Year |
Citation |
Score |
2020 |
Saxena N, Hayes E, Bertino E, Ojo P, Choo KR, Burnap P. Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses Electronics. 9: 1460. DOI: 10.3390/Electronics9091460 |
0.341 |
|
2020 |
Singla A, Hussain SR, Chowdhury O, Bertino E, Li N. Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks Proceedings On Privacy Enhancing Technologies. 2020: 126-142. DOI: 10.2478/popets-2020-0008 |
0.311 |
|
2020 |
Won J, Seo S, Bertino E. A Secure Shuffling Mechanism for White-Box Attack-Resistant Unmanned Vehicles Ieee Transactions On Mobile Computing. 19: 1023-1039. DOI: 10.1109/Tmc.2019.2903048 |
0.417 |
|
2020 |
Yi X, Bertino E, Rao F, Lam K, Nepal S, Bouguettaya A. Privacy-Preserving User Profile Matching in Social Networks Ieee Transactions On Knowledge and Data Engineering. 32: 1572-1585. DOI: 10.1109/Tkde.2019.2912748 |
0.393 |
|
2020 |
Cicala F, Bertino E. Analysis of Encryption Key Generation in Modern Crypto Ransomware Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2020.3005976 |
0.342 |
|
2020 |
Mehnaz S, Bertino E. A Fine-grained Approach for Anomaly Detection in File System Accesses with Enhanced Temporal User Profiles Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2954507 |
0.349 |
|
2020 |
Li Y, Bertino E, Abdel-Khalik HS. Effectiveness of Model-Based Defenses for Digitally Controlled Industrial Systems: Nuclear Reactor Case Study Nuclear Technology. 206: 82-93. DOI: 10.1080/00295450.2019.1626170 |
0.351 |
|
2020 |
Yan Z, Susilo W, Bertino E, Zhang J, Yang LT. AI-driven data security and privacy Journal of Network and Computer Applications. 172: 102842. DOI: 10.1016/J.JNCA.2020.102842 |
0.31 |
|
2019 |
Rao F, Cao J, Bertino E, Kantarcioglu M. Hybrid Private Record Linkage Acm Transactions On Privacy and Security. 22: 1-36. DOI: 10.1145/3318462 |
0.333 |
|
2019 |
Bertino E, Kundu A, Sura Z. Data Transparency with Blockchain and AI Ethics Journal of Data and Information Quality. 11: 16. DOI: 10.1145/3312750 |
0.395 |
|
2019 |
Jabal AA, Davari M, Bertino E, Makaya C, Calo S, Verma D, Russo A, Williams C. Methods and Tools for Policy Analysis Acm Computing Surveys. 51: 121. DOI: 10.1145/3295749 |
0.357 |
|
2019 |
Jabal AA, Davari M, Bertino E, Makaya C, Calo S, Verma D, Williams C. ProFact: A Provenance-based Analytics Framework for Access Control Policies Ieee Transactions On Services Computing. 1-1. DOI: 10.1109/Tsc.2019.2900641 |
0.413 |
|
2019 |
Sani AS, Yuan D, Bao W, Dong ZY, Vucetic B, Bertino E. Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet Ieee Transactions On Information Forensics and Security. 14: 2113-2127. DOI: 10.1109/Tifs.2019.2892005 |
0.405 |
|
2019 |
Zhang Y, Deng R, Bertino E, Zheng D. Robust and Universal Seamless Handover Authentication in 5G HetNets Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2927664 |
0.38 |
|
2019 |
Bertino E, Merrill S, Nesen A, Utz C. Redefining Data Transparency: A Multidimensional Approach Ieee Computer. 52: 16-26. DOI: 10.1109/Mc.2018.2890190 |
0.313 |
|
2019 |
Li F, Li H, Wang C, Ren K, Bertino E. Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT Ieee Internet of Things Journal. 6: 1446-1449. DOI: 10.1109/Jiot.2019.2908460 |
0.418 |
|
2019 |
Fadolalkarim D, Bertino E. A-PANDDE: Advanced Provenance-based ANomaly Detection of Data Exfiltration Computers & Security. 84: 276-287. DOI: 10.1016/J.Cose.2019.03.021 |
0.437 |
|
2018 |
Bertino E, Jabal AA, Calo SB, Verma DC, Williams C. The Challenge of Access Control Policies Quality Journal of Data and Information Quality. 10: 6. DOI: 10.1145/3209668 |
0.327 |
|
2018 |
Bertino E, Jahanshahi MR. Adaptive and Cost-Effective Collection of High-Quality Data for Critical Infrastructure and Emergency Management in Smart Cities—Framework and Challenges Journal of Data and Information Quality. 10: 1-6. DOI: 10.1145/3190579 |
0.3 |
|
2018 |
Rezvani M, Ignjatovic A, Bertino E. A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems Acm Transactions On Internet Technology. 18: 55. DOI: 10.1145/3183323 |
0.363 |
|
2018 |
Jabal AA, Bertino E. A Comprehensive Query Language for Provenance Information International Journal of Cooperative Information Systems. 27: 1850007. DOI: 10.1142/S0218843018500077 |
0.397 |
|
2018 |
Badsha S, Yi X, Khalil I, Liu D, Nepal S, Bertino E, Lam K. Privacy Preserving Location-Aware Personalized Web Service Recommendations Ieee Transactions On Services Computing. 1-1. DOI: 10.1109/Tsc.2018.2839587 |
0.391 |
|
2018 |
Arshad MU, Kundu A, Bertino E, Ghafoor A, Kundu C. Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases Ieee Transactions On Knowledge and Data Engineering. 30: 866-879. DOI: 10.1109/Tkde.2017.2776221 |
0.606 |
|
2018 |
Gunasinghe H, Bertino E. PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones Ieee Transactions On Information Forensics and Security. 13: 1042-1057. DOI: 10.1109/Tifs.2017.2777787 |
0.446 |
|
2018 |
Rashidi B, Fung C, Nguyen A, Vu T, Bertino E. Android User Privacy Preserving Through Crowdsourcing Ieee Transactions On Information Forensics and Security. 13: 773-787. DOI: 10.1109/Tifs.2017.2767019 |
0.4 |
|
2018 |
Kang J, Lin D, Jiang W, Bertino E. Highly efficient randomized authentication in VANETs Pervasive and Mobile Computing. 44: 31-44. DOI: 10.1016/J.Pmcj.2018.01.004 |
0.407 |
|
2018 |
Bertino E, Casola V, Castiglione A, Susilo W. Editorial: Security and privacy protection vs sustainable development Computers & Security. 76: 250-251. DOI: 10.1016/J.Cose.2018.05.008 |
0.382 |
|
2018 |
Oluwatimi O, Damiani ML, Bertino E. A context-aware system to secure enterprise content: Incorporating reliability specifiers Computers & Security. 77: 162-178. DOI: 10.1016/J.Cose.2018.04.001 |
0.418 |
|
2017 |
Rullo A, Midi D, Serra E, Bertino E. Pareto Optimal Security Resource Allocation for Internet of Things Acm Transactions On Privacy and Security. 20: 1-30. DOI: 10.1145/3139293 |
0.308 |
|
2017 |
Wang C, Bertino E. Sensor Network Provenance Compression Using Dynamic Bayesian Networks Acm Transactions On Sensor Networks. 13: 5. DOI: 10.1145/2997653 |
0.322 |
|
2017 |
Midi D, Sultana S, Bertino E. A System for Response and Prevention of Security Incidents in Wireless Sensor Networks Acm Transactions On Sensor Networks. 13: 1-38. DOI: 10.1145/2996195 |
0.357 |
|
2017 |
Verma D, Calo S, Chakraborty S, Bertino E, Williams C, Tucker J, Rivera B, Mel GRd. Dynamic and adaptive policy models for coalition operations Proceedings of Spie. 10190: 1019006. DOI: 10.1117/12.2266565 |
0.428 |
|
2017 |
Touma M, Bertino E, Rivera B, Verma D, Calo S. Framework for behavioral analytics in anomaly identification Proceedings of Spie. 10190. DOI: 10.1117/12.2266374 |
0.359 |
|
2017 |
Bossi L, Bertino E, Hussain SR. A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection Ieee Transactions On Software Engineering. 43: 415-431. DOI: 10.1109/Tse.2016.2598336 |
0.447 |
|
2017 |
Yavuz AA, Mudgerikar A, Singla A, Papapanagiotou I, Bertino E. Real-Time Digital Signatures for Time-Critical Networks Ieee Transactions On Information Forensics and Security. 12: 2627-2639. DOI: 10.1109/Tifs.2017.2716911 |
0.388 |
|
2017 |
Rashidi B, Fung C, Bertino E. A Collaborative DDoS Defence Framework Using Network Function Virtualization Ieee Transactions On Information Forensics and Security. 12: 2483-2497. DOI: 10.1109/Tifs.2017.2708693 |
0.378 |
|
2017 |
Bertino E, Islam N. Botnets and Internet of Things Security Ieee Computer. 50: 76-79. DOI: 10.1109/Mc.2017.62 |
0.417 |
|
2017 |
Habibi J, Midi D, Mudgerikar A, Bertino E. Heimdall: Mitigating the Internet of Insecure Things Ieee Internet of Things Journal. 4: 968-978. DOI: 10.1109/Jiot.2017.2704093 |
0.348 |
|
2017 |
Khan MS, Midi D, Khan MI, Bertino E. Fine-Grained Analysis of Packet Loss in MANETs Ieee Access. 5: 7798-7807. DOI: 10.1109/Access.2017.2694467 |
0.312 |
|
2017 |
Won J, Seo S, Bertino E. Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications Ieee Access. 5: 3721-3749. DOI: 10.1109/Access.2017.2684128 |
0.438 |
|
2017 |
Ahmad A, Whitworth B, Zeshan F, Bertino E, Friedman RS. Extending social networks with delegation Computers & Security. 70: 546-564. DOI: 10.1016/J.Cose.2017.07.010 |
0.348 |
|
2017 |
Rashidi B, Fung C, Bertino E. Android resource usage risk assessment using hidden Markov model and online learning Computers & Security. 65: 90-107. DOI: 10.1016/J.Cose.2016.11.006 |
0.407 |
|
2017 |
Khan MS, Midi D, Malik SUR, Khan MI, Javaid N, Bertino E. Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy Mobile Networks and Applications. 22: 493-509. DOI: 10.1007/S11036-017-0867-0 |
0.325 |
|
2017 |
Xiao Q, Bertino E. Detecting deceptive engagement in social media by temporal pattern analysis of user behaviors: a survey Wiley Interdisciplinary Reviews-Data Mining and Knowledge Discovery. 7. DOI: 10.1002/Widm.1210 |
0.377 |
|
2017 |
Xiang Y, Bertino E, Kutylowski M. Security and privacy in social networks Concurrency and Computation: Practice and Experience. 29. DOI: 10.1002/Cpe.4093 |
0.308 |
|
2016 |
Seo SH, Won J, Bertino E, Kang Y, Choi D. A security framework for a drone delivery service Dronet 2016 - Proceedings of the 2nd Workshop On Micro Aerial Vehicle Networks, Systems, and Applications For Civilian Use, Co-Located With Mobisys 2016. 29-34. DOI: 10.1145/2935620.2935629 |
0.329 |
|
2016 |
Ghinita G, Damiani ML, Silvestri C, Bertino E. Protecting Against Velocity-Based, Proximity-Based, and External Event Attacks in Location-Centric Social Networks Acm Transactions On Spatial Algorithms and Systems. 2: 8. DOI: 10.1145/2910580 |
0.397 |
|
2016 |
Midi D, Bertino E. Node or link? Fine-grained analysis of packet-loss attacks in wireless sensor networks Acm Transactions On Sensor Networks. 12. DOI: 10.1145/2886103 |
0.324 |
|
2016 |
Wang C, Hussain SR, Bertino E. Dictionary Based Secure Provenance Compression for Wireless Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 27: 405-418. DOI: 10.1109/Tpds.2015.2402156 |
0.323 |
|
2016 |
Yi X, Paulet R, Bertino E, Varadharajan V. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy Ieee Transactions On Knowledge and Data Engineering. 28: 1546-1559. DOI: 10.1109/Tkde.2016.2520473 |
0.395 |
|
2016 |
Yi X, Paulet R, Bertino E, Xu G. Private Cell Retrieval from Data Warehouses Ieee Transactions On Information Forensics and Security. 11: 1346-1361. DOI: 10.1109/Tifs.2016.2527620 |
0.389 |
|
2016 |
Yi X, Rao F, Tari Z, Hao F, Bertino E, Khalil I, Zomaya AY. ID2S Password-Authenticated Key Exchange Protocols Ieee Transactions On Computers. 65: 3687-3701. DOI: 10.1109/Tc.2016.2553031 |
0.422 |
|
2016 |
Bertino E. Securing Mobile Applications Ieee Computer. 49: 9-9. DOI: 10.1109/Mc.2016.34 |
0.362 |
|
2016 |
Bertino E. Security Threats: Protecting the New Cyberfrontier Computer. 49: 11-14. DOI: 10.1109/Mc.2016.188 |
0.338 |
|
2016 |
Panah AS, Schyndel RV, Sellis T, Bertino E. On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques Ieee Access. 4: 2670-2704. DOI: 10.1109/Access.2016.2570812 |
0.379 |
|
2016 |
Bertino E. Editorial: Introduction to Data Security and Privacy Data Science and Engineering. 1: 125-126. DOI: 10.1007/S41019-016-0021-1 |
0.425 |
|
2016 |
Wang C, Zheng W, Bertino E. Provenance for Wireless Sensor Networks: A Survey Data Science and Engineering. 1: 189-200. DOI: 10.1007/S41019-016-0017-X |
0.328 |
|
2016 |
Sun Y, Xu H, Bertino E, Sun C. A Data-Driven Evaluation for Insider Threats Data Science and Engineering. 1: 73-85. DOI: 10.1007/S41019-016-0009-X |
0.415 |
|
2016 |
Sallam A, Fadolalkarim D, Bertino E, Xiao Q. Data and syntax centric anomaly detection for relational databases Wiley Interdisciplinary Reviews-Data Mining and Knowledge Discovery. 6: 231-239. DOI: 10.1002/Widm.1195 |
0.465 |
|
2016 |
Wang H, Yi X, Bertino E, Sun L. Protecting outsourced data in cloud computing through access management Concurrency Computation. 28: 600-615. DOI: 10.1002/Cpe.3286 |
0.517 |
|
2015 |
Bertino E, Samanthula BK. Security with privacy-A research agenda Collaboratecom 2014 - Proceedings of the 10th Ieee International Conference On Collaborative Computing: Networking, Applications and Worksharing. 144-153. DOI: 10.4108/icst.collaboratecom.2014.257687 |
0.314 |
|
2015 |
Sultana S, Bertino E. A distributed system for the management of finegrained provenance Journal of Database Management. 26: 32-47. DOI: 10.4018/Jdm.2015040103 |
0.453 |
|
2015 |
Ammar N, Malik Z, Bertino E, Rezgui A. XACML Policy Evaluation with Dynamic Context Handling Ieee Transactions On Knowledge and Data Engineering. 27: 2575-2588. DOI: 10.1109/Tkde.2015.2415473 |
0.415 |
|
2015 |
Shu X, Yao D, Bertino E. Privacy-preserving detection of sensitive data exposure Ieee Transactions On Information Forensics and Security. 10: 1092-1103. DOI: 10.1109/Tifs.2015.2398363 |
0.386 |
|
2015 |
Seo SH, Won J, Sultana S, Bertino E. Effective key management in dynamic wireless sensor networks Ieee Transactions On Information Forensics and Security. 10: 371-383. DOI: 10.1109/Tifs.2014.2375555 |
0.365 |
|
2015 |
Bertino E. The state of the journal editorial Ieee Transactions On Dependable and Secure Computing. 12: 135. DOI: 10.1109/Tdsc.2015.2504839 |
0.321 |
|
2015 |
Gupta A, Habibi J, Kirkpatrick MS, Bertino E. Marlin: Mitigating code reuse attacks using code randomization Ieee Transactions On Dependable and Secure Computing. 12: 326-337. DOI: 10.1109/Tdsc.2014.2345384 |
0.489 |
|
2015 |
Shebaro B, Oluwatimi O, Bertino E. Context-based access control systems for mobile devices Ieee Transactions On Dependable and Secure Computing. 12: 150-163. DOI: 10.1109/Tdsc.2014.2320731 |
0.461 |
|
2015 |
Rezvani M, Ignjatovic A, Bertino E, Jha S. Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks Ieee Transactions On Dependable and Secure Computing. 12: 98-110. DOI: 10.1109/Tdsc.2014.2316816 |
0.335 |
|
2015 |
Sultana S, Ghinita G, Bertino E, Shehab M. A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks Ieee Transactions On Dependable and Secure Computing. 12: 256-269. DOI: 10.1109/Tdsc.2013.44 |
0.388 |
|
2015 |
Bertino E. Denial-of-service attacks to UMTS Computer. 48: 6. DOI: 10.1109/Mc.2015.42 |
0.394 |
|
2015 |
Sallam A, Bertino E, Hussain SR, Landers D, Lefler RM, Steiner D. DBSAFE—An Anomaly Detection System to Protect Databases From Exfiltration Attempts Ieee Systems Journal. DOI: 10.1109/Jsyst.2015.2487221 |
0.418 |
|
2015 |
Cao J, Rao FY, Bertino E, Kantarcioglu M. A hybrid private record linkage scheme: Separating differentially private synopses from matching records Proceedings - International Conference On Data Engineering. 2015: 1011-1022. DOI: 10.1109/ICDE.2015.7113352 |
0.33 |
|
2015 |
Gunasinghe H, Bertino E. RahasNym: Protecting against Linkability in the Digital Identity Ecosystem Proceedings - International Conference On Distributed Computing Systems. 2015: 772-773. DOI: 10.1109/ICDCS.2015.102 |
0.35 |
|
2015 |
Bertino E. Big Data-Security and Privacy Proceedings - 2015 Ieee International Congress On Big Data, Bigdata Congress 2015. 757-761. DOI: 10.1109/BigDataCongress.2015.126 |
0.32 |
|
2015 |
Nabeel M, Ding X, Seo S, Bertino E. Scalable end-to-end security for advanced metering infrastructures Information Systems. 53: 213-223. DOI: 10.1016/J.Is.2015.01.004 |
0.46 |
|
2015 |
Brunswicker S, Bertino E, Matei S. Big Data for Open Digital Innovation - A Research Roadmap Big Data Research. 2: 53-58. DOI: 10.1016/J.Bdr.2015.01.008 |
0.349 |
|
2015 |
Bertino E, Deng RH, Huang X, Zhou J. Security and privacy of electronic health information systems International Journal of Information Security. 14: 485-486. DOI: 10.1007/S10207-015-0303-Z |
0.336 |
|
2014 |
Midi D, Oluwatimi O, Shebaro B, Bertino E. Demo overview: Privacy-enhancing features of IdentiDroid Proceedings of the Acm Conference On Computer and Communications Security. 1481-1483. DOI: 10.1145/2660267.2662380 |
0.304 |
|
2014 |
Arshad MU, Kundu A, Bertino E, Madhavan K, Ghafoor A. Security of graph data: Hashing schemes and definitions Codaspy 2014 - Proceedings of the 4th Acm Conference On Data and Application Security and Privacy. 223-234. DOI: 10.1145/2557547.2557564 |
0.508 |
|
2014 |
Choi S, Ghinita G, Lim H, Bertino E. Secure kNN Query Processing in Untrusted Cloud Environments Ieee Transactions On Knowledge and Data Engineering. 26: 2818-2831. DOI: 10.1109/Tkde.2014.2302434 |
0.554 |
|
2014 |
Paulet R, Kaosar MG, Yi X, Bertino E. Privacy-Preserving and Content-Protecting Location Based Queries Ieee Transactions On Knowledge and Data Engineering. 26: 1200-1210. DOI: 10.1109/Tkde.2013.87 |
0.468 |
|
2014 |
Nabeel M, Bertino E. Privacy Preserving Delegated Access Control in Public Clouds Ieee Transactions On Knowledge and Data Engineering. 26: 2268-2280. DOI: 10.1109/Tkde.2013.68 |
0.461 |
|
2014 |
Seo S, Nabeel MYM, Ding X, Bertino E. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds Ieee Transactions On Knowledge and Data Engineering. 26: 2107-2119. DOI: 10.1109/Tkde.2013.138 |
0.47 |
|
2014 |
Fouad MR, Elbassioni K, Bertino E. A supermodularity-based differential privacy preserving algorithm for data anonymization Ieee Transactions On Knowledge and Data Engineering. 26: 1591-1601. DOI: 10.1109/Tkde.2013.107 |
0.795 |
|
2014 |
Yi X, Bertino E, Vaidya J, Xing C. Private Searching on Streaming Data Based on Keyword Frequency Ieee Transactions On Dependable and Secure Computing. 11: 155-167. DOI: 10.1109/Tdsc.2013.36 |
0.426 |
|
2014 |
Huang X, Xiang Y, Bertino E, Zhou J, Xu L. Robust Multi-Factor Authentication for Fragile Communications Ieee Transactions On Dependable and Secure Computing. 11: 568-581. DOI: 10.1109/Tdsc.2013.2297110 |
0.442 |
|
2014 |
Seo S, Gupta A, Sallam AM, Bertino E, Yim K. Detecting mobile malware threats to homeland security through static analysis Journal of Network and Computer Applications. 38: 43-53. DOI: 10.1016/J.Jnca.2013.05.008 |
0.549 |
|
2014 |
Wang H, Sun L, Bertino E. Building access control policy model for privacy preserving and testing policy conflicting problems Journal of Computer and System Sciences. 80: 1493-1503. DOI: 10.1016/J.Jcss.2014.04.017 |
0.403 |
|
2014 |
Allahbakhsh M, Ignjatovic A, Benatallah B, Beheshti SMR, Foo N, Bertino E. Representation and querying of unfair evaluations in social rating systems Computers and Security. 41: 68-88. DOI: 10.1016/J.Cose.2013.09.008 |
0.334 |
|
2014 |
Bertino E, Ghinita G, Kantarcioglu M, Nguyen D, Park J, Sandhu R, Sultana S, Thuraisingham B, Xu S. A roadmap for privacy-enhanced secure data provenance Journal of Intelligent Information Systems. 43: 481-501. DOI: 10.1007/s10844-014-0322-7 |
0.387 |
|
2014 |
Cuzzocrea A, Bertino E. A comprehensive theoretical framework for privacy preserving distributed OLAP Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8842: 117-136. DOI: 10.1007/978-3-662-45550-0_16 |
0.417 |
|
2014 |
Yi X, Hao F, Bertino E. ID-based two-server password-authenticated key exchange Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8713: 257-276. DOI: 10.1007/978-3-319-11212-1_15 |
0.338 |
|
2014 |
Ammar N, Malik Z, Bertino E, Rezgui A. Dynamic privacy policy management in services-based interactions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8645: 248-262. DOI: 10.1007/978-3-319-10085-2_23 |
0.379 |
|
2014 |
Bertino E. Data security - Challenges and research opportunities Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8425: 9-13. DOI: 10.1007/978-3-319-06811-4_2 |
0.342 |
|
2014 |
Xu L, Bertino E, Mu Y. Security of new generation computing systems Concurrency and Computation: Practice and Experience. 26: 1475-1476. DOI: 10.1002/Cpe.3128 |
0.335 |
|
2014 |
Gunasinghe H, Bertino E. Privacy preserving biometrics-based and user centric authentication protocol Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8792: 389-408. |
0.348 |
|
2013 |
Kuzu M, Kantarcioglu M, Inan A, Bertino E, Durham E, Malin B. Efficient Privacy-Aware Record Integration. Advances in Database Technology : Proceedings. International Conference On Extending Database Technology. 167-178. PMID 24500681 DOI: 10.1145/2452376.2452398 |
0.347 |
|
2013 |
Choi S, Gutierrez C, Lim HS, Bagchi S, Bertino E. Secure and resilient proximity-based access control International Conference On Information and Knowledge Management, Proceedings. 15-20. DOI: 10.1145/2512410.2512425 |
0.314 |
|
2013 |
Shebaro B, Sallam A, Kamra A, Bertino E. PostgreSQL anomalous query detector Acm International Conference Proceeding Series. 741-744. DOI: 10.1145/2452376.2452469 |
0.526 |
|
2013 |
Squicciarini AC, Petracca G, Bertino E. Adaptive data protection in distributed sysems Codaspy 2013 - Proceedings of the 3rd Acm Conference On Data and Application Security and Privacy. 365-376. DOI: 10.1145/2435349.2435401 |
0.397 |
|
2013 |
She W, Yen I, Thuraisingham B, Bertino E. Security-Aware Service Composition with Fine-Grained Information Flow Control Ieee Transactions On Services Computing. 6: 330-343. DOI: 10.1109/Tsc.2012.3 |
0.412 |
|
2013 |
Yi X, Kaosar MG, Paulet R, Bertino E. Single-Database Private Information Retrieval from Fully Homomorphic Encryption Ieee Transactions On Knowledge and Data Engineering. 25: 1125-1134. DOI: 10.1109/Tkde.2012.90 |
0.385 |
|
2013 |
Sultana S, Shehab M, Bertino E. Secure provenance transmission for streaming data Ieee Transactions On Knowledge and Data Engineering. 25: 1890-1903. DOI: 10.1109/Tkde.2012.31 |
0.437 |
|
2013 |
Nabeel M, Shang N, Bertino E. Privacy preserving policy-based content sharing in public clouds Ieee Transactions On Knowledge and Data Engineering. 25: 2602-2614. DOI: 10.1109/Tkde.2012.180 |
0.497 |
|
2013 |
Lin D, Rao P, Ferrini R, Bertino E, Lobo J. A Similarity Measure for Comparing XACML Policies Ieee Transactions On Knowledge and Data Engineering. 25: 1946-1959. DOI: 10.1109/Tkde.2012.174 |
0.409 |
|
2013 |
Hasan O, Brunie L, Bertino E, Shang N. A decentralized privacy preserving reputation protocol for the malicious adversarial model Ieee Transactions On Information Forensics and Security. 8: 949-962. DOI: 10.1109/Tifs.2013.2258914 |
0.402 |
|
2013 |
Seo SH, Ding X, Bertino E. Encryption key management for secure communication in smart advanced metering infrastructures 2013 Ieee International Conference On Smart Grid Communications, Smartgridcomm 2013. 498-503. DOI: 10.1109/SmartGridComm.2013.6688007 |
0.344 |
|
2013 |
Allahbakhsh M, Benatallah B, Ignjatovic A, Motahari-Nezhad HR, Bertino E, Dustdar S. Quality Control in Crowdsourcing Systems: Issues and Directions Ieee Internet Computing. 17: 76-81. DOI: 10.1109/Mic.2013.20 |
0.355 |
|
2013 |
Singhal M, Chandrasekhar S, Ge T, Sandhu R, Krishnan R, Ahn GJ, Bertino E. Collaboration in multicloud computing environments: Framework and security issues Computer. 46: 76-84. DOI: 10.1109/Mc.2013.46 |
0.449 |
|
2013 |
Cuzzocrea A, Bertino E. Further theoretical contributions to a privacy preserving distributed OLAP framework Proceedings - International Computer Software and Applications Conference. 234-239. DOI: 10.1109/COMPSAC.2013.39 |
0.301 |
|
2013 |
Nehme RV, Works K, Lei C, Rundensteiner EA, Bertino E. Multi-route query processing and optimization Journal of Computer and System Sciences. 79: 312-329. DOI: 10.1016/J.Jcss.2012.09.010 |
0.729 |
|
2013 |
Lee W, Squicciarini A, Bertino E. Agent-based accountable grid computing systems The Journal of Supercomputing. 65: 903-929. DOI: 10.1007/S11227-013-0871-5 |
0.621 |
|
2013 |
Kundu A, Bertino E. Privacy-preserving authentication of trees and graphs International Journal of Information Security. 12: 467-494. DOI: 10.1007/S10207-013-0198-5 |
0.605 |
|
2012 |
Nabeel M, Shang N, Bertino E. Efficient privacy preserving content based publish subscribe systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 133-143. DOI: 10.1145/2295136.2295164 |
0.327 |
|
2012 |
Inan A, Kantarcioglu M, Ghinita G, Bertino E. A hybrid approach to private record matching Ieee Transactions On Dependable and Secure Computing. 9: 684-698. DOI: 10.1109/Tdsc.2012.46 |
0.417 |
|
2012 |
Kirkpatrick MS, Ghinita G, Bertino E. Resilient authenticated execution of critical applications in untrusted environments Ieee Transactions On Dependable and Secure Computing. 9: 597-609. DOI: 10.1109/Tdsc.2012.25 |
0.392 |
|
2012 |
Squicciarini A, Bertino E, Trombetta A, Braghin S. A Flexible Approach to Multisession Trust Negotiations Ieee Transactions On Dependable and Secure Computing. 9: 16-29. DOI: 10.1109/Tdsc.2011.31 |
0.443 |
|
2012 |
Fouad MR, Elbassioni K, Bertino E. Modeling the risk & Utility of information sharing in social networks Proceedings - 2012 Ase/Ieee International Conference On Privacy, Security, Risk and Trust and 2012 Ase/Ieee International Conference On Social Computing, Socialcom/Passat 2012. 441-450. DOI: 10.1109/SocialCom-PASSAT.2012.131 |
0.773 |
|
2012 |
Bertino E. Trusted identities in cyberspace Ieee Internet Computing. 16: 3-6. DOI: 10.1109/Mic.2012.15 |
0.407 |
|
2012 |
Nabeel M, Bertino E. Privacy preserving delegated access control in the storage as a service model Proceedings of the 2012 Ieee 13th International Conference On Information Reuse and Integration, Iri 2012. 645-652. DOI: 10.1109/IRI.2012.6303070 |
0.402 |
|
2012 |
Han W, Cao Y, Bertino E, Yong J. Using automated individual white-list to protect web digital identities Expert Systems With Applications. 39: 11861-11869. DOI: 10.1016/J.Eswa.2012.02.020 |
0.413 |
|
2012 |
Hasan O, Brunie L, Bertino E. Preserving privacy of feedback providers in decentralized reputation systems Computers & Security. 31: 816-826. DOI: 10.1016/J.Cose.2011.12.003 |
0.399 |
|
2012 |
Kabir ME, Wang H, Bertino E. A role-involved purpose-based access control model Information Systems Frontiers. 14: 809-822. DOI: 10.1007/S10796-011-9305-1 |
0.455 |
|
2012 |
You I, Lenzini G, Ogiela MR, Bertino E. Defending against insider threats and internal data leakage Security and Communication Networks. 5: 831-833. DOI: 10.1002/Sec.598 |
0.45 |
|
2012 |
Squicciarini AC, Petracca G, Bertino E. Adaptive data management for self-protecting objects in cloud computing systems Proceedings of the 2012 8th International Conference On Network and Service Management, Cnsm 2012. 140-144. |
0.389 |
|
2011 |
Nabeel M, Bertino E, Kantarcioglu M, Thuraisingham B. Towards privacy preserving access control in the cloud Coliaboratecom 2011 - Proceedings of the 7th International Conference On Collaborative Computing: Networking, Applications and Worksharing. 172-180. DOI: 10.4108/icst.collaboratecom.2011.247061 |
0.334 |
|
2011 |
Bertino E, Kirkpatrick MS. Location-based access control systems for mobile users - Concepts and research directions Springl 2011 - Proceedings of the 4th Acm Sigspatial International Workshop On Security and Privacy in Gis and Lbs. 49-52. DOI: 10.1145/2071880.2071890 |
0.315 |
|
2011 |
Ni Q, Bertino E. xfACL: An extensible functional language for access control Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 61-71. DOI: 10.1145/1998441.1998451 |
0.57 |
|
2011 |
Paci F, Mecella M, Ouzzani M, Bertino E. ACConv -- An Access Control Model for Conversational Web Services Acm Transactions On the Web. 5: 13. DOI: 10.1145/1993053.1993055 |
0.428 |
|
2011 |
Bertino E, Ghinita G. Towards mechanisms for detection and prevention of data exfiltration by insiders Proceedings of the 6th International Symposium On Information, Computer and Communications Security, Asiaccs 2011. 10-19. DOI: 10.1145/1966913.1966916 |
0.301 |
|
2011 |
Aliaga DG, Bertino E, Valtolina S. DECHO-A framework for the digital exploration of cultural heritage objects Journal of Computing and Cultural Heritage. 3. DOI: 10.1145/1921614.1921619 |
0.376 |
|
2011 |
Kamra A, Bertino E. Design and implementation of an intrusion response system for relational databases Ieee Transactions On Knowledge and Data Engineering. 23: 875-888. DOI: 10.1109/Tkde.2010.151 |
0.626 |
|
2011 |
Trombetta A, Jiang W, Bertino E, Bossi L. Privacy-preserving updates to anonymous and confidential databases Ieee Transactions On Dependable and Secure Computing. 8: 578-587. DOI: 10.1109/Tdsc.2010.72 |
0.401 |
|
2011 |
Sun Y, Wang Q, Li N, Bertino E, Atallah MJ. On the Complexity of Authorization in RBAC under Qualification and Security Constraints Ieee Transactions On Dependable and Secure Computing. 8: 883-897. DOI: 10.1109/Tdsc.2010.55 |
0.414 |
|
2011 |
Damiani ML, Silvestri C, Bertino E. Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications Ieee Pervasive Computing. 10: 64-72. DOI: 10.1109/Mprv.2011.18 |
0.391 |
|
2011 |
Kabir E, Wang H, Bertino E. A Conditional Role-Involved Purpose-Based Access Control Model Journal of Organizational Computing and Electronic Commerce. 21: 71-91. DOI: 10.1080/10919392.2011.541007 |
0.416 |
|
2011 |
Cuzzocrea A, Bertino E. Privacy preserving OLAP over distributed XML data: A theoretically-sound secure-multiparty-computation approach Journal of Computer and System Sciences. 77: 965-987. DOI: 10.1016/J.Jcss.2011.02.004 |
0.422 |
|
2011 |
Kabir ME, Wang H, Bertino E. A conditional purpose-based access control model with dynamic roles Expert Systems With Applications. 38: 1482-1489. DOI: 10.1016/J.Eswa.2010.07.057 |
0.455 |
|
2011 |
Squicciarini AC, Paci F, Bertino E. Trust establishment in the formation of Virtual Organizations Computer Standards and Interfaces. 33: 13-23. DOI: 10.1016/J.Csi.2010.03.003 |
0.365 |
|
2011 |
Rao P, Lin D, Bertino E, Li N, Lobo J. Fine-grained integration of access control policies Computers & Security. 30: 91-107. DOI: 10.1016/J.Cose.2010.10.006 |
0.608 |
|
2011 |
Ghinita G, Kalnis P, Kantarcioglu M, Bertino E. Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection Geoinformatica. 15: 699-726. DOI: 10.1007/S10707-010-0121-4 |
0.437 |
|
2011 |
Kabir ME, Wang H, Bertino E. Efficient systematic clustering method for k -anonymization Acta Informatica. 48: 51-66. DOI: 10.1007/S00236-010-0131-6 |
0.313 |
|
2011 |
Sandhu R, Bertino E. CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy: Foreword Codaspy'11 - Proceedings of the 1st Acm Conference On Data and Application Security and Privacy. |
0.31 |
|
2010 |
Bertino E, Ghinita G, Kamra A. Access control for databases: Concepts and systems Foundations and Trends in Databases. 3: 1-148. DOI: 10.1561/1900000014 |
0.686 |
|
2010 |
Molloy I, Chen H, Li T, Wang Q, Li N, Bertino E, Calo S, Lobo J. Mining Roles with Multiple Objectives Acm Transactions On Information and System Security. 13: 36. DOI: 10.1145/1880022.1880030 |
0.458 |
|
2010 |
Kirkpatrick MS, Bertino E. Enforcing spatial constraints for mobile RBAC systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 99-108. DOI: 10.1145/1809842.1809860 |
0.365 |
|
2010 |
Nabeel M, Shang N, Zage J, Bertino E. Mask: A system for privacy-preserving policy-based access to published content Proceedings of the Acm Sigmod International Conference On Management of Data. 1239-1242. DOI: 10.1145/1807167.1807329 |
0.373 |
|
2010 |
Ni Q, Bertino E, Lobo J, Brodie C, Karat C, Karat J, Trombeta A. Privacy-aware role-based access control Acm Transactions On Information and System Security. 13: 24. DOI: 10.1145/1805974.1805980 |
0.66 |
|
2010 |
Shang N, Ghinita G, Zhou Y, Bertino E. Controlling data disclosure in computational PIR protocols Proceedings of the 5th International Symposium On Information, Computer and Communications Security, Asiaccs 2010. 310-313. DOI: 10.1145/1755688.1755727 |
0.374 |
|
2010 |
Bhargav-Spantzel A, Squicciarini A, Bertino E, Kong X, Zhang W. Biometrics-based identifiers for digital identity management Acm International Conference Proceeding Series. 84-96. DOI: 10.1145/1750389.1750401 |
0.771 |
|
2010 |
Shang N, Paci F, Bertino E. Efficient and privacy-preserving enforcement of attribute-based access control Acm International Conference Proceeding Series. 63-68. DOI: 10.1145/1750389.1750398 |
0.399 |
|
2010 |
Inan A, Kantarcioglu M, Ghinita G, Bertino E. Private record matching using differential privacy Advances in Database Technology - Edbt 2010 - 13th International Conference On Extending Database Technology, Proceedings. 123-134. DOI: 10.1145/1739041.1739059 |
0.336 |
|
2010 |
Bhargav-Spantzel A, Squicciarini AC, Xue R, Bertino E. Multifactor identity verification using aggregated proof of knowledge Ieee Transactions On Systems, Man and Cybernetics Part C: Applications and Reviews. 40: 372-383. DOI: 10.1109/TSMCC.2010.2045755 |
0.765 |
|
2010 |
Squicciarini AC, Paci F, Bertino E, Trombetta A, Braghin S. Group-based negotiations in P2P systems Ieee Transactions On Parallel and Distributed Systems. 21: 1473-1486. DOI: 10.1109/Tpds.2010.25 |
0.354 |
|
2010 |
Kamra A, Bertino E. JTAM: A joint threshold administration model Proceedings - 2010 Ieee International Symposium On Policies For Distributed Systems and Networks, Policy 2010. 129-132. DOI: 10.1109/POLICY.2010.34 |
0.579 |
|
2010 |
Bertino E, Maurino A, Scannapieco M. Guest editors' introduction: Data quality in the Internet era Ieee Internet Computing. 14: 11-13. DOI: 10.1109/Mic.2010.93 |
0.379 |
|
2010 |
Shang N, Nabeel M, Paci F, Bertino E. A privacy-preserving approach to policy-based content dissemination Proceedings - International Conference On Data Engineering. 944-955. DOI: 10.1109/ICDE.2010.5447902 |
0.366 |
|
2010 |
Nehme RV, Lim HS, Bertino E. FENCE: Continuous access control enforcement in dynamic data stream environments Proceedings - International Conference On Data Engineering. 940-943. DOI: 10.1109/ICDE.2010.5447899 |
0.691 |
|
2010 |
Ni Q, Bertino E. Credibility-enhanced curated database: Improving the value of curated databases Proceedings - International Conference On Data Engineering. 784-795. DOI: 10.1109/ICDE.2010.5447857 |
0.497 |
|
2010 |
Bertino E, Ferrari E, Perego A. A General Framework for Web Content Filtering World Wide Web. 13: 215-249. DOI: 10.1007/S11280-009-0073-5 |
0.363 |
|
2010 |
Lin D, Rao P, Bertino E, Li N, Lobo J. EXAM: a comprehensive environment for the analysis of access control policies International Journal of Information Security. 9: 253-273. DOI: 10.1007/S10207-010-0106-1 |
0.599 |
|
2010 |
Kamra A, Bertino E. Privilege states based access control for fine-grained intrusion response Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 402-421. DOI: 10.1007/978-3-642-15512-3_21 |
0.604 |
|
2010 |
Bertino E, Martino LD, Paci F, Squicciarini AC. Security for web services and service-oriented architectures Security For Web Services and Service-Oriented Architectures. 1-226. DOI: 10.1007/978-3-540-87742-4 |
0.344 |
|
2009 |
Paci F, Bertino E, Kerr S, Squicciarini AC, Woo J. An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices Journal of Software. 4: 696-706. DOI: 10.4304/Jsw.4.7.696-706 |
0.459 |
|
2009 |
Ni Q, Bertino E. Aggregating uncertain access risk estimations from different sources: Invited paper 2009 5th International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2009. DOI: 10.4108/ICST.COLLABORATECOM2009.8272 |
0.542 |
|
2009 |
Martino LD, Bertino E. Security for Web services: Standards and research issues International Journal of Web Services Research. 6: 48-74. DOI: 10.4018/978-1-61350-104-7.Ch015 |
0.464 |
|
2009 |
Celikel E, Kantarcioglu M, Thuraisingham B, Bertino E. A risk management approach to RBAC Risk and Decision Analysis. 1: 21-33. DOI: 10.3233/Rda-2008-0002 |
0.405 |
|
2009 |
Byun J, Li T, Bertino E, Li N, Sohn Y. Privacy-preserving incremental data dissemination Journal of Computer Security. 17: 43-68. DOI: 10.3233/Jcs-2009-0316 |
0.598 |
|
2009 |
Dai C, Ghinita G, Bertino E, Byun J, Li N. TIAMAT Proceedings of the Vldb Endowment. 2: 1618-1621. DOI: 10.14778/1687553.1687607 |
0.469 |
|
2009 |
Karat J, Karat C-, Bertino E, Li N, Ni Q, Brodie C, Lobo J, Calo SB, Cranor LF, Kumaraguru P, Reeder RW. Policy framework for security and privacy management Ibm Journal of Research and Development. 53: 242-255. DOI: 10.1147/Jrd.2009.5429046 |
0.638 |
|
2009 |
Bertino E, Brodie C, Calo SB, Cranor LF, Karat C, Karat J, Li N, Lin D, Lobo J, Ni Q, Rao PR, Wang X. Analysis of privacy and security policies Ibm Journal of Research and Development. 53: 225-241. DOI: 10.1147/Jrd.2009.5429045 |
0.694 |
|
2009 |
Kirkpatrick MS, Bertino E. Physically restricted authentication with trusted hardware Proceedings of the Acm Conference On Computer and Communications Security. 55-60. DOI: 10.1145/1655108.1655118 |
0.344 |
|
2009 |
Bertino E. Privacy-preserving techniques for location-based services Sigspatial Special. 1: 2-3. DOI: 10.1145/1567253.1567254 |
0.386 |
|
2009 |
Nehme RV, Lim HS, Bertino E, Rundensteiner EA. StreamShield: A stream-centric approach towards security and privacy in data stream environments Sigmod-Pods'09 - Proceedings of the International Conference On Management of Data and 28th Symposium On Principles of Database Systems. 1027-1029. DOI: 10.1145/1559845.1559972 |
0.724 |
|
2009 |
Lee W, Squicciarini AC, Bertino E. An assessment of accountability policies for Large-Scale distributed computing systems Acm International Conference Proceeding Series. DOI: 10.1145/1558607.1558652 |
0.304 |
|
2009 |
Ferrini R, Bertino E. Supporting RBAC with XACML+OWL Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 145-154. DOI: 10.1145/1542207.1542231 |
0.312 |
|
2009 |
Nehme RV, Rundensteiner EA, Bertino E. Self-tuning query mesh for adaptive multi-route query processing Proceedings of the 12th International Conference On Extending Database Technology: Advances in Database Technology, Edbt'09. 803-814. DOI: 10.1145/1516360.1516452 |
0.668 |
|
2009 |
Bertino E, Chu WCC. Guest editorial: Special section on service-oriented distributed computing systems Ieee Transactions On Services Computing. 2: 245-246. DOI: 10.1109/Tsc.2009.24 |
0.376 |
|
2009 |
Cao T, Bertino E, Lei H. Security Analysis of the SASI Protocol Ieee Transactions On Dependable and Secure Computing. 6: 73-77. DOI: 10.1109/Tdsc.2008.32 |
0.434 |
|
2009 |
Gaspard C, Goldberg S, Itani W, Bertino E, Nita-Rotaru C. SINE: Cache-friendly integrity for the web 5th Ieee Workshop On Secure Network Protocols, Npsec'09. 7-12. DOI: 10.1109/NPSEC.2009.5342250 |
0.307 |
|
2009 |
Paci F, Ferrini R, Musci A, Steuer K, Bertino E. An Interoperable Approach to Multifactor Identity Verification Ieee Computer. 42: 50-57. DOI: 10.1109/Mc.2009.142 |
0.38 |
|
2009 |
Wonjun L, Squicciarini AC, Bertino E. The design and evaluation of accountable grid computing system Proceedings - International Conference On Distributed Computing Systems. 145-154. DOI: 10.1109/ICDCS.2009.54 |
0.318 |
|
2009 |
Bertino E, Kirkpatrick M. Location-aware authentication and access control - Concepts and issues Proceedings - International Conference On Advanced Information Networking and Applications, Aina. 10-15. DOI: 10.1109/AINA.2009.50 |
0.356 |
|
2009 |
Sun Y, Gong B, Meng X, Lin Z, Bertino E. Specification and enforcement of flexible security policy for active cooperation Information Sciences. 179: 2629-2642. DOI: 10.1016/J.Ins.2009.01.040 |
0.505 |
|
2009 |
Paci F, Bauer D, Bertino E, Blough DM, Squicciarini A, Gupta A. Minimal credential disclosure in trust negotiations Identity in the Information Society. 2: 221-239. DOI: 10.1007/S12394-009-0022-6 |
0.574 |
|
2009 |
Mazzoleni P, Crispo B, Sivasubramanian S, Bertino E. Efficient integration of fine-grained access control and resource brokering in grid The Journal of Supercomputing. 49: 108-126. DOI: 10.1007/S11227-008-0248-3 |
0.414 |
|
2009 |
Shay R, Bertino E. A comprehensive simulation tool for the analysis of password policies International Journal of Information Security. 8: 275-289. DOI: 10.1007/S10207-009-0084-3 |
0.424 |
|
2009 |
Thomas RK, Sandhu R, Bertino E, Arpinar B, Xu S. Privacy-preserving accountable accuracy management systems (PAAMS) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5661: 115-121. DOI: 10.1007/978-3-642-10233-2_11 |
0.379 |
|
2009 |
Kirkpatrick M, Bertino E. Context-dependent authentication and access control Ifip Advances in Information and Communication Technology. 309: 63-75. DOI: 10.1007/978-3-642-05437-2_6 |
0.372 |
|
2009 |
Ghinita G, Kalnis P, Kantarcioglu M, Bertino E. A hybrid technique for private location-based queries with database protection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5644: 98-116. DOI: 10.1007/978-3-642-02982-0_9 |
0.338 |
|
2009 |
Ferrini R, Bertino E. A comprehensive approach for solving policy heterogeneity Iceis 2009 - 11th International Conference On Enterprise Information Systems, Proceedings. 63-68. |
0.324 |
|
2009 |
Nehme RV, Rundensteiner EA, Bertino E. Tagging stream data for rich real-time services Proceedings of the Vldb Endowment. 2: 73-84. |
0.674 |
|
2009 |
Nehme RV, Works KE, Rundensteiner EA, Bertino E. Query Mesh: Multi-route query processing technology Proceedings of the Vldb Endowment. 2: 1530-1533. |
0.672 |
|
2008 |
Damiani ML, Silvestri C, Bertino E. Semantics-aware Obfuscation for Location Privacy Journal of Computing Science and Engineering. 2: 137-160. DOI: 10.5626/Jcse.2008.2.2.137 |
0.43 |
|
2008 |
Cao T, Shen P, Bertino E. Cryptanalysis of Some RFID Authentication Protocols Journal of Communications. 3: 20-27. DOI: 10.4304/Jcm.3.7.20-27 |
0.367 |
|
2008 |
Paci F, Bertino E, Crampton J. An access-control framework for WS-BPEL International Journal of Web Services Research. 5: 20-43. DOI: 10.4018/Jwsr.2008070102 |
0.366 |
|
2008 |
Squicciarini AC, Trombetta A, Bertino E, Braghin S. Identity-based long running negotiations Proceedings of the Acm Conference On Computer and Communications Security. 97-105. DOI: 10.1145/1456424.1456440 |
0.363 |
|
2008 |
Paci F, Bauer D, Bertino E, Blough DM, Squicciarini AC. Minimal credential disclosure in trust negotiations Proceedings of the Acm Conference On Computer and Communications Security. 89-96. DOI: 10.1145/1456424.1456439 |
0.313 |
|
2008 |
Kamra A, Bertino E, Lebanon G. Mechanisms for database intrusion detection and response 2nd Sigmod Phd Workshop On Innovative Database Research, Idar. 31-36. DOI: 10.1145/1410308.1410318 |
0.617 |
|
2008 |
Mazzoleni P, Crispo B, Sivasubramanian S, Bertino E. XACML Policy Integration Algorithms Acm Transactions On Information and System Security. 11: 4. DOI: 10.1145/1330295.1330299 |
0.456 |
|
2008 |
Joshi JBD, Bertino E, Ghafoor A, Zhang Y. Formal foundations for hybrid hierarchies in GTRBAC Acm Transactions On Information and System Security. 10: 2. DOI: 10.1145/1284680.1284682 |
0.599 |
|
2008 |
Kundu A, Bertino E. A new model for secure dissemination of XML content Ieee Transactions On Systems, Man and Cybernetics Part C: Applications and Reviews. 38: 292-301. DOI: 10.1109/TSMCC.2008.919213 |
0.428 |
|
2008 |
Wu X, Liu J, Hong X, Bertino E. Anonymous Geo-Forwarding in MANETs through Location Cloaking Ieee Transactions On Parallel and Distributed Systems. 19: 1297-1309. DOI: 10.1109/Tpds.2008.28 |
0.317 |
|
2008 |
Shehab M, Ghafoor A, Bertino E. Secure collaboration in a mediator-free distributed environment Ieee Transactions On Parallel and Distributed Systems. 19: 1338-1351. DOI: 10.1109/Tpds.2008.26 |
0.633 |
|
2008 |
Koglin Y, Yao D, Bertino E. Efficient and secure content processing and distribution by cooperative intermediaries Ieee Transactions On Parallel and Distributed Systems. 19: 615-626. DOI: 10.1109/Tpds.2007.70758 |
0.813 |
|
2008 |
Shehab M, Bertino E, Ghafoor A. Watermarking relational databases using optimization based techniques Ieee Transactions On Knowledge and Data Engineering. 20. DOI: 10.1109/Tkde.2007.190668 |
0.585 |
|
2008 |
Bertino E, Shang N, Wagstaff SS. An efficient time-bound hierarchical key management scheme for secure broadcasting Ieee Transactions On Dependable and Secure Computing. 5: 65-70. DOI: 10.1109/Tdsc.2007.70241 |
0.43 |
|
2008 |
Squicciarini A, Mont MC, Bhargav-Spantzel A, Bertino E. Automatic compliance of privacy policies in federated digital identity management Proceedings - 2008 Ieee Workshop On Policies For Distributed Systems and Networks, Policy 2008. 89-92. DOI: 10.1109/POLICY.2008.46 |
0.798 |
|
2008 |
Shehab M, Bertino E, Ghafoor A. Proactive role discovery in mediator-free environments Proceedings - P2p'08, 8th International Conference On Peer-to-Peer Computing. 150-159. DOI: 10.1109/P2P.2008.52 |
0.316 |
|
2008 |
Samuel A, Ghafoor A, Bertino E. Context-Aware Adaptation of Access-Control Policies Ieee Internet Computing. 12: 51-54. DOI: 10.1109/Mic.2008.6 |
0.626 |
|
2008 |
Bhatti R, Damiani ML, Bettis DW, Bertino E. Policy Mapper: Administering Location-Based Access-Control Policies Ieee Internet Computing. 12: 38-45. DOI: 10.1109/Mic.2008.40 |
0.385 |
|
2008 |
Nabeel M, Bertino E. Secure delta-publishing of XML content Proceedings - International Conference On Data Engineering. 1361-1363. DOI: 10.1109/ICDE.2008.4497556 |
0.369 |
|
2008 |
Nehme RV, Rundensteiner EA, Bertino E. A security punctuation framework for enforcing access control on streaming data Proceedings - International Conference On Data Engineering. 406-415. DOI: 10.1109/ICDE.2008.4497449 |
0.74 |
|
2008 |
Woo J, Bhagav-Spantzel A, Squicciarini AC, Bertino E. Verification of receipts from M-commerce transactions on NFC cellular phones Proceedings - 10th Ieee Joint Conference On E-Commerce Technology and the 5th Enterprise Computing, E-Commerce and E-Services, Cec 2008 and Eee 2008. 36-43. DOI: 10.1109/CECandEEE.2008.130 |
0.367 |
|
2008 |
Squicciarini AC, Lee W, Bertino E, Song CX. A policy-based accountability tool for grid computing systems Proceedings of the 3rd Ieee Asia-Pacific Services Computing Conference, Apscc 2008. 95-100. DOI: 10.1109/APSCC.2008.257 |
0.33 |
|
2008 |
Damiani ML, Bertino E, Silvestri C. Spatial Domains for the Administration of Location-based Access Control Policies Journal of Network and Systems Management. 16: 277-302. DOI: 10.1007/S10922-008-9106-0 |
0.406 |
|
2008 |
Luo H, Fan J, Lin X, Zhou A, Bertino E. A distributed approach to enabling privacy-preserving model-based classifier training Knowledge and Information Systems. 20: 157-185. DOI: 10.1007/S10115-008-0167-X |
0.361 |
|
2008 |
Kamra A, Terzi E, Bertino E. Detecting anomalous access patterns in relational databases Vldb Journal. 17: 1063-1077. DOI: 10.1007/s00778-007-0051-4 |
0.624 |
|
2008 |
Kamra A, Bertino E. Database intrusion detection and response Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 400-401. DOI: 10.1007/978-3-540-87403-4_26 |
0.615 |
|
2008 |
Kamra A, Bertino E, Nehme R. Responding to anomalous database requests Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5159: 50-66. DOI: 10.1007/978-3-540-85259-9_4 |
0.778 |
|
2008 |
Fouad MR, Lebanon G, Bertino E. ARUBA: A risk-utility-based algorithm for data disclosure Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5159: 32-49. DOI: 10.1007/978-3-540-85259-9_3 |
0.767 |
|
2007 |
Bertino E, Carminati B, Ferrari E. Authentication techniques for UDDI registries Modern Technologies in Web Services Research. 9-30. DOI: 10.4018/978-1-59904-280-0.ch002 |
0.358 |
|
2007 |
Damiani ML, Bertino E, Perlasca P. Data security in location-aware applications: an approach based on RBAC International Journal of Information and Computer Security. 1: 5-38. DOI: 10.1504/Ijics.2007.012243 |
0.469 |
|
2007 |
Bhargav-Spantzel A, Woo J, Bertino E. Receipt management- transaction history based trust establishment Dim'07 - Proceedings of the 2007 Acm Workshop On Digital Identity Management. 82-91. DOI: 10.1145/1314403.1314417 |
0.803 |
|
2007 |
Shay RJK, Bhargav-Spantzel A, Bertino E. Password policy simulation and analysis Dim'07 - Proceedings of the 2007 Acm Workshop On Digital Identity Management. 1-10. DOI: 10.1145/1314403.1314405 |
0.768 |
|
2007 |
Winsborough WH, Squicciarini AC, Bertino E. Information carrying identity proof trees Wpes'07 - Proceedings of the 2007 Acm Workshop On Privacy in Electronic Society. 76-79. DOI: 10.1145/1314333.1314348 |
0.325 |
|
2007 |
Antón AI, Bertino E, Li N, Yu T. A roadmap for comprehensive online privacy policy management Communications of the Acm. 50: 109-116. DOI: 10.1145/1272516.1272522 |
0.364 |
|
2007 |
Squicciarini A, Bertino E, Ferrari E, Paci F, Thuraisingham B. PP-trust-X: A system for privacy preserving trust negotiations Acm Transactions On Information and System Security. 10: 12. DOI: 10.1145/1266977.1266981 |
0.478 |
|
2007 |
Squicciarini AC, Hintoglu AA, Bertino E, Saygin Y. A privacy preserving assertion based policy language for federation systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 51-60. DOI: 10.1145/1266840.1266849 |
0.354 |
|
2007 |
Yao D, Koglin Y, Bertino E, Tamassia R. Decentralized authorization and data security in web content delivery Proceedings of the Acm Symposium On Applied Computing. 1654-1661. DOI: 10.1145/1244002.1244353 |
0.815 |
|
2007 |
Bhatti R, Bertino E, Ghafoor A. An integrated approach to federated identity and privilege management in open systems Communications of the Acm. 50: 81-87. DOI: 10.1145/1216016.1216025 |
0.589 |
|
2007 |
Wu X, Bertino E. An analysis study on zone-based anonymous communication in mobile ad hoc networks Ieee Transactions On Dependable and Secure Computing. 4: 252-265. DOI: 10.1109/Tdsc.2007.70213 |
0.333 |
|
2007 |
Bertino E, Kamra A, Early JP. Profiling database applications to detect SQL injection attacks Conference Proceedings of the Ieee International Performance, Computing, and Communications Conference. 449-458. DOI: 10.1109/PCCC.2007.358926 |
0.571 |
|
2007 |
Bhargav-Spantzel A, Squicciarini AC, Bertino E. Trust negotiation in identity management Ieee Security and Privacy. 5: 55-63. DOI: 10.1109/MSP.2007.46 |
0.784 |
|
2007 |
Li N, Byun J, Bertino E. A Critique of the ANSI Standard on Role-Based Access Control Ieee Security & Privacy Magazine. 5: 41-49. DOI: 10.1109/MSP.2007.158 |
0.516 |
|
2007 |
Squicciarini AC, Trombetta A, Bertino E. Supporting robust and secure interactions in open domains through recovery of trust negotiations Proceedings - International Conference On Distributed Computing Systems. DOI: 10.1109/ICDCS.2007.144 |
0.345 |
|
2007 |
Bertino E, Martino LD. A service-oriented approach to security - Concepts and issues Proceedings of the Ieee Computer Society Workshop On Future Trends of Distributed Computing Systems. 31-38. DOI: 10.1109/FTDCS.2007.6 |
0.38 |
|
2007 |
Squicciarini AC, Bertino E, Goasguen S. Access control strategies for virtualized environments in grid computing systems Proceedings of the Ieee Computer Society Workshop On Future Trends of Distributed Computing Systems. 48-54. DOI: 10.1109/FTDCS.2007.10 |
0.34 |
|
2007 |
Nabeel M, Bertino E. A structure preserving approach for securing XML documents Proceedings of the 3rd International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2007. 8-15. DOI: 10.1109/COLCOM.2007.4553802 |
0.394 |
|
2007 |
Bertino E, Ferrari E, Paci F, Provenza LP. A system for securing push-based distribution of XML documents International Journal of Information Security. 6: 255-284. DOI: 10.1007/S10207-007-0020-3 |
0.477 |
|
2007 |
Damiani ML, Bertino E. Access control systems for geospatial data and applications Spatial Data On the Web: Modeling and Management. 189-214. DOI: 10.1007/978-3-540-69878-4_9 |
0.378 |
|
2007 |
Zou X, Karandikar Y, Bertino E. A dynamic key management solution to access hierarchy International Journal of Network Management. 17: 437-450. DOI: 10.1002/Nem.656 |
0.39 |
|
2006 |
Bertino E, Squicciarini AC, Martino L, Paci F. An Adaptive Access Control Model for Web Services International Journal of Web Services Research. 3: 27-60. DOI: 10.4018/Jwsr.2006070102 |
0.389 |
|
2006 |
Shehab M, Bertino E, Ghafoor A. Workflow authorisation in mediator-free environments International Journal of Security and Networks. 1: 2-12. DOI: 10.1504/Ijsn.2006.010819 |
0.557 |
|
2006 |
Mella G, Ferrari E, Bertino E, Koglin Y. Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems Acm Transactions On Information and System Security. 9: 421-460. DOI: 10.1145/1187441.1187443 |
0.81 |
|
2006 |
Bhargav-Spantzel A, Squicciarini A, Bertino E. Privacy preserving multi-factor authentication with biometrics Proceedings of the Second Acm Workshop On Digital Identity Management, Dim 2006. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 63-72. DOI: 10.1145/1179529.1179540 |
0.801 |
|
2006 |
Byun J, Bertino E. Micro-views, or on how to protect privacy while enhancing data usability Acm Sigmod Record. 35: 9-13. DOI: 10.1145/1121995.1121997 |
0.541 |
|
2006 |
Bhargav-Spantzel A, Squicciarini AC, Bertino E. Establishing and protecting digital identity in federation systems Journal of Computer Security. 14: 269-300. DOI: 10.1145/1102486.1102489 |
0.733 |
|
2006 |
Bhatti R, Bertino E, Ghafoor A. X-FEDERATE: a policy engineering framework for federated access management Ieee Transactions On Software Engineering. 32: 330-346. DOI: 10.1109/Tse.2006.49 |
0.622 |
|
2006 |
Squicciarini AC, Bertino E, Ferrari E, Ray I. Achieving privacy in trust negotiations with an ontology-based approach Ieee Transactions On Dependable and Secure Computing. 3: 13-30. DOI: 10.1109/Tdsc.2006.3 |
0.492 |
|
2006 |
Bertino E, Martino L. Security in SOA and Web services Proceedings - 2006 Ieee International Conference On Services Computing, Scc 2006. DOI: 10.1109/SCC.2006.85 |
0.336 |
|
2006 |
Bertino E, Bhargav-Spantzel A, Squicciarini AC. Policy languages for digital identity management in federation systems Proceedings - Seventh Ieee International Workshop On Policies For Distributed Systems and Networks, Policy 2006. 2006: 54-64. DOI: 10.1109/POLICY.2006.22 |
0.798 |
|
2006 |
Bertino E, Ruth S. Policies and IT technologies: A puzzle of two pieces Ieee Internet Computing. 10: 65-67. DOI: 10.1109/Mic.2006.15 |
0.335 |
|
2006 |
Kundu A, Bertino E. Secure dissemination of XML content using structure-based routing Proceedings - Ieee International Enterprise Distributed Object Computing Workshop, Edoc. 153-162. DOI: 10.1109/EDOC.2006.46 |
0.383 |
|
2006 |
Camossi E, Bertolotto M, Bertino E. A multigranular object‐oriented framework supporting spatio‐temporal granularity conversions International Journal of Geographical Information Science. 20: 511-534. DOI: 10.1080/13658810600607451 |
0.339 |
|
2006 |
Bertino E, Squicciarini AC, Paloscia I, Martino L. Ws-AC: A fine grained access control system for Web services World Wide Web. 9: 143-171. DOI: 10.1007/S11280-005-3045-4 |
0.456 |
|
2006 |
Cuppens F, Debar H, Bertino E. Network and information systems security Annales Des TéLéCommunications. 61: 242-244. DOI: 10.1007/Bf03219907 |
0.343 |
|
2006 |
Squicciarini A, Bhargav-Spantzel A, Czeskis A, Bertino E. Traceable and automatic compliance of privacy policies in federated digital identity management Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4258: 78-98. DOI: 10.1007/11957454_5 |
0.802 |
|
2006 |
Joshi JBD, Bertino E. Fine-grained role-based delegation in presence of the hybrid role hierarchy Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 2006: 81-90. |
0.321 |
|
2006 |
Damiani ML, Bertino E. Architectural issues for a location-aware role-based access control system Proceedings of the Acm Symposium On Applied Computing. 2: 1184-1185. |
0.309 |
|
2006 |
Squicciarini AC, Paci F, Bertino E. A secure framework for publishing virtual community contracts International Journal of Web Based Communities. 2: 237-255. |
0.34 |
|
2005 |
Bertino E, Ferrari E, Mella G. An approach to cooperative updates of XML documents in distributed systems Journal of Computer Security. 13: 191-242. DOI: 10.3233/Jcs-2005-13201 |
0.48 |
|
2005 |
Bhatti R, Shafiq B, Bertino E, Ghafoor A, Joshi JBD. X-GTRBAC admin: A decentralized administration model for enterprise-wide access control Acm Transactions On Information and System Security. 8: 388-423. DOI: 10.1145/1108906.1108909 |
0.618 |
|
2005 |
Shafiq B, Bertino E, Ghafoor A. Access control management in a distributed environment supporting dynamic collaboration Proceedings of the Acm Conference On Computer and Communications Security. 104-112. DOI: 10.1145/1102486.1102503 |
0.387 |
|
2005 |
Shehab M, Bertino E, Ghafoor A. Secure collaboration in mediator-free environments Proceedings of the Acm Conference On Computer and Communications Security. 58-67. DOI: 10.1145/1102120.1102130 |
0.34 |
|
2005 |
Bhatti R, Ghafoor A, Bertino E, Joshi JBD. X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control Acm Transactions On Information and System Security. 8: 187-227. DOI: 10.1145/1065545.1065547 |
0.644 |
|
2005 |
Shehab M, Bertino E, Ghafoor A. SERAT: SEcure Role mApping Technique for decentralized secure interoperability Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 159-167. DOI: 10.1145/1063979.1064007 |
0.315 |
|
2005 |
Shafiq B, Joshi JBD, Bertino E, Ghafoor A. Secure interoperation in a multidomain environment employing RBAC policies Ieee Transactions On Knowledge and Data Engineering. 17: 1557-1577. DOI: 10.1109/Tkde.2005.185 |
0.617 |
|
2005 |
Joshi JBD, Bertino E, Latif U, Ghafoor A. A generalized temporal role-based access control model Ieee Transactions On Knowledge and Data Engineering. 17: 4-23. DOI: 10.1109/Tkde.2005.1 |
0.592 |
|
2005 |
Bertino E, Sandhu R. Database security-concepts, approaches, and challenges Ieee Transactions On Dependable and Secure Computing. 2: 2-18. DOI: 10.1109/Tdsc.2005.9 |
0.511 |
|
2005 |
Joshi JBD, Bertino E, Ghafoor A. An analysis of expressiveness and design issues for the generalized temporal role-based access control model Ieee Transactions On Dependable and Secure Computing. 2: 157-175. DOI: 10.1109/Tdsc.2005.18 |
0.586 |
|
2005 |
Bertino E, Kamra A, Terzi E, Vakali A. Intrusion detection in RBAC-administered databases Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 170-179. DOI: 10.1109/CSAC.2005.33 |
0.629 |
|
2005 |
Bertino E, Hacid M, Toumani F. Towards structure discovering in video data Journal of Experimental and Theoretical Artificial Intelligence. 17: 5-18. DOI: 10.1080/09528130512331315927 |
0.369 |
|
2005 |
Bhatti R, Bertino E, Ghafoor A. A Trust-Based Context-Aware Access Control Model for Web-Services Distributed and Parallel Databases. 18: 83-105. DOI: 10.1007/S10619-005-1075-7 |
0.623 |
|
2005 |
Bertino E, Fovino IN, Provenza LP. A Framework for Evaluating Privacy Preserving Data Mining Algorithms Data Mining and Knowledge Discovery. 11: 121-154. DOI: 10.1007/S10618-005-0006-6 |
0.361 |
|
2005 |
Bertino E, Byun J, Li N. Privacy-Preserving database systems Lecture Notes in Computer Science. 178-206. DOI: 10.1007/11554578_6 |
0.633 |
|
2005 |
Bertino E. Purpose based access control for privacy protection in database systems Lecture Notes in Computer Science. 3453: 2. |
0.394 |
|
2005 |
Bhatti R, Bertino E, Ghafoor A. A Policy Framework for Access Management in Federated Information Sharing Ifip Advances in Information and Communication Technology. 193: 95-120. |
0.361 |
|
2004 |
Bertino E, Carminati B, Ferrari E. Merkle Tree Authentication in UDDI Registries International Journal of Web Services Research. 1: 37-57. DOI: 10.4018/Jwsr.2004040103 |
0.489 |
|
2004 |
Belussi A, Bertino E, Nucita A. Grid based methods for estimating spatial join selectivity International Journal of Geographical Information Science. 92-100. DOI: 10.1145/1032222.1032238 |
0.308 |
|
2004 |
Belussi A, Bertino E, Catania B, Damiani ML, Nucita A. An authorization model for geographical maps International Journal of Geographical Information Science. 82-91. DOI: 10.1145/1032222.1032236 |
0.351 |
|
2004 |
Bertino E, Mazzoleni P, Santi D. Hsgs: An Interactive System For High-Level Specification And Generation Of Hypermedia Presentations International Journal of Software Engineering and Knowledge Engineering. 14: 545-564. DOI: 10.1142/S0218194004001786 |
0.398 |
|
2004 |
Bertino E, Carminati B, Ferrari E, Thuraisingham B, Gupta A. Selective and authentic third-party distribution of XML documents Ieee Transactions On Knowledge and Data Engineering. 16: 1263-1278. DOI: 10.1109/Tkde.2004.63 |
0.499 |
|
2004 |
Bertino E, Ferrari E, Squicciarini AC. Trust-χ: A peer-to-peer framework for trust establishment Ieee Transactions On Knowledge and Data Engineering. 16: 827-842. DOI: 10.1109/Tkde.2004.1318565 |
0.47 |
|
2004 |
Verykios VS, Elmagarmid AK, Bertino E, Saygin Y, Dasseni E. Association Rule Hiding Ieee Transactions On Knowledge and Data Engineering. 16: 434-447. DOI: 10.1109/Tkde.2004.1269668 |
0.418 |
|
2004 |
Bertino E, Guerrini G, Merlo I. Extending the ODMG Object Model with Triggers Ieee Transactions On Knowledge and Data Engineering. 16: 170-188. DOI: 10.1109/Tkde.2004.1269596 |
0.371 |
|
2004 |
Bertino E, Squicciarini AC, Mevi D. A fine-grained access control model for Web services Proceedings - 2004 Ieee International Conference On Services Computing, Scc 2004. 33-40. DOI: 10.1109/RIDE.2004.1281700 |
0.342 |
|
2004 |
Bertino E, Ramamritham K. Guest editors' introduction: Data dissemination on the web Ieee Internet Computing. 8: 27-28. DOI: 10.1109/Mic.2004.1297270 |
0.418 |
|
2004 |
Bertino E, Ferrari E, Squicciarini A. Trust negotiations: concepts, systems, and languages Computing in Science and Engineering. 6: 27-34. DOI: 10.1109/Mcse.2004.22 |
0.392 |
|
2004 |
Bhatti R, Bertino E, Ghafoor A, Joshi JBD. XML-based specification for Web services document security Ieee Computer. 37: 41-49. DOI: 10.1109/Mc.2004.1297300 |
0.633 |
|
2004 |
Camossi E, Bertino E, Mesiti M, Guerrini G. Handling Expiration of Multigranular Temporal Objects Journal of Logic and Computation. 14: 23-50. DOI: 10.1093/Logcom/14.1.23 |
0.351 |
|
2004 |
Bertino E, Elmagarmid AK, Hacid MS. A logical approach to quality of service specification in video databases Multimedia Tools and Applications. 23: 75-101. DOI: 10.1023/B:Mtap.0000026842.02622.6C |
0.408 |
|
2004 |
Bertino E, Carminati B, Ferrari E. Access control for XML documents and data Information Security Technical Report. 9: 19-34. DOI: 10.1016/S1363-4127(04)00029-9 |
0.468 |
|
2004 |
Atluri V, Bertino E, Ferrari E, Mazzoleni P. Supporting delegation in secure workflow management systems Ifip Advances in Information and Communication Technology. 142: 190-204. |
0.358 |
|
2003 |
Bertino E, Fan J, Ferrari E, Hacid MS, Elmagarmid AK, Zhu X. A hierarchical access control model for video database systems Acm Transactions On Information Systems. 21: 155-191. DOI: 10.1145/763693.763695 |
0.395 |
|
2003 |
Bertino E, Catania B, Ferrari E, Perlasca P. A logical framework for reasoning about access control models Acm Transactions On Information and System Security. 6: 71-127. DOI: 10.1145/605434.605437 |
0.43 |
|
2003 |
Bertino E, Catarci T, Elmagarmid AK, Hacid MS. Quality of Service Specification in Video Databases Ieee Multimedia. 10: 71-81. DOI: 10.1109/Mmul.2003.1237552 |
0.4 |
|
2003 |
BERTINO E, PERLASCA P, CATANIA B. Introducing dynamic behavior in amalgamated knowledge bases Theory and Practice of Logic Programming. 3: 625-669. DOI: 10.1017/S1471068402001588 |
0.308 |
|
2003 |
Bertino E, Ferrari E, Guerrini G, Merlo I. T-ODMG: An ODMG compliant temporal object model supporting multiple granularity management Information Systems. 28: 885-927. DOI: 10.1016/S0306-4379(02)00077-7 |
0.346 |
|
2003 |
Montesi D, Bertino E, Bagnato M. Refined rules termination analysis through transactions Information Systems. 28: 435-456. DOI: 10.1016/S0306-4379(02)00025-X |
0.33 |
|
2003 |
Bertino E. RBAC models - Concepts and trends Computers and Security. 22: 511-514. DOI: 10.1016/S0167-4048(03)00609-6 |
0.436 |
|
2003 |
Bertino E, Ferrari E, Perego A. Content-based filtering of Web documents: the MaX system and the EUFORBIA project International Journal of Information Security. 2: 45-58. DOI: 10.1007/S10207-003-0024-6 |
0.329 |
|
2003 |
Bertino E, Guerrini G, Merlo I. A set-oriented method definition language for object databases and its semantics Concurrency Computation Practice and Experience. 15: 1275-1335. DOI: 10.1002/Cpe.731 |
0.317 |
|
2002 |
Bertino E, Ferrari E. Secure and selective dissemination of XML documents Acm Transactions On Information and System Security. 5: 290-331. DOI: 10.1145/545186.545190 |
0.497 |
|
2002 |
Bertino E, Bouguettaya A. Database technology on the Web Ieee Internet Computing. 6: 31-32. DOI: 10.1109/Mic.2002.1020322 |
0.395 |
|
2002 |
Bertino E, Ferrari E, Perego A. MaX: An access control system for digital libraries and the web Proceedings - Ieee Computer Society's International Computer Software and Applications Conference. 945-950. DOI: 10.1109/CMPSAC.2002.1045127 |
0.359 |
|
2002 |
Adam NR, Atluri V, Bertino E, Ferrari E. A content-based authorization model for digital libraries Ieee Transactions On Knowledge and Data Engineering. 14: 296-315. DOI: 10.1109/69.991718 |
0.446 |
|
2002 |
Bertino E, Trombetta A, Montesi D. Workflow Architecture for Interactive Video Management Systems Distributed and Parallel Databases. 11: 33-51. DOI: 10.1023/A:1013325522291 |
0.394 |
|
2002 |
Ferrari E, Adam NR, Atluri V, Bertino E, Capuozzo U. An authorization system for digital libraries Vldb Journal. 11: 58-67. DOI: 10.1007/s007780200063 |
0.301 |
|
2001 |
Bertino E, Catania B, Ferrari E. A nested transaction model for multilevel secure database management systems Acm Transactions On Information and System Security. 4: 321-370. DOI: 10.1145/503339.503340 |
0.429 |
|
2001 |
Bertino E, Bonatti PA, Ferrari E. TRBAC: A temporal role-based access control model Acm Transactions On Information and System Security. 4: 191-233. DOI: 10.1145/501978.501979 |
0.405 |
|
2001 |
Bertino E, Ferrari E. XML and data integration Ieee Internet Computing. 5: 75-76. DOI: 10.1109/4236.968835 |
0.346 |
|
2001 |
Bertino E, Catania B. Integrating XML and databases Ieee Internet Computing. 5: 84-88. DOI: 10.1109/4236.939454 |
0.416 |
|
2001 |
Bertino E, Castano S, Ferrari E. Securing XML documents with Author-X Ieee Internet Computing. 5: 21-31. DOI: 10.1109/4236.935172 |
0.446 |
|
2001 |
Bellettini C, Bertino E, Ferrari E. Role Based Access Control Models Information Security Technical Report. 6: 21-29. DOI: 10.1016/S1363-4127(01)00204-7 |
0.332 |
|
2001 |
Bertino E, Guerrini G, Merlo I. Exception Handling in Object-Oriented Databases Lecture Notes in Computer Science. 234-250. DOI: 10.1007/3-540-45407-1_15 |
0.386 |
|
2001 |
Bertino E, Ferrari E, Pitoura E. An access control mechanism for large scale data dissemination systems Proceedings of the International Workshop On Research Issues in Data Engineering - Distributed Object Management -Ride-Dom. 43-50. |
0.362 |
|
2000 |
Bertino E, Bonatti PA, Ferrari E, Sapino ML. Temporal authorization bases: from specification to integration Journal of Computer Security. 8: 309-353. DOI: 10.3233/Jcs-2000-8404 |
0.401 |
|
2000 |
Bertino E, Buccafurri F, Ferrari E, Rullo P. A logic-based approach for enforcing access control[1]A preliminary version of this paper appears in the Proceedings of the 5th European Symposium on Research in Computer Security (ESORICS’98), Louvain-La-Neuve, Belgium, September 1998 under the title “An Authorization Model and its Formal Semantics”. Journal of Computer Security. 8: 109-139. DOI: 10.3233/Jcs-2000-82-303 |
0.409 |
|
2000 |
Atluri V, Huang W, Bertino E. A semantic-based execution model for multilevel secure workflows Journal of Computer Security. 8: 3-41. DOI: 10.3233/Jcs-2000-8102 |
0.393 |
|
2000 |
Bertino E, Pagani E, Rossi GP, Samarati P. Protecting information on the Web Communications of the Acm. 43: 3. DOI: 10.1145/352515.352518 |
0.424 |
|
2000 |
Ray I, Mancini LV, Jajodia S, Bertino E. ASEP: a secure and flexible commit protocol for MLS distributed database systems Ieee Transactions On Knowledge and Data Engineering. 12: 880-899. DOI: 10.1109/69.895800 |
0.411 |
|
2000 |
Bertino E, Guerrini G, Merlo I. Trigger inheritance and overriding in an active object database system Ieee Transactions On Knowledge and Data Engineering. 12: 588-608. DOI: 10.1109/69.868909 |
0.347 |
|
2000 |
Bertino E, Ferrari E, Stolf M. MPGS: an interactive tool for the specification and generation of multimedia presentations Ieee Transactions On Knowledge and Data Engineering. 12: 102-125. DOI: 10.1109/69.842254 |
0.376 |
|
2000 |
Bertino E, Castano S, Ferrari E, Mesiti M. Specifying and enforcing access control policies for XML document sources World Wide Web. 3: 139-151. DOI: 10.1023/A:1019289831564 |
0.488 |
|
2000 |
Mancini LV, Ray I, Jajodia S, Bertino E. Flexible Transaction Dependencies in Database Systems Distributed and Parallel Databases. 8: 399-446. DOI: 10.1023/A:1008738705440 |
0.419 |
|
1999 |
Bertino E, Ferrari E. Secure object deletion and garbage collection in multilevel object bases[1]A preliminary version of this paper appeared under the title “A principled approach to object deletion and garbage collection in multilevel secure object bases”, inc Proceedings of the 11th Annual IFIP Working Conference on Database Security, Lake Tahoe, CA, August 1997. Journal of Computer Security. 7: 257-285. DOI: 10.3233/Jcs-1999-7402 |
0.416 |
|
1999 |
Bertino E, Jajodia S, Samarati P. A flexible authorization mechanism for relational data management systems Acm Transactions On Information Systems. 17: 101-140. DOI: 10.1145/306686.306687 |
0.387 |
|
1999 |
Bertino E, Ferrari E, Atluri V. The specification and enforcement of authorization constraints in workflow management systems Acm Transactions On Information and System Security. 2: 65-104. DOI: 10.1145/300830.300837 |
0.467 |
|
1999 |
Bertino E, Ooi BC. The indispensability of dispensable indexes Ieee Transactions On Knowledge and Data Engineering. 11: 17-27. DOI: 10.1109/69.755611 |
0.321 |
|
1999 |
Bertino E, Catania B, Wong L. Finitely representable nested relations Information Processing Letters. 70: 165-173. DOI: 10.1016/S0020-0190(99)00062-9 |
0.343 |
|
1999 |
Bertino E, Guerrini G, Montesi D. Inheritance in a Deductive Object Database Language with Updates Lecture Notes in Computer Science. 67-90. DOI: 10.1007/3-540-46466-2_4 |
0.322 |
|
1998 |
Bertino E, Bettini C, Ferrari E, Samarati P. An access control model supporting periodicity constraints and temporal reasoning Acm Transactions On Database Systems. 23: 231-285. DOI: 10.1145/293910.293151 |
0.405 |
|
1998 |
Bertino E, Vimercati SDCD, Ferrari E, Samarati P. Exception-based information flow control in object-oriented systems Acm Transactions On Information and System Security. 1: 26-65. DOI: 10.1145/290163.290167 |
0.363 |
|
1998 |
Belussi A, Bertino E, Catania B. An extended algebra for constraint databases Ieee Transactions On Knowledge and Data Engineering. 10: 686-705. DOI: 10.1109/69.729722 |
0.322 |
|
1998 |
Bertino E, Ferrari E, Guerrini G. Navigational accesses in a temporal object model Ieee Transactions On Knowledge and Data Engineering. 10: 656-665. DOI: 10.1109/69.706062 |
0.378 |
|
1998 |
Bertino E, Ferrari E. Temporal synchronization models for multimedia data Ieee Transactions On Knowledge and Data Engineering. 10: 612-631. DOI: 10.1109/69.706060 |
0.377 |
|
1998 |
Bertino E, Jajodia S, Mancini L, Ray I. Advanced transaction processing in multilevel secure file stores Ieee Transactions On Knowledge and Data Engineering. 10: 120-135. DOI: 10.1109/69.667095 |
0.406 |
|
1998 |
Bertino E, Catania B, Chiesa L. Definition and analysis of index organizations for object-oriented database systems Information Systems. 23: 65-108. DOI: 10.1016/S0306-4379(98)00003-9 |
0.323 |
|
1998 |
Bertino E, Catania B. A constraint-based approach to shape management in multimedia databases Multimedia Systems. 6: 2-16. DOI: 10.1007/S005300050072 |
0.384 |
|
1998 |
Bertino E, Ferrari E, Samarati P. Mandatory security and object-oriented systems: a multilevel entity model and its mapping onto a single-level object model Theory and Practice of Object Systems. 4: 183-204. DOI: 10.1002/(Sici)1096-9942(1998)4:3<183::Aid-Tapo4>3.3.Co;2-6 |
0.374 |
|
1998 |
Bertino E. Data security Data and Knowledge Engineering. 25: 199-216. |
0.354 |
|
1997 |
Bertino E, Samarati P, Rossi GP. Special issue on Security in the World Wide Web (WWW) Journal of Computer Security. 5: 189-190. DOI: 10.3233/Jcs-1997-5301 |
0.42 |
|
1997 |
Jajodia S, Samarati P, Subrahmanian VS, Bertino E. A unified framework for enforcing multiple access control policies Acm Sigmod Record. 26: 474-485. DOI: 10.1145/253262.253364 |
0.324 |
|
1997 |
Montesi D, Bertino E, Martelli M. Transactions and updates in deductive databases Ieee Transactions On Knowledge and Data Engineering. 9: 784-797. DOI: 10.1109/69.634755 |
0.398 |
|
1997 |
Atluri V, Jajodia S, Bertino E. Transaction processing in multilevel secure databases with kernelized architecture: Challenges and solutions Ieee Transactions On Knowledge and Data Engineering. 9: 697-708. DOI: 10.1109/69.634749 |
0.434 |
|
1997 |
Samarati P, Bertino E, Ciampichetti A, Jajodia S. Information flow control in object-oriented systems Ieee Transactions On Knowledge and Data Engineering. 9: 524-538. DOI: 10.1109/69.617048 |
0.333 |
|
1997 |
Bertino E, Foscoli P. On modeling cost functions for object-oriented databases Ieee Transactions On Knowledge and Data Engineering. 9: 500-508. DOI: 10.1109/69.599936 |
0.315 |
|
1997 |
Bertino E, Samarati P, Jajodia S. An extended authorization model for relational databases Ieee Transactions On Knowledge and Data Engineering. 9: 85-101. DOI: 10.1109/69.567051 |
0.399 |
|
1997 |
Bertino E, Bettini C, Ferrari E, Samarati P. Decentralized administration for a temporal access control model Information Systems. 22: 223-248. DOI: 10.1016/S0306-4379(97)00013-6 |
0.401 |
|
1997 |
Belussi A, Bertino E, Catania B. Manipulating Spatial Data in Constraint Databases Lecture Notes in Computer Science. 115-141. DOI: 10.1007/3-540-63238-7_27 |
0.345 |
|
1997 |
Bertino E, Ferrari E, Guerrini G. T_Chimera: a temporal object-oriented data model Theory and Practice of Object Systems. 3: 103-125. DOI: 10.1002/(Sici)1096-9942(1997)3:2<103::Aid-Tapo3>3.0.Co;2-W |
0.317 |
|
1996 |
Atluri V, Jajodia S, Bertino E. Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases Ieee Transactions On Knowledge and Data Engineering. 8: 839-854. DOI: 10.1109/69.542034 |
0.46 |
|
1996 |
Samarati P, Bertino E, Jajodia S. An authorization model for a distributed hypertext system Ieee Transactions On Knowledge and Data Engineering. 8: 555-562. DOI: 10.1109/69.536249 |
0.401 |
|
1996 |
Bertino E, Bettini C, Ferrari E, Samarati P. A temporal access control mechanism for database systems Ieee Transactions On Knowledge and Data Engineering. 8: 67-80. DOI: 10.1109/69.485637 |
0.382 |
|
1995 |
Bertino E, Origgi F, Samarati P. An extended authorization model for object databases Journal of Computer Security. 3: 207-230. DOI: 10.3233/Jcs-1994/1995-32-305 |
0.397 |
|
1995 |
Bettini C, Wang XS, Bertino E, Jajodia S. Semantic Assumptions and Query Evaluation in Temporal Databases Acm Sigmod Record. 24: 257-268. DOI: 10.1145/568271.223843 |
0.318 |
|
1995 |
Bertino E, Foscoli P. Index Organizations for Object-Oriented Database Systems Ieee Transactions On Knowledge and Data Engineering. 7: 193-209. DOI: 10.1109/69.382292 |
0.335 |
|
1995 |
Bertino E, Jajodia S, Samarati P. Database security: Research and practice Information Systems. 20: 537-556. DOI: 10.1016/0306-4379(95)00029-4 |
0.459 |
|
1994 |
Paganini A, Bertino E, Damiani M. A View Mechanism for a Knowledge-Based Information System Integrated Computer-Aided Engineering. 1: 397-420. DOI: 10.3233/Ica-1994-1503 |
0.365 |
|
1994 |
Bertino E, Negri M, Pelagatti G, Sbattella L. Applications of object-oriented technology to the integration of heterogeneous database systems Distributed and Parallel Databases. 2: 343-370. DOI: 10.1007/Bf01265319 |
0.396 |
|
1993 |
Atluri V, Jajodia S, Bertino E. Achieving stricter correctness requirements in multilevel secure database management systems Journal of Computer Security. 2: 311-351. DOI: 10.3233/Jcs-1993-2404 |
0.458 |
|
1992 |
Bertino E, Negri M, Pelagatti G, Sbattella L. Object-oriented query languages: the notion and the issues Ieee Transactions On Knowledge and Data Engineering. 4: 223-237. DOI: 10.1109/69.142014 |
0.309 |
|
1991 |
Rabitti F, Bertino E, Kim W, Woelk D. A model of authorization for next-generation database systems Acm Transactions On Database Systems. 16: 88-131. DOI: 10.1145/103140.103144 |
0.367 |
|
1991 |
Bertino E, Martino L. Object-Oriented Database Management Systems: Concepts and Issues Computer. 24: 33-47. DOI: 10.1109/2.76261 |
0.315 |
|
1990 |
Bertino E, Negri M, Pelagatti G, Sbattella L. An object-oriented data model for distributed office applications Acm Sigois Bulletin. 11: 216-226. DOI: 10.1145/91478.91544 |
0.343 |
|
1989 |
Bertino E, Kim W. Indexing Techniques for Queries on Nested Objects Ieee Transactions On Knowledge and Data Engineering. 1: 196-214. DOI: 10.1109/69.87960 |
0.31 |
|
1988 |
Bertino E, Gibbs S, Rabitti F. DOCUMENT QUERY PROCESSING STRATEGIES: COST EVALUATION AND HEURISTICS . 169-181. DOI: 10.1145/966861.45428 |
0.375 |
|
1988 |
Bertino E, Rabitti F, Gibbs S. Query Processing in a Multimedia Document System Acm Transactions On Information Systems (Tois). 6: 1-41. DOI: 10.1145/42279.42281 |
0.397 |
|
Show low-probability matches. |