Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Elisa Bertino
Author information
- Purdue University
2010 – today
- 2013
[j243]Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi S. Sandhu, Ram Krishnan, Gail-Joon Ahn, Elisa Bertino: Collaboration in Multicloud Computing Environments: Framework and Security Issues. IEEE Computer 46(2): 76-84 (2013)
[j242]Mohammad Allahbakhsh, Boualem Benatallah, Aleksandar Ignjatovic, Hamid R. Motahari Nezhad, Elisa Bertino, Schahram Dustdar: Quality Control in Crowdsourcing Systems: Issues and Directions. IEEE Internet Computing 17(2): 76-81 (2013)
[j241]Rimma V. Nehme, Karen Works, Chuan Lei, Elke A. Rundensteiner, Elisa Bertino: Multi-route query processing and optimization. J. Comput. Syst. Sci. 79(3): 312-329 (2013)
[j240]Omar Hasan, Lionel Brunie, Elisa Bertino, Ning Shang: A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model. IEEE Transactions on Information Forensics and Security 8(6): 949-962 (2013)
[j239]Wonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino: Agent-based accountable grid computing systems. The Journal of Supercomputing 65(2): 903-929 (2013)
[j238]Xun Yi, Md. Golam Kaosar, Russell Paulet, Elisa Bertino: Single-Database Private Information Retrieval from Fully Homomorphic Encryption. IEEE Trans. Knowl. Data Eng. 25(5): 1125-1134 (2013)
[j237]Salmin Sultana, Mohamed Shehab, Elisa Bertino: Secure Provenance Transmission for Streaming Data. IEEE Trans. Knowl. Data Eng. 25(8): 1890-1903 (2013)
[j236]Dan Lin, Prathima Rao, Rodolfo Ferrini, Elisa Bertino, Jorge Lobo: A Similarity Measure for Comparing XACML Policies. IEEE Trans. Knowl. Data Eng. 25(9): 1946-1959 (2013)
[j235]Mohamed Nabeel, Ning Shang, Elisa Bertino: Privacy Preserving Policy-Based Content Sharing in Public Clouds. IEEE Trans. Knowl. Data Eng. 25(11): 2602-2614 (2013)
[j234]Wei She, I-Ling Yen, Bhavani M. Thuraisingham, Elisa Bertino: Security-Aware Service Composition with Fine-Grained Information Flow Control. IEEE T. Services Computing 6(3): 330-343 (2013)
[c419]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Seyed-Mehdi-Reza Beheshti, Elisa Bertino, Norman Foo: Collusion Detection in Online Rating Systems. APWeb 2013: 196-207
[c418]
[c417]Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino: An efficient certificateless cryptography scheme without pairing. CODASPY 2013: 181-184
[c416]Rimma V. Nehme, Hyo-Sang Lim, Elisa Bertino: FENCE: continuous access control enforcement in dynamic data stream environments. CODASPY 2013: 243-254
[c415]Anna Cinzia Squicciarini, Giuseppe Petracca, Elisa Bertino: Adaptive data protection in distributed systems. CODASPY 2013: 365-376
[c414]Jianneng Cao, Fang-Yu Rao, Mehmet Kuzu, Elisa Bertino, Murat Kantarcioglu: Efficient tree pattern queries on encrypted XML documents. EDBT/ICDT Workshops 2013: 111-120
[c413]Mehmet Kuzu, Murat Kantarcioglu, Ali Inan, Elisa Bertino, Elizabeth Durham, Bradley Malin: Efficient privacy-aware record integration. EDBT 2013: 167-178
[c412]Jianneng Cao, Qian Xiao, Gabriel Ghinita, Ninghui Li, Elisa Bertino, Kian-Lee Tan: Efficient and accurate strategies for differentially-private sliding window queries. EDBT 2013: 191-202
[c411]Bilal Shebaro, Asmaa Sallam, Ashish Kamra, Elisa Bertino: PostgreSQL anomalous query detector. EDBT 2013: 741-744
[c410]Xun Yi, Russell Paulet, Elisa Bertino, Guandong Xu: Private data warehouse queries. SACMAT 2013: 25-36
[e29]Elisa Bertino, Ravi S. Sandhu, Lujo Bauer, Jaehong Park (Eds.): Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013. ACM 2013, ISBN 978-1-4503-1890-7- 2012
[b6]Elisa Bertino: Data Protection from Insider Threats. Synthesis Lectures on Data Management, Morgan & Claypool Publishers 2012
[j233]Omar Hasan, Lionel Brunie, Elisa Bertino: Preserving privacy of feedback providers in decentralized reputation systems. Computers & Security 31(7): 816-826 (2012)
[j232]Mohamed Nabeel, Elisa Bertino: Privacy-Preserving Fine-Grained Access Control in Public Clouds. IEEE Data Eng. Bull. 35(4): 21-30 (2012)
[j231]Weili Han, Ye Cao, Elisa Bertino, Jianming Yong: Using automated individual white-list to protect web digital identities. Expert Syst. Appl. 39(15): 11861-11869 (2012)
[j230]Md. Enamul Kabir, Hua Wang, Elisa Bertino: A role-involved purpose-based access control model. Information Systems Frontiers 14(3): 809-822 (2012)
[j229]James Joshi, Elisa Bertino, Calton Pu, Heri Ramampiaro: ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing". MONET 17(3): 325-326 (2012)
[j228]Ilsun You, Gabriele Lenzini, Marek R. Ogiela, Elisa Bertino: Defending against insider threats and internal data leakage. Security and Communication Networks 5(8): 831-833 (2012)
[j227]Anna Cinzia Squicciarini, Elisa Bertino, Alberto Trombetta, Stefano Braghin: A Flexible Approach to Multisession Trust Negotiations. IEEE Trans. Dependable Sec. Comput. 9(1): 16-29 (2012)
[j226]Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino: Resilient Authenticated Execution of Critical Applications in Untrusted Environments. IEEE Trans. Dependable Sec. Comput. 9(4): 597-609 (2012)
[j225]Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino: Privacy-Preserving Enforcement of Spatially Aware RBAC. IEEE Trans. Dependable Sec. Comput. 9(5): 627-640 (2012)
[j224]Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Elisa Bertino: A Hybrid Approach to Private Record Matching. IEEE Trans. Dependable Sec. Comput. 9(5): 684-698 (2012)
[j223]Paolo Atzeni, Elisa Bertino, Masaru Kitsuregawa, Kian-Lee Tan: Special issue: best papers of VLDB 2010. VLDB J. 21(2): 167-168 (2012)
[c409]Aditi Gupta, Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino: Marlin: making it harder to fish for gadgets. ACM Conference on Computer and Communications Security 2012: 1016-1018
[c408]Bilal Shebaro, Salmin Sultana, Shakthidhar Reddy Gopavaram, Elisa Bertino: Demonstrating a lightweight data provenance for sensor networks. ACM Conference on Computer and Communications Security 2012: 1022-1024
[c407]Anna Cinzia Squicciarini, Giuseppe Petracca, Elisa Bertino: Adaptive data management for self-protecting objects in cloud computing systems. CNSM 2012: 140-144
[c406]Ninghui Li, Haining Chen, Elisa Bertino: On practical specification and enforcement of obligations. CODASPY 2012: 71-82
[c405]Ashish Kundu, Mikhail J. Atallah, Elisa Bertino: Leakage-free redactable signatures. CODASPY 2012: 307-316
[c404]Aditi Gupta, Michael S. Kirkpatrick, Elisa Bertino: A formal proximity model for RBAC systems. CollaborateCom 2012: 1-10
[c403]Chenyun Dai, Fang-Yu Rao, Traian Marius Truta, Elisa Bertino: Privacy-preserving assessment of social network data trustworthiness. CollaborateCom 2012: 97-106
[c402]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Seyed-Mehdi-Reza Beheshti, Elisa Bertino, Norman Foo: Reputation management in crowdsourcing systems. CollaborateCom 2012: 664-671
[c401]Alfredo Cuzzocrea, Elisa Bertino, Domenico Saccà: Towards a theory for privacy preserving distributed OLAP. EDBT/ICDT Workshops 2012: 221-226
[c400]
[c399]Russell Paulet, Md. Golam Kaosar, Xun Yi, Elisa Bertino: Privacy-Preserving and Content-Protecting Location Based Queries. ICDE 2012: 44-53
[c398]Hyo-Sang Lim, Gabriel Ghinita, Elisa Bertino, Murat Kantarcioglu: A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks. ICDE 2012: 1192-1203
[c397]Salmin Sultana, Gabriel Ghinita, Elisa Bertino, Mohamed Shehab: A Lightweight Secure Provenance Scheme for Wireless Sensor Networks. ICPADS 2012: 101-108
[c396]
[c395]Gordon K. Lee, Elisa Bertino, Stuart Harvey Rubin, Taghi M. Khoshgoftaar, Bhavani M. Thuraisingham, James D. McCaffrey: Panel: Using information re-use and integration principles in big data. IRI 2012
[c394]Mohamed Nabeel, Elisa Bertino: Privacy preserving delegated access control in the storage as a service model. IRI 2012: 645-652
[c393]Sunoh Choi, Gabriel Ghinita, Elisa Bertino: Secure sensor network SUM aggregation with detection of malicious nodes. LCN 2012: 19-27
[c392]Rafae Bhatti, Ryan LaSalle, Rob Bird, Tim Grance, Elisa Bertino: Emerging trends around big data analytics and security: panel. SACMAT 2012: 67-68
[c391]Mohamed Nabeel, Ning Shang, Elisa Bertino: Efficient privacy preserving content based publish subscribe systems. SACMAT 2012: 133-144
[c390]Basit Shafiq, Jaideep Vaidya, Arif Ghafoor, Elisa Bertino: A framework for verification and optimal reconfiguration of event-driven role based access control policies. SACMAT 2012: 197-208
[c389]Mohamed Nabeel, Sam Kerr, Xiaoyu Ding, Elisa Bertino: Authentication and key management for Advanced Metering Infrastructures utilizing physically unclonable functions. SmartGridComm 2012: 324-329
[c388]Mohamed R. Fouad, Khaled M. Elbassioni, Elisa Bertino: Modeling the Risk & Utility of Information Sharing in Social Networks. SocialCom/PASSAT 2012: 441-450
[c387]Sunoh Choi, Hyo-Sang Lim, Elisa Bertino: Authenticated Top-K Aggregation in Distributed and Outsourced Databases. SocialCom/PASSAT 2012: 779-788
[e28]Elisa Bertino, Ravi S. Sandhu (Eds.): Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012. ACM 2012, ISBN 978-1-4503-1091-8
[e27]Xiaoying Bai, Fevzi Belli, Elisa Bertino, Carl K. Chang, Atilla Elçi, Cristina Cerschi Seceleanu, Haihua Xie, Mohammad Zulkernine (Eds.): 36th Annual IEEE Computer Software and Applications Conference, COMPSAC 2012, Izmir, Turkey, July 16-20, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1990-4
[e26]Xiaoying Bai, Fevzi Belli, Elisa Bertino, Carl K. Chang, Atilla Elçi, Cristina Cerschi Seceleanu, Haihua Xie, Mohammad Zulkernine (Eds.): 36th Annual IEEE Computer Software and Applications Conference Workshops, COMPSAC 2012, Izmir, Turkey, July 16-20, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2714-5
[e25]Chengcui Zhang, James Joshi, Elisa Bertino, Bhavani M. Thuraisingham (Eds.): IEEE 13th International Conference on Information Reuse & Integration, IRI 2012, Las Vegas, NV, USA, August 8-10, 2012. IEEE 2012, ISBN 978-1-4673-2282-9
[e24]Li Xu, Elisa Bertino, Yi Mu (Eds.): Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings. Lecture Notes in Computer Science 7645, Springer 2012, ISBN 978-3-642-34600-2
[i8]Mohamed Nabeel, John Zage, Sam Kerr, Elisa Bertino, N. Athula Kulatunga, U. Sudheera Navaratne, Michael Duren: Cryptographic Key Management for Smart Power Grids - Approaches and Issues. CoRR abs/1206.3880 (2012)
[i7]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Seyed-Mehdi-Reza Beheshti, Norman Foo, Elisa Bertino: Detecting, Representing and Querying Collusion in Online Rating Systems. CoRR abs/1211.0963 (2012)
[i6]Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Seyed-Mehdi-Reza Beheshti, Norman Foo, Elisa Bertino: An Analytic Approach to People Evaluation in Crowdsourcing Systems. CoRR abs/1211.3200 (2012)
[i5]Ashish Kundu, Mikhail J. Atallah, Elisa Bertino: Efficient Leakage-free Authentication of Trees, Graphs and Forests. IACR Cryptology ePrint Archive 2012: 36 (2012)
[i4]- 2011
[j222]Md. Enamul Kabir, Hua Wang, Elisa Bertino: Efficient systematic clustering method for k-anonymization. Acta Inf. 48(1): 51-66 (2011)
[j221]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo: Fine-grained integration of access control policies. Computers & Security 30(2-3): 91-107 (2011)
[j220]Anna Cinzia Squicciarini, Federica Paci, Elisa Bertino: Trust establishment in the formation of Virtual Organizations. Computer Standards & Interfaces 33(1): 13-23 (2011)
[j219]Md. Enamul Kabir, Hua Wang, Elisa Bertino: A conditional purpose-based access control model with dynamic roles. Expert Syst. Appl. 38(3): 1482-1489 (2011)
[j218]Elisa Bertino, Gabriel Ghinita, Ashish Kamra: Access Control for Databases: Concepts and Systems. Foundations and Trends in Databases 3(1-2): 1-148 (2011)
[j217]Gabriel Ghinita, Panos Kalnis, Murat Kantarcioglu, Elisa Bertino: Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection. GeoInformatica 15(4): 699-726 (2011)
[j216]Alfredo Cuzzocrea, Elisa Bertino: Privacy Preserving OLAP over Distributed XML Data: A Theoretically-Sound Secure-Multiparty-Computation Approach. J. Comput. Syst. Sci. 77(6): 965-987 (2011)
[j215]Daniel G. Aliaga, Elisa Bertino, Stefano Valtolina: DECHO - a framework for the digital exploration of cultural heritage objects. JOCCH 3(3): 12 (2011)
[j214]Md. Enamul Kabir, Hua Wang, Elisa Bertino: A Conditional Role-Involved Purpose-Based Access Control Model. J. Org. Computing and E. Commerce 21(1): 71-91 (2011)
[j213]Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino: Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications. IEEE Pervasive Computing 10(4): 64-72 (2011)
[j212]Alberto Trombetta, Wei Jiang, Elisa Bertino, Lorenzo Bossi: Privacy-Preserving Updates to Anonymous and Confidential Databases. IEEE Trans. Dependable Sec. Comput. 8(4): 578-587 (2011)
[j211]Yuqing Sun, Qihua Wang, Ninghui Li, Elisa Bertino, Mikhail J. Atallah: On the Complexity of Authorization in RBAC under Qualification and Security Constraints. IEEE Trans. Dependable Sec. Comput. 8(6): 883-897 (2011)
[j210]Ashish Kamra, Elisa Bertino: Design and Implementation of an Intrusion Response System for Relational Databases. IEEE Trans. Knowl. Data Eng. 23(6): 875-888 (2011)
[j209]Federica Paci, Massimo Mecella, Mourad Ouzzani, Elisa Bertino: ACConv - An Access Control Model for Conversational Web Services. TWEB 5(3): 13 (2011)
[c386]Wonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino: Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems. CCGRID 2011: 534-543
[c385]Elisa Bertino, Gabriel Ghinita: Towards mechanisms for detection and prevention of data exfiltration by insiders: keynote talk paper. ASIACCS 2011: 10-19
[c384]Michael S. Kirkpatrick, Sam Kerr, Elisa Bertino: PUF ROKs: a hardware approach to read-once keys. ASIACCS 2011: 155-164
[c383]Mohamed Nabeel, Elisa Bertino: Poster: towards attribute based group key management. ACM Conference on Computer and Communications Security 2011: 821-824
[c382]Mohamed Nabeel, Elisa Bertino, Murat Kantarcioglu, Bhavani M. Thuraisingham: Towards privacy preserving access control in the cloud. CollaborateCom 2011: 172-180
[c381]Robert K. Abercrombie, Frederick T. Sheldon, Hal Aldridge, Michael Duren, Tracy Ricci, Elisa Bertino, N. Athula Kulatunga, Uditha Navaratne: Secure cryptographic key management system (CKMS) considerations for smart grid devices. CSIIRW 2011: 59
[c380]Elisa Bertino, Michael S. Kirkpatrick: Location-based access control systems for mobile users: concepts and research directions. SPRINGL 2011: 49-52
[c379]Chenyun Dai, Fang-Yu Rao, Gabriel Ghinita, Elisa Bertino: Privacy-preserving assessment of location data trustworthiness. GIS 2011: 231-240
[c378]Michael S. Kirkpatrick, Maria Luisa Damiani, Elisa Bertino: Prox-RBAC: a proximity-based spatially aware RBAC. GIS 2011: 339-348
[c377]Xukai Zou, Fabio Maino, Elisa Bertino, Yan Sui, Kai Wang, Feng Li: A New Approach to Weighted Multi-Secret Sharing. ICCCN 2011: 1-6
[c376]
[c375]Salmin Sultana, Elisa Bertino, Mohamed Shehab: A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks. ICDCS Workshops 2011: 332-338
[c374]Nan Guo, Tian-han Gao, Bin Zhang, Ruchith Fernando, Elisa Bertino: Aggregated Privacy-Preserving Identity Verification for Composite Web Services. ICWS 2011: 692-693
[c373]
[c372]Wonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino: Profile-Based Selection of Accountability Policies in Grid Computing Systems. POLICY 2011: 145-148
[c371]Qun Ni, Elisa Bertino: xfACL: an extensible functional language for access control. SACMAT 2011: 61-72
[c370]
[e23]Ravi S. Sandhu, Elisa Bertino (Eds.): First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings. ACM 2011, ISBN 978-1-4503-0466-5
[e22]Elisa Bertino, Maria Luisa Damiani, Gabriel Ghinita (Eds.): Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2011, November 1st, 2011, Chicago, IL, USA. ACM 2011, ISBN 978-1-4503-1032-1
[e21]Sadagopan Srinivasan, Krithi Ramamritham, Arun Kumar, M. P. Ravindra, Elisa Bertino, Ravi Kumar (Eds.): Proceedings of the 20th International Conference on World Wide Web, WWW 2011, Hyderabad, India, March 28 - April 1, 2011. ACM 2011, ISBN 978-1-4503-0632-4
[e20]Sadagopan Srinivasan, Krithi Ramamritham, Arun Kumar, M. P. Ravindra, Elisa Bertino, Ravi Kumar (Eds.): Proceedings of the 20th International Conference on World Wide Web, WWW 2011, Hyderabad, India, March 28 - April 1, 2011 (Companion Volume). ACM 2011, ISBN 978-1-4503-0637-9- 2010
[b5]Elisa Bertino, Lorenzo Martino, Federica Paci, Anna Cinzia Squicciarini: Security for Web Services and Service-Oriented Architectures. Springer 2010, ISBN 978-3-540-87741-7, pp. I-XII, 1-226
[j208]Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo: EXAM: a comprehensive environment for the analysis of access control policies. Int. J. Inf. Sec. 9(4): 253-273 (2010)
[j207]Elisa Bertino, Andrea Maurino, Monica Scannapieco: Guest Editors' Introduction: Data Quality in the Internet Era. IEEE Internet Computing 14(4): 11-13 (2010)
[j206]Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri: The PROBE Framework for the Personalized Cloaking of Private Locations. Transactions on Data Privacy 3(2): 123-148 (2010)
[j205]Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie, Clare-Marie Karat, John Karat, Alberto Trombetta: Privacy-aware role-based access control. ACM Trans. Inf. Syst. Secur. 13(3) (2010)
[j204]Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo: Mining Roles with Multiple Objectives. ACM Trans. Inf. Syst. Secur. 13(4): 36 (2010)
[j203]Anna Cinzia Squicciarini, Federica Paci, Elisa Bertino, Alberto Trombetta, Stefano Braghin: Group-Based Negotiations in P2P Systems. IEEE Trans. Parallel Distrib. Syst. 21(10): 1473-1486 (2010)
[j202]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Rui Xue, Elisa Bertino: Multifactor Identity Verification Using Aggregated Proof of Knowledge. IEEE Transactions on Systems, Man, and Cybernetics, Part C 40(4): 372-383 (2010)
[j201]Elisa Bertino, Elena Ferrari, Andrea Perego: A General Framework for Web Content Filtering. World Wide Web 13(3): 215-249 (2010)
[c369]Md. Enamul Kabir, Hua Wang, Elisa Bertino, Yunxiang Chi: Systematic clustering method for l-diversity model. ADC 2010: 93-102
[c368]Qun Ni, Elisa Bertino, Jorge Lobo: Risk-based access control systems built on fuzzy inferences. ASIACCS 2010: 250-260
[c367]Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa Bertino: Controlling data disclosure in computational PIR protocols. ASIACCS 2010: 310-313
[c366]Aditi Gupta, Salmin Sultana, Michael S. Kirkpatrick, Elisa Bertino: A selective encryption approach to fine-grained access control for P2P file sharing. CollaborateCom 2010: 1-10
[c365]Hyo-Sang Lim, Chenyun Dai, Elisa Bertino: A policy-based approach for assuring data integrity in DBMSs. CollaborateCom 2010: 1-10
[c364]Eiji Kawai, Elisa Bertino, Sue Moon: Panel Description: Joint COMPSAC/SAINT Panel: Future of the Internet. COMPSAC 2010: 21
[c363]Jianming Yong, Elisa Bertino: Digital identity enrolment and assurance support for VeryIDX. CSCWD 2010: 734-739
[c362]Michael S. Kirkpatrick, Elisa Bertino, Sam Kerr: PUF ROKs: generating read-once keys from physically unclonable functions. CSIIRW 2010: 19
[c361]Wonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino: Vulnerabilities leading to denial of services attacks in grid computing systems: a survey. CSIIRW 2010: 54
[c360]Yang-Sae Moon, Hea-Suk Kim, Sang-Pil Kim, Elisa Bertino: Publishing Time-Series Data under Preservation of Privacy and Distance Orders. DEXA (2) 2010: 17-31
[c359]Sunoh Choi, Gabriel Ghinita, Elisa Bertino: A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations. DEXA (1) 2010: 368-384
[c358]Eun-Ae Cho, Gabriel Ghinita, Elisa Bertino: Privacy-preserving similarity measurement for access control policies. Digital Identity Management 2010: 3-12
[c357]Kevin Steuer Jr., Ruchith Fernando, Elisa Bertino: Privacy preserving identity attribute verification in windows cardspace. Digital Identity Management 2010: 13-16
[c356]Hyo-Sang Lim, Yang-Sae Moon, Elisa Bertino: Provenance-based trustworthiness assessment in sensor networks. DMSN 2010: 2-7
[c355]Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Elisa Bertino: Private record matching using differential privacy. EDBT 2010: 123-134
[c354]
[c353]Gabriel Ghinita, Carmen Ruiz Vicente, Ning Shang, Elisa Bertino: Privacy-preserving matching of spatial datasets with protection against background knowledge. GIS 2010: 3-12
[c352]Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino: PEAR: a hardware based protocol authentication system. SPRINGL 2010: 18-25
[c351]Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino: Analyzing semantic locations cloaking techniques in a probabilistic grid-based map. GIS 2010: 522-523
[c350]
[c349]Rimma V. Nehme, Hyo-Sang Lim, Elisa Bertino: FENCE: Continuous access control enforcement in dynamic data stream environments. ICDE 2010: 940-943
[c348]Ning Shang, Mohamed Nabeel, Federica Paci, Elisa Bertino: A privacy-preserving approach to policy-based content dissemination. ICDE 2010: 944-955
[c347]Wei She, I-Ling Yen, Bhavani M. Thuraisingham, Elisa Bertino: Policy-Driven Service Composition with Information Flow Control. ICWS 2010: 50-57
[c346]Ning Shang, Federica Paci, Elisa Bertino: Efficient and privacy-preserving enforcement of attribute-based access control. IDtrust 2010: 63-68
[c345]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino, Xiangwei Kong, Weike Zhang: Biometrics-based identifiers for digital identity management. IDtrust 2010: 84-96
[c344]Md. Enamul Kabir, Hua Wang, Elisa Bertino: A Role-Involved Conditional Purpose-Based Access Control Model. EGES/GISP 2010: 167-180
[c343]Gabriel Ghinita, Mehdi Azarmi, Elisa Bertino: Privacy-Aware Location-Aided Routing in Mobile Ad Hoc Networks. Mobile Data Management 2010: 65-74
[c342]
[c341]Omar Hasan, Elisa Bertino, Lionel Brunie: Efficient privacy preserving reputation protocols inspired by secure sum. PST 2010: 126-133
[c340]Ashish Kamra, Elisa Bertino: Privilege States Based Access Control for Fine-Grained Intrusion Response. RAID 2010: 402-421
[c339]Alfredo Cuzzocrea, Elisa Bertino: A secure multiparty computation privacy preserving OLAP framework over distributed XML data. SAC 2010: 1666-1673
[c338]Michael S. Kirkpatrick, Elisa Bertino: Enforcing spatial constraints for mobile RBAC systems. SACMAT 2010: 99-108
[c337]Elisa Bertino, Hyo-Sang Lim: Assuring Data Trustworthiness - Concepts and Research Challenges. Secure Data Management 2010: 1-12
[c336]Omar Hasan, Lionel Brunie, Elisa Bertino: k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments. SEC 2010: 253-264
[c335]Mohamed Nabeel, Ning Shang, John Zage, Elisa Bertino: Mask: a system for privacy-preserving policy-based access to published content. SIGMOD Conference 2010: 1239-1242
[c334]Shouhuai Xu, Haifeng Qian, Fengying Wang, Zhenxin Zhan, Elisa Bertino, Ravi S. Sandhu: Trustworthy Information: Concepts and Mechanisms. WAIM 2010: 398-404
[e19]Elisa Bertino, Maria Luisa Damiani, Yücel Saygin (Eds.): Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2010, November 2, 2010, San Jose, California, USA, Proceedings. ACM 2010
2000 – 2009
- 2009
[j200]Federica Paci, Rodolfo Ferrini, Andrea Musci, Kevin Steuer Jr., Elisa Bertino: An Interoperable Approach to Multifactor Identity Verification. IEEE Computer 42(5): 50-57 (2009)
[j199]Elisa Bertino, Federica Paci, Rodolfo Ferrini, Ning Shang: Privacy-preserving Digital Identity Management for Cloud Computing. IEEE Data Eng. Bull. 32(1): 21-27 (2009)
[j198]Elisa Bertino, Carolyn Brodie, Seraphin B. Calo, Lorrie Faith Cranor, Clare-Marie Karat, John Karat, Ninghui Li, Dan Lin, Jorge Lobo, Qun Ni, Prathima Rao, Xiping Wang: Analysis of privacy and security policies. IBM Journal of Research and Development 53(2): 3 (2009)
[j197]John Karat, Clare-Marie Karat, Elisa Bertino, Ninghui Li, Qun Ni, Carolyn Brodie, Jorge Lobo, Seraphin B. Calo, Lorrie Faith Cranor, Ponnurangam Kumaraguru, Robert W. Reeder: Policy framework for security and privacy management. IBM Journal of Research and Development 53(2): 4 (2009)
[j196]Qun Ni, Elisa Bertino, Jorge Lobo, Seraphin B. Calo: Privacy-Aware Role-Based Access Control. IEEE Security & Privacy 7(4): 35-43 (2009)
[j195]Richard Shay, Elisa Bertino: A comprehensive simulation tool for the analysis of password policies. Int. J. Inf. Sec. 8(4): 275-289 (2009)
[j194]Yuqing Sun, Bin Gong, Xiangxu Meng, Zongkai Lin, Elisa Bertino: Specification and enforcement of flexible security policy for active cooperation. Inf. Sci. 179(15): 2629-2642 (2009)
[j193]Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, Yonglak Sohn: Privacy-preserving incremental data dissemination. Journal of Computer Security 17(1): 43-68 (2009)
[j192]Federica Paci, Elisa Bertino, Sam Kerr, Anna Cinzia Squicciarini, Jungha Woo: An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices. JSW 4(7): 696-706 (2009)
[j191]Lorenzo Martino, Elisa Bertino: Security for Web Services: Standards and Research Issues. Int. J. Web Service Res. 6(4): 48-74 (2009)
[j190]Hangzai Luo, Jianping Fan, Xiaodong Lin, Aoying Zhou, Elisa Bertino: A distributed approach to enabling privacy-preserving model-based classifier training. Knowl. Inf. Syst. 20(2): 157-185 (2009)
[j189]Rimma V. Nehme, Elke A. Rundensteiner, Elisa Bertino: Tagging Stream Data for Rich Real-Time Services. PVLDB 2(1): 73-84 (2009)
[j188]Rimma V. Nehme, Karen Works, Elke A. Rundensteiner, Elisa Bertino: Query Mesh: Multi-Route Query Processing Technology. PVLDB 2(2): 1530-1533 (2009)
[j187]Chenyun Dai, Gabriel Ghinita, Elisa Bertino, Ji-Won Byun, Ninghui Li: TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques. PVLDB 2(2): 1618-1621 (2009)
[j186]Ebru Celikel, Murat Kantarcioglu, Bhavani M. Thuraisingham, Elisa Bertino: A risk management approach to RBAC. Risk and Decision Analysis 1(1): 21-33 (2009)
[j185]Elisa Bertino: Privacy-preserving techniques for location-based services. SIGSPATIAL Special 1(2): 2-3 (2009)
[j184]Elisa Bertino, Maria Luisa Damiani: Foreword for the special issue of selected papers from the 1st ACM SIGSPATIAL Workshop on Security and Privacy in GIS and LBS. Transactions on Data Privacy 2(1): 1-2 (2009)
[j183]Dan Lin, Elisa Bertino, Reynold Cheng, Sunil Prabhakar: Location Privacy in Moving-Object Environments. Transactions on Data Privacy 2(1): 21-46 (2009)
[j182]Guy Lebanon, Monica Scannapieco, Mohamed R. Fouad, Elisa Bertino: Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk. Transactions on Data Privacy 2(3): 153-183 (2009)
[j181]Tianjie Cao, Elisa Bertino, Hong Lei: Security Analysis of the SASI Protocol. IEEE Trans. Dependable Sec. Comput. 6(1): 73-77 (2009)
[j180]Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino: Efficient integration of fine-grained access control and resource brokering in grid. The Journal of Supercomputing 49(1): 108-126 (2009)
[j179]Elisa Bertino, William Cheng-Chung Chu: Guest Editorial: Special Section on Service-Oriented Distributed Computing Systems. IEEE T. Services Computing 2(3): 245-246 (2009)
[c333]Jian Wu, Qianhui Liang, Elisa Bertino: Improving Scalability of Software Cloud for Composite Web Services. IEEE CLOUD 2009: 143-146
[c332]Elisa Bertino, Michael S. Kirkpatrick: Location-Aware Authentication and Access Control. AINA 2009: 10-15
[c331]Michael S. Kirkpatrick, Elisa Bertino: Physically restricted authentication with trusted hardware. STC 2009: 55-60
[c330]Qun Ni, Elisa Bertino, Jorge Lobo: D-algebra for composing access control policy decisions. ASIACCS 2009: 298-309
[c329]Qun Ni, Elisa Bertino: Aggregating uncertain access risk estimations from different sources invited paper. CollaborateCom 2009: 1-10
[c328]Wonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino: An assessment of accountability policies for large-scale distributed computing systems. CSIIRW 2009: 39
[c327]Elisa Bertino, Chenyun Dai, Murat Kantarcioglu: The Challenge of Assuring Data Trustworthiness. DASFAA 2009: 22-33
[c326]Rimma V. Nehme, Elke A. Rundensteiner, Elisa Bertino: Self-tuning query mesh for adaptive multi-route query processing. EDBT 2009: 803-814
[c325]Carmen Ruiz Vicente, Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino, Christian S. Jensen: Towards location-based access control in healthcare emergency response. SPRINGL 2009: 22-26
[c324]Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri: Protecting location privacy against spatial inferences: the PROBE approach. SPRINGL 2009: 32-41
[c323]Hyo-Sang Lim, Yang-Sae Moon, Elisa Bertino: Research issues in data provenance for streaming environments. SPRINGL 2009: 58-62
[c322]Yücel Saygin, Elisa Bertino, Michael Gertz, Mohamed F. Mokbel, Maria Luisa Damiani: Can an inter-disciplinary research community on location privacy be successful? SPRINGL 2009: 71-72
[c321]Gabriel Ghinita, Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino: Preventing velocity-based linkage attacks in location-aware applications. GIS 2009: 246-255
[c320]Chenyun Dai, Hyo-Sang Lim, Elisa Bertino, Yang-Sae Moon: Assessing the trustworthiness of location data based on provenance. GIS 2009: 276-285
[c319]Wonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino: The Design and Evaluation of Accountable Grid Computing System. ICDCS 2009: 145-154
[c318]Ali Inan, Murat Kantarcioglu, Elisa Bertino: Using Anonymized Data for Classification. ICDE 2009: 429-440
[c317]Rodolfo Ferrini, Elisa Bertino: A Comprehensive Approach for Solving Policy Heterogeneity. ICEIS (3) 2009: 63-68
[c316]Elisa Bertino, Elena Camossi, Michela Bertolotto: Multi-granular Spatio-temporal Object Models: Concepts and Research Directions. ICOODB 2009: 132-148
[c315]Elisa Bertino, Alfredo Cuzzocrea: Privacy Preserving OLAP over Distributed XML Documents. ICPP Workshops 2009: 603-611
[c314]Wei She, I-Ling Yen, Bhavani M. Thuraisingham, Elisa Bertino: The SCIFC Model for Information Flow Control in Web Service Composition. ICWS 2009: 1-8
[c313]Federica Paci, Rodolfo Ferrini, Elisa Bertino: Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. ICWS 2009: 535-542
[c312]Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer Jr., Jungha Woo, Elisa Bertino: Privacy-preserving management of transactions' receipts for mobile environments. IDtrust 2009: 73-84
[c311]Michael S. Kirkpatrick, Elisa Bertino: Context-Dependent Authentication and Access Control. iNetSeC 2009: 63-75
[c310]Omar Hasan, Lionel Brunie, Jean-Marc Pierson, Elisa Bertino: Elimination of Subjectivity from Trust Recommendation. IFIPTM 2009: 65-80
[c309]Shouhuai Xu, Ravi S. Sandhu, Elisa Bertino: TIUPAM: A Framework for Trustworthiness-Centric Information Sharing. IFIPTM 2009: 164-175
[c308]Tim Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani M. Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi S. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic: Assured Information Sharing Life Cycle. ISI 2009: 307-309
[c307]Shouhuai Xu, Qun Ni, Elisa Bertino, Ravi S. Sandhu: A Characterization of the problem of secure provenance management. ISI 2009: 310-314
[c306]Gabriel Ghinita, Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri: Interactive Location Cloaking with the PROBE Obfuscator. Mobile Data Management 2009: 355-356
[c305]Federica Paci, Ning Shang, Kevin Steuer Jr., Ruchith Fernando, Elisa Bertino: VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices. Mobile Data Management 2009: 367-368
[c304]Prathima Rao, Gabriel Ghinita, Elisa Bertino, Jorge Lobo: Visualization for Access Control Policy Analysis Results Using Multi-level Grids. POLICY 2009: 25-28
[c303]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo: An algebra for fine-grained integration of XACML policies. SACMAT 2009: 63-72
[c302]Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohatgi, Elisa Bertino: Automating role-based provisioning by learning from examples. SACMAT 2009: 75-84
[c301]Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, Dan Lin: Access control policy combining: theory meets practice. SACMAT 2009: 135-144
[c300]
[c299]Chenyun Dai, Dan Lin, Murat Kantarcioglu, Elisa Bertino, Ebru Celikel, Bhavani M. Thuraisingham: Query Processing Techniques for Compliance with Data Confidence Policies. Secure Data Management 2009: 49-67
[c298]Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu, Weili Han: An Access Control Language for a General Provenance Model. Secure Data Management 2009: 68-88
[c297]Rimma V. Nehme, Hyo-Sang Lim, Elisa Bertino, Elke A. Rundensteiner: StreamShield: a stream-centric approach towards security and privacy in data stream environments. SIGMOD Conference 2009: 1027-1030
[c296]
[c295]Wei She, I-Ling Yen, Bhavani M. Thuraisingham, Elisa Bertino: Effective and efficient implementation of an information flow control protocol for service composition. SOCA 2009: 1-8
[c294]Gabriel Ghinita, Panos Kalnis, Murat Kantarcioglu, Elisa Bertino: A Hybrid Technique for Private Location-Based Queries with Database Protection. SSTD 2009: 98-116
[c293]Elena Camossi, Elisa Bertino, Giovanna Guerrini, Michela Bertolotto: Adaptive Management of Multigranular Spatio-Temporal Object Attributes. SSTD 2009: 320-337
[c292]Omar Hasan, Lionel Brunie, Jean-Marc Pierson, Elisa Bertino: L'Elimination de la subjectivité dans la recommandation de confiance. UbiMob 2009: 3-10
[e18]Elisa Bertino, James B. D. Joshi (Eds.): Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 10, Springer 2009, ISBN 978-3-642-03353-7
[e17]Sheikh Iqbal Ahamed, Elisa Bertino, Carl K. Chang, Vladimir Getov, Lin Liu, Hua Ming, Rajesh Subramanyan (Eds.): Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, 20-24 July 2009. IEEE Computer Society 2009
[e16]Elisa Bertino, Thomas Groß, Kenji Takahashi (Eds.): Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009. ACM 2009, ISBN 978-1-60558-786-8
[e15]Elisa Bertino, Maria Luisa Damiani, Yücel Saygin (Eds.): Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2009, November 3, 2009, Seattle, WA, USA. ACM 2009
[e14]Elena Ferrari, Ninghui Li, Elisa Bertino, Yücel Karabulut (Eds.): Trust Management III, Third IFIP WG 11.11 International Conference, IFIPTM 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings. IFIP Advances in Information and Communication Technology 300, Springer 2009, ISBN 978-3-642-02055-1- 2008
[j178]Arjmand Samuel, Arif Ghafoor, Elisa Bertino: Context-Aware Adaptation of Access-Control Policies. IEEE Internet Computing 12(1): 51-54 (2008)
[j177]Rafae Bhatti, Maria Luisa Damiani, David W. Bettis, Elisa Bertino: Policy Mapper: Administering Location-Based Access-Control Policies. IEEE Internet Computing 12(2): 38-45 (2008)
[j176]Tianjie Cao, Peng Shen, Elisa Bertino: Cryptanalysis of Some RFID Authentication Protocols. JCM 3(7): 20-27 (2008)
[j175]Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino: Semantics-aware Obfuscation for Location Privacy. JCSE 2(2): 137-160 (2008)
[j174]Elisa Bertino, Giovanna Guerrini, Marco Mesiti: Measuring the structural similarity among XML documents and DTDs. J. Intell. Inf. Syst. 30(1): 55-92 (2008)
[j173]Maria Luisa Damiani, Elisa Bertino, Claudio Silvestri: Spatial Domains for the Administration of Location-based Access Control Policies. J. Network Syst. Manage. 16(3): 277-302 (2008)
[j172]Federica Paci, Elisa Bertino, Jason Crampton: An Access-Control Framework for WS-BPEL. Int. J. Web Service Res. 5(3): 20-43 (2008)
[j171]Ashish Kundu, Elisa Bertino: Structural signatures for tree data structures. PVLDB 1(1): 138-150 (2008)
[j170]Elisa Bertino, Ning Shang, Samuel S. Wagstaff Jr.: An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting. IEEE Trans. Dependable Sec. Comput. 5(2): 65-70 (2008)
[j169]James B. D. Joshi, Elisa Bertino, Arif Ghafoor, Yue Zhang: Formal foundations for hybrid hierarchies in GTRBAC. ACM Trans. Inf. Syst. Secur. 10(4) (2008)
[j168]Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino: XACML Policy Integration Algorithms. ACM Trans. Inf. Syst. Secur. 11(1) (2008)
[j167]Mohamed Shehab, Elisa Bertino, Arif Ghafoor: Watermarking Relational Databases Using Optimization-Based Techniques. IEEE Trans. Knowl. Data Eng. 20(1): 116-129 (2008)
[j166]Yunhua Koglin, Danfeng Yao, Elisa Bertino: Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries. IEEE Trans. Parallel Distrib. Syst. 19(5): 615-626 (2008)
[j165]Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino: Anonymous Geo-Forwarding in MANETs through Location Cloaking. IEEE Trans. Parallel Distrib. Syst. 19(10): 1297-1309 (2008)
[j164]Mohamed Shehab, Arif Ghafoor, Elisa Bertino: Secure Collaboration in a Mediator-Free Distributed Environment. IEEE Trans. Parallel Distrib. Syst. 19(10): 1338-1351 (2008)
[j163]Ashish Kundu, Elisa Bertino: A New Model for Secure Dissemination of XML Content. IEEE Transactions on Systems, Man, and Cybernetics, Part C 38(3): 292-301 (2008)
[j162]Ashish Kamra, Evimaria Terzi, Elisa Bertino: Detecting anomalous access patterns in relational databases. VLDB J. 17(5): 1063-1077 (2008)
[c291]Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino: Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems. ARES 2008: 153-160
[c290]Anna Cinzia Squicciarini, Wonjun Lee, Elisa Bertino, Carol X. Song: A Policy-Based Accountability Tool for Grid Computing Systems. APSCC 2008: 95-100
[c289]Elisa Bertino, Chenyun Dai, Hyo-Sang Lim, Dan Lin: High-Assurance Integrity Techniques for Databases. BNCOD 2008: 244-256
[c288]Elisa Bertino, Rodolfo Ferrini, Andrea Musci, Federica Paci, Kevin J. Steuer: A Federated Digital Identity Management Approach for Business Processes. CollaborateCom 2008: 194-206
[c287]Elena Camossi, Michela Bertolotto, Elisa Bertino: Querying Multigranular Spatio-temporal Objects. DEXA 2008: 390-403
[c286]Federica Paci, David Bauer, Elisa Bertino, Douglas M. Blough, Anna Cinzia Squicciarini: Minimal credential disclosure in trust negotiations. Digital Identity Management 2008: 89-96
[c285]Anna Cinzia Squicciarini, Alberto Trombetta, Elisa Bertino, Stefano Braghin: Identity-based long running negotiations. Digital Identity Management 2008: 97-106
[c284]Elisa Bertino, Bhavani M. Thuraisingham, Michael Gertz, Maria Luisa Damiani: Security and privacy for geospatial data: concepts and research directions. SPRINGL 2008: 6-19
[c283]Dan Lin, Elisa Bertino, Reynold Cheng, Sunil Prabhakar: Position transformation: a location privacy protection method for moving objects. SPRINGL 2008: 62-71
[c282]Elena Camossi, Michela Bertolotto, Elisa Bertino: Multigranular spatio-temporal models: implementation challenges. GIS 2008: 63
[c281]Rimma V. Nehme, Elke A. Rundensteiner, Elisa Bertino: A Security Punctuation Framework for Enforcing Access Control on Streaming Data. ICDE 2008: 406-415
[c280]Anna Cinzia Squicciarini, Federica Paci, Elisa Bertino: Trust establishment in the formation of Virtual Organizations. ICDE Workshops 2008: 454-461
[c279]Ali Inan, Murat Kantarcioglu, Elisa Bertino, Monica Scannapieco: A Hybrid Approach to Private Record Linkage. ICDE 2008: 496-505
[c278]Rui Zhang, Dan Lin, Kotagiri Ramamohanarao, Elisa Bertino: Continuous Intersection Joins Over Moving Objects. ICDE 2008: 863-872
[c277]Anna Cinzia Squicciarini, Ivan Paloscia, Elisa Bertino: Protecting Databases from Query Flood Attacks. ICDE 2008: 1358-1360
[c276]
[c275]Alberto Trombetta, Wei Jiang, Elisa Bertino, Lorenzo Bossi: Privately Updating Suppression and Generalization based k-Anonymous Databases. ICDE 2008: 1370-1372
[c274]Federica Paci, Rodolfo Ferrini, Yuqing Sun, Elisa Bertino: Authorization and User Failure Resiliency for WS-BPEL Business Processes. ICSOC 2008: 116-131
[c273]Xukai Zou, Yuan-Shun Dai, Elisa Bertino: A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing. INFOCOM 2008: 538-546
[c272]Fatih Turkmen, Pietro Mazzoleni, Bruno Crispo, Elisa Bertino: P-CDN: Extending access control capabilities of P2P systems to provide CDN services. ISCC 2008: 480-486
[c271]Tianjie Cao, Peng Shen, Elisa Bertino: Cryptanalysis of the LCSS RFID Authentication Protocol. ISECS 2008: 305-309
[c270]Roshan K. Thomas, Ravi S. Sandhu, Elisa Bertino, Ismailcem Budak Arpinar, Shouhuai Xu: Privacy-Preserving Accountable Accuracy Management Systems (PAAMS). ISIPS 2008: 115-121
[c269]Mohamed Shehab, Elisa Bertino, Arif Ghafoor: Proactive Role Discovery in Mediator-Free Environments. Peer-to-Peer Computing 2008: 150-159
[c268]Anna Cinzia Squicciarini, Marco Casassa Mont, Abhilasha Bhargav-Spantzel, Elisa Bertino: Automatic Compliance of Privacy Policies in Federated Digital Identity Management. POLICY 2008: 89-92
[c267]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo: EXAM: An Environment for Access Control Policy Analysis and Management. POLICY 2008: 238-240
[c266]
[c265]Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo: Mining roles with semantic meanings. SACMAT 2008: 21-30
[c264]Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo: Policy decomposition for collaborative access control. SACMAT 2008: 103-112
[c263]Qun Ni, Elisa Bertino, Jorge Lobo: An obligation model bridging access control policies and privacy policies. SACMAT 2008: 133-142
[c262]Mohamed R. Fouad, Guy Lebanon, Elisa Bertino: ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure. Secure Data Management 2008: 32-49
[c261]Ashish Kamra, Elisa Bertino, Rimma V. Nehme: Responding to Anomalous Database Requests. Secure Data Management 2008: 50-66
[c260]Chenyun Dai, Dan Lin, Elisa Bertino, Murat Kantarcioglu: An Approach to Evaluate Data Trustworthiness Based on Data Provenance. Secure Data Management 2008: 82-98
[c259]
[c258]Federica Paci, Elisa Bertino, Sam Kerr, Aaron Lint, Anna Cinzia Squicciarini, Jungha Woo: VeryIDX - A Digital Identity Management System for Pervasive Computing Environments. SEUS 2008: 268-279
[c257]Jungha Woo, Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino: Verification of Receipts from M-commerce Transactions on NFC Cellular Phones. CEC/EEE 2008: 36-43
[p7]Elisa Bertino, Giovanna Guerrini: Object-Oriented Databases. Wiley Encyclopedia of Computer Science and Engineering 2008
[p6]Elisa Bertino, Dan Lin, Wei Jiang: A Survey of Quantification of Privacy Preserving Data Mining Algorithms. Privacy-Preserving Data Mining 2008: 183-205
[e13]Yanchun Zhang, Ge Yu, Elisa Bertino, Guandong Xu (Eds.): Progress in WWW Research and Development, 10th Asia-Pacific Web Conference, APWeb 2008, Shenyang, China, April 26-28, 2008. Proceedings. Lecture Notes in Computer Science 4976, Springer 2008, ISBN 978-3-540-78848-5
[e12]Elisa Bertino, Kenji Takahashi (Eds.): Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008. ACM 2008, ISBN 978-1-60558-294-8
[e11]Elisa Bertino, Maria Luisa Damiani (Eds.): Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2008, November 4, 2008, Irvine, California, USA, Proceedings. ACM 2008- 2007
[j161]Rafae Bhatti, Elisa Bertino, Arif Ghafoor: An integrated approach to federated identity and privilege management in open systems. Commun. ACM 50(2): 81-87 (2007)
[j160]Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu: A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7): 109-116 (2007)
[j159]Jianming Yong, Elisa Bertino: Replacing Lost or Stolen E-Passports. IEEE Computer 40(10): 89-91 (2007)
[j158]Manolis Terrovitis, Panos Vassiliadis, Spiros Skiadopoulos, Elisa Bertino, Barbara Catania, Anna Maddalena, Stefano Rizzi: Modeling and language support for the management of pattern-bases. Data Knowl. Eng. 62(2): 368-397 (2007)
[j157]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino: Trust Negotiation in Identity Management. IEEE Security & Privacy 5(2): 55-63 (2007)
[j156]Ninghui Li, Ji-Won Byun, Elisa Bertino: A Critique of the ANSI Standard on Role-Based Access Control. IEEE Security & Privacy 5(6): 41-49 (2007)
[j155]Elisa Bertino, Elena Ferrari, Federica Paci, Loredana Parasiliti Provenza: A system for securing push-based distribution of XML documents. Int. J. Inf. Sec. 6(4): 255-284 (2007)
[j154]Xukai Zou, Yogesh Karandikar, Elisa Bertino: A dynamic key management solution to access hierarchy. Int. Journal of Network Management 17(6): 437-450 (2007)
[j153]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Shimon K. Modi, Matthew Young, Elisa Bertino, Stephen J. Elliott: Privacy preserving multi-factor authentication with biometrics. Journal of Computer Security 15(5): 529-560 (2007)
[j152]Xiaoxin Wu, Elisa Bertino: An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks. IEEE Trans. Dependable Sec. Comput. 4(4): 252-265 (2007)
[j151]Maria Luisa Damiani, Elisa Bertino, Barbara Catania, Paolo Perlasca: GEO-RBAC: A spatially aware RBAC. ACM Trans. Inf. Syst. Secur. 10(1) (2007)
[j150]Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Federica Paci, Bhavani M. Thuraisingham: PP-trust-X: A system for privacy preserving trust negotiations. ACM Trans. Inf. Syst. Secur. 10(3) (2007)
[c256]Mohamed Nabeel, Elisa Bertino: A structure preserving approach for securing XML documents. CollaborateCom 2007: 8-15
[c255]Ji-Won Byun, Ashish Kamra, Elisa Bertino, Ninghui Li: Efficient k -Anonymization Using Clustering Techniques. DASFAA 2007: 188-200
[c254]Dan Lin, Hicham G. Elmongui, Elisa Bertino, Beng Chin Ooi: Data Management in RFID Applications. DEXA 2007: 434-444
[c253]Richard Shay, Abhilasha Bhargav-Spantzel, Elisa Bertino: Password policy simulation and analysis. Digital Identity Management 2007: 1-10
[c252]Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bertino: Receipt management- transaction history based trust establishment. Digital Identity Management 2007: 82-91
[c251]Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo: Conditional Privacy-Aware Role Based Access Control. ESORICS 2007: 72-89
[c250]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Matthew Young, Elisa Bertino: Privacy Requirements in Identity Management Solutions. HCI (9) 2007: 694-702
[c249]Anna Cinzia Squicciarini, Alberto Trombetta, Elisa Bertino: Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations. ICDCS 2007: 57
[c248]Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Alexei B. Czeksis: Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies. ICICS 2007: 386-397
[c247]Jacques Thomas, Federica Paci, Elisa Bertino, Patrick Eugster: User Tasks and Access Control overWeb Services. ICWS 2007: 60-69
[c246]Rafae Bhatti, Daniel Sanz, Elisa Bertino, Arif Ghafoor: A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy. ICWS 2007: 447-454
[c245]Elisa Bertino, Ashish Kamra, James P. Early: Profiling Database Application to Detect SQL Injection Attacks. IPCCC 2007: 449-458
[c244]Elisa Bertino, Lorenzo Martino: A Service-oriented Approach to Security - Concepts and Issues. ISADS 2007: 7-16
[c243]Ebru Celikel, Murat Kantarcioglu, Bhavani M. Thuraisingham, Elisa Bertino: Managing Risks in RBAC Employed Distributed Environments. OTM Conferences (2) 2007: 1548-1566
[c242]
[c241]Danfeng Yao, Yunhua Koglin, Elisa Bertino, Roberto Tamassia: Decentralized authorization and data security in web content delivery. SAC 2007: 1654-1661
[c240]Dan Lin, Prathima Rao, Elisa Bertino, Jorge Lobo: An approach to evaluate policy similarity. SACMAT 2007: 1-10
[c239]Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo: Privacy-aware role based access control. SACMAT 2007: 41-50
[c238]Anna Cinzia Squicciarini, Ayça Azgin Hintoglu, Elisa Bertino, Yücel Saygin: A privacy preserving assertion based policy language for federation systems. SACMAT 2007: 51-60
[c237]Monica Scannapieco, Ilya Figotin, Elisa Bertino, Ahmed K. Elmagarmid: Privacy preserving schema and data matching. SIGMOD Conference 2007: 653-664
[c236]Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun: On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566
[c235]William H. Winsborough, Anna Cinzia Squicciarini, Elisa Bertino: Information carrying identity proof trees. WPES 2007: 76-79
[p5]Abbie Barbir, Chris Hobbs, Elisa Bertino, Frederick Hirsch, Lorenzo Martino: Challenges of Testing Web Services and Security in SOA Implementations. Test and Analysis of Web Services 2007: 395-440- 2006
[j149]Frédéric Cuppens, Hervé Debar, Elisa Bertino: Foreword. Annales des Télécommunications 61(3-4): 242-244 (2006)
[j148]Maria Luisa Damiani, G. Groppelli, G. Norini, Elisa Bertino, A. Gigliuto, Andrea Nucita: A lava flow simulation model for the development of volcanic hazard maps for Mount Etna (Italy). Computers & Geosciences 32(4): 512-526 (2006)
[j147]Elena Camossi, Michela Bertolotto, Elisa Bertino: A multigranular object-oriented framework supporting spatio-temporal granularity conversions. International Journal of Geographical Information Science 20(5): 511-534 (2006)
[j146]Elisa Bertino, Stefano Franzoni, Pietro Mazzoleni, Piero Mussio, Stefano Valtolina: Integration of virtual reality and database systems for cultural heritage dissemination. IJCSE 2(5/6): 307-316 (2006)
[j145]Mohamed Shehab, Elisa Bertino, Arif Ghafoor: Workflow authorisation in mediator-free environments. IJSN 1(1/2): 2-12 (2006)
[j144]Anna Cinzia Squicciarini, Federica Paci, Elisa Bertino: A secure framework for publishing virtual community contracts. IJWBC 2(2): 237-255 (2006)
[j143]Elisa Bertino, Steve Ruth: Policies and IT Technologies: A Puzzle of Two Pieces. IEEE Internet Computing 10(1): 65-67 (2006)
[j142]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino: Establishing and protecting digital identity in federation systems. Journal of Computer Security 14(3): 269-300 (2006)
[j141]Elisa Bertino, Anna Cinzia Squicciarini, Lorenzo Martino, Federica Paci: An Adaptive Access Control Model for Web Services. Int. J. Web Service Res. 3(3): 27-60 (2006)
[j140]Ji-Won Byun, Elisa Bertino: Micro-views, or on how to protect privacy while enhancing data usability: concepts and challenges. SIGMOD Record 35(1): 9-13 (2006)
[j139]Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Indrakshi Ray: Achieving Privacy in Trust Negotiations with an Ontology-Based Approach. IEEE Trans. Dependable Sec. Comput. 3(1): 13-30 (2006)
[j138]Giovanni Mella, Elena Ferrari, Elisa Bertino, Yunhua Koglin: Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems. ACM Trans. Inf. Syst. Secur. 9(4): 421-460 (2006)
[j137]Rafae Bhatti, Elisa Bertino, Arif Ghafoor: X-FEDERATE: A Policy Engineering Framework for Federated Access Management. IEEE Trans. Software Eng. 32(5): 330-346 (2006)
[j136]Elisa Bertino, Latifur R. Khan, Ravi S. Sandhu, Bhavani M. Thuraisingham: Secure knowledge management: confidentiality, trust, and privacy. IEEE Transactions on Systems, Man, and Cybernetics, Part A 36(3): 429-438 (2006)
[j135]Elisa Bertino, Anna Cinzia Squicciarini, Ivan Paloscia, Lorenzo Martino: Ws-AC: A Fine Grained Access Control System for Web Services. World Wide Web 9(2): 143-171 (2006)
[c234]
[c233]Stefano Valtolina, Pietro Mazzoleni, Stefano Franzoni, Elisa Bertino: A semantic approach to build personalized interfaces in the cultural heritage domain. AVI 2006: 306-309
[c232]Elisa Bertino, Anna Cinzia Squicciarini: A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities. CSCWD 2006: 14
[c231]Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino: Privacy preserving multi-factor authentication with biometrics. Digital Identity Management 2006: 63-72
[c230]Ashish Kundu, Elisa Bertino: Secure Dissemination of XML Content Using Structure-based Routing. EDOC 2006: 153-164
[c229]Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, Indrakshi Ray: Trust Negotiations with Customizable Anonymity. IAT Workshops 2006: 69-72
[c228]
[c227]Basit Shafiq, Arjmand Samuel, Elisa Bertino, Arif Ghafoor: Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints. ICDE 2006: 119
[c226]Elisa Bertino, Jason Crampton, Federica Paci: Access Control and Authorization Constraints for WS-BPEL. ICWS 2006: 275-284
[c225]Maria Luisa Damiani, Elisa Bertino: Access Control and Privacy in Location-Aware Services forMobile Organizations. MDM 2006: 11
[c224]Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino: Achieving Anonymity in Mobile Ad Hoc Networks Using Fuzzy Position Information. MSN 2006: 461-472
[c223]Jianming Yong, Elisa Bertino, Mark Toleman, Dave Roberts: Extended RBAC with Role Attributes. PACIS 2006: 8
[c222]Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Alexei Czeskis, Elisa Bertino: Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management. Privacy Enhancing Technologies 2006: 78-98
[c221]Reynold Cheng, Yu Zhang, Elisa Bertino, Sunil Prabhakar: Preserving User Location Privacy in Mobile Data Management Infrastructures. Privacy Enhancing Technologies 2006: 393-412
[c220]Elisa Bertino, Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini: Policy Languages for Digital Identity Management in Federation Systems. POLICY 2006: 54-66
[c219]Guy Lebanon, Monica Scannapieco, Mohamed R. Fouad, Elisa Bertino: Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk. Privacy in Statistical Databases 2006: 217-232
[c218]
[c217]Maria Luisa Damiani, Elisa Bertino: Architectural issues for a location-aware role-based access control system. SAC 2006: 1184-1185
[c216]Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan, Latifur Khan: Access control, confidentiality and privacy for video surveillance databases. SACMAT 2006: 1-10
[c215]James B. D. Joshi, Elisa Bertino: Fine-grained role-based delegation in presence of the hybrid role hierarchy. SACMAT 2006: 81-90
[c214]Ji-Won Byun, Yonglak Sohn, Elisa Bertino: Systematic control and management of data integrity. SACMAT 2006: 101-110
[c213]Pietro Mazzoleni, Elisa Bertino, Bruno Crispo: XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! SACMAT 2006: 219-227
[c212]

