - [c340]Carmen Ruiz Vicente, Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino, Christian S. Jensen:
Towards location-based access control in healthcare emergency response. SPRINGL 2009: 22-26 - [c339]Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri:
Protecting location privacy against spatial inferences: the PROBE approach. SPRINGL 2009: 32-41 - [c338]Hyo-Sang Lim, Yang-Sae Moon, Elisa Bertino:
Research issues in data provenance for streaming environments. SPRINGL 2009: 58-62 - [c337]Yücel Saygin, Elisa Bertino, Michael Gertz, Mohamed F. Mokbel, Maria Luisa Damiani:
Can an inter-disciplinary research community on location privacy be successful? SPRINGL 2009: 71-72 - [c336]Gabriel Ghinita, Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino:
Preventing velocity-based linkage attacks in location-aware applications. GIS 2009: 246-255 - [c335]Chenyun Dai, Hyo-Sang Lim, Elisa Bertino, Yang-Sae Moon:
Assessing the trustworthiness of location data based on provenance. GIS 2009: 276-285 - [c334]Wonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino:
The Design and Evaluation of Accountable Grid Computing System. ICDCS 2009: 145-154 - [c333]Ali Inan, Murat Kantarcioglu, Elisa Bertino:
Using Anonymized Data for Classification. ICDE 2009: 429-440 - [c332]Rodolfo Ferrini, Elisa Bertino:
A Comprehensive Approach for Solving Policy Heterogeneity. ICEIS (3) 2009: 63-68 - [c331]Elisa Bertino, Elena Camossi, Michela Bertolotto:
Multi-granular Spatio-temporal Object Models: Concepts and Research Directions. ICOODB 2009: 132-148 - [c330]Elisa Bertino, Alfredo Cuzzocrea:
Privacy Preserving OLAP over Distributed XML Documents. ICPP Workshops 2009: 603-611 - [c329]Wei She, I-Ling Yen, Bhavani Thuraisingham, Elisa Bertino:
The SCIFC Model for Information Flow Control in Web Service Composition. ICWS 2009: 1-8 - [c328]Federica Paci, Rodolfo Ferrini, Elisa Bertino:
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. ICWS 2009: 535-542 - [c327]Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer Jr., Jungha Woo, Elisa Bertino:
Privacy-preserving management of transactions' receipts for mobile environments. IDtrust 2009: 73-84 - [c326]Michael S. Kirkpatrick, Elisa Bertino:
Context-Dependent Authentication and Access Control. iNetSeC 2009: 63-75 - [c325]Omar Hasan, Lionel Brunie, Jean-Marc Pierson, Elisa Bertino:
Elimination of Subjectivity from Trust Recommendation. IFIPTM 2009: 65-80 - [c324]Shouhuai Xu, Ravi S. Sandhu, Elisa Bertino:
TIUPAM: A Framework for Trustworthiness-Centric Information Sharing. IFIPTM 2009: 164-175 - [c323]Tim Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi S. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic:
Assured Information Sharing Life Cycle. ISI 2009: 307-309 - [c322]Shouhuai Xu, Qun Ni, Elisa Bertino, Ravi S. Sandhu:
A Characterization of the problem of secure provenance management. ISI 2009: 310-314 - [c321]Gabriel Ghinita, Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri:
Interactive Location Cloaking with the PROBE Obfuscator. Mobile Data Management 2009: 355-356 - [c320]Federica Paci, Ning Shang, Kevin Steuer Jr., Ruchith Fernando, Elisa Bertino:
VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices. Mobile Data Management 2009: 367-368 - [c319]Prathima Rao, Gabriel Ghinita, Elisa Bertino, Jorge Lobo:
Visualization for Access Control Policy Analysis Results Using Multi-level Grids. POLICY 2009: 25-28 - [c318]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo:
An algebra for fine-grained integration of XACML policies. SACMAT 2009: 63-72 - [c317]Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohatgi, Elisa Bertino:
Automating role-based provisioning by learning from examples. SACMAT 2009: 75-84 - [c316]Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, Dan Lin:
Access control policy combining: theory meets practice. SACMAT 2009: 135-144 - [c315]Rodolfo Ferrini, Elisa Bertino:
Supporting RBAC with XACML+OWL. SACMAT 2009: 145-154 - [c314]Chenyun Dai, Dan Lin, Murat Kantarcioglu, Elisa Bertino, Ebru Celikel, Bhavani Thuraisingham:
Query Processing Techniques for Compliance with Data Confidence Policies. Secure Data Management 2009: 49-67 - [c313]Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu, Weili Han:
An Access Control Language for a General Provenance Model. Secure Data Management 2009: 68-88 - [c312]Rimma V. Nehme, Hyo-Sang Lim, Elisa Bertino, Elke A. Rundensteiner:
StreamShield: a stream-centric approach towards security and privacy in data stream environments. SIGMOD Conference 2009: 1027-1030 - [c311]Elisa Bertino:
Assured information sharing: concepts and issues. SIN 2009: 19-20 - [c310]Wei She, I-Ling Yen, Bhavani Thuraisingham, Elisa Bertino:
Effective and efficient implementation of an information flow control protocol for service composition. SOCA 2009: 1-8 - [c309]Gabriel Ghinita, Panos Kalnis, Murat Kantarcioglu, Elisa Bertino:
A Hybrid Technique for Private Location-Based Queries with Database Protection. SSTD 2009: 98-116 - [c308]Elena Camossi, Elisa Bertino, Giovanna Guerrini, Michela Bertolotto:
Adaptive Management of Multigranular Spatio-Temporal Object Attributes. SSTD 2009: 320-337 - [c307]Omar Hasan, Lionel Brunie, Jean-Marc Pierson, Elisa Bertino:
L'Elimination de la subjectivité dans la recommandation de confiance. UbiMob 2009: 3-10 - [e21]Elisa Bertino, James B. D. Joshi:
Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 10, Springer / ICST 2009, ISBN 978-3-642-03353-7 [contents] - [e20]Sheikh Iqbal Ahamed, Elisa Bertino, Carl K. Chang, Vladimir Getov, Lin Liu, Ming Hua, Rajesh Subramanyan:
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 1. IEEE Computer Society 2009, ISBN 978-0-7695-3726-9 [contents] - [e19]Sheikh Iqbal Ahamed, Elisa Bertino, Carl K. Chang, Vladimir Getov, Lin Liu, Ming Hua, Rajesh Subramanyan:
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2. IEEE Computer Society 2009 [contents] - [e18]Elisa Bertino, Thomas Groß, Kenji Takahashi:
Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009. ACM 2009, ISBN 978-1-60558-786-8 [contents] - [e17]Elisa Bertino, Maria Luisa Damiani, Yücel Saygin:
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2009, November 3, 2009, Seattle, WA, USA. ACM 2009 [contents] - [e16]Elena Ferrari, Ninghui Li, Elisa Bertino, Yücel Karabulut:
Trust Management III, Third IFIP WG 11.11 International Conference, IFIPTM 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings. IFIP Advances in Information and Communication Technology 300, Springer 2009, ISBN 978-3-642-02055-1 [contents] - 2008
- [j176]Arjmand Samuel, Arif Ghafoor, Elisa Bertino:
Context-Aware Adaptation of Access-Control Policies. IEEE Internet Comput. 12(1): 51-54 (2008) - [j175]Rafae Bhatti, Maria Luisa Damiani, David W. Bettis, Elisa Bertino:
Policy Mapper: Administering Location-Based Access-Control Policies. IEEE Internet Comput. 12(2): 38-45 (2008) - [j174]Tianjie Cao, Peng Shen, Elisa Bertino:
Cryptanalysis of Some RFID Authentication Protocols. J. Commun. 3(7): 20-27 (2008) - [j173]Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino:
Semantics-aware Obfuscation for Location Privacy. J. Comput. Sci. Eng. 2(2): 137-160 (2008) - [j172]Elisa Bertino, Giovanna Guerrini, Marco Mesiti:
Measuring the structural similarity among XML documents and DTDs. J. Intell. Inf. Syst. 30(1): 55-92 (2008) - [j171]Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri:
Spatial Domains for the Administration of Location-based Access Control Policies. J. Netw. Syst. Manag. 16(3): 277-302 (2008) - [j170]Federica Paci, Elisa Bertino, Jason Crampton:
An Access-Control Framework for WS-BPEL. Int. J. Web Serv. Res. 5(3): 20-43 (2008) - [j169]Ashish Kundu, Elisa Bertino:
Structural signatures for tree data structures. Proc. VLDB Endow. 1(1): 138-150 (2008) - [j168]Elisa Bertino, Ning Shang, Samuel S. Wagstaff Jr.:
An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting. IEEE Trans. Dependable Secur. Comput. 5(2): 65-70 (2008) - [j167]James B. D. Joshi, Elisa Bertino, Arif Ghafoor, Yue Zhang:
Formal foundations for hybrid hierarchies in GTRBAC. ACM Trans. Inf. Syst. Secur. 10(4): 2:1-2:39 (2008) - [j166]Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino:
XACML Policy Integration Algorithms. ACM Trans. Inf. Syst. Secur. 11(1): 4:1-4:29 (2008) - [j165]Mohamed Shehab, Elisa Bertino, Arif Ghafoor:
Watermarking Relational Databases Using Optimization-Based Techniques. IEEE Trans. Knowl. Data Eng. 20(1): 116-129 (2008) - [j164]Yunhua Koglin, Danfeng Yao, Elisa Bertino:
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries. IEEE Trans. Parallel Distributed Syst. 19(5): 615-626 (2008) - [j163]Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino:
Anonymous Geo-Forwarding in MANETs through Location Cloaking. IEEE Trans. Parallel Distributed Syst. 19(10): 1297-1309 (2008) - [j162]Mohamed Shehab, Arif Ghafoor, Elisa Bertino:
Secure Collaboration in a Mediator-Free Distributed Environment. IEEE Trans. Parallel Distributed Syst. 19(10): 1338-1351 (2008) - [j161]Ashish Kundu, Elisa Bertino:
A New Model for Secure Dissemination of XML Content. IEEE Trans. Syst. Man Cybern. Part C 38(3): 292-301 (2008) - [j160]Ashish Kamra, Evimaria Terzi, Elisa Bertino:
Detecting anomalous access patterns in relational databases. VLDB J. 17(5): 1063-1077 (2008) - [c306]Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino:
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems. ARES 2008: 153-160 - [c305]Anna Cinzia Squicciarini, Wonjun Lee, Elisa Bertino, Carol X. Song:
A Policy-Based Accountability Tool for Grid Computing Systems. APSCC 2008: 95-100 - [c304]Elisa Bertino, Chenyun Dai, Hyo-Sang Lim, Dan Lin:
High-Assurance Integrity Techniques for Databases. BNCOD 2008: 244-256 - [c303]Elisa Bertino, Rodolfo Ferrini, Andrea Musci, Federica Paci, Kevin J. Steuer:
A Federated Digital Identity Management Approach for Business Processes. CollaborateCom 2008: 194-206 - [c302]Elisa Bertino, Wonjun Lee, Anna Cinzia Squicciarini, Bhavani Thuraisingham:
End-to-end accountability in grid computing systems for coalition information sharing. CSIIRW 2008: 29:1-29:3 - [c301]Elena Camossi, Michela Bertolotto, Elisa Bertino:
Querying Multigranular Spatio-temporal Objects. DEXA 2008: 390-403 - [c300]Federica Paci, David Bauer, Elisa Bertino, Douglas M. Blough, Anna Cinzia Squicciarini:
Minimal credential disclosure in trust negotiations. Digital Identity Management 2008: 89-96 - [c299]Anna Cinzia Squicciarini, Alberto Trombetta, Elisa Bertino, Stefano Braghin:
Identity-based long running negotiations. Digital Identity Management 2008: 97-106 - [c298]Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri:
Approach to Supporting Continuity of Usage in Location-Based Access Control. FTDCS 2008: 199-205 - [c297]Elisa Bertino, Bhavani Thuraisingham, Michael Gertz, Maria Luisa Damiani:
Security and privacy for geospatial data: concepts and research directions. SPRINGL 2008: 6-19 - [c296]Dan Lin, Elisa Bertino, Reynold Cheng, Sunil Prabhakar:
Position transformation: a location privacy protection method for moving objects. SPRINGL 2008: 62-71 - [c295]Elena Camossi, Michela Bertolotto, Elisa Bertino:
Multigranular spatio-temporal models: implementation challenges. GIS 2008: 63 - [c294]Rimma V. Nehme, Elke A. Rundensteiner, Elisa Bertino:
A Security Punctuation Framework for Enforcing Access Control on Streaming Data. ICDE 2008: 406-415 - [c293]Anna Cinzia Squicciarini, Federica Paci, Elisa Bertino:
Trust establishment in the formation of Virtual Organizations. ICDE Workshops 2008: 454-461 - [c292]Ali Inan, Murat Kantarcioglu, Elisa Bertino, Monica Scannapieco:
A Hybrid Approach to Private Record Linkage. ICDE 2008: 496-505 - [c291]Rui Zhang, Dan Lin, Kotagiri Ramamohanarao, Elisa Bertino:
Continuous Intersection Joins Over Moving Objects. ICDE 2008: 863-872 - [c290]Anna Cinzia Squicciarini, Ivan Paloscia, Elisa Bertino:
Protecting Databases from Query Flood Attacks. ICDE 2008: 1358-1360 - [c289]Mohamed Nabeel, Elisa Bertino:
Secure Delta-Publishing of XML Content. ICDE 2008: 1361-1363 - [c288]Alberto Trombetta, Wei Jiang, Elisa Bertino, Lorenzo Bossi:
Privately Updating Suppression and Generalization based k-Anonymous Databases. ICDE 2008: 1370-1372 - [c287]Federica Paci, Rodolfo Ferrini, Yuqing Sun, Elisa Bertino:
Authorization and User Failure Resiliency for WS-BPEL Business Processes. ICSOC 2008: 116-131 - [c286]Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri:
Protecting Location Privacy through Semantics-aware Obfuscation Techniques. IFIPTM 2008: 231-245 - [c285]Xukai Zou, Yuan-Shun Dai, Elisa Bertino:
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing. INFOCOM 2008: 538-546 - [c284]Fatih Turkmen, Pietro Mazzoleni, Bruno Crispo, Elisa Bertino:
P-CDN: Extending access control capabilities of P2P systems to provide CDN services. ISCC 2008: 480-486 - [c283]Tianjie Cao, Peng Shen, Elisa Bertino:
Cryptanalysis of the LCSS RFID Authentication Protocol. ISECS 2008: 305-309 - [c282]Roshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Ismailcem Budak Arpinar, Shouhuai Xu:
Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). ISIPS 2008: 115-121 - [c281]Mohamed Shehab, Elisa Bertino, Arif Ghafoor:
Proactive Role Discovery in Mediator-Free Environments. Peer-to-Peer Computing 2008: 150-159 - [c280]Lorenzo Martino, Qun Ni, Dan Lin, Elisa Bertino:
Multi-domain and privacy-aware role based access control in eHealth. PervasiveHealth 2008: 131-134 - [c279]Anna Cinzia Squicciarini, Marco Casassa Mont, Abhilasha Bhargav-Spantzel, Elisa Bertino:
Automatic Compliance of Privacy Policies in Federated Digital Identity Management. POLICY 2008: 89-92 - [c278]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo:
EXAM: An Environment for Access Control Policy Analysis and Management. POLICY 2008: 238-240 - [c277]Ashish Kamra, Elisa Bertino:
Database Intrusion Detection and Response. RAID 2008: 400-401 - [c276]Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo:
Mining roles with semantic meanings. SACMAT 2008: 21-30 - [c275]Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo:
Policy decomposition for collaborative access control. SACMAT 2008: 103-112 - [c274]Qun Ni, Elisa Bertino, Jorge Lobo:
An obligation model bridging access control policies and privacy policies. SACMAT 2008: 133-142 - [c273]Mohamed R. Fouad, Guy Lebanon, Elisa Bertino:
ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure. Secure Data Management 2008: 32-49 - [c272]Ashish Kamra, Elisa Bertino, Rimma V. Nehme:
Responding to Anomalous Database Requests. Secure Data Management 2008: 50-66 - [c271]Chenyun Dai, Dan Lin, Elisa Bertino, Murat Kantarcioglu:
An Approach to Evaluate Data Trustworthiness Based on Data Provenance. Secure Data Management 2008: 82-98 - [c270]Elisa Bertino:
Privacy-Preserving Techniques for Location-Based Services. SEBD 2008: 7-8 - [c269]Federica Paci, Elisa Bertino, Sam Kerr, Aaron Lint, Anna Cinzia Squicciarini, Jungha Woo:
VeryIDX - A Digital Identity Management System for Pervasive Computing Environments. SEUS 2008: 268-279 - [c268]Jungha Woo, Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino:
Verification of Receipts from M-commerce Transactions on NFC Cellular Phones. CEC/EEE 2008: 36-43 - [p10]Elisa Bertino, Giovanna Guerrini:
Object-Oriented Databases. Wiley Encyclopedia of Computer Science and Engineering 2008 - [p9]Elisa Bertino, Dan Lin, Wei Jiang:
A Survey of Quantification of Privacy Preserving Data Mining Algorithms. Privacy-Preserving Data Mining 2008: 183-205 - [e15]Yanchun Zhang, Ge Yu, Elisa Bertino, Guandong Xu:
Progress in WWW Research and Development, 10th Asia-Pacific Web Conference, APWeb 2008, Shenyang, China, April 26-28, 2008. Proceedings. Lecture Notes in Computer Science 4976, Springer 2008, ISBN 978-3-540-78848-5 [contents] - [e14]Elisa Bertino, Kenji Takahashi:
Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008. ACM 2008, ISBN 978-1-60558-294-8 [contents] - [e13]Elisa Bertino, Maria Luisa Damiani:
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2008, November 4, 2008, Irvine, California, USA, Proceedings. ACM 2008 [contents] - 2007
- [j159]Rafae Bhatti, Elisa Bertino, Arif Ghafoor:
An integrated approach to federated identity and privilege management in open systems. Commun. ACM 50(2): 81-87 (2007) - [j158]Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu:
A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7): 109-116 (2007) - [j157]Jianming Yong, Elisa Bertino:
Replacing Lost or Stolen E-Passports. Computer 40(10): 89-91 (2007) - [j156]Manolis Terrovitis, Panos Vassiliadis, Spiros Skiadopoulos, Elisa Bertino, Barbara Catania, Anna Maddalena, Stefano Rizzi:
Modeling and language support for the management of pattern-bases. Data Knowl. Eng. 62(2): 368-397 (2007) - [j155]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino:
Trust Negotiation in Identity Management. IEEE Secur. Priv. 5(2): 55-63 (2007) - [j154]Ninghui Li, Ji-Won Byun, Elisa Bertino:
A Critique of the ANSI Standard on Role-Based Access Control. IEEE Secur. Priv. 5(6): 41-49 (2007) - [j153]Maria Luisa Damiani, Elisa Bertino, Paolo Perlasca:
Data security in location-aware applications: an approach based on RBAC. Int. J. Inf. Comput. Secur. 1(1/2): 5-38 (2007) - [j152]Elisa Bertino, Elena Ferrari, Federica Paci, Loredana Parasiliti Provenza:
A system for securing push-based distribution of XML documents. Int. J. Inf. Sec. 6(4): 255-284 (2007) - [j151]Xukai Zou, Yogesh Karandikar, Elisa Bertino:
A dynamic key management solution to access hierarchy. Int. J. Netw. Manag. 17(6): 437-450 (2007) - [j150]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Shimon K. Modi, Matthew Young, Elisa Bertino, Stephen J. Elliott:
Privacy preserving multi-factor authentication with biometrics. J. Comput. Secur. 15(5): 529-560 (2007) - [j149]Xiaoxin Wu, Elisa Bertino:
An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks. IEEE Trans. Dependable Secur. Comput. 4(4): 252-265 (2007) - [j148]Maria Luisa Damiani, Elisa Bertino, Barbara Catania, Paolo Perlasca:
GEO-RBAC: A spatially aware RBAC. ACM Trans. Inf. Syst. Secur. 10(1): 2 (2007) - [j147]Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Federica Paci, Bhavani Thuraisingham:
PP-trust-X: A system for privacy preserving trust negotiations. ACM Trans. Inf. Syst. Secur. 10(3): 12 (2007) - [c267]Mohamed Nabeel, Elisa Bertino:
A structure preserving approach for securing XML documents. CollaborateCom 2007: 8-15 - [c266]Ji-Won Byun, Ashish Kamra, Elisa Bertino, Ninghui Li:
Efficient k -Anonymization Using Clustering Techniques. DASFAA 2007: 188-200 - [c265]Dan Lin, Hicham G. Elmongui, Elisa Bertino, Beng Chin Ooi:
Data Management in RFID Applications. DEXA 2007: 434-444 - [c264]Richard Shay, Abhilasha Bhargav-Spantzel, Elisa Bertino:
Password policy simulation and analysis. Digital Identity Management 2007: 1-10 - [c263]Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bertino:
Receipt management- transaction history based trust establishment. Digital Identity Management 2007: 82-91 - [c262]Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo:
Conditional Privacy-Aware Role Based Access Control. ESORICS 2007: 72-89 - [c261]Elisa Bertino, Lorenzo D. Martino:
A Service-Oriented Approach to Security-Concepts and Issues. FTDCS 2007: 31-40 - [c260]Anna Cinzia Squicciarini, Elisa Bertino, Sebastien Goasguen:
Access Control Strategies for Virtualized Environments in Grid Computing Systems. FTDCS 2007: 48-54 - [c259]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Matthew Young, Elisa Bertino:
Privacy Requirements in Identity Management Solutions. HCI (9) 2007: 694-702 - [c258]Anna Cinzia Squicciarini, Alberto Trombetta, Elisa Bertino:
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations. ICDCS 2007: 57 - [c257]Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Alexei B. Czeksis:
Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies. ICICS 2007: 386-397 - [c256]Jacques Thomas, Federica Paci, Elisa Bertino, Patrick Eugster:
User Tasks and Access Control overWeb Services. ICWS 2007: 60-69 - [c255]Rafae Bhatti, Daniel Sanz, Elisa Bertino, Arif Ghafoor:
A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy. ICWS 2007: 447-454 - [c254]Elisa Bertino, Ashish Kamra, James P. Early:
Profiling Database Application to Detect SQL Injection Attacks. IPCCC 2007: 449-458 - [c253]Elisa Bertino, Lorenzo Martino:
A Service-oriented Approach to Security - Concepts and Issues. ISADS 2007: 7-16 - [c252]Ebru Celikel, Murat Kantarcioglu, Bhavani Thuraisingham, Elisa Bertino:
Managing Risks in RBAC Employed Distributed Environments. OTM Conferences (2) 2007: 1548-1566 - [c251]Prathima Rao, Dan Lin, Elisa Bertino:
XACML Function Annotations. POLICY 2007: 178-182 - [c250]Danfeng Yao, Yunhua Koglin, Elisa Bertino, Roberto Tamassia:
Decentralized authorization and data security in web content delivery. SAC 2007: 1654-1661 - [c249]Dan Lin, Prathima Rao, Elisa Bertino, Jorge Lobo:
An approach to evaluate policy similarity. SACMAT 2007: 1-10 - [c248]Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo:
Privacy-aware role based access control. SACMAT 2007: 41-50 - [c247]Anna Cinzia Squicciarini, Ayça Azgin Hintoglu, Elisa Bertino, Yücel Saygin:
A privacy preserving assertion based policy language for federation systems. SACMAT 2007: 51-60 - [c246]Monica Scannapieco, Ilya Figotin, Elisa Bertino, Ahmed K. Elmagarmid:
Privacy preserving schema and data matching. SIGMOD Conference 2007: 653-664 - [c245]Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun:
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566 - [c244]William H. Winsborough, Anna Cinzia Squicciarini, Elisa Bertino:
Information carrying identity proof trees. WPES 2007: 76-79 - [p8]Elisa Bertino, Ji-Won Byun, Ashish Kamra:
Database Security. Security, Privacy, and Trust in Modern Data Management 2007: 87-101 - [p7]Maria Luisa Damiani, Elisa Bertino:
Access Control Systems for Geospatial Data and Applications. Spatial Data on the Web 2007: 189-214 - [p6]Abbie Barbir, Chris Hobbs, Elisa Bertino, Frederick Hirsch, Lorenzo Martino:
Challenges of Testing Web Services and Security in SOA Implementations. Test and Analysis of Web Services 2007: 395-440 - 2006
- [j146]Frédéric Cuppens, Hervé Debar, Elisa Bertino:
Foreword. Ann. des Télécommunications 61(3-4): 242-244 (2006) - [j145]Maria Luisa Damiani, Gianluca Groppelli, Gianluca Norini, Elisa Bertino, A. Gigliuto, Andrea Nucita:
A lava flow simulation model for the development of volcanic hazard maps for Mount Etna (Italy). Comput. Geosci. 32(4): 512-526 (2006) - [j144]Elena Camossi, Michela Bertolotto, Elisa Bertino:
A multigranular object-oriented framework supporting spatio-temporal granularity conversions. Int. J. Geogr. Inf. Sci. 20(5): 511-534 (2006) - [j143]Elisa Bertino, Stefano Franzoni, Pietro Mazzoleni, Piero Mussio, Stefano Valtolina:
Integration of virtual reality and database systems for cultural heritage dissemination. Int. J. Comput. Sci. Eng. 2(5/6): 307-316 (2006) - [j142]Mohamed Shehab, Elisa Bertino, Arif Ghafoor:
Workflow authorisation in mediator-free environments. Int. J. Secur. Networks 1(1/2): 2-12 (2006) - [j141]Anna Cinzia Squicciarini, Federica Paci, Elisa Bertino:
A secure framework for publishing virtual community contracts. Int. J. Web Based Communities 2(2): 237-255 (2006) - [j140]Elisa Bertino, Steve Ruth:
Policies and IT Technologies: A Puzzle of Two Pieces. IEEE Internet Comput. 10(1): 65-67 (2006) - [j139]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino:
Establishing and protecting digital identity in federation systems. J. Comput. Secur. 14(3): 269-300 (2006) - [j138]Elisa Bertino, Anna Cinzia Squicciarini, Lorenzo Martino, Federica Paci:
An Adaptive Access Control Model for Web Services. Int. J. Web Serv. Res. 3(3): 27-60 (2006) - [j137]Ji-Won Byun, Elisa Bertino:
Micro-views, or on how to protect privacy while enhancing data usability: concepts and challenges. SIGMOD Rec. 35(1): 9-13 (2006) - [j136]Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Indrakshi Ray:
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. IEEE Trans. Dependable Secur. Comput. 3(1): 13-30 (2006) - [j135]Giovanni Mella, Elena Ferrari, Elisa Bertino, Yunhua Koglin:
Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems. ACM Trans. Inf. Syst. Secur. 9(4): 421-460 (2006) - [j134]Rafae Bhatti, Elisa Bertino, Arif Ghafoor:
X-FEDERATE: A Policy Engineering Framework for Federated Access Management. IEEE Trans. Software Eng. 32(5): 330-346 (2006) - [j133]Elisa Bertino, Latifur R. Khan, Ravi S. Sandhu, Bhavani Thuraisingham:
Secure knowledge management: confidentiality, trust, and privacy. IEEE Trans. Syst. Man Cybern. Part A 36(3): 429-438 (2006) - [j132]Elisa Bertino, Anna Cinzia Squicciarini, Ivan Paloscia, Lorenzo Martino:
Ws-AC: A Fine Grained Access Control System for Web Services. World Wide Web 9(2): 143-171 (2006) - [c243]Elisa Bertino, Lorenzo Martino:
Security in SOA and Web Services. IEEE SCC 2006 - [c242]Stefano Valtolina, Pietro Mazzoleni, Stefano Franzoni, Elisa Bertino:
A semantic approach to build personalized interfaces in the cultural heritage domain. AVI 2006: 306-309 - [c241]Elisa Bertino, Anna Cinzia Squicciarini:
A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities. CSCWD 2006: 14 - [c240]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino:
Privacy preserving multi-factor authentication with biometrics. Digital Identity Management 2006: 63-72 - [c239]Ashish Kundu, Elisa Bertino:
Secure Dissemination of XML Content Using Structure-based Routing. EDOC 2006: 153-164 - [c238]Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, Indrakshi Ray:
Trust Negotiations with Customizable Anonymity. IAT Workshops 2006: 69-72 - [c237]Alberto Trombetta, Elisa Bertino:
Private Updates to Anonymous Databases. ICDE 2006: 116 - [c236]Basit Shafiq, Arjmand Samuel, Elisa Bertino, Arif Ghafoor:
Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints. ICDE 2006: 119 - [c235]Elisa Bertino, Jason Crampton, Federica Paci:
Access Control and Authorization Constraints for WS-BPEL. ICWS 2006: 275-284 - [c234]Maria Luisa Damiani, Elisa Bertino:
Access Control and Privacy in Location-Aware Services forMobile Organizations. MDM 2006: 11 - [c233]Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino:
Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information. MSN 2006: 461-472 - [c232]Jianming Yong, Elisa Bertino, Mark Toleman, Dave Roberts:
Extended RBAC with Role Attributes. PACIS 2006: 8 - [c231]Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis, Elisa Bertino:
Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management. Privacy Enhancing Technologies 2006: 78-98 - [c230]Reynold Cheng, Yu Zhang, Elisa Bertino, Sunil Prabhakar:
Preserving User Location Privacy in Mobile Data Management Infrastructures. Privacy Enhancing Technologies 2006: 393-412 - [c229]Elisa Bertino, Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini:
Policy Languages for Digital Identity Management in Federation Systems. POLICY 2006: 54-66 - [c228]Guy Lebanon, Monica Scannapieco, Mohamed R. Fouad, Elisa Bertino:
Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk. Privacy in Statistical Databases 2006: 217-232 - [c227]Elisa Bertino:
Digital identity management and protection. PST 2006: 1 - [c226]Maria Luisa Damiani, Elisa Bertino:
Architectural issues for a location-aware role-based access control system. SAC 2006: 1184-1185 - [c225]Bhavani Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan, Latifur Khan:
Access control, confidentiality and privacy for video surveillance databases. SACMAT 2006: 1-10 - [c224]James B. D. Joshi, Elisa Bertino:
Fine-grained role-based delegation in presence of the hybrid role hierarchy. SACMAT 2006: 81-90 - [c223]Ji-Won Byun, Yonglak Sohn, Elisa Bertino:
Systematic control and management of data integrity. SACMAT 2006: 101-110 - [c222]Pietro Mazzoleni, Elisa Bertino, Bruno Crispo:
XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! SACMAT 2006: 219-227 - [c221]Ji-Won Byun, Yonglak Sohn, Elisa Bertino, Ninghui Li:
Secure Anonymization for Incremental Datasets. Secure Data Management 2006: 48-63 - [c220]Pietro Mazzoleni, Stefano Valtolina, Stefano Franzoni, Piero Mussio, Elisa Bertino:
Towards a contextualized access to the cultural heritage world using 360 Panoramic Images. SEKE 2006: 416-419 - [c219]Massimo Mecella, Mourad Ouzzani, Federica Paci, Elisa Bertino:
Access control enforcement for conversation-based web services. WWW 2006: 257-266 - 2005
- [j131]Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza:
A Framework for Evaluating Privacy Preserving Data Mining Algorithms. Data Min. Knowl. Discov. 11(2): 121-154 (2005) - [j130]Rafae Bhatti, Elisa Bertino, Arif Ghafoor:
A Trust-Based Context-Aware Access Control Model for Web-Services. Distributed Parallel Databases 18(1): 83-105 (2005) - [j129]Elisa Bertino, Elena Ferrari, Giovanni Mella:
An approach to cooperative updates of XML documents in distributed systems. J. Comput. Secur. 13(2): 191-242 (2005) - [j128]Elisa Bertino, Mohand-Said Hacid, Farouk Toumani:
Towards structure discovering in video data. J. Exp. Theor. Artif. Intell. 17(1-2): 5-18 (2005) - [j127]Mourad Ouzzani, Walid G. Aref, Elisa Bertino, Ann Christine Catlin, Christopher W. Clifton, Wing-Kai Hon, Ahmed K. Elmagarmid, Arif Ghafoor, Susanne E. Hambrusch, Sunil Prabhakar, Jeffrey Scott Vitter, Xiang Zhang:
The Indiana Center for Database Systems at Purdue University. SIGMOD Rec. 34(2): 53-58 (2005) - [j126]Philip A. Bernstein, Elisa Bertino, Andreas Heuer, Christian S. Jensen, Holger Meyer, M. Tamer Özsu, Richard T. Snodgrass, Kyu-Young Whang:
An apples-to-apples comparison of two database journals. SIGMOD Rec. 34(4): 61-64 (2005) - [j125]Elisa Bertino, Ravi S. Sandhu:
Database Security-Concepts, Approaches, and Challenges. IEEE Trans. Dependable Secur. Comput. 2(1): 2-19 (2005) - [j124]James Joshi, Elisa Bertino, Arif Ghafoor:
An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model. IEEE Trans. Dependable Secur. Comput. 2(2): 157-175 (2005) - [j123]Rafae Bhatti, Arif Ghafoor, Elisa Bertino, James Joshi:
X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control. ACM Trans. Inf. Syst. Secur. 8(2): 187-227 (2005) - [j122]Rafae Bhatti, Basit Shafiq, Elisa Bertino, Arif Ghafoor, James Joshi:
X-gtrbac admin: A decentralized administration model for enterprise-wide access control. ACM Trans. Inf. Syst. Secur. 8(4): 388-423 (2005) - [j121]James Joshi, Elisa Bertino, Usman Latif, Arif Ghafoor:
A Generalized Temporal Role-Based Access Control Model. IEEE Trans. Knowl. Data Eng. 17(1): 4-23 (2005) - [j120]Basit Shafiq, James Joshi, Elisa Bertino, Arif Ghafoor:
Secure Interoperation in a Multidomain Environment Employing RBAC Policies. IEEE Trans. Knowl. Data Eng. 17(11): 1557-1577 (2005) - [c218]Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino:
Efficient Integration of Fine-grained Access Control in Large-scale Grid Services. IEEE SCC 2005: 77-86 - [c217]Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athena Vakali:
Intrusion Detection in RBAC-administered Databases. ACSAC 2005: 170-182 - [c216]Elisa Bertino, Dolores Cuadra, Paloma Martínez:
An Object-Relational Approach to the Representation of Multi-granular Spatio-Temporal Data. CAiSE 2005: 119-134 - [c215]Mohamed Shehab, Elisa Bertino, Arif Ghafoor:
Secure collaboration in mediator-free environments. CCS 2005: 58-67 - [c214]Barbara Carminati, Elena Ferrari, Elisa Bertino:
Securing XML data in third-party distribution systems. CIKM 2005: 99-106 - [c213]Jianping Fan, Hangzai Luo, Mohand-Said Hacid, Elisa Bertino:
A novel approach for privacy-preserving video sharing. CIKM 2005: 609-616 - [c212]Elisa Bertino:
Purpose Based Access Control for Privacy Protection in Database Systems. DASFAA 2005: 2 - [c211]Elisa Bertino, Igor Nai Fovino:
Information Driven Evaluation of Data Hiding Algorithms. DaWaK 2005: 418-427 - [c210]Elisa Bertino, Elena Ferrari, Andrea Perego, Gian Piero Zarri:
A Multi-Strategy Approach to Rating and Filtering Online Resources. DEXA Workshops 2005: 519-523 - [c209]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino:
Establishing and protecting digital identity in federation systems. Digital Identity Management 2005: 11-19 - [c208]Basit Shafiq, Elisa Bertino, Arif Ghafoor:
Access control management in a distributed environment supporting dynamic collaboration. Digital Identity Management 2005: 104-112 - [c207]Elisa Bertino, Stefano Franzoni, Pietro Mazzoleni, Stefano Valtolina:
Integration of Virtual Reality and Database System Techniques. DNIS 2005: 92-103 - [c206]Elisa Bertino, Ji-Won Byun, Ninghui Li:
Privacy-Preserving Database Systems. FOSAD 2005: 178-206 - [c205]Yunhua Koglin, Giovanni Mella, Elisa Bertino, Elena Ferrari:
An Update Protocol for XML Documents in Distributed and Cooperative Systems. ICDCS 2005: 314-323 - [c204]Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, Robert H. Deng:
Privacy and Ownership Preserving of Outsourced Medical Data. ICDE 2005: 521-532 - [c203]Barbara Carminati, Elena Ferrari, Elisa Bertino:
Assuring Security Properties in Third-party Architectures. ICDE 2005: 547-548 - [c202]Elisa Bertino, Elena Ferrari, Andrea Perego, Diego Santi:
A Constraint-Based Approach for the Authoring of Multi-Topic Multimedia Presentations. ICME 2005: 578-581 - [c201]Bruno Crispo, Swaminathan Sivasubramanian, Pietro Mazzoleni, Elisa Bertino:
P-Hera: Scalable fine-grained access control for P2P infrastructures. ICPADS (1) 2005: 585-591 - [c200]Elisa Bertino, Elena Ferrari, Andrea Perego, Gian Piero Zarri:
An Integrated Approach to Rating and Filtering Web Content. IEA/AIE 2005: 749-751 - [c199]Elisa Bertino, Maria Luisa Damiani:
Spatial Knowledge-Based Applications and Technologies: Research Issues. KES (4) 2005: 324-328 - [c198]Stefano Valtolina, Stefano Franzoni, Pietro Mazzoleni, Elisa Bertino:
Dissemination of Cultural Heritage Content through Virtual Reality and Multimedia Techniques: A Case Study. MMM 2005: 214-221 - [c197]Indrakshi Ray, Elisa Bertino, Anna Cinzia Squicciarini, Elena Ferrari:
Anonymity Preserving Techniques in Trust Negotiations. Privacy Enhancing Technologies 2005: 93-109 - [c196]Elisa Bertino, Alessandra Mileo, Alessandro Provetti:
PDL with Preferences. POLICY 2005: 213-222 - [c195]Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Paolo Perlasca:
GEO-RBAC: a spatially aware RBAC. SACMAT 2005: 29-37 - [c194]Ji-Won Byun, Elisa Bertino, Ninghui Li:
Purpose based access control of complex data for privacy protection. SACMAT 2005: 102-110 - [c193]Mohamed Shehab, Elisa Bertino, Arif Ghafoor:
SERAT: SEcure role mApping technique for decentralized secure interoperability. SACMAT 2005: 159-167 - [c192]Mohamed Shehab, Elisa Bertino, Arif Ghafoor:
Efficient hierarchical key generation and key diffusion for sensor networks. SECON 2005: 76-84 - [c191]Elisa Bertino, Alessandro Provetti, Franco Salvetti:
Reasoning about RDF statements with default rules. Rule Languages for Interoperability 2005 - [e12]Claudia Bauzer Medeiros, Max J. Egenhofer, Elisa Bertino:
Advances in Spatial and Temporal Databases, 9th International Symposium, SSTD 2005, Angra dos Reis, Brazil, August 22-24, 2005, Proceedings. Lecture Notes in Computer Science 3633, Springer 2005, ISBN 3-540-28127-4 [contents] - [e11]Stefano Spaccapietra, Elisa Bertino, Sushil Jajodia, Roger King, Dennis McLeod, Maria E. Orlowska, Leon Strous:
Journal on Data Semantics II. Lecture Notes in Computer Science 3360, Springer 2005, ISBN 3-540-24208-2 [contents] - 2004
- [j119]Rafae Bhatti, Elisa Bertino, Arif Ghafoor, James Joshi:
XML-Based Specification for Web Services Document Security. Computer 37(4): 41-49 (2004) - [j118]Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini:
Trust negotiations: concepts, systems, and languages. Comput. Sci. Eng. 6(4): 27-34 (2004) - [j117]Elisa Bertino, Pietro Mazzoleni, Diego Santi:
Hsgs: An Interactive System For High-Level Specification And Generation Of Hypermedia Presentations. Int. J. Softw. Eng. Knowl. Eng. 14(6): 545-564 (2004) - [j116]Elisa Bertino, Krithi Ramamritham:
Guest Editors' Introduction: Data Dissemination on the Web. IEEE Internet Comput. 8(3): 27-28 (2004) - [j115]James Joshi, Rafae Bhatti, Elisa Bertino, Arif Ghafoor:
Access-Control Language for Multidomain Environments. IEEE Internet Comput. 8(6): 40-50 (2004) - [j114]Elisa Bertino, Giovanna Guerrini, Marco Mesiti:
A matching algorithm for measuring the structural similarity between an XML document and a DTD and its applications. Inf. Syst. 29(1): 23-46 (2004) - [j113]Elisa Bertino, Barbara Carminati, Elena Ferrari:
Access control for XML documents and data. Inf. Secur. Tech. Rep. 9(3): 19-34 (2004) - [j112]Elisa Bertino, Barbara Carminati, Elena Ferrari:
Merkle Tree Authentication in UDDI Registries. Int. J. Web Serv. Res. 1(2): 37-57 (2004) - [j111]Elena Camossi, Elisa Bertino, Marco Mesiti, Giovanna Guerrini:
Handling Expiration of Multigranular Temporal Objects. J. Log. Comput. 14(1): 23-50 (2004) - [j110]Elisa Bertino, Ahmed K. Elmagarmid, Mohand-Said Hacid:
A Logical Approach to Quality of Service Specification in Video Databases. Multim. Tools Appl. 23(2): 75-101 (2004) - [j109]Vassilios S. Verykios, Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza, Yücel Saygin, Yannis Theodoridis:
State-of-the-art in privacy preserving data mining. SIGMOD Rec. 33(1): 50-57 (2004) - [j108]Pietro Mazzoleni, Elisa Bertino, Elena Ferrari, Stefano Valtolina:
CiVeDi: A Customized Virtual Environment for Database Interaction. SIGMOD Rec. 33(3): 15-20 (2004) - [j107]Elisa Bertino, Giovanna Guerrini, Isabella Merlo:
Extending the ODMG Object Model with Triggers. IEEE Trans. Knowl. Data Eng. 16(2): 170-188 (2004) - [j106]Vassilios S. Verykios, Ahmed K. Elmagarmid, Elisa Bertino, Yücel Saygin, Elena Dasseni:
Association Rule Hiding. IEEE Trans. Knowl. Data Eng. 16(4): 434-447 (2004) - [j105]Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini:
Trust-X: A Peer-to-Peer Framework for Trust Establishment. IEEE Trans. Knowl. Data Eng. 16(7): 827-842 (2004) - [j104]Elisa Bertino, Barbara Carminati, Elena Ferrari, Bhavani Thuraisingham, Amar Gupta:
Selective and Authentic Third-Party Distribution of XML Documents. IEEE Trans. Knowl. Data Eng. 16(10): 1263-1278 (2004) - [j103]Elisa Bertino, Tok Wang Ling, Umeshwar Dayal:
Guest Editors' Introduction. World Wide Web 7(1): 5-6 (2004) - [c190]Elisa Bertino, Anna Cinzia Squicciarini, D. Mevi:
A Fine-Grained Access Control Model for Web Services. IEEE SCC 2004: 33-40 - [c189]Elisa Bertino:
Purpose based access control for privacy protection. BDA 2004: 243 - [c188]Elisa Bertino, Danilo Bruschi, Stefano Franzoni, Igor Nai Fovino, Stefano Valtolina:
Threat Modelling for SQL Servers - Designing a Secure Database in a Web Application. Communications and Multimedia Security 2004: 159-171 - [c187]Elisa Bertino, Bruno Crispo, Pietro Mazzoleni:
Supporting Multi-Dimensional Trustworthiness for Grid Workflows. DELOS 2004: 195-204 - [c186]Elisa Bertino, Giovanna Guerrini, Marco Mesiti:
DiXeminator: A Profile-Based Selective Dissemination System for XML Documents. EDBT Workshops 2004: 578-587 - [c185]Elisa Bertino, Anna Cinzia Squicciarini:
A Flexible Access Control Model for Web Services. FQAS 2004: 13-16 - [c184]Elisa Bertino, Elena Camossi, Giovanna Guerrini:
Access to Multigranular Temporal Objects. FQAS 2004: 320-333 - [c183]Elisa Bertino, Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elena Ferrari:
Towards Supporting Fine-Grained Access Control for Grid Resources. FTDCS 2004: 59-65 - [c182]Alberto Belussi, Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Andrea Nucita:
An authorization model for geographical maps. GIS 2004: 82-91 - [c181]Alberto Belussi, Elisa Bertino, Andrea Nucita:
Grid based methods for estimating spatial join selectivity. GIS 2004: 92-100 - [c180]Elisa Bertino, Barbara Catania, Wen Qiang Wang:
XJoin Index: Indexing XML Data for Efficient Handling of Branching Path Expressions. ICDE 2004: 828 - [c179]Rafae Bhatti, Elisa Bertino, Arif Ghafoor:
A Trust-based Context-Aware Access Control Model for Web-Services. ICWS 2004: 184-191 - [c178]Elisa Bertino, Marco Mesiti, Munir Cochinwala:
A Trigger-Based Approach for Communication Personalization. IDEAS 2004: 3-13 - [c177]Elisa Bertino, Elena Ferrari, Giovanni Mella:
Flow policies: specification and enforcement. IPCCC 2004: 681-684 - [c176]Elisa Bertino, Teodoro Leggieri, Evimaria Terzi:
Securing DBMS: Characterizing and Detecting Query Floods. ISC 2004: 195-206 - [c175]Elisa Bertino, Elena Ferrari, Giovanni Mella:
An XML-Based Approach to Document Flow Verification. ISC 2004: 207-218 - [c174]Elisa Bertino, Barbara Catania, Anna Maddalena:
Towards a Language for Pattern Manipulation and Querying. PaRMa 2004 - [c173]Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini:
Privacy-Preserving Trust Negotiations. Privacy Enhancing Technologies 2004: 283-301 - [c172]Barbara Catania, Anna Maddalena, Maurizio Mazza, Elisa Bertino, Stefano Rizzi:
A Framework for Data Mining Pattern Management. PKDD 2004: 87-98 - [c171]Babak Sadighi Firozabadi, Marek J. Sergot, Anna Cinzia Squicciarini, Elisa Bertino:
A Framework for Contractual Resource Sharing in Coalitions. POLICY 2004: 117-126 - [c170]Elisa Bertino, Maria Luisa Damiani, Davide Momini:
An Access Control System for a Web Map Management Service. RIDE 2004: 33-39 - [c169]Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor:
X-GTRBAC admin: a decentralized administration model for enterprise wide access control. SACMAT 2004: 78-86 - [c168]Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu:
Security for grid-based computing systems issues and challenges. SACMAT 2004: 125 - [c167]Elisa Bertino, Giovanna Guerrini, Marco Mesiti:
Exploiting User-Profiles for the Selective Dissemination of XML Documents. SEBD 2004: 334-341 - [c166]Manolis Terrovitis, Panos Vassiliadis, Spiros Skiadopoulos, Elisa Bertino, Barbara Catania, Anna Maddalena:
Modeling and Language Support for the Management of Pattern-Bases. SSDBM 2004: 265-274 - [c165]Rafae Bhatti, Elisa Bertino, Arif Ghafoor:
A Policy Framework for Access Management in Federated Information Sharing. IICIS 2004: 95-120 - [e10]Elisa Bertino, Stavros Christodoulakis, Dimitris Plexousakis, Vassilis Christophides, Manolis Koubarakis, Klemens Böhm, Elena Ferrari:
Advances in Database Technology - EDBT 2004, 9th International Conference on Extending Database Technology, Heraklion, Crete, Greece, March 14-18, 2004, Proceedings. Lecture Notes in Computer Science 2992, Springer 2004, ISBN 3-540-21200-0 [contents] - [r1]Elisa Bertino, Elena Ferrari:
Information Security. The Practical Handbook of Internet Computing 2004 - [i7]Elisa Bertino, Barbara Catania, Roberta Gori:
Enhancing the expressive power of the U-Datalog language. CoRR cs.DB/0404003 (2004) - 2003
- [j102]Elisa Bertino:
Trustworthy objects. Obj. Logiciel Base données Réseaux 9(1-2): 11 (2003) - [j101]Elisa Bertino:
RBAC models - concepts and trends. Comput. Secur. 22(6): 511-514 (2003) - [j100]Elisa Bertino, Giovanna Guerrini, Isabella Merlo:
A set-oriented method definition language for object databases and its semantics. Concurr. Comput. Pract. Exp. 15(14): 1275-1335 (2003) - [j99]Athena Vakali, Evimaria Terzi, Elisa Bertino, Ahmed K. Elmagarmid:
Hierarchical data placement for navigational multimedia applications. Data Knowl. Eng. 44(1): 49-80 (2003) - [j98]Elisa Bertino, Tiziana Catarci, Ahmed K. Elmagarmid, Mohand-Said Hacid:
Quality of Service Specification in Video Databases. IEEE Multim. 10(4): 71-81 (2003) - [j97]Elisa Bertino, Elena Ferrari, Andrea Perego:
Content-based filtering of Web documents: the MaX system and the EUFORBIA project. Int. J. Inf. Sec. 2(1): 45-58 (2003) - [j96]Danilo Montesi, Elisa Bertino, Maria Bagnato:
Refined rules termination analysis through transactions. Inf. Syst. 28(5): 435-456 (2003) - [j95]Elisa Bertino, Elena Ferrari, Giovanna Guerrini, Isabella Merlo:
T-ODMG: an ODMG compliant temporal object model supporting multiple granularity management. Inf. Syst. 28(8): 885-927 (2003) - [j94]Elisa Bertino, Ahmed K. Elmagarmid, Mohand-Said Hacid:
Ordering and Path Constraints over Semistructured Data. J. Intell. Inf. Syst. 20(2): 181-206 (2003) - [j93]Elisa Bertino, Ahmed K. Elmagarmid, Mohand-Said Hacid:
A Database Approach to Quality of Service Specification in Video Databases. SIGMOD Rec. 32(1): 35-40 (2003) - [j92]Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca:
A logical framework for reasoning about access control models. ACM Trans. Inf. Syst. Secur. 6(1): 71-127 (2003) - [j91]Barbara Catania, Elisa Bertino:
Static Analysis of Logical Languages with Deferred Update Semantics. IEEE Trans. Knowl. Data Eng. 15(2): 386-404 (2003) - [j90]Elisa Bertino, Jianping Fan, Elena Ferrari, Mohand-Said Hacid, Ahmed K. Elmagarmid, Xingquan Zhu:
A hierarchical access control model for video database systems. ACM Trans. Inf. Syst. 21(2): 155-191 (2003) - [j89]Elisa Bertino, Barbara Catania, Paolo Perlasca:
Introducing Dynamic Behavior in Amalgamated Knowledge Bases. Theory Pract. Log. Program. 3(6): 625-669 (2003) - [c164]Elisa Bertino, Alessandra Mileo, Alessandro Provetti:
User Preferences VS Minimality in PPDL. APPIA-GULP-PRODE 2003: 110-122 - [c163]Elisa Bertino, Alessandro Provetti, Franco Salvetti:
Local Closed-World Assumptions for reasoning about Semantic Web data. APPIA-GULP-PRODE 2003: 314-323 - [c162]Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini:
Trust-Chi: An XML Framework for Trust Negotiations. Communications and Multimedia Security 2003: 146-157 - [c161]Elisa Bertino, Dennis McLeod:
PC Co-chairs' Message. OTM 2003: 2-3 - [c160]Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini:
A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities. DBSec 2003: 176-189 - [c159]Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari, Pietro Mazzoleni:
Supporting Delegation in Secure Workflow Management Systems. DBSec 2003: 190-202 - [c158]Elisa Bertino, Barbara Carminati, Elena Ferrari, Giovanni Mella:
Author-Chi - A System for Secure Dissemination and Update of XML Documents. DNIS 2003: 66-85 - [c157]Stefano Rizzi, Elisa Bertino, Barbara Catania, Matteo Golfarelli, Maria Halkidi, Manolis Terrovitis, Panos Vassiliadis, Michalis Vazirgiannis, Euripides Vrachnos:
Towards a Logical Model for Patterns. ER 2003: 77-90 - [c156]Elisa Bertino, Elena Ferrari, Loredana Parasiliti Provenza:
Signature and Access Control Policies for XML Documents. ESORICS 2003: 1-22 - [c155]Alberto Belussi, Barbara Catania, Elisa Bertino:
A reference framework for integrating multiple representations of geographical maps. GIS 2003: 33-40 - [c154]Elena Camossi, Michela Bertolotto, Elisa Bertino, Giovanna Guerrini:
A multigranular spatiotemporal data model. GIS 2003: 94-101 - [c153]Elisa Bertino, Barbara Carminati, Elena Ferrari:
A Flexible Authentication Method for UDDI Registries. ICWS 2003: 218-226 - [c152]Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor:
Access Control in Dynamic XML-Based Web-Services with X-RBAC. ICWS 2003: 243-249 - [c151]Marco Mesiti, Elisa Bertino, Giovanna Guerrini:
An abstraction-based approach to measuring the structural similarity between two unordered XML documents. ISICT 2003: 316-321 - [c150]Elisa Bertino, Alessandra Mileo, Alessandro Provetti:
PDL with Maximum Consistency Monitors. ISMIS 2003: 65-74 - [c149]Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini:
X-TNL: An XML-based Language for Trust Negotiations. POLICY 2003: 81-84 - [c148]James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Bertino:
Dependencies and separation of duty constraints in GTRBAC. SACMAT 2003: 51-64 - [c147]Elisa Bertino, Giovanni Mella, Gianluca Correndo, Elena Ferrari:
An infrastructure for managing secure update operations on XML data. SACMAT 2003: 110-122 - [c146]Alberto Belussi, Elisa Bertino, Andrea Nucita:
Grid Based Methods for the Spatial Join Estimation. SEBD 2003: 49-60 - [c145]Elisa Bertino, Stefano Franzoni, Marco Mesiti:
Memorizzazione di regole per l'instradamento di messaggi in un sistema di comunicazione universale. SEBD 2003: 245-256 - [c144]Ilaria Bartolini, Elisa Bertino, Barbara Catania, Paolo Ciaccia, Matteo Golfarelli, Marco Patella, Stefano Rizzi:
PAtterns for Next-generation DAtabase systems: preliminary results of the PANDA project. SEBD 2003: 293-300 - [c143]Pietro Mazzoleni, Elisa Bertino, Stefano Valtolina, Elena Ferrari, Chiara Boeri:
ViRdB: integrating virtual reality and multimedia databases for customized visualization of cultural heritage. SIGGRAPH 2003 - [p5]Elisa Bertino, Mohand-Saïd Hacid, Farouk Toumani:
Retrieval of Semistructured Web Data. Intelligent Exploration of the Web 2003: 304-323 - 2002
- [j88]Alberto Belussi, Elisa Bertino, Barbara Catania:
Using spatial data access structures for filtering nearest neighbor queries. Data Knowl. Eng. 40(1): 1-31 (2002) - [j87]Elisa Bertino, Silvana Castano, Elena Ferrari, Marco Mesiti:
Protection and administration of XML data sources. Data Knowl. Eng. 43(3): 237-260 (2002) - [j86]Elisa Bertino, Alberto Trombetta, Danilo Montesi:
Workflow Architecture for Interactive Video Management Systems. Distributed Parallel Databases 11(1): 33-51 (2002) - [j85]Elisa Bertino, Athman Bouguettaya:
IEEE Internet Computing: Guest Editors' Introduction - Database Technology on the Web. IEEE Distributed Syst. Online 3(7) (2002) - [j84]Elisa Bertino, Athman Bouguettaya:
Guest Editors' Introduction: Database Technology on the Web. IEEE Internet Comput. 6(4): 31-32 (2002) - [j83]Elisa Bertino, Ahmed K. Elmagarmid, Mohand-Said Hacid:
A Knowledge-Based Approach to Visual Information. J. Intell. Inf. Syst. 19(3): 319-341 (2002) - [j82]Elisa Bertino, Elena Ferrari:
Secure and selective dissemination of XML documents. ACM Trans. Inf. Syst. Secur. 5(3): 290-331 (2002) - [j81]Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari:
A Content-Based Authorization Model for Digital Libraries. IEEE Trans. Knowl. Data Eng. 14(2): 296-315 (2002) - [j80]Elena Ferrari, Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Ugo Capuozzo:
An authorization system for digital libraries. VLDB J. 11(1): 58-67 (2002) - [c142]Elisa Bertino, Barbara Carminati, Elena Ferrari:
A temporal key management scheme for secure broadcasting of XML documents. CCS 2002: 31-40 - [c141]Elisa Bertino, Elena Ferrari, Andrea Perego:
Ma X : An Access Control System for Digital Libraries and the Web. COMPSAC 2002: 945-950 - [c140]James Joshi, Elisa Bertino, Arif Ghafoor:
Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model. COMPSAC 2002: 951-956 - [c139]Elisa Bertino, Elena Ferrari, Giovanni Mella:
Distributed Cooperative Updates of XML Documents. DBSec 2002: 147-159 - [c138]Elisa Bertino, Giovanna Guerrini, Marco Mesiti, Luigi Tosetto:
Evolving a Set of DTDs According to a Dynamic Set of XML Documents. EDBT Workshops 2002: 45-66 - [c137]Elisa Bertino, Elena Ferrari, Andrea Perego:
An Access Control System for Digital Libraries and the Web: The MaX Prototype Demonstration. ECDL 2002: 656-657 - [c136]Elisa Bertino, Danilo Montesi, Maria Bagnato, Peter A. Dearnley:
Rules Termination Analysis investigating the interaction between transactions and triggers. IDEAS 2002: 285-294 - [c135]Elisa Bertino, Giovanna Guerrini, Marco Mesiti:
Matching an XML Document against a Set of DTDs. ISMIS 2002: 412-422 - [c134]Elisa Bertino, Munir Cochinwala, Marco Mesiti:
UCS-Router: A Policy Engine for Enforcing Message Routing Rules in a Universal Communication System. Mobile Data Management 2002: 8-16 - [c133]Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca:
A System to Specify and Manage Multipolicy Access Control Models. POLICY 2002: 116-127 - [c132]James Joshi, Elisa Bertino, Arif Ghafoor:
Temporal hierarchies and inheritance semantics for GTRBAC. SACMAT 2002: 74-83 - [c131]Elisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi S. Sandhu:
Making access control more usable. SACMAT 2002: 141 - [c130]Elena Camossi, Elisa Bertino, Giovanna Guerrini, Marco Mesiti:
Evolution Specification of Multigranular Temporal Objects. TIME 2002: 78-85 - [e9]Christian S. Jensen, Keith G. Jeffery, Jaroslav Pokorný, Simonas Saltenis, Elisa Bertino, Klemens Böhm, Matthias Jarke:
Advances in Database Technology - EDBT 2002, 8th International Conference on Extending Database Technology, Prague, Czech Republic, March 25-27, Proceedings. Lecture Notes in Computer Science 2287, Springer 2002, ISBN 3-540-43324-4 [contents] - [e8]Ravi S. Sandhu, Elisa Bertino:
7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002. ACM 2002, ISBN 1-58113-496-7 [contents] - [e7]Tok Wang Ling, Umeshwar Dayal, Elisa Bertino, Wee Keong Ng, Angela Goh:
3rd International Conference on Web Information Systems Engineering, WISE 2002, Singapore, December 12-14, 2002, Proceedings. IEEE Computer Society 2002, ISBN 0-7695-1766-8 [contents] - [i6]Elisa Bertino, Barbara Catania, Paolo Perlasca:
Introducing Dynamic Behavior in Amalgamated Knowledge Bases. CoRR cs.PL/0207076 (2002) - 2001
- [b4]Elisa Bertino, Barbara Catania, Gian Piero Zarri:
Intelligent Database Systems. Addison-Wesley 2001, ISBN 0-201-87736-8 - [j79]Elisa Bertino, Barbara Catania, Gian Piero Zarri:
Metadata, Intelligent Indexing, and Repository Management for Multimedia Digital Libraries. Fundam. Informaticae 47(1-2): 155-173 (2001) - [j78]Elisa Bertino, Silvana Castano, Elena Ferrari:
Securing XML Documents with Author-X. IEEE Internet Comput. 5(3): 21-31 (2001) - [j77]Elisa Bertino, Barbara Catania:
Integrating XML and Databases. IEEE Internet Comput. 5(4): 84-88 (2001) - [j76]Elisa Bertino, Elena Ferrari:
XML and Data Integration. IEEE Internet Comput. 5(6): 75-76 (2001) - [j75]Carlo Bellettini, Elisa Bertino, Elena Ferrari:
Role Based Access Control Models. Inf. Secur. Tech. Rep. 6(2): 21-29 (2001) - [j74]Elisa Bertino, Barbara Carminati, Elena Ferrari:
XML security. Inf. Secur. Tech. Rep. 6(2): 44-58 (2001) - [j73]Elisa Bertino, Ahmed K. Elmagarmid, Mohand-Said Hacid:
Quality of Service in Multimedia Digital Libraries. SIGMOD Rec. 30(1): 35-40 (2001) - [j72]Elisa Bertino, Piero A. Bonatti, Elena Ferrari:
TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4(3): 191-233 (2001) - [j71]Elisa Bertino, Barbara Catania, Elena Ferrari:
A nested transaction model for multilevel secure database management systems. ACM Trans. Inf. Syst. Secur. 4(4): 321-370 (2001) - [j70]Elisa Bertino, Elena Ferrari, Marco Stolf:
Correction to 'MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations'. IEEE Trans. Knowl. Data Eng. 13(2): 334 (2001) - [j69]Elisa Bertino, Barbara Catania, Roberta Gori:
Enhancing the expressive power of the U-Datalog language. Theory Pract. Log. Program. 1(1): 105-122 (2001) - [c129]Elisa Bertino, Barbara Catania, Paolo Perlasca:
Introducing Cooperation and Actions in Amalgamated Knowledge Bases. DASFAA 2001: 108-115 - [c128]Elena Dasseni, Vassilios S. Verykios, Ahmed K. Elmagarmid, Elisa Bertino:
Hiding Association Rules by Using Confidence and Support. Information Hiding 2001: 369-383 - [c127]Elisa Bertino, Barbara Carminati, Elena Ferrari:
A Secure Publishing Service for Digital Libraries of XML Documents. ISC 2001: 347-362 - [c126]Elisa Bertino, Elena Ferrari, Evaggelia Pitoura:
An Access Control Mechanism for Large Scale Data Dissemination Systems. RIDE-DM 2001: 43-50 - [c125]Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca:
A logical framework for reasoning about access control models. SACMAT 2001: 41-52 - [c124]Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr:
Panel: The next generation of acess control models (panel session): do we need them and what should they be? SACMAT 2001: 53 - [c123]Elisa Bertino, Silvana Castano, Elena Ferrari:
On specifying security policies for web documents with an XML-based language. SACMAT 2001: 57-65 - [c122]Elisa Bertino, Silvana Castano, Elena Ferrari:
Securing XML Documents: the Author-X Project Demonstration. SIGMOD Conference 2001: 605 - [c121]Elisa Bertino, Elena Ferrari, Giovanna Guerrini, Isabella Merlo:
Navigating Through Multiple Temporal Granularity Objects. TIME 2001: 147-155 - [c120]Elisa Bertino, Tsz S. Cheng, Shashi K. Gadia, Giovanna Guerrini:
A Linguistic Framework for Querying Dimensional Data. TIME 2001: 156-163 - [c119]Bhavani Thuraisingham, Chris Clifton, Amar Gupta, Elisa Bertino, Elena Ferrari:
Directions for Web and E-Commerce Applications Security. WETICE 2001: 200-204 - 2000
- [j68]Elisa Bertino, Giovanna Guerrini, Isabella Merlo:
Triggers in Java-based Databases. Obj. Logiciel Base données Réseaux 6(3) (2000) - [j67]Elisa Bertino, Elena Pagani, Gian Paolo Rossi, Pierangela Samarati:
Protecting information on the Web. Commun. ACM 43(11es): 3 (2000) - [j66]Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino:
Flexible Transaction Dependencies in Database Systems. Distributed Parallel Databases 8(4): 399-446 (2000) - [j65]Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino:
A Semantic-Based Execution Model for Multilevel Secure Workflows. J. Comput. Secur. 8(1): 3-41 (2000) - [j64]Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo:
A Logic-Based Approach for Enforcing Access Control. J. Comput. Secur. 8(2/3) (2000) - [j63]Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino:
Temporal Authorization Bases: From Specification to Integration. J. Comput. Secur. 8(4): 309-353 (2000) - [j62]Elisa Bertino, Barbara Catania, Vincenzo Gervasi, Alessandra Raffaetà:
A Logical Approach to Cooperative Information Systems. J. Log. Program. 43(1): 15-48 (2000) - [j61]Elisa Bertino, Barbara Catania, A. Filippone:
An index allocation tool for object-oriented database systems. Softw. Pract. Exp. 30(9): 973-1002 (2000) - [j60]Elisa Bertino, Richard R. Muntz, Thomas C. Rakow:
Guest Editorial: Introduction to the Special Section. IEEE Trans. Knowl. Data Eng. 12(1): 58-59 (2000) - [j59]Elisa Bertino, Elena Ferrari, Marco Stolf:
MPGS: An Interactive Tool for the Specification and Generation of Multimedia Presentations. IEEE Trans. Knowl. Data Eng. 12(1): 102-125 (2000) - [j58]Elisa Bertino, Giovanna Guerrini, Isabella Merlo:
Trigger Inheritance and Overriding in an Active Object Database System. IEEE Trans. Knowl. Data Eng. 12(4): 588-608 (2000) - [j57]Indrajit Ray, Luigi V. Mancini, Sushil Jajodia, Elisa Bertino:
ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. IEEE Trans. Knowl. Data Eng. 12(6): 880-899 (2000) - [j56]Elisa Bertino, Silvana Castano, Elena Ferrari, Marco Mesiti:
Specifying and enforcing access control policies for XML document sources. World Wide Web 3(3): 139-151 (2000) - [c118]Elisa Bertino, Moustafa A. Hammad, Walid G. Aref, Ahmed K. Elmagarmid:
An Access Control Model for Video Database Systems. CIKM 2000: 336-343 - [c117]Elisa Bertino:
Protecting XML Documents: Position Paper. COMPSAC 2000: 132- - [c116]Elisa Bertino, M. Braun, Silvana Castano, Elena Ferrari, Marco Mesiti:
Author-X: A Java-Based System for XML Data Protection. DBSec 2000: 15-26 - [c115]Elisa Bertino, Giovanna Guerrini, Isabella Merlo:
Exception Handling in Object-Oriented Databases. Advances in Exception Handling Techniques 2000: 234-250 - [c114]Elisa Bertino, Danilo Montesi, Alberto Trombetta:
Fuzzy and Presentation Algebras for Web and Multimedia Data. IDEAS 2000: 134-144 - [c113]Barbara Armani, Elisa Bertino, Barbara Catania, D. Laradi, B. Marin, Gian Piero Zarri:
Repository Management in an Intelligent Indexing Approach for Multimedia Digital Libraries. ISMIS 2000: 68-76 - [c112]William J. Black, John McNaught, Gian Piero Zarri, Andreas Persidis, Andrew Brasher, Luca Gilardoni, Elisa Bertino, Giovanni Semeraro, Pietro Leo:
A Semi-automatic System for Conceptual Annotation, its Application to Resource Construction and Evaluation. LREC 2000 - [c111]Elisa Bertino, Piero A. Bonatti, Elena Ferrari:
TRBAC: a temporal role-based access control model. ACM Workshop on Role-Based Access Control 2000: 21-30 - [c110]Isabella Merlo, Elisa Bertino, Elena Ferrari, Shashi K. Gadia, Giovanna Guerrini:
Querying Multiple Temporal Granularity Data. TIME 2000: 103-114 - [e6]Elisa Bertino:
ECOOP 2000 - Object-Oriented Programming, 14th European Conference, Sophia Antipolis and Cannes, France, June 12-16, 2000, Proceedings. Lecture Notes in Computer Science 1850, Springer 2000, ISBN 3-540-67660-0 [contents] - [e5]Elisa Bertino, Susan Darling Urban:
Guest Editorial: Introduction to the Special Section. IEEE Trans. Knowl. Data Eng. 12(1): 1-2 (2000) - [i5]Elisa Bertino:
Review - Supporting Valid-Time Indeterminacy. ACM SIGMOD Digit. Rev. 2 (2000) - [i4]Elisa Bertino:
Review - Data Mining: An Overview from a Database Perspective. ACM SIGMOD Digit. Rev. 2 (2000) - [i3]Elisa Bertino:
Review - Role Hierarchies and Constraints for Lattice-Based Access Controls. ACM SIGMOD Digit. Rev. 2 (2000) - [i2]Elisa Bertino:
Review - Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels. ACM SIGMOD Digit. Rev. 2 (2000)
1990 – 1999
- 1999
- [j55]Yong-Moo Kwon, Elena Ferrari, Elisa Bertino:
Modeling Spatio-Temporal Constraints for Multimedia Objects. Data Knowl. Eng. 30(3): 217-238 (1999) - [j54]Elisa Bertino, Barbara Catania, Limsoon Wong:
Finitely Representable Nested Relations. Inf. Process. Lett. 70(4): 165-173 (1999) - [j53]Elisa Bertino, Elena Ferrari:
Secure Object Deletion and Garbage Collection in Multilevel Object Bases. J. Comput. Secur. 7(4) (1999) - [j52]Elisa Bertino, Susan Darling Urban, Elke A. Rundensteiner:
Object-Oriented Databases and Applications - Selected Papers from ICDE'98. Theory Pract. Object Syst. 5(3): 125 (1999) - [j51]Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri:
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Trans. Inf. Syst. Secur. 2(1): 65-104 (1999) - [j50]Elisa Bertino, Beng Chin Ooi:
The Indispensability of Dispensable Indexes. IEEE Trans. Knowl. Data Eng. 11(1): 17-27 (1999) - [j49]Elisa Bertino, Sushil Jajodia, Pierangela Samarati:
A Flexible Authorization Mechanism for Relational Data Management Systems. ACM Trans. Inf. Syst. 17(2): 101-140 (1999) - [c109]Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino:
Specifying and computing hierarchies of temporal authorizations. APPIA-GULP-PRODE 1999: 243-258 - [c108]Elisa Bertino:
Protecting Information in the Web - Position Paper. COMPSAC 1999: 50-51 - [c107]Elisa Bertino, Elena Ferrari, Francesco Buccafurri, Pasquale Rullo:
A Logical Framework for Reasoning on Data Access Control Policies. CSFW 1999: 175-189 - [c106]Elisa Bertino, Barbara Catania, Boris Chidlovskii:
Approximation Techniques for Indexing Two-Dimensional Constraint Databases. DASFAA 1999: 213-220 - [c105]Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino:
Specifying and Computing Hierarchies of Temporal Authorizations. DBSec 1999: 285-300 - [c104]Elisa Bertino, Elena Pagani, Gian Paolo Rossi:
An adaptive concurrency control protocol for mobile transactions. Mobile Networks and Computing 1999: 31-49 - [c103]Elisa Bertino, Giovanna Guerrini, Isabella Merlo, Marco Mesiti:
An Approach to Classify Semi-structured Objects. ECOOP 1999: 416-440 - [c102]Elisa Bertino, Giovanna Guerrini, Danilo Montesi:
Inheritance in a Deductive Object Database Language with Updates. FMLDO 1999: 42-64 - [c101]Elisa Bertino, Giovanna Guerrini, Danilo Montesi:
Inheritance in a Deductive Object Database Language with Updates. FMLDO - Selected Papers 1999: 67-90 - [c100]Elisa Bertino, Barbara Catania, Boris Chidlovskii:
Indexing Constraint Databases by Using a Dual Representation. ICDE 1999: 618-627 - [c99]Elisa Bertino, Bill Black, Andrew Brasher, Vito Candela, Barbara Catania, Diana Deavin, Luigi Di Pace, Floriana Esposito, Pietro Leo, John McNaught, Andreas Persidis, Fabio Rinaldi, Giovanni Semeraro, Gian Piero Zarri:
CONCERTO, Conceptual Indexing, Querying and Retrieval of Digital Documents. ICMCS, Vol. 2 1999: 1106-1109 - [c98]Gian Piero Zarri, Elisa Bertino, Bill Black, Andrew Brasher, Barbara Catania, Diana Deavin, Luigi Di Pace, Floriana Esposito, Pietro Leo, John McNaught, Andreas Persidis, Fabio Rinaldi, Giovanni Semeraro:
CONCERTO, An Environment for the 'Intelligent' Indexing, Querying and Retrieval of Digital Documents. ISMIS 1999: 226-234 - [c97]Elisa Bertino, Barbara Catania, Eleonora Caglio:
Applying Data Mining Techniques to Wafer Manufacturing. PKDD 1999: 41-50 - [c96]Isabella Merlo, Elisa Bertino, Elena Ferrari, Giovanna Guerrini:
A Temporal Object-Oriented Data Model with Multiple Granularities. TIME 1999: 73-81 - [c95]Elisa Bertino, Barbara Catania, Gian Piero Zarri:
A Conceptual Annotation Approach to Indexing in a Web-Based Information System. WECWIS 1999: 160-165 - [c94]Elisa Bertino, Silvana Castano, Elena Ferrari, Marco Mesiti:
Controlled Access and Dissemination of XML Documents. Workshop on Web Information and Data Management 1999: 22-27 - [e4]Elisa Bertino, Silvana Castano:
Atti del Settimo Convegno Nazionale Sistemi Evoluti per Basi di Dati, SEBD 1999, Villa Olmo, Como, Italy, 23-25 Giugno 1999. 1999 [contents] - [i1]Elisa Bertino:
Review - An Authorization Mechanism for a Relational Data Base System. ACM SIGMOD Digit. Rev. 1 (1999) - 1998
- [j48]Elisa Bertino:
Data Security. Data Knowl. Eng. 25(1-2): 199-216 (1998) - [j47]Elisa Bertino, Barbara Catania, Luca Chiesa:
Definition and Analysis of Index Organizations for Object-Oriented Database Systems. Inf. Syst. 23(2): 65-108 (1998) - [j46]Giovanna Guerrini, Elisa Bertino, René Bal:
A Formal Definition of the Chimera Object-Oriented Data Model. J. Intell. Inf. Syst. 11(1): 5-40 (1998) - [j45]Elisa Bertino, Barbara Catania:
A Constraint-Based Approach to Shape Management in Multimedia Databases. Multim. Syst. 6(1): 2-16 (1998) - [j44]Elisa Bertino, Elena Ferrari, Pierangela Samarati:
Mandatory Security and Object-Oriented Systems: A Multilevel Entity Model and its Mapping onto a Single-Level Object Model. Theory Pract. Object Syst. 4(3): 183-204 (1998) - [j43]Elisa Bertino, Sabrina De Capitani di Vimercati, Elena Ferrari, Pierangela Samarati:
Exception-Based Information Flow Control in Object-Oriented Systems. ACM Trans. Inf. Syst. Secur. 1(1): 26-65 (1998) - [j42]Elisa Bertino, Sushil Jajodia, Luigi V. Mancini, Indrajit Ray:
Advanced Transaction Processing in Multilevel Secure File Stores. IEEE Trans. Knowl. Data Eng. 10(1): 120-135 (1998) - [j41]Elisa Bertino, Elena Ferrari:
Temporal Synchronization Models for Multimedia Data. IEEE Trans. Knowl. Data Eng. 10(4): 612-631 (1998) - [j40]Elisa Bertino, Elena Ferrari, Giovanna Guerrini:
Navigational Accesses in a Temporal Object Model. IEEE Trans. Knowl. Data Eng. 10(4): 656-665 (1998) - [j39]Alberto Belussi, Elisa Bertino, Barbara Catania:
An Extended Algebra for Constraint Databases. IEEE Trans. Knowl. Data Eng. 10(5): 686-705 (1998) - [j38]Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati:
An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. ACM Trans. Database Syst. 23(3): 231-285 (1998) - [c93]Elisa Bertino, Giovanni Chiola, Luigi V. Mancini:
Deadlock Detection in the Face of Transaction and Data Dependencies in Advanced Transaction Models. ICATPN 1998: 266-285 - [c92]Elisa Bertino, Elena Ferrari:
Data Security. COMPSAC 1998: 228-239 - [c91]Barbara Catania, Alberto Belussi, Elisa Bertino:
Introducing External Functions in Constraint Query Languages. CP 1998: 132-146 - [c90]Elisa Bertino, Barbara Catania, Vincenzo Gervasi, Alessandra Raffaetà:
Active-U-Datalog: Integrating Active Rules in a Logical Update Language. Transactions and Change in Logic Databases 1998: 107-133 - [c89]Elisa Bertino, Elena Ferrari, Giovanna Guerrini, Isabella Merlo:
Extending the ODMG Object Model with Time. ECOOP 1998: 41-66 - [c88]Elisa Bertino, Barbara Catania, Boris Shidlovsky:
Towards Optimal Indexing for Segment Databases. EDBT 1998: 39-53 - [c87]Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo:
An Authorization Model and Its Formal Semantics. ESORICS 1998: 127-142 - [c86]Elisa Bertino, Giovanna Guerrini:
Extending the ODMG Object Model with Composite Objects. OOPSLA 1998: 259-270 - [c85]Elisa Bertino, Elena Ferrari, Giovanna Guerrini:
An Approach to Model and Query Event-Based Temporal Data. TIME 1998: 122-131 - [e3]Susan Darling Urban, Elisa Bertino:
Proceedings of the Fourteenth International Conference on Data Engineering, Orlando, Florida, USA, February 23-27, 1998. IEEE Computer Society 1998, ISBN 0-8186-8289-2 [contents] - 1997
- [b3]Elisa Bertino, Beng Chin Ooi, Ron Sacks-Davis, Kian-Lee Tan, Justin Zobel, Boris Shidlovsky, Barbara Catania:
Indexing Techniques for Advanced Database Systems. Advances in Database Systems 8, Kluwer 1997, ISBN 0-7923-9985-4, pp. 1-224 [contents] - [j37]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
A theoretical formulation for degrees of isolation in databases. Inf. Softw. Technol. 39(1): 47-53 (1997) - [j36]Elisa Bertino, Barbara Catania, Boris Shidlovsky:
Towards Optimal Two-Dimensional Indexing for Constraint Databases. Inf. Process. Lett. 64(1): 1-8 (1997) - [j35]Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati:
Decentralized Administration for a Temporal Access Control Model. Inf. Syst. 22(4): 223-248 (1997) - [j34]Elisa Bertino, Elena Ferrari, Giovanna Guerrini:
T_Chimera: A Temporal Object-Oriented Data Model. Theory Pract. Object Syst. 3(2): 103-125 (1997) - [j33]Giovanna Guerrini, Elisa Bertino, Barbara Catania, Jesús García Molina:
A Formal View of Object-Oriented Database Systems. Theory Pract. Object Syst. 3(3): 157-183 (1997) - [j32]Elisa Bertino, Pierangela Samarati, Sushil Jajodia:
An Extended Authorization Model for Relational Databases. IEEE Trans. Knowl. Data Eng. 9(1): 85-101 (1997) - [j31]Elisa Bertino, Paola Foscoli:
On Modeling Cost Functions for Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 9(3): 500-508 (1997) - [j30]Pierangela Samarati, Elisa Bertino, Alessandro Ciampichetti, Sushil Jajodia:
Information Flow Control in Object-Oriented Systems. IEEE Trans. Knowl. Data Eng. 9(4): 524-538 (1997) - [j29]Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino:
Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions. IEEE Trans. Knowl. Data Eng. 9(5): 697-708 (1997) - [j28]Danilo Montesi, Elisa Bertino, Maurizio Martelli:
Transactions and Updates in Deductive Databases. IEEE Trans. Knowl. Data Eng. 9(5): 784-797 (1997) - [c84]Elisa Bertino, Barbara Catania, Stéphane Bressan:
Integrity Constraint Checking in Chimera. CDB 1997: 160-186 - [c83]Elisa Bertino, Elena Ferrari:
A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases. DBSec 1997: 95-109 - [c82]Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino:
An Execution Model for Multilevel Seccure Workflows. DBSec 1997: 151-165 - [c81]Elisa Bertino, Elena Ferrari:
Administration Policies in a Multipolicy Autorization System. DBSec 1997: 341-355 - [c80]Elisa Bertino, Giovanna Guerrini, Isabella Merlo:
Trigger Inheritance and Overriding in Active Object Database Systems. DOOD 1997: 193-210 - [c79]Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri:
A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems. ACM Workshop on Role-Based Access Control 1997: 1-12 - [c78]Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino:
A Unified Framework for Enforcing Multiple Access Control Policies. SIGMOD Conference 1997: 474-485 - [c77]Elena Ferrari, Pierangela Samarati, Elisa Bertino, Sushil Jajodia:
Providing flexibility in information flow control for object oriented systems. S&P 1997: 130-140 - [c76]Alberto Belussi, Elisa Bertino, Barbara Catania:
Manipulating Spatial Data in Constraint Databases. SSD 1997: 115-141 - [p4]Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino:
Flexible Commit Protocols for Advanced Transaction Processing. Advanced Transaction Models and Architectures 1997 - [p3]Elisa Bertino, Barbara Catania, Elena Ferrari:
Query Processing. Multimedia Databases in Perspective 1997: 181-217 - 1996
- [j27]Boris Shidlovsky, Elisa Bertino:
On the Number of Descendants in an Object DAG. Inf. Process. Lett. 58(5): 211-216 (1996) - [j26]Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati:
A Temporal Access Control Mechanism for Database Systems. IEEE Trans. Knowl. Data Eng. 8(1): 67-80 (1996) - [j25]Pierangela Samarati, Elisa Bertino, Sushil Jajodia:
An Authorization Model for a Distributed Hypertext System. IEEE Trans. Knowl. Data Eng. 8(4): 555-562 (1996) - [j24]Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino:
Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases. IEEE Trans. Knowl. Data Eng. 8(5): 839-854 (1996) - [c75]Indrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini:
An Advanced Commit Protocol for MLS Distributed Database Systems. CCS 1996: 119-128 - [c74]Elisa Bertino, Sushil Jajodia, Pierangela Samarati:
A Non-Timestamped Authorization Model for Data Management Systems. CCS 1996: 169-178 - [c73]Elisa Bertino, Elena Ferrari, Giovanna Guerrini:
A Formal Temporal Object-Oriented Data Model. EDBT 1996: 342-356 - [c72]Boris Shidlovsky, Elisa Bertino:
A Graph-Theoretic Approach to Indexing in Object-Oriented Databases. ICDE 1996: 230-237 - [c71]Elisa Bertino, Barbara Catania:
Static Analysis of Intensional Databases in U-Datalog. PODS 1996: 202-212 - [c70]Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati:
A decentralized temporal autoritzation model. SEC 1996: 271-280 - [c69]Elisa Bertino, Giovanna Guerrini:
Viewpoints in object database systems. ISAW/Viewpoints@FSE 1996: 289-293 - [c68]Elisa Bertino, Donatella Castelli, Federica Vitale:
A Formal Representation for State Diagrams in the OMT Methodology. SOFSEM 1996: 327-334 - [c67]Elisa Bertino, Sushil Jajodia, Pierangela Samarati:
Supporting Multiple Access Control Policies in Database Systems. S&P 1996: 94-107 - [c66]Elena Ferrari, Elisa Bertino, Claudio Bettini, Alberto Motta, Pierangela Samarati:
On Using Materialization Strategies for a Temporal Authorization Model. VIEWS 1996: 34-42 - [c65]Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati:
Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control. VLDB 1996: 472-483 - [p2]Alberto Belussi, Elisa Bertino, A. Biavasco, S. Rizzo:
A Data Access Structure for Filtering Distance Queries in Image Retrieval. Multimedia Database System: Issues and Research Direction 1996: 185-213 - [e2]Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo:
Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings. Lecture Notes in Computer Science 1146, Springer 1996, ISBN 3-540-61770-1 [contents] - 1995
- [j23]Elisa Bertino, Sushil Jajodia, Pierangela Samarati:
Database Security: Research and Practice. Inf. Syst. 20(7): 537-556 (1995) - [j22]Elisa Bertino, Fabio Origgi, Pierangela Samarati:
An Extended Authorization Model for Object Databases. J. Comput. Secur. 3(2/3): 169-206 (1995) - [j21]Elisa Bertino, Giovanna Guerrini, Danilo Montesi:
Towards Deductice Object Databases. Theory Pract. Object Syst. 1(1): 19-39 (1995) - [j20]Elisa Bertino, Paola Foscoli:
Index Organizations for Object-Oriented Database Systems. IEEE Trans. Knowl. Data Eng. 7(2): 193-209 (1995) - [c64]Alberto Belussi, Elisa Bertino, Michela Bertolotto, Barbara Catania:
Generalized Relational Algebra: Modeling Spatial Queries in Constraint Databases. CDB 1995: 40-67 - [c63]Elisa Bertino, S. Salerno, Boris Shidlovsky:
Enhanced Nested-Inherited Index for OODBMS. CIKM 1995: 58-65 - [c62]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. DBSec 1995: 231-247 - [c61]Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting:
Panel Discussion: Role-Based Access Control and Next-Generation Security Models. DBSec 1995: 289-298 - [c60]Elisa Bertino, Giovanna Guerrini:
Objects with Multiple Most Specific Classes. ECOOP 1995: 102-126 - [c59]Elisa Bertino, Barbara Catania:
Database Monitoring in U-Datalog. NGITS 1995 - [c58]Elisa Bertino, Pierangela Samarati:
Research issues in authorization models for hypertext systems. NSPW 1995: 22-28 - [c57]Elisa Bertino:
Query Decomposition in an Object-Oriented Database System Distributed on a Local Area Network. RIDE-DOM 1995: 2-9 - [c56]Claudio Bettini, Xiaoyang Sean Wang, Elisa Bertino, Sushil Jajodia:
Semantic Assumptions and Query Evaluation in Temporal Databases. SIGMOD Conference 1995: 257-268 - 1994
- [j19]Elisa Bertino, Hans Weigand:
An Approach to Authorization Modeling in Object-Oriented Database Systems. Data Knowl. Eng. 12(1): 1-29 (1994) - [j18]Elisa Bertino, Amani A. Saad, Mohamed A. Ismail:
Clustering Techniques in Object Bases: A Survey. Data Knowl. Eng. 12(3): 255-275 (1994) - [j17]Elisa Bertino, M. Tamer Özsu:
Guest Editors' Introduction. Distributed Parallel Databases 2(1): 5-6 (1994) - [j16]Elisa Bertino, Mauro Negri, Giuseppe Pelagatti, Licia Sbattella:
Applications of Object-Oriented Technology to the Integration of Heterogeneous Database Systems. Distributed Parallel Databases 2(4): 343-370 (1994) - [j15]Elisa Bertino:
Index Configuration in Object-Oriented Databases. VLDB J. 3(3): 355-399 (1994) - [c55]Elisa Bertino, Barbara Catania, Giovanna Guerrini, Maurizio Martelli, Danilo Montesi:
A Bottom-Up Interpreter for a Database Language with Updates and Transactions. GULP-PRODE (2) 1994: 206-220 - [c54]Elisa Bertino, Claudio Bettini, Pierangela Samarati:
A Temporal Authorization Model. CCS 1994: 126-135 - [c53]Elisa Bertino, Fabio Origgi, Pierangela Samarati:
A new Authorization Model for Object-Oriented Databases. DBSec 1994: 199-222 - [c52]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols. DBSec 1994: 259-274 - [c51]Elisa Bertino, Barbara Catania, Giovanna Guerrini, Danilo Montesi:
Static Analysis of Transactional Intensional Databases. Workshop on Deductive Databases and Logic Programming 1994: 57-73 - [c50]Elisa Bertino, Giovanna Guerrini, Danilo Montesi:
Deductive Object Databases. ECOOP 1994: 213-235 - [c49]Alessandro Ciampichetti, Elisa Bertino, Luigi V. Mancini:
Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems. ESORICS 1994: 359-373 - [c48]Sunil Choenni, Elisa Bertino, Henk M. Blanken, Thiel Chang:
On the Selection of Optimal Index Configuration in OO Databases. ICDE 1994: 526-537 - [c47]Elisa Bertino, Claudio Bettini, Pierangela Samarati:
A discretionary access control model with temporal authorizations. NSPW 1994: 102-107 - [c46]Elisa Bertino, Giovanna Guerrini, Danilo Montesi:
Generic Methods in Deductive Object Databases. OOIS 1994: 210-213 - [c45]Elisa Bertino, Barbara Catania, Giovanna Guerrini, Danilo Montesi:
Transaction Optimization in Rule Databases. RIDE-ADS 1994: 137-145 - [c44]Elisa Bertino, Luigi V. Mancini, Sushil Jajodia:
Collecting garbage in multilevel secure object stores. S&P 1994: 106-120 - [c43]Sunil Choenni, Elisa Bertino, Henk M. Blanken, Thiel Chang:
Index Configurations in Object-Oriented Databases. TOOLS (13) 1994: 119-133 - [e1]Elisa Bertino, Susan Darling Urban:
Object-Oriented Methodologies and Systems, International Symposium ISOOMS '94, Palermo, Italy, September 21-22, 1994, Proceedings. Lecture Notes in Computer Science 858, Springer 1994, ISBN 3-540-58451-X [contents] - 1993
- [b2]Elisa Bertino, Lorenzo Martino:
Object-Oriented Database Systems. Addison-Wesley 1993, ISBN 0-201-62439-7 [contents] - [j14]Elisa Bertino, C. Guglielmina:
Path-Index: An Approach to the Efficient Execution of Object-Oriented Queries. Data Knowl. Eng. 10: 1-27 (1993) - [j13]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems. J. Comput. Secur. 2(4): 311-352 (1993) - [c42]Elisa Bertino, Barbara Catania, Giovanna Guerrini, Maurizio Martelli, Danilo Montesi:
Formalizzazione e Ottimizzazione di Transazioni di modifica in CLP(AD). GULP 1993: 501-518 - [c41]Elisa Bertino, Pierangela Samarati, Sushil Jajodia:
Authorizations in Relational Database Management Systems. CCS 1993: 130-139 - [c40]Elisa Bertino, Pierangela Samarati, Sushil Jajodia:
High Assurance Discretionary Access Control for Object Bases. CCS 1993: 140-150 - [c39]Danilo Montesi, Elisa Bertino:
Queries, Constraints, Updates and Transactions Within a Logic-Based Language. CIKM 1993: 500-506 - [c38]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case. DBSec 1993: 135-158 - [c37]Elisa Bertino, Sushil Jajodia:
Modeling Multilevel Entities Using Single Level Objects. DOOD 1993: 415-428 - [c36]Elisa Bertino, Sushil Jajodia, Pierangela Samarati:
Enforcing Mandatory Access Control in Object Bases. Security for Object-Oriented Systems 1993: 96-116 - [c35]Elisa Bertino, Pierangela Samarati:
Research Issues in Discretionary Authorizations for Object Bases. Security for Object-Oriented Systems 1993: 183-199 - [c34]Elisa Bertino, Maria Damiani, Paolo Randi, Luca Spampinato:
An Advanced Information Management System. RIDE-IMS 1993: 61-64 - [c33]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Achieving stricter correctness requirements in multilevel secure databases. S&P 1993: 135-147 - [c32]Elisa Bertino, Sushil Jajodia, Pierangela Samarati:
Access Control in Object-Oriented Database Systems - Some Approaches and Issues. Advanced Database Systems 1993: 17-44 - 1992
- [b1]Elisa Bertino, Lorenzo Martino:
Sistemi di basi di dati orientate agli oggetti - concetti e architetture. Addison-Wesley 1992, ISBN 978-88-7192-036-8, pp. 1-315 - [j12]Elisa Bertino, Daniela Musto:
Query optimization by using knowledge about data semantics. Data Knowl. Eng. 9: 121-155 (1992) - [j11]Elisa Bertino, Mauro Negri, Giuseppe Pelagatti, Licia Sbattella:
Object-Oriented Query Languages: The Notion and the Issues. IEEE Trans. Knowl. Data Eng. 4(3): 223-237 (1992) - [c31]Elisa Bertino, Maria Damiani, Paolo Randi:
An Approach to Integrate Multimedi Data in a Knowledge Representation System. Advanced Visual Interfaces 1992: 109-123 - [c30]Elisa Bertino, Maurizio Martelli, Danilo Montesi:
CLP (X) as a framework for action and deduction. CNKBS 1992: 27-29 - [c29]Elisa Bertino, Maurizio Martelli, Danilo Montesi:
Modeling Database Updates with Constraint Logic Programming. Workshop on Deductive Databases, JICSLP 1992: 175-184 - [c28]Elisa Bertino:
A View Mechanism for Object-Oriented Databases. EDBT 1992: 136-151 - [c27]Elisa Bertino, Danilo Montesi:
Towards a Logical-Object Oriented Programming Language for Databases. EDBT 1992: 168-183 - [c26]Elisa Bertino, Maurizio Martelli, Danilo Montesi:
CLP(AD) as a Deductive Database Language with Updates. ELP 1992: 80-99 - [c25]Elisa Bertino, Maurizio Martelli, Danilo Montesi:
Modelling Database Updates with Constraint Logic Programming. FMLDO 1992: 121-132 - [c24]Elisa Bertino, Maria Damiani, Paolo Randi:
Multimedia Data Handling in a Knowledge Representation System. Future Databases 1992: 133-141 - [c23]Elisa Bertino, Sandro Bottarelli, Maria Damiani, M. Marcadella, M. Migliorati, Paolo Randi:
The ADKMS Knowledge Acquisition System. Future Databases 1992: 298-314 - [c22]Elisa Bertino:
Data Hiding and Security in Object-Oriented Databases. ICDE 1992: 338-347 - [c21]Elisa Bertino, Sandro Bottarelli, Maria Damiani, M. Marcadella, M. Migliorati, Paolo Randi:
A Knowledge Based Information System. IFIP Congress (3) 1992: 189-195 - [c20]Elisa Bertino, Paola Foscoli:
An Analytical Model of Object-Oriented Query Costs. POS 1992: 241-261 - [c19]Elisa Bertino, C. Guglielmina:
Optimization of Object-Oriented Queries Using Path Indices. RIDE-TQP 1992: 140-149 - [c18]Elisa Bertino, Alfonso Quarati:
An Approach to Support Method Invocations in Object-Oriented Queries. RIDE-TQP 1992: 163-168 - 1991
- [j10]Elisa Bertino, Lorenzo Martino:
Object-Oriented Database Management Systems: Concepts and Issues. Computer 24(4): 33-47 (1991) - [j9]Fausto Rabitti, Elisa Bertino, Won Kim, Darrell Woelk:
A Model of Authorization for Next-Generation Database Systems. ACM Trans. Database Syst. 16(1): 88-131 (1991) - [c17]Elisa Bertino:
Method precomputation in object-oriented databases. COOCS 1991: 199-212 - [c16]Elisa Bertino:
An Indexing Technique for Object-Oriented Databases. ICDE 1991: 160-170 - [c15]Elisa Bertino:
Integration of Heterogeneous Data Repositories by Using Object-Oriented Views. RIDE-IMS 1991: 22-29 - [p1]Elisa Bertino:
A Survey of Indexing Techniques for Object-Oriented Database Management Systems. Query Processing for Advanced Database Systems 1991: 383-418 - 1990
- [c14]Elisa Bertino, Mauro Negri, Giuseppe Pelagatti, Licia Sbattella:
An object-oriented data model for distributed office applications. COCS 1990: 216-226 - [c13]Elisa Bertino, Danilo Montesi:
Design and Development of a Document Management System for Banking Applikations: an Example of Office Automation. DEXA 1990: 500-507 - [c12]Elisa Bertino:
Optimization of Queries using Nested Indices. EDBT 1990: 44-59
1980 – 1989
- 1989
- [j8]Elisa Bertino, Mauro Negri, Giuseppe Pelagatti, Licia Sbattella:
Integration of heterogeneous database applications through an object-oriented interface. Inf. Syst. 14(5): 407-420 (1989) - [j7]Elisa Bertino, Won Kim:
Indexing Techniques for Queries on Nested Objects. IEEE Trans. Knowl. Data Eng. 1(2): 196-214 (1989) - [c11]Won Kim, Elisa Bertino, Jorge F. Garza:
Composite Objects Revisted. SIGMOD Conference 1989: 337-347 - 1988
- [j6]Elisa Bertino, Daniela Musto:
Correctness of Semantic Integrity Checking in Database Management Systems. Acta Informatica 26(1/2): 25-57 (1988) - [j5]Costantino Thanos, Elisa Bertino, Carlo Carlesi:
The Effects of Two-Phase Locking on the Performance of a Distributed Database Management System. Perform. Evaluation 8(2): 129-157 (1988) - [j4]Elisa Bertino, Fausto Rabitti, Simon J. Gibbs:
Query Processing in a Multimedia Document System. ACM Trans. Inf. Syst. 6(1): 1-41 (1988) - [c10]Elisa Bertino, Laura M. Haas:
Views and Security in Distributed Database Management Systems. EDBT 1988: 155-169 - [c9]Elisa Bertino, Fausto Rabitti, Costantino Thanos:
MULTOS: a Document Server for Distributed Office Systems. EDBT 1988: 606-615 - [c8]Elisa Bertino, Simon J. Gibbs, Fausto Rabitti:
Document query processing strategies: cost evaluation and heuristics. COCS 1988: 169-181 - [c7]Elisa Bertino, R. Gagliardi, Mauro Negri, Giuseppe Pelagatti, Licia Sbattella:
The COMANDOS Integration System: An Object Oriented Approach to the Interconnection of Heterogeneous Applications. OODBS 1988: 213-218 - 1987
- [j3]Elisa Bertino:
An Evaluation of Precompilation and Interpretation in Distributed Database Management Systems. Comput. J. 30(6): 519-528 (1987) - 1986
- [j2]Elisa Bertino, Fausto Rabitti:
Query Processing Based on Complex Object Types. IEEE Database Eng. Bull. 9(4): 22-29 (1986) - 1984
- [c6]Stavros Christodoulakis, J. Vanderbroek, J. Li, T. Li, S. Wan, Y. Wang, Maria Pia Papa, Elisa Bertino:
Development of a Multimedia Information System for an Office Environment. VLDB 1984: 261-271 - 1983
- [c5]Elisa Bertino:
Distributed Database Design Using the Entity-Relationship Model. ER 1983: 189-203 - [c4]Elisa Bertino, Carlo Meghini, Costantino Thanos:
The Update Problem in the Distributed Database System Hermes/1. ICOD 1983: 317-331 - [c3]Costantino Thanos, Carlo Carlesi, Elisa Bertino:
Performance Evaluation of Two-Phase Locking Algorithms in a System for Distributed Databases. Symposium on Reliability in Distributed Software and Database Systems 1983: 57-69 - [c2]Elisa Bertino, Laura M. Haas, Bruce G. Lindsay:
View Management in Distributed Data Base Systems. VLDB 1983: 376-378 - 1982
- [j1]Laura M. Haas, Patricia G. Selinger, Elisa Bertino, Dean Daniels, Bruce G. Lindsay, Guy M. Lohman, Yoshifumi Masunaga, C. Mohan, Pui Ng, Paul F. Wilms, Robert A. Yost:
R*: A Research Project on Distributed Relational DBMS. IEEE Database Eng. Bull. 5(4): 28-32 (1982) - 1981
- [c1]Costantino Thanos, Carlo Carlesi, Elisa Bertino:
Performance Evaluation of Two Concurrency Control Mechanisms in a Distributed Database System. ECI 1981: 266-279
Coauthor Index
aka: Maria Damiani
aka: Mohand-Saïd Hacid
aka: Amani M. Abu Jabal
aka: James Joshi
aka: Lorenzo D. Martino
aka: Asmaa Mohamed Sallam
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-02 23:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint