Elisa Bertino - Publications

Affiliations: 
Computer Sciences Purdue University, West Lafayette, IN, United States 
Area:
Computer Science
Website:
https://www.cs.purdue.edu/people/faculty/bertino.html

370 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Saxena N, Hayes E, Bertino E, Ojo P, Choo KR, Burnap P. Impact and Key Challenges of Insider Threats on Organizations and Critical Businesses Electronics. 9: 1460. DOI: 10.3390/Electronics9091460  0.341
2020 Singla A, Hussain SR, Chowdhury O, Bertino E, Li N. Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks Proceedings On Privacy Enhancing Technologies. 2020: 126-142. DOI: 10.2478/popets-2020-0008  0.311
2020 Won J, Seo S, Bertino E. A Secure Shuffling Mechanism for White-Box Attack-Resistant Unmanned Vehicles Ieee Transactions On Mobile Computing. 19: 1023-1039. DOI: 10.1109/Tmc.2019.2903048  0.417
2020 Yi X, Bertino E, Rao F, Lam K, Nepal S, Bouguettaya A. Privacy-Preserving User Profile Matching in Social Networks Ieee Transactions On Knowledge and Data Engineering. 32: 1572-1585. DOI: 10.1109/Tkde.2019.2912748  0.393
2020 Cicala F, Bertino E. Analysis of Encryption Key Generation in Modern Crypto Ransomware Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2020.3005976  0.342
2020 Mehnaz S, Bertino E. A Fine-grained Approach for Anomaly Detection in File System Accesses with Enhanced Temporal User Profiles Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2954507  0.349
2020 Li Y, Bertino E, Abdel-Khalik HS. Effectiveness of Model-Based Defenses for Digitally Controlled Industrial Systems: Nuclear Reactor Case Study Nuclear Technology. 206: 82-93. DOI: 10.1080/00295450.2019.1626170  0.351
2020 Yan Z, Susilo W, Bertino E, Zhang J, Yang LT. AI-driven data security and privacy Journal of Network and Computer Applications. 172: 102842. DOI: 10.1016/J.JNCA.2020.102842  0.31
2019 Rao F, Cao J, Bertino E, Kantarcioglu M. Hybrid Private Record Linkage Acm Transactions On Privacy and Security. 22: 1-36. DOI: 10.1145/3318462  0.333
2019 Bertino E, Kundu A, Sura Z. Data Transparency with Blockchain and AI Ethics Journal of Data and Information Quality. 11: 16. DOI: 10.1145/3312750  0.395
2019 Jabal AA, Davari M, Bertino E, Makaya C, Calo S, Verma D, Russo A, Williams C. Methods and Tools for Policy Analysis Acm Computing Surveys. 51: 121. DOI: 10.1145/3295749  0.357
2019 Jabal AA, Davari M, Bertino E, Makaya C, Calo S, Verma D, Williams C. ProFact: A Provenance-based Analytics Framework for Access Control Policies Ieee Transactions On Services Computing. 1-1. DOI: 10.1109/Tsc.2019.2900641  0.413
2019 Sani AS, Yuan D, Bao W, Dong ZY, Vucetic B, Bertino E. Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet Ieee Transactions On Information Forensics and Security. 14: 2113-2127. DOI: 10.1109/Tifs.2019.2892005  0.405
2019 Zhang Y, Deng R, Bertino E, Zheng D. Robust and Universal Seamless Handover Authentication in 5G HetNets Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2927664  0.38
2019 Bertino E, Merrill S, Nesen A, Utz C. Redefining Data Transparency: A Multidimensional Approach Ieee Computer. 52: 16-26. DOI: 10.1109/Mc.2018.2890190  0.313
2019 Li F, Li H, Wang C, Ren K, Bertino E. Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT Ieee Internet of Things Journal. 6: 1446-1449. DOI: 10.1109/Jiot.2019.2908460  0.418
2019 Fadolalkarim D, Bertino E. A-PANDDE: Advanced Provenance-based ANomaly Detection of Data Exfiltration Computers & Security. 84: 276-287. DOI: 10.1016/J.Cose.2019.03.021  0.437
2018 Bertino E, Jabal AA, Calo SB, Verma DC, Williams C. The Challenge of Access Control Policies Quality Journal of Data and Information Quality. 10: 6. DOI: 10.1145/3209668  0.327
2018 Bertino E, Jahanshahi MR. Adaptive and Cost-Effective Collection of High-Quality Data for Critical Infrastructure and Emergency Management in Smart Cities—Framework and Challenges Journal of Data and Information Quality. 10: 1-6. DOI: 10.1145/3190579  0.3
2018 Rezvani M, Ignjatovic A, Bertino E. A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems Acm Transactions On Internet Technology. 18: 55. DOI: 10.1145/3183323  0.363
2018 Jabal AA, Bertino E. A Comprehensive Query Language for Provenance Information International Journal of Cooperative Information Systems. 27: 1850007. DOI: 10.1142/S0218843018500077  0.397
2018 Badsha S, Yi X, Khalil I, Liu D, Nepal S, Bertino E, Lam K. Privacy Preserving Location-Aware Personalized Web Service Recommendations Ieee Transactions On Services Computing. 1-1. DOI: 10.1109/Tsc.2018.2839587  0.391
2018 Arshad MU, Kundu A, Bertino E, Ghafoor A, Kundu C. Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases Ieee Transactions On Knowledge and Data Engineering. 30: 866-879. DOI: 10.1109/Tkde.2017.2776221  0.606
2018 Gunasinghe H, Bertino E. PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones Ieee Transactions On Information Forensics and Security. 13: 1042-1057. DOI: 10.1109/Tifs.2017.2777787  0.446
2018 Rashidi B, Fung C, Nguyen A, Vu T, Bertino E. Android User Privacy Preserving Through Crowdsourcing Ieee Transactions On Information Forensics and Security. 13: 773-787. DOI: 10.1109/Tifs.2017.2767019  0.4
2018 Kang J, Lin D, Jiang W, Bertino E. Highly efficient randomized authentication in VANETs Pervasive and Mobile Computing. 44: 31-44. DOI: 10.1016/J.Pmcj.2018.01.004  0.407
2018 Bertino E, Casola V, Castiglione A, Susilo W. Editorial: Security and privacy protection vs sustainable development Computers & Security. 76: 250-251. DOI: 10.1016/J.Cose.2018.05.008  0.382
2018 Oluwatimi O, Damiani ML, Bertino E. A context-aware system to secure enterprise content: Incorporating reliability specifiers Computers & Security. 77: 162-178. DOI: 10.1016/J.Cose.2018.04.001  0.418
2017 Rullo A, Midi D, Serra E, Bertino E. Pareto Optimal Security Resource Allocation for Internet of Things Acm Transactions On Privacy and Security. 20: 1-30. DOI: 10.1145/3139293  0.308
2017 Wang C, Bertino E. Sensor Network Provenance Compression Using Dynamic Bayesian Networks Acm Transactions On Sensor Networks. 13: 5. DOI: 10.1145/2997653  0.322
2017 Midi D, Sultana S, Bertino E. A System for Response and Prevention of Security Incidents in Wireless Sensor Networks Acm Transactions On Sensor Networks. 13: 1-38. DOI: 10.1145/2996195  0.357
2017 Verma D, Calo S, Chakraborty S, Bertino E, Williams C, Tucker J, Rivera B, Mel GRd. Dynamic and adaptive policy models for coalition operations Proceedings of Spie. 10190: 1019006. DOI: 10.1117/12.2266565  0.428
2017 Touma M, Bertino E, Rivera B, Verma D, Calo S. Framework for behavioral analytics in anomaly identification Proceedings of Spie. 10190. DOI: 10.1117/12.2266374  0.359
2017 Bossi L, Bertino E, Hussain SR. A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection Ieee Transactions On Software Engineering. 43: 415-431. DOI: 10.1109/Tse.2016.2598336  0.447
2017 Yavuz AA, Mudgerikar A, Singla A, Papapanagiotou I, Bertino E. Real-Time Digital Signatures for Time-Critical Networks Ieee Transactions On Information Forensics and Security. 12: 2627-2639. DOI: 10.1109/Tifs.2017.2716911  0.388
2017 Rashidi B, Fung C, Bertino E. A Collaborative DDoS Defence Framework Using Network Function Virtualization Ieee Transactions On Information Forensics and Security. 12: 2483-2497. DOI: 10.1109/Tifs.2017.2708693  0.378
2017 Bertino E, Islam N. Botnets and Internet of Things Security Ieee Computer. 50: 76-79. DOI: 10.1109/Mc.2017.62  0.417
2017 Habibi J, Midi D, Mudgerikar A, Bertino E. Heimdall: Mitigating the Internet of Insecure Things Ieee Internet of Things Journal. 4: 968-978. DOI: 10.1109/Jiot.2017.2704093  0.348
2017 Khan MS, Midi D, Khan MI, Bertino E. Fine-Grained Analysis of Packet Loss in MANETs Ieee Access. 5: 7798-7807. DOI: 10.1109/Access.2017.2694467  0.312
2017 Won J, Seo S, Bertino E. Certificateless Cryptographic Protocols for Efficient Drone-Based Smart City Applications Ieee Access. 5: 3721-3749. DOI: 10.1109/Access.2017.2684128  0.438
2017 Ahmad A, Whitworth B, Zeshan F, Bertino E, Friedman RS. Extending social networks with delegation Computers & Security. 70: 546-564. DOI: 10.1016/J.Cose.2017.07.010  0.348
2017 Rashidi B, Fung C, Bertino E. Android resource usage risk assessment using hidden Markov model and online learning Computers & Security. 65: 90-107. DOI: 10.1016/J.Cose.2016.11.006  0.407
2017 Khan MS, Midi D, Malik SUR, Khan MI, Javaid N, Bertino E. Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy Mobile Networks and Applications. 22: 493-509. DOI: 10.1007/S11036-017-0867-0  0.325
2017 Xiao Q, Bertino E. Detecting deceptive engagement in social media by temporal pattern analysis of user behaviors: a survey Wiley Interdisciplinary Reviews-Data Mining and Knowledge Discovery. 7. DOI: 10.1002/Widm.1210  0.377
2017 Xiang Y, Bertino E, Kutylowski M. Security and privacy in social networks Concurrency and Computation: Practice and Experience. 29. DOI: 10.1002/Cpe.4093  0.308
2016 Seo SH, Won J, Bertino E, Kang Y, Choi D. A security framework for a drone delivery service Dronet 2016 - Proceedings of the 2nd Workshop On Micro Aerial Vehicle Networks, Systems, and Applications For Civilian Use, Co-Located With Mobisys 2016. 29-34. DOI: 10.1145/2935620.2935629  0.329
2016 Ghinita G, Damiani ML, Silvestri C, Bertino E. Protecting Against Velocity-Based, Proximity-Based, and External Event Attacks in Location-Centric Social Networks Acm Transactions On Spatial Algorithms and Systems. 2: 8. DOI: 10.1145/2910580  0.397
2016 Midi D, Bertino E. Node or link? Fine-grained analysis of packet-loss attacks in wireless sensor networks Acm Transactions On Sensor Networks. 12. DOI: 10.1145/2886103  0.324
2016 Wang C, Hussain SR, Bertino E. Dictionary Based Secure Provenance Compression for Wireless Sensor Networks Ieee Transactions On Parallel and Distributed Systems. 27: 405-418. DOI: 10.1109/Tpds.2015.2402156  0.323
2016 Yi X, Paulet R, Bertino E, Varadharajan V. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy Ieee Transactions On Knowledge and Data Engineering. 28: 1546-1559. DOI: 10.1109/Tkde.2016.2520473  0.395
2016 Yi X, Paulet R, Bertino E, Xu G. Private Cell Retrieval from Data Warehouses Ieee Transactions On Information Forensics and Security. 11: 1346-1361. DOI: 10.1109/Tifs.2016.2527620  0.389
2016 Yi X, Rao F, Tari Z, Hao F, Bertino E, Khalil I, Zomaya AY. ID2S Password-Authenticated Key Exchange Protocols Ieee Transactions On Computers. 65: 3687-3701. DOI: 10.1109/Tc.2016.2553031  0.422
2016 Bertino E. Securing Mobile Applications Ieee Computer. 49: 9-9. DOI: 10.1109/Mc.2016.34  0.362
2016 Bertino E. Security Threats: Protecting the New Cyberfrontier Computer. 49: 11-14. DOI: 10.1109/Mc.2016.188  0.338
2016 Panah AS, Schyndel RV, Sellis T, Bertino E. On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques Ieee Access. 4: 2670-2704. DOI: 10.1109/Access.2016.2570812  0.379
2016 Bertino E. Editorial: Introduction to Data Security and Privacy Data Science and Engineering. 1: 125-126. DOI: 10.1007/S41019-016-0021-1  0.425
2016 Wang C, Zheng W, Bertino E. Provenance for Wireless Sensor Networks: A Survey Data Science and Engineering. 1: 189-200. DOI: 10.1007/S41019-016-0017-X  0.328
2016 Sun Y, Xu H, Bertino E, Sun C. A Data-Driven Evaluation for Insider Threats Data Science and Engineering. 1: 73-85. DOI: 10.1007/S41019-016-0009-X  0.415
2016 Sallam A, Fadolalkarim D, Bertino E, Xiao Q. Data and syntax centric anomaly detection for relational databases Wiley Interdisciplinary Reviews-Data Mining and Knowledge Discovery. 6: 231-239. DOI: 10.1002/Widm.1195  0.465
2016 Wang H, Yi X, Bertino E, Sun L. Protecting outsourced data in cloud computing through access management Concurrency Computation. 28: 600-615. DOI: 10.1002/Cpe.3286  0.517
2015 Bertino E, Samanthula BK. Security with privacy-A research agenda Collaboratecom 2014 - Proceedings of the 10th Ieee International Conference On Collaborative Computing: Networking, Applications and Worksharing. 144-153. DOI: 10.4108/icst.collaboratecom.2014.257687  0.314
2015 Sultana S, Bertino E. A distributed system for the management of finegrained provenance Journal of Database Management. 26: 32-47. DOI: 10.4018/Jdm.2015040103  0.453
2015 Ammar N, Malik Z, Bertino E, Rezgui A. XACML Policy Evaluation with Dynamic Context Handling Ieee Transactions On Knowledge and Data Engineering. 27: 2575-2588. DOI: 10.1109/Tkde.2015.2415473  0.415
2015 Shu X, Yao D, Bertino E. Privacy-preserving detection of sensitive data exposure Ieee Transactions On Information Forensics and Security. 10: 1092-1103. DOI: 10.1109/Tifs.2015.2398363  0.386
2015 Seo SH, Won J, Sultana S, Bertino E. Effective key management in dynamic wireless sensor networks Ieee Transactions On Information Forensics and Security. 10: 371-383. DOI: 10.1109/Tifs.2014.2375555  0.365
2015 Bertino E. The state of the journal editorial Ieee Transactions On Dependable and Secure Computing. 12: 135. DOI: 10.1109/Tdsc.2015.2504839  0.321
2015 Gupta A, Habibi J, Kirkpatrick MS, Bertino E. Marlin: Mitigating code reuse attacks using code randomization Ieee Transactions On Dependable and Secure Computing. 12: 326-337. DOI: 10.1109/Tdsc.2014.2345384  0.489
2015 Shebaro B, Oluwatimi O, Bertino E. Context-based access control systems for mobile devices Ieee Transactions On Dependable and Secure Computing. 12: 150-163. DOI: 10.1109/Tdsc.2014.2320731  0.461
2015 Rezvani M, Ignjatovic A, Bertino E, Jha S. Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks Ieee Transactions On Dependable and Secure Computing. 12: 98-110. DOI: 10.1109/Tdsc.2014.2316816  0.335
2015 Sultana S, Ghinita G, Bertino E, Shehab M. A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks Ieee Transactions On Dependable and Secure Computing. 12: 256-269. DOI: 10.1109/Tdsc.2013.44  0.388
2015 Bertino E. Denial-of-service attacks to UMTS Computer. 48: 6. DOI: 10.1109/Mc.2015.42  0.394
2015 Sallam A, Bertino E, Hussain SR, Landers D, Lefler RM, Steiner D. DBSAFE—An Anomaly Detection System to Protect Databases From Exfiltration Attempts Ieee Systems Journal. DOI: 10.1109/Jsyst.2015.2487221  0.418
2015 Cao J, Rao FY, Bertino E, Kantarcioglu M. A hybrid private record linkage scheme: Separating differentially private synopses from matching records Proceedings - International Conference On Data Engineering. 2015: 1011-1022. DOI: 10.1109/ICDE.2015.7113352  0.33
2015 Gunasinghe H, Bertino E. RahasNym: Protecting against Linkability in the Digital Identity Ecosystem Proceedings - International Conference On Distributed Computing Systems. 2015: 772-773. DOI: 10.1109/ICDCS.2015.102  0.35
2015 Bertino E. Big Data-Security and Privacy Proceedings - 2015 Ieee International Congress On Big Data, Bigdata Congress 2015. 757-761. DOI: 10.1109/BigDataCongress.2015.126  0.32
2015 Nabeel M, Ding X, Seo S, Bertino E. Scalable end-to-end security for advanced metering infrastructures Information Systems. 53: 213-223. DOI: 10.1016/J.Is.2015.01.004  0.46
2015 Brunswicker S, Bertino E, Matei S. Big Data for Open Digital Innovation - A Research Roadmap Big Data Research. 2: 53-58. DOI: 10.1016/J.Bdr.2015.01.008  0.349
2015 Bertino E, Deng RH, Huang X, Zhou J. Security and privacy of electronic health information systems International Journal of Information Security. 14: 485-486. DOI: 10.1007/S10207-015-0303-Z  0.336
2014 Midi D, Oluwatimi O, Shebaro B, Bertino E. Demo overview: Privacy-enhancing features of IdentiDroid Proceedings of the Acm Conference On Computer and Communications Security. 1481-1483. DOI: 10.1145/2660267.2662380  0.304
2014 Arshad MU, Kundu A, Bertino E, Madhavan K, Ghafoor A. Security of graph data: Hashing schemes and definitions Codaspy 2014 - Proceedings of the 4th Acm Conference On Data and Application Security and Privacy. 223-234. DOI: 10.1145/2557547.2557564  0.508
2014 Choi S, Ghinita G, Lim H, Bertino E. Secure kNN Query Processing in Untrusted Cloud Environments Ieee Transactions On Knowledge and Data Engineering. 26: 2818-2831. DOI: 10.1109/Tkde.2014.2302434  0.554
2014 Paulet R, Kaosar MG, Yi X, Bertino E. Privacy-Preserving and Content-Protecting Location Based Queries Ieee Transactions On Knowledge and Data Engineering. 26: 1200-1210. DOI: 10.1109/Tkde.2013.87  0.468
2014 Nabeel M, Bertino E. Privacy Preserving Delegated Access Control in Public Clouds Ieee Transactions On Knowledge and Data Engineering. 26: 2268-2280. DOI: 10.1109/Tkde.2013.68  0.461
2014 Seo S, Nabeel MYM, Ding X, Bertino E. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds Ieee Transactions On Knowledge and Data Engineering. 26: 2107-2119. DOI: 10.1109/Tkde.2013.138  0.47
2014 Fouad MR, Elbassioni K, Bertino E. A supermodularity-based differential privacy preserving algorithm for data anonymization Ieee Transactions On Knowledge and Data Engineering. 26: 1591-1601. DOI: 10.1109/Tkde.2013.107  0.795
2014 Yi X, Bertino E, Vaidya J, Xing C. Private Searching on Streaming Data Based on Keyword Frequency Ieee Transactions On Dependable and Secure Computing. 11: 155-167. DOI: 10.1109/Tdsc.2013.36  0.426
2014 Huang X, Xiang Y, Bertino E, Zhou J, Xu L. Robust Multi-Factor Authentication for Fragile Communications Ieee Transactions On Dependable and Secure Computing. 11: 568-581. DOI: 10.1109/Tdsc.2013.2297110  0.442
2014 Seo S, Gupta A, Sallam AM, Bertino E, Yim K. Detecting mobile malware threats to homeland security through static analysis Journal of Network and Computer Applications. 38: 43-53. DOI: 10.1016/J.Jnca.2013.05.008  0.549
2014 Wang H, Sun L, Bertino E. Building access control policy model for privacy preserving and testing policy conflicting problems Journal of Computer and System Sciences. 80: 1493-1503. DOI: 10.1016/J.Jcss.2014.04.017  0.403
2014 Allahbakhsh M, Ignjatovic A, Benatallah B, Beheshti SMR, Foo N, Bertino E. Representation and querying of unfair evaluations in social rating systems Computers and Security. 41: 68-88. DOI: 10.1016/J.Cose.2013.09.008  0.334
2014 Bertino E, Ghinita G, Kantarcioglu M, Nguyen D, Park J, Sandhu R, Sultana S, Thuraisingham B, Xu S. A roadmap for privacy-enhanced secure data provenance Journal of Intelligent Information Systems. 43: 481-501. DOI: 10.1007/s10844-014-0322-7  0.387
2014 Cuzzocrea A, Bertino E. A comprehensive theoretical framework for privacy preserving distributed OLAP Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8842: 117-136. DOI: 10.1007/978-3-662-45550-0_16  0.417
2014 Yi X, Hao F, Bertino E. ID-based two-server password-authenticated key exchange Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8713: 257-276. DOI: 10.1007/978-3-319-11212-1_15  0.338
2014 Ammar N, Malik Z, Bertino E, Rezgui A. Dynamic privacy policy management in services-based interactions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8645: 248-262. DOI: 10.1007/978-3-319-10085-2_23  0.379
2014 Bertino E. Data security - Challenges and research opportunities Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8425: 9-13. DOI: 10.1007/978-3-319-06811-4_2  0.342
2014 Xu L, Bertino E, Mu Y. Security of new generation computing systems Concurrency and Computation: Practice and Experience. 26: 1475-1476. DOI: 10.1002/Cpe.3128  0.335
2014 Gunasinghe H, Bertino E. Privacy preserving biometrics-based and user centric authentication protocol Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8792: 389-408.  0.348
2013 Kuzu M, Kantarcioglu M, Inan A, Bertino E, Durham E, Malin B. Efficient Privacy-Aware Record Integration. Advances in Database Technology : Proceedings. International Conference On Extending Database Technology. 167-178. PMID 24500681 DOI: 10.1145/2452376.2452398  0.347
2013 Choi S, Gutierrez C, Lim HS, Bagchi S, Bertino E. Secure and resilient proximity-based access control International Conference On Information and Knowledge Management, Proceedings. 15-20. DOI: 10.1145/2512410.2512425  0.314
2013 Shebaro B, Sallam A, Kamra A, Bertino E. PostgreSQL anomalous query detector Acm International Conference Proceeding Series. 741-744. DOI: 10.1145/2452376.2452469  0.526
2013 Squicciarini AC, Petracca G, Bertino E. Adaptive data protection in distributed sysems Codaspy 2013 - Proceedings of the 3rd Acm Conference On Data and Application Security and Privacy. 365-376. DOI: 10.1145/2435349.2435401  0.397
2013 She W, Yen I, Thuraisingham B, Bertino E. Security-Aware Service Composition with Fine-Grained Information Flow Control Ieee Transactions On Services Computing. 6: 330-343. DOI: 10.1109/Tsc.2012.3  0.412
2013 Yi X, Kaosar MG, Paulet R, Bertino E. Single-Database Private Information Retrieval from Fully Homomorphic Encryption Ieee Transactions On Knowledge and Data Engineering. 25: 1125-1134. DOI: 10.1109/Tkde.2012.90  0.385
2013 Sultana S, Shehab M, Bertino E. Secure provenance transmission for streaming data Ieee Transactions On Knowledge and Data Engineering. 25: 1890-1903. DOI: 10.1109/Tkde.2012.31  0.437
2013 Nabeel M, Shang N, Bertino E. Privacy preserving policy-based content sharing in public clouds Ieee Transactions On Knowledge and Data Engineering. 25: 2602-2614. DOI: 10.1109/Tkde.2012.180  0.497
2013 Lin D, Rao P, Ferrini R, Bertino E, Lobo J. A Similarity Measure for Comparing XACML Policies Ieee Transactions On Knowledge and Data Engineering. 25: 1946-1959. DOI: 10.1109/Tkde.2012.174  0.409
2013 Hasan O, Brunie L, Bertino E, Shang N. A decentralized privacy preserving reputation protocol for the malicious adversarial model Ieee Transactions On Information Forensics and Security. 8: 949-962. DOI: 10.1109/Tifs.2013.2258914  0.402
2013 Seo SH, Ding X, Bertino E. Encryption key management for secure communication in smart advanced metering infrastructures 2013 Ieee International Conference On Smart Grid Communications, Smartgridcomm 2013. 498-503. DOI: 10.1109/SmartGridComm.2013.6688007  0.344
2013 Allahbakhsh M, Benatallah B, Ignjatovic A, Motahari-Nezhad HR, Bertino E, Dustdar S. Quality Control in Crowdsourcing Systems: Issues and Directions Ieee Internet Computing. 17: 76-81. DOI: 10.1109/Mic.2013.20  0.355
2013 Singhal M, Chandrasekhar S, Ge T, Sandhu R, Krishnan R, Ahn GJ, Bertino E. Collaboration in multicloud computing environments: Framework and security issues Computer. 46: 76-84. DOI: 10.1109/Mc.2013.46  0.449
2013 Cuzzocrea A, Bertino E. Further theoretical contributions to a privacy preserving distributed OLAP framework Proceedings - International Computer Software and Applications Conference. 234-239. DOI: 10.1109/COMPSAC.2013.39  0.301
2013 Nehme RV, Works K, Lei C, Rundensteiner EA, Bertino E. Multi-route query processing and optimization Journal of Computer and System Sciences. 79: 312-329. DOI: 10.1016/J.Jcss.2012.09.010  0.729
2013 Lee W, Squicciarini A, Bertino E. Agent-based accountable grid computing systems The Journal of Supercomputing. 65: 903-929. DOI: 10.1007/S11227-013-0871-5  0.621
2013 Kundu A, Bertino E. Privacy-preserving authentication of trees and graphs International Journal of Information Security. 12: 467-494. DOI: 10.1007/S10207-013-0198-5  0.605
2012 Nabeel M, Shang N, Bertino E. Efficient privacy preserving content based publish subscribe systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 133-143. DOI: 10.1145/2295136.2295164  0.327
2012 Inan A, Kantarcioglu M, Ghinita G, Bertino E. A hybrid approach to private record matching Ieee Transactions On Dependable and Secure Computing. 9: 684-698. DOI: 10.1109/Tdsc.2012.46  0.417
2012 Kirkpatrick MS, Ghinita G, Bertino E. Resilient authenticated execution of critical applications in untrusted environments Ieee Transactions On Dependable and Secure Computing. 9: 597-609. DOI: 10.1109/Tdsc.2012.25  0.392
2012 Squicciarini A, Bertino E, Trombetta A, Braghin S. A Flexible Approach to Multisession Trust Negotiations Ieee Transactions On Dependable and Secure Computing. 9: 16-29. DOI: 10.1109/Tdsc.2011.31  0.443
2012 Fouad MR, Elbassioni K, Bertino E. Modeling the risk & Utility of information sharing in social networks Proceedings - 2012 Ase/Ieee International Conference On Privacy, Security, Risk and Trust and 2012 Ase/Ieee International Conference On Social Computing, Socialcom/Passat 2012. 441-450. DOI: 10.1109/SocialCom-PASSAT.2012.131  0.773
2012 Bertino E. Trusted identities in cyberspace Ieee Internet Computing. 16: 3-6. DOI: 10.1109/Mic.2012.15  0.407
2012 Nabeel M, Bertino E. Privacy preserving delegated access control in the storage as a service model Proceedings of the 2012 Ieee 13th International Conference On Information Reuse and Integration, Iri 2012. 645-652. DOI: 10.1109/IRI.2012.6303070  0.402
2012 Han W, Cao Y, Bertino E, Yong J. Using automated individual white-list to protect web digital identities Expert Systems With Applications. 39: 11861-11869. DOI: 10.1016/J.Eswa.2012.02.020  0.413
2012 Hasan O, Brunie L, Bertino E. Preserving privacy of feedback providers in decentralized reputation systems Computers & Security. 31: 816-826. DOI: 10.1016/J.Cose.2011.12.003  0.399
2012 Kabir ME, Wang H, Bertino E. A role-involved purpose-based access control model Information Systems Frontiers. 14: 809-822. DOI: 10.1007/S10796-011-9305-1  0.455
2012 You I, Lenzini G, Ogiela MR, Bertino E. Defending against insider threats and internal data leakage Security and Communication Networks. 5: 831-833. DOI: 10.1002/Sec.598  0.45
2012 Squicciarini AC, Petracca G, Bertino E. Adaptive data management for self-protecting objects in cloud computing systems Proceedings of the 2012 8th International Conference On Network and Service Management, Cnsm 2012. 140-144.  0.389
2011 Nabeel M, Bertino E, Kantarcioglu M, Thuraisingham B. Towards privacy preserving access control in the cloud Coliaboratecom 2011 - Proceedings of the 7th International Conference On Collaborative Computing: Networking, Applications and Worksharing. 172-180. DOI: 10.4108/icst.collaboratecom.2011.247061  0.334
2011 Bertino E, Kirkpatrick MS. Location-based access control systems for mobile users - Concepts and research directions Springl 2011 - Proceedings of the 4th Acm Sigspatial International Workshop On Security and Privacy in Gis and Lbs. 49-52. DOI: 10.1145/2071880.2071890  0.315
2011 Ni Q, Bertino E. xfACL: An extensible functional language for access control Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 61-71. DOI: 10.1145/1998441.1998451  0.57
2011 Paci F, Mecella M, Ouzzani M, Bertino E. ACConv -- An Access Control Model for Conversational Web Services Acm Transactions On the Web. 5: 13. DOI: 10.1145/1993053.1993055  0.428
2011 Bertino E, Ghinita G. Towards mechanisms for detection and prevention of data exfiltration by insiders Proceedings of the 6th International Symposium On Information, Computer and Communications Security, Asiaccs 2011. 10-19. DOI: 10.1145/1966913.1966916  0.301
2011 Aliaga DG, Bertino E, Valtolina S. DECHO-A framework for the digital exploration of cultural heritage objects Journal of Computing and Cultural Heritage. 3. DOI: 10.1145/1921614.1921619  0.376
2011 Kamra A, Bertino E. Design and implementation of an intrusion response system for relational databases Ieee Transactions On Knowledge and Data Engineering. 23: 875-888. DOI: 10.1109/Tkde.2010.151  0.626
2011 Trombetta A, Jiang W, Bertino E, Bossi L. Privacy-preserving updates to anonymous and confidential databases Ieee Transactions On Dependable and Secure Computing. 8: 578-587. DOI: 10.1109/Tdsc.2010.72  0.401
2011 Sun Y, Wang Q, Li N, Bertino E, Atallah MJ. On the Complexity of Authorization in RBAC under Qualification and Security Constraints Ieee Transactions On Dependable and Secure Computing. 8: 883-897. DOI: 10.1109/Tdsc.2010.55  0.414
2011 Damiani ML, Silvestri C, Bertino E. Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications Ieee Pervasive Computing. 10: 64-72. DOI: 10.1109/Mprv.2011.18  0.391
2011 Kabir E, Wang H, Bertino E. A Conditional Role-Involved Purpose-Based Access Control Model Journal of Organizational Computing and Electronic Commerce. 21: 71-91. DOI: 10.1080/10919392.2011.541007  0.416
2011 Cuzzocrea A, Bertino E. Privacy preserving OLAP over distributed XML data: A theoretically-sound secure-multiparty-computation approach Journal of Computer and System Sciences. 77: 965-987. DOI: 10.1016/J.Jcss.2011.02.004  0.422
2011 Kabir ME, Wang H, Bertino E. A conditional purpose-based access control model with dynamic roles Expert Systems With Applications. 38: 1482-1489. DOI: 10.1016/J.Eswa.2010.07.057  0.455
2011 Squicciarini AC, Paci F, Bertino E. Trust establishment in the formation of Virtual Organizations Computer Standards and Interfaces. 33: 13-23. DOI: 10.1016/J.Csi.2010.03.003  0.365
2011 Rao P, Lin D, Bertino E, Li N, Lobo J. Fine-grained integration of access control policies Computers & Security. 30: 91-107. DOI: 10.1016/J.Cose.2010.10.006  0.608
2011 Ghinita G, Kalnis P, Kantarcioglu M, Bertino E. Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection Geoinformatica. 15: 699-726. DOI: 10.1007/S10707-010-0121-4  0.437
2011 Kabir ME, Wang H, Bertino E. Efficient systematic clustering method for k -anonymization Acta Informatica. 48: 51-66. DOI: 10.1007/S00236-010-0131-6  0.313
2011 Sandhu R, Bertino E. CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy: Foreword Codaspy'11 - Proceedings of the 1st Acm Conference On Data and Application Security and Privacy 0.31
2010 Bertino E, Ghinita G, Kamra A. Access control for databases: Concepts and systems Foundations and Trends in Databases. 3: 1-148. DOI: 10.1561/1900000014  0.686
2010 Molloy I, Chen H, Li T, Wang Q, Li N, Bertino E, Calo S, Lobo J. Mining Roles with Multiple Objectives Acm Transactions On Information and System Security. 13: 36. DOI: 10.1145/1880022.1880030  0.458
2010 Kirkpatrick MS, Bertino E. Enforcing spatial constraints for mobile RBAC systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 99-108. DOI: 10.1145/1809842.1809860  0.365
2010 Nabeel M, Shang N, Zage J, Bertino E. Mask: A system for privacy-preserving policy-based access to published content Proceedings of the Acm Sigmod International Conference On Management of Data. 1239-1242. DOI: 10.1145/1807167.1807329  0.373
2010 Ni Q, Bertino E, Lobo J, Brodie C, Karat C, Karat J, Trombeta A. Privacy-aware role-based access control Acm Transactions On Information and System Security. 13: 24. DOI: 10.1145/1805974.1805980  0.66
2010 Shang N, Ghinita G, Zhou Y, Bertino E. Controlling data disclosure in computational PIR protocols Proceedings of the 5th International Symposium On Information, Computer and Communications Security, Asiaccs 2010. 310-313. DOI: 10.1145/1755688.1755727  0.374
2010 Bhargav-Spantzel A, Squicciarini A, Bertino E, Kong X, Zhang W. Biometrics-based identifiers for digital identity management Acm International Conference Proceeding Series. 84-96. DOI: 10.1145/1750389.1750401  0.771
2010 Shang N, Paci F, Bertino E. Efficient and privacy-preserving enforcement of attribute-based access control Acm International Conference Proceeding Series. 63-68. DOI: 10.1145/1750389.1750398  0.399
2010 Inan A, Kantarcioglu M, Ghinita G, Bertino E. Private record matching using differential privacy Advances in Database Technology - Edbt 2010 - 13th International Conference On Extending Database Technology, Proceedings. 123-134. DOI: 10.1145/1739041.1739059  0.336
2010 Bhargav-Spantzel A, Squicciarini AC, Xue R, Bertino E. Multifactor identity verification using aggregated proof of knowledge Ieee Transactions On Systems, Man and Cybernetics Part C: Applications and Reviews. 40: 372-383. DOI: 10.1109/TSMCC.2010.2045755  0.765
2010 Squicciarini AC, Paci F, Bertino E, Trombetta A, Braghin S. Group-based negotiations in P2P systems Ieee Transactions On Parallel and Distributed Systems. 21: 1473-1486. DOI: 10.1109/Tpds.2010.25  0.354
2010 Kamra A, Bertino E. JTAM: A joint threshold administration model Proceedings - 2010 Ieee International Symposium On Policies For Distributed Systems and Networks, Policy 2010. 129-132. DOI: 10.1109/POLICY.2010.34  0.579
2010 Bertino E, Maurino A, Scannapieco M. Guest editors' introduction: Data quality in the Internet era Ieee Internet Computing. 14: 11-13. DOI: 10.1109/Mic.2010.93  0.379
2010 Shang N, Nabeel M, Paci F, Bertino E. A privacy-preserving approach to policy-based content dissemination Proceedings - International Conference On Data Engineering. 944-955. DOI: 10.1109/ICDE.2010.5447902  0.366
2010 Nehme RV, Lim HS, Bertino E. FENCE: Continuous access control enforcement in dynamic data stream environments Proceedings - International Conference On Data Engineering. 940-943. DOI: 10.1109/ICDE.2010.5447899  0.691
2010 Ni Q, Bertino E. Credibility-enhanced curated database: Improving the value of curated databases Proceedings - International Conference On Data Engineering. 784-795. DOI: 10.1109/ICDE.2010.5447857  0.497
2010 Bertino E, Ferrari E, Perego A. A General Framework for Web Content Filtering World Wide Web. 13: 215-249. DOI: 10.1007/S11280-009-0073-5  0.363
2010 Lin D, Rao P, Bertino E, Li N, Lobo J. EXAM: a comprehensive environment for the analysis of access control policies International Journal of Information Security. 9: 253-273. DOI: 10.1007/S10207-010-0106-1  0.599
2010 Kamra A, Bertino E. Privilege states based access control for fine-grained intrusion response Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6307: 402-421. DOI: 10.1007/978-3-642-15512-3_21  0.604
2010 Bertino E, Martino LD, Paci F, Squicciarini AC. Security for web services and service-oriented architectures Security For Web Services and Service-Oriented Architectures. 1-226. DOI: 10.1007/978-3-540-87742-4  0.344
2009 Paci F, Bertino E, Kerr S, Squicciarini AC, Woo J. An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices Journal of Software. 4: 696-706. DOI: 10.4304/Jsw.4.7.696-706  0.459
2009 Ni Q, Bertino E. Aggregating uncertain access risk estimations from different sources: Invited paper 2009 5th International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2009. DOI: 10.4108/ICST.COLLABORATECOM2009.8272  0.542
2009 Martino LD, Bertino E. Security for Web services: Standards and research issues International Journal of Web Services Research. 6: 48-74. DOI: 10.4018/978-1-61350-104-7.Ch015  0.464
2009 Celikel E, Kantarcioglu M, Thuraisingham B, Bertino E. A risk management approach to RBAC Risk and Decision Analysis. 1: 21-33. DOI: 10.3233/Rda-2008-0002  0.405
2009 Byun J, Li T, Bertino E, Li N, Sohn Y. Privacy-preserving incremental data dissemination Journal of Computer Security. 17: 43-68. DOI: 10.3233/Jcs-2009-0316  0.598
2009 Dai C, Ghinita G, Bertino E, Byun J, Li N. TIAMAT Proceedings of the Vldb Endowment. 2: 1618-1621. DOI: 10.14778/1687553.1687607  0.469
2009 Karat J, Karat C-, Bertino E, Li N, Ni Q, Brodie C, Lobo J, Calo SB, Cranor LF, Kumaraguru P, Reeder RW. Policy framework for security and privacy management Ibm Journal of Research and Development. 53: 242-255. DOI: 10.1147/Jrd.2009.5429046  0.638
2009 Bertino E, Brodie C, Calo SB, Cranor LF, Karat C, Karat J, Li N, Lin D, Lobo J, Ni Q, Rao PR, Wang X. Analysis of privacy and security policies Ibm Journal of Research and Development. 53: 225-241. DOI: 10.1147/Jrd.2009.5429045  0.694
2009 Kirkpatrick MS, Bertino E. Physically restricted authentication with trusted hardware Proceedings of the Acm Conference On Computer and Communications Security. 55-60. DOI: 10.1145/1655108.1655118  0.344
2009 Bertino E. Privacy-preserving techniques for location-based services Sigspatial Special. 1: 2-3. DOI: 10.1145/1567253.1567254  0.386
2009 Nehme RV, Lim HS, Bertino E, Rundensteiner EA. StreamShield: A stream-centric approach towards security and privacy in data stream environments Sigmod-Pods'09 - Proceedings of the International Conference On Management of Data and 28th Symposium On Principles of Database Systems. 1027-1029. DOI: 10.1145/1559845.1559972  0.724
2009 Lee W, Squicciarini AC, Bertino E. An assessment of accountability policies for Large-Scale distributed computing systems Acm International Conference Proceeding Series. DOI: 10.1145/1558607.1558652  0.304
2009 Ferrini R, Bertino E. Supporting RBAC with XACML+OWL Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 145-154. DOI: 10.1145/1542207.1542231  0.312
2009 Nehme RV, Rundensteiner EA, Bertino E. Self-tuning query mesh for adaptive multi-route query processing Proceedings of the 12th International Conference On Extending Database Technology: Advances in Database Technology, Edbt'09. 803-814. DOI: 10.1145/1516360.1516452  0.668
2009 Bertino E, Chu WCC. Guest editorial: Special section on service-oriented distributed computing systems Ieee Transactions On Services Computing. 2: 245-246. DOI: 10.1109/Tsc.2009.24  0.376
2009 Cao T, Bertino E, Lei H. Security Analysis of the SASI Protocol Ieee Transactions On Dependable and Secure Computing. 6: 73-77. DOI: 10.1109/Tdsc.2008.32  0.434
2009 Gaspard C, Goldberg S, Itani W, Bertino E, Nita-Rotaru C. SINE: Cache-friendly integrity for the web 5th Ieee Workshop On Secure Network Protocols, Npsec'09. 7-12. DOI: 10.1109/NPSEC.2009.5342250  0.307
2009 Paci F, Ferrini R, Musci A, Steuer K, Bertino E. An Interoperable Approach to Multifactor Identity Verification Ieee Computer. 42: 50-57. DOI: 10.1109/Mc.2009.142  0.38
2009 Wonjun L, Squicciarini AC, Bertino E. The design and evaluation of accountable grid computing system Proceedings - International Conference On Distributed Computing Systems. 145-154. DOI: 10.1109/ICDCS.2009.54  0.318
2009 Bertino E, Kirkpatrick M. Location-aware authentication and access control - Concepts and issues Proceedings - International Conference On Advanced Information Networking and Applications, Aina. 10-15. DOI: 10.1109/AINA.2009.50  0.356
2009 Sun Y, Gong B, Meng X, Lin Z, Bertino E. Specification and enforcement of flexible security policy for active cooperation Information Sciences. 179: 2629-2642. DOI: 10.1016/J.Ins.2009.01.040  0.505
2009 Paci F, Bauer D, Bertino E, Blough DM, Squicciarini A, Gupta A. Minimal credential disclosure in trust negotiations Identity in the Information Society. 2: 221-239. DOI: 10.1007/S12394-009-0022-6  0.574
2009 Mazzoleni P, Crispo B, Sivasubramanian S, Bertino E. Efficient integration of fine-grained access control and resource brokering in grid The Journal of Supercomputing. 49: 108-126. DOI: 10.1007/S11227-008-0248-3  0.414
2009 Shay R, Bertino E. A comprehensive simulation tool for the analysis of password policies International Journal of Information Security. 8: 275-289. DOI: 10.1007/S10207-009-0084-3  0.424
2009 Thomas RK, Sandhu R, Bertino E, Arpinar B, Xu S. Privacy-preserving accountable accuracy management systems (PAAMS) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5661: 115-121. DOI: 10.1007/978-3-642-10233-2_11  0.379
2009 Kirkpatrick M, Bertino E. Context-dependent authentication and access control Ifip Advances in Information and Communication Technology. 309: 63-75. DOI: 10.1007/978-3-642-05437-2_6  0.372
2009 Ghinita G, Kalnis P, Kantarcioglu M, Bertino E. A hybrid technique for private location-based queries with database protection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5644: 98-116. DOI: 10.1007/978-3-642-02982-0_9  0.338
2009 Ferrini R, Bertino E. A comprehensive approach for solving policy heterogeneity Iceis 2009 - 11th International Conference On Enterprise Information Systems, Proceedings. 63-68.  0.324
2009 Nehme RV, Rundensteiner EA, Bertino E. Tagging stream data for rich real-time services Proceedings of the Vldb Endowment. 2: 73-84.  0.674
2009 Nehme RV, Works KE, Rundensteiner EA, Bertino E. Query Mesh: Multi-route query processing technology Proceedings of the Vldb Endowment. 2: 1530-1533.  0.672
2008 Damiani ML, Silvestri C, Bertino E. Semantics-aware Obfuscation for Location Privacy Journal of Computing Science and Engineering. 2: 137-160. DOI: 10.5626/Jcse.2008.2.2.137  0.43
2008 Cao T, Shen P, Bertino E. Cryptanalysis of Some RFID Authentication Protocols Journal of Communications. 3: 20-27. DOI: 10.4304/Jcm.3.7.20-27  0.367
2008 Paci F, Bertino E, Crampton J. An access-control framework for WS-BPEL International Journal of Web Services Research. 5: 20-43. DOI: 10.4018/Jwsr.2008070102  0.366
2008 Squicciarini AC, Trombetta A, Bertino E, Braghin S. Identity-based long running negotiations Proceedings of the Acm Conference On Computer and Communications Security. 97-105. DOI: 10.1145/1456424.1456440  0.363
2008 Paci F, Bauer D, Bertino E, Blough DM, Squicciarini AC. Minimal credential disclosure in trust negotiations Proceedings of the Acm Conference On Computer and Communications Security. 89-96. DOI: 10.1145/1456424.1456439  0.313
2008 Kamra A, Bertino E, Lebanon G. Mechanisms for database intrusion detection and response 2nd Sigmod Phd Workshop On Innovative Database Research, Idar. 31-36. DOI: 10.1145/1410308.1410318  0.617
2008 Mazzoleni P, Crispo B, Sivasubramanian S, Bertino E. XACML Policy Integration Algorithms Acm Transactions On Information and System Security. 11: 4. DOI: 10.1145/1330295.1330299  0.456
2008 Joshi JBD, Bertino E, Ghafoor A, Zhang Y. Formal foundations for hybrid hierarchies in GTRBAC Acm Transactions On Information and System Security. 10: 2. DOI: 10.1145/1284680.1284682  0.599
2008 Kundu A, Bertino E. A new model for secure dissemination of XML content Ieee Transactions On Systems, Man and Cybernetics Part C: Applications and Reviews. 38: 292-301. DOI: 10.1109/TSMCC.2008.919213  0.428
2008 Wu X, Liu J, Hong X, Bertino E. Anonymous Geo-Forwarding in MANETs through Location Cloaking Ieee Transactions On Parallel and Distributed Systems. 19: 1297-1309. DOI: 10.1109/Tpds.2008.28  0.317
2008 Shehab M, Ghafoor A, Bertino E. Secure collaboration in a mediator-free distributed environment Ieee Transactions On Parallel and Distributed Systems. 19: 1338-1351. DOI: 10.1109/Tpds.2008.26  0.633
2008 Koglin Y, Yao D, Bertino E. Efficient and secure content processing and distribution by cooperative intermediaries Ieee Transactions On Parallel and Distributed Systems. 19: 615-626. DOI: 10.1109/Tpds.2007.70758  0.813
2008 Shehab M, Bertino E, Ghafoor A. Watermarking relational databases using optimization based techniques Ieee Transactions On Knowledge and Data Engineering. 20. DOI: 10.1109/Tkde.2007.190668  0.585
2008 Bertino E, Shang N, Wagstaff SS. An efficient time-bound hierarchical key management scheme for secure broadcasting Ieee Transactions On Dependable and Secure Computing. 5: 65-70. DOI: 10.1109/Tdsc.2007.70241  0.43
2008 Squicciarini A, Mont MC, Bhargav-Spantzel A, Bertino E. Automatic compliance of privacy policies in federated digital identity management Proceedings - 2008 Ieee Workshop On Policies For Distributed Systems and Networks, Policy 2008. 89-92. DOI: 10.1109/POLICY.2008.46  0.798
2008 Shehab M, Bertino E, Ghafoor A. Proactive role discovery in mediator-free environments Proceedings - P2p'08, 8th International Conference On Peer-to-Peer Computing. 150-159. DOI: 10.1109/P2P.2008.52  0.316
2008 Samuel A, Ghafoor A, Bertino E. Context-Aware Adaptation of Access-Control Policies Ieee Internet Computing. 12: 51-54. DOI: 10.1109/Mic.2008.6  0.626
2008 Bhatti R, Damiani ML, Bettis DW, Bertino E. Policy Mapper: Administering Location-Based Access-Control Policies Ieee Internet Computing. 12: 38-45. DOI: 10.1109/Mic.2008.40  0.385
2008 Nabeel M, Bertino E. Secure delta-publishing of XML content Proceedings - International Conference On Data Engineering. 1361-1363. DOI: 10.1109/ICDE.2008.4497556  0.369
2008 Nehme RV, Rundensteiner EA, Bertino E. A security punctuation framework for enforcing access control on streaming data Proceedings - International Conference On Data Engineering. 406-415. DOI: 10.1109/ICDE.2008.4497449  0.74
2008 Woo J, Bhagav-Spantzel A, Squicciarini AC, Bertino E. Verification of receipts from M-commerce transactions on NFC cellular phones Proceedings - 10th Ieee Joint Conference On E-Commerce Technology and the 5th Enterprise Computing, E-Commerce and E-Services, Cec 2008 and Eee 2008. 36-43. DOI: 10.1109/CECandEEE.2008.130  0.367
2008 Squicciarini AC, Lee W, Bertino E, Song CX. A policy-based accountability tool for grid computing systems Proceedings of the 3rd Ieee Asia-Pacific Services Computing Conference, Apscc 2008. 95-100. DOI: 10.1109/APSCC.2008.257  0.33
2008 Damiani ML, Bertino E, Silvestri C. Spatial Domains for the Administration of Location-based Access Control Policies Journal of Network and Systems Management. 16: 277-302. DOI: 10.1007/S10922-008-9106-0  0.406
2008 Luo H, Fan J, Lin X, Zhou A, Bertino E. A distributed approach to enabling privacy-preserving model-based classifier training Knowledge and Information Systems. 20: 157-185. DOI: 10.1007/S10115-008-0167-X  0.361
2008 Kamra A, Terzi E, Bertino E. Detecting anomalous access patterns in relational databases Vldb Journal. 17: 1063-1077. DOI: 10.1007/s00778-007-0051-4  0.624
2008 Kamra A, Bertino E. Database intrusion detection and response Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 400-401. DOI: 10.1007/978-3-540-87403-4_26  0.615
2008 Kamra A, Bertino E, Nehme R. Responding to anomalous database requests Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5159: 50-66. DOI: 10.1007/978-3-540-85259-9_4  0.778
2008 Fouad MR, Lebanon G, Bertino E. ARUBA: A risk-utility-based algorithm for data disclosure Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5159: 32-49. DOI: 10.1007/978-3-540-85259-9_3  0.767
2007 Bertino E, Carminati B, Ferrari E. Authentication techniques for UDDI registries Modern Technologies in Web Services Research. 9-30. DOI: 10.4018/978-1-59904-280-0.ch002  0.358
2007 Damiani ML, Bertino E, Perlasca P. Data security in location-aware applications: an approach based on RBAC International Journal of Information and Computer Security. 1: 5-38. DOI: 10.1504/Ijics.2007.012243  0.469
2007 Bhargav-Spantzel A, Woo J, Bertino E. Receipt management- transaction history based trust establishment Dim'07 - Proceedings of the 2007 Acm Workshop On Digital Identity Management. 82-91. DOI: 10.1145/1314403.1314417  0.803
2007 Shay RJK, Bhargav-Spantzel A, Bertino E. Password policy simulation and analysis Dim'07 - Proceedings of the 2007 Acm Workshop On Digital Identity Management. 1-10. DOI: 10.1145/1314403.1314405  0.768
2007 Winsborough WH, Squicciarini AC, Bertino E. Information carrying identity proof trees Wpes'07 - Proceedings of the 2007 Acm Workshop On Privacy in Electronic Society. 76-79. DOI: 10.1145/1314333.1314348  0.325
2007 Antón AI, Bertino E, Li N, Yu T. A roadmap for comprehensive online privacy policy management Communications of the Acm. 50: 109-116. DOI: 10.1145/1272516.1272522  0.364
2007 Squicciarini A, Bertino E, Ferrari E, Paci F, Thuraisingham B. PP-trust-X: A system for privacy preserving trust negotiations Acm Transactions On Information and System Security. 10: 12. DOI: 10.1145/1266977.1266981  0.478
2007 Squicciarini AC, Hintoglu AA, Bertino E, Saygin Y. A privacy preserving assertion based policy language for federation systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 51-60. DOI: 10.1145/1266840.1266849  0.354
2007 Yao D, Koglin Y, Bertino E, Tamassia R. Decentralized authorization and data security in web content delivery Proceedings of the Acm Symposium On Applied Computing. 1654-1661. DOI: 10.1145/1244002.1244353  0.815
2007 Bhatti R, Bertino E, Ghafoor A. An integrated approach to federated identity and privilege management in open systems Communications of the Acm. 50: 81-87. DOI: 10.1145/1216016.1216025  0.589
2007 Wu X, Bertino E. An analysis study on zone-based anonymous communication in mobile ad hoc networks Ieee Transactions On Dependable and Secure Computing. 4: 252-265. DOI: 10.1109/Tdsc.2007.70213  0.333
2007 Bertino E, Kamra A, Early JP. Profiling database applications to detect SQL injection attacks Conference Proceedings of the Ieee International Performance, Computing, and Communications Conference. 449-458. DOI: 10.1109/PCCC.2007.358926  0.571
2007 Bhargav-Spantzel A, Squicciarini AC, Bertino E. Trust negotiation in identity management Ieee Security and Privacy. 5: 55-63. DOI: 10.1109/MSP.2007.46  0.784
2007 Li N, Byun J, Bertino E. A Critique of the ANSI Standard on Role-Based Access Control Ieee Security & Privacy Magazine. 5: 41-49. DOI: 10.1109/MSP.2007.158  0.516
2007 Squicciarini AC, Trombetta A, Bertino E. Supporting robust and secure interactions in open domains through recovery of trust negotiations Proceedings - International Conference On Distributed Computing Systems. DOI: 10.1109/ICDCS.2007.144  0.345
2007 Bertino E, Martino LD. A service-oriented approach to security - Concepts and issues Proceedings of the Ieee Computer Society Workshop On Future Trends of Distributed Computing Systems. 31-38. DOI: 10.1109/FTDCS.2007.6  0.38
2007 Squicciarini AC, Bertino E, Goasguen S. Access control strategies for virtualized environments in grid computing systems Proceedings of the Ieee Computer Society Workshop On Future Trends of Distributed Computing Systems. 48-54. DOI: 10.1109/FTDCS.2007.10  0.34
2007 Nabeel M, Bertino E. A structure preserving approach for securing XML documents Proceedings of the 3rd International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2007. 8-15. DOI: 10.1109/COLCOM.2007.4553802  0.394
2007 Bertino E, Ferrari E, Paci F, Provenza LP. A system for securing push-based distribution of XML documents International Journal of Information Security. 6: 255-284. DOI: 10.1007/S10207-007-0020-3  0.477
2007 Damiani ML, Bertino E. Access control systems for geospatial data and applications Spatial Data On the Web: Modeling and Management. 189-214. DOI: 10.1007/978-3-540-69878-4_9  0.378
2007 Zou X, Karandikar Y, Bertino E. A dynamic key management solution to access hierarchy International Journal of Network Management. 17: 437-450. DOI: 10.1002/Nem.656  0.39
2006 Bertino E, Squicciarini AC, Martino L, Paci F. An Adaptive Access Control Model for Web Services International Journal of Web Services Research. 3: 27-60. DOI: 10.4018/Jwsr.2006070102  0.389
2006 Shehab M, Bertino E, Ghafoor A. Workflow authorisation in mediator-free environments International Journal of Security and Networks. 1: 2-12. DOI: 10.1504/Ijsn.2006.010819  0.557
2006 Mella G, Ferrari E, Bertino E, Koglin Y. Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems Acm Transactions On Information and System Security. 9: 421-460. DOI: 10.1145/1187441.1187443  0.81
2006 Bhargav-Spantzel A, Squicciarini A, Bertino E. Privacy preserving multi-factor authentication with biometrics Proceedings of the Second Acm Workshop On Digital Identity Management, Dim 2006. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 63-72. DOI: 10.1145/1179529.1179540  0.801
2006 Byun J, Bertino E. Micro-views, or on how to protect privacy while enhancing data usability Acm Sigmod Record. 35: 9-13. DOI: 10.1145/1121995.1121997  0.541
2006 Bhargav-Spantzel A, Squicciarini AC, Bertino E. Establishing and protecting digital identity in federation systems Journal of Computer Security. 14: 269-300. DOI: 10.1145/1102486.1102489  0.733
2006 Bhatti R, Bertino E, Ghafoor A. X-FEDERATE: a policy engineering framework for federated access management Ieee Transactions On Software Engineering. 32: 330-346. DOI: 10.1109/Tse.2006.49  0.622
2006 Squicciarini AC, Bertino E, Ferrari E, Ray I. Achieving privacy in trust negotiations with an ontology-based approach Ieee Transactions On Dependable and Secure Computing. 3: 13-30. DOI: 10.1109/Tdsc.2006.3  0.492
2006 Bertino E, Martino L. Security in SOA and Web services Proceedings - 2006 Ieee International Conference On Services Computing, Scc 2006. DOI: 10.1109/SCC.2006.85  0.336
2006 Bertino E, Bhargav-Spantzel A, Squicciarini AC. Policy languages for digital identity management in federation systems Proceedings - Seventh Ieee International Workshop On Policies For Distributed Systems and Networks, Policy 2006. 2006: 54-64. DOI: 10.1109/POLICY.2006.22  0.798
2006 Bertino E, Ruth S. Policies and IT technologies: A puzzle of two pieces Ieee Internet Computing. 10: 65-67. DOI: 10.1109/Mic.2006.15  0.335
2006 Kundu A, Bertino E. Secure dissemination of XML content using structure-based routing Proceedings - Ieee International Enterprise Distributed Object Computing Workshop, Edoc. 153-162. DOI: 10.1109/EDOC.2006.46  0.383
2006 Camossi E, Bertolotto M, Bertino E. A multigranular object‐oriented framework supporting spatio‐temporal granularity conversions International Journal of Geographical Information Science. 20: 511-534. DOI: 10.1080/13658810600607451  0.339
2006 Bertino E, Squicciarini AC, Paloscia I, Martino L. Ws-AC: A fine grained access control system for Web services World Wide Web. 9: 143-171. DOI: 10.1007/S11280-005-3045-4  0.456
2006 Cuppens F, Debar H, Bertino E. Network and information systems security Annales Des TéLéCommunications. 61: 242-244. DOI: 10.1007/Bf03219907  0.343
2006 Squicciarini A, Bhargav-Spantzel A, Czeskis A, Bertino E. Traceable and automatic compliance of privacy policies in federated digital identity management Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4258: 78-98. DOI: 10.1007/11957454_5  0.802
2006 Joshi JBD, Bertino E. Fine-grained role-based delegation in presence of the hybrid role hierarchy Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 2006: 81-90.  0.321
2006 Damiani ML, Bertino E. Architectural issues for a location-aware role-based access control system Proceedings of the Acm Symposium On Applied Computing. 2: 1184-1185.  0.309
2006 Squicciarini AC, Paci F, Bertino E. A secure framework for publishing virtual community contracts International Journal of Web Based Communities. 2: 237-255.  0.34
2005 Bertino E, Ferrari E, Mella G. An approach to cooperative updates of XML documents in distributed systems Journal of Computer Security. 13: 191-242. DOI: 10.3233/Jcs-2005-13201  0.48
2005 Bhatti R, Shafiq B, Bertino E, Ghafoor A, Joshi JBD. X-GTRBAC admin: A decentralized administration model for enterprise-wide access control Acm Transactions On Information and System Security. 8: 388-423. DOI: 10.1145/1108906.1108909  0.618
2005 Shafiq B, Bertino E, Ghafoor A. Access control management in a distributed environment supporting dynamic collaboration Proceedings of the Acm Conference On Computer and Communications Security. 104-112. DOI: 10.1145/1102486.1102503  0.387
2005 Shehab M, Bertino E, Ghafoor A. Secure collaboration in mediator-free environments Proceedings of the Acm Conference On Computer and Communications Security. 58-67. DOI: 10.1145/1102120.1102130  0.34
2005 Bhatti R, Ghafoor A, Bertino E, Joshi JBD. X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control Acm Transactions On Information and System Security. 8: 187-227. DOI: 10.1145/1065545.1065547  0.644
2005 Shehab M, Bertino E, Ghafoor A. SERAT: SEcure Role mApping Technique for decentralized secure interoperability Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 159-167. DOI: 10.1145/1063979.1064007  0.315
2005 Shafiq B, Joshi JBD, Bertino E, Ghafoor A. Secure interoperation in a multidomain environment employing RBAC policies Ieee Transactions On Knowledge and Data Engineering. 17: 1557-1577. DOI: 10.1109/Tkde.2005.185  0.617
2005 Joshi JBD, Bertino E, Latif U, Ghafoor A. A generalized temporal role-based access control model Ieee Transactions On Knowledge and Data Engineering. 17: 4-23. DOI: 10.1109/Tkde.2005.1  0.592
2005 Bertino E, Sandhu R. Database security-concepts, approaches, and challenges Ieee Transactions On Dependable and Secure Computing. 2: 2-18. DOI: 10.1109/Tdsc.2005.9  0.511
2005 Joshi JBD, Bertino E, Ghafoor A. An analysis of expressiveness and design issues for the generalized temporal role-based access control model Ieee Transactions On Dependable and Secure Computing. 2: 157-175. DOI: 10.1109/Tdsc.2005.18  0.586
2005 Bertino E, Kamra A, Terzi E, Vakali A. Intrusion detection in RBAC-administered databases Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 170-179. DOI: 10.1109/CSAC.2005.33  0.629
2005 Bertino E, Hacid M, Toumani F. Towards structure discovering in video data Journal of Experimental and Theoretical Artificial Intelligence. 17: 5-18. DOI: 10.1080/09528130512331315927  0.369
2005 Bhatti R, Bertino E, Ghafoor A. A Trust-Based Context-Aware Access Control Model for Web-Services Distributed and Parallel Databases. 18: 83-105. DOI: 10.1007/S10619-005-1075-7  0.623
2005 Bertino E, Fovino IN, Provenza LP. A Framework for Evaluating Privacy Preserving Data Mining Algorithms Data Mining and Knowledge Discovery. 11: 121-154. DOI: 10.1007/S10618-005-0006-6  0.361
2005 Bertino E, Byun J, Li N. Privacy-Preserving database systems Lecture Notes in Computer Science. 178-206. DOI: 10.1007/11554578_6  0.633
2005 Bertino E. Purpose based access control for privacy protection in database systems Lecture Notes in Computer Science. 3453: 2.  0.394
2005 Bhatti R, Bertino E, Ghafoor A. A Policy Framework for Access Management in Federated Information Sharing Ifip Advances in Information and Communication Technology. 193: 95-120.  0.361
2004 Bertino E, Carminati B, Ferrari E. Merkle Tree Authentication in UDDI Registries International Journal of Web Services Research. 1: 37-57. DOI: 10.4018/Jwsr.2004040103  0.489
2004 Belussi A, Bertino E, Nucita A. Grid based methods for estimating spatial join selectivity International Journal of Geographical Information Science. 92-100. DOI: 10.1145/1032222.1032238  0.308
2004 Belussi A, Bertino E, Catania B, Damiani ML, Nucita A. An authorization model for geographical maps International Journal of Geographical Information Science. 82-91. DOI: 10.1145/1032222.1032236  0.351
2004 Bertino E, Mazzoleni P, Santi D. Hsgs: An Interactive System For High-Level Specification And Generation Of Hypermedia Presentations International Journal of Software Engineering and Knowledge Engineering. 14: 545-564. DOI: 10.1142/S0218194004001786  0.398
2004 Bertino E, Carminati B, Ferrari E, Thuraisingham B, Gupta A. Selective and authentic third-party distribution of XML documents Ieee Transactions On Knowledge and Data Engineering. 16: 1263-1278. DOI: 10.1109/Tkde.2004.63  0.499
2004 Bertino E, Ferrari E, Squicciarini AC. Trust-χ: A peer-to-peer framework for trust establishment Ieee Transactions On Knowledge and Data Engineering. 16: 827-842. DOI: 10.1109/Tkde.2004.1318565  0.47
2004 Verykios VS, Elmagarmid AK, Bertino E, Saygin Y, Dasseni E. Association Rule Hiding Ieee Transactions On Knowledge and Data Engineering. 16: 434-447. DOI: 10.1109/Tkde.2004.1269668  0.418
2004 Bertino E, Guerrini G, Merlo I. Extending the ODMG Object Model with Triggers Ieee Transactions On Knowledge and Data Engineering. 16: 170-188. DOI: 10.1109/Tkde.2004.1269596  0.371
2004 Bertino E, Squicciarini AC, Mevi D. A fine-grained access control model for Web services Proceedings - 2004 Ieee International Conference On Services Computing, Scc 2004. 33-40. DOI: 10.1109/RIDE.2004.1281700  0.342
2004 Bertino E, Ramamritham K. Guest editors' introduction: Data dissemination on the web Ieee Internet Computing. 8: 27-28. DOI: 10.1109/Mic.2004.1297270  0.418
2004 Bertino E, Ferrari E, Squicciarini A. Trust negotiations: concepts, systems, and languages Computing in Science and Engineering. 6: 27-34. DOI: 10.1109/Mcse.2004.22  0.392
2004 Bhatti R, Bertino E, Ghafoor A, Joshi JBD. XML-based specification for Web services document security Ieee Computer. 37: 41-49. DOI: 10.1109/Mc.2004.1297300  0.633
2004 Camossi E, Bertino E, Mesiti M, Guerrini G. Handling Expiration of Multigranular Temporal Objects Journal of Logic and Computation. 14: 23-50. DOI: 10.1093/Logcom/14.1.23  0.351
2004 Bertino E, Elmagarmid AK, Hacid MS. A logical approach to quality of service specification in video databases Multimedia Tools and Applications. 23: 75-101. DOI: 10.1023/B:Mtap.0000026842.02622.6C  0.408
2004 Bertino E, Carminati B, Ferrari E. Access control for XML documents and data Information Security Technical Report. 9: 19-34. DOI: 10.1016/S1363-4127(04)00029-9  0.468
2004 Atluri V, Bertino E, Ferrari E, Mazzoleni P. Supporting delegation in secure workflow management systems Ifip Advances in Information and Communication Technology. 142: 190-204.  0.358
2003 Bertino E, Fan J, Ferrari E, Hacid MS, Elmagarmid AK, Zhu X. A hierarchical access control model for video database systems Acm Transactions On Information Systems. 21: 155-191. DOI: 10.1145/763693.763695  0.395
2003 Bertino E, Catania B, Ferrari E, Perlasca P. A logical framework for reasoning about access control models Acm Transactions On Information and System Security. 6: 71-127. DOI: 10.1145/605434.605437  0.43
2003 Bertino E, Catarci T, Elmagarmid AK, Hacid MS. Quality of Service Specification in Video Databases Ieee Multimedia. 10: 71-81. DOI: 10.1109/Mmul.2003.1237552  0.4
2003 BERTINO E, PERLASCA P, CATANIA B. Introducing dynamic behavior in amalgamated knowledge bases Theory and Practice of Logic Programming. 3: 625-669. DOI: 10.1017/S1471068402001588  0.308
2003 Bertino E, Ferrari E, Guerrini G, Merlo I. T-ODMG: An ODMG compliant temporal object model supporting multiple granularity management Information Systems. 28: 885-927. DOI: 10.1016/S0306-4379(02)00077-7  0.346
2003 Montesi D, Bertino E, Bagnato M. Refined rules termination analysis through transactions Information Systems. 28: 435-456. DOI: 10.1016/S0306-4379(02)00025-X  0.33
2003 Bertino E. RBAC models - Concepts and trends Computers and Security. 22: 511-514. DOI: 10.1016/S0167-4048(03)00609-6  0.436
2003 Bertino E, Ferrari E, Perego A. Content-based filtering of Web documents: the MaX system and the EUFORBIA project International Journal of Information Security. 2: 45-58. DOI: 10.1007/S10207-003-0024-6  0.329
2003 Bertino E, Guerrini G, Merlo I. A set-oriented method definition language for object databases and its semantics Concurrency Computation Practice and Experience. 15: 1275-1335. DOI: 10.1002/Cpe.731  0.317
2002 Bertino E, Ferrari E. Secure and selective dissemination of XML documents Acm Transactions On Information and System Security. 5: 290-331. DOI: 10.1145/545186.545190  0.497
2002 Bertino E, Bouguettaya A. Database technology on the Web Ieee Internet Computing. 6: 31-32. DOI: 10.1109/Mic.2002.1020322  0.395
2002 Bertino E, Ferrari E, Perego A. MaX: An access control system for digital libraries and the web Proceedings - Ieee Computer Society's International Computer Software and Applications Conference. 945-950. DOI: 10.1109/CMPSAC.2002.1045127  0.359
2002 Adam NR, Atluri V, Bertino E, Ferrari E. A content-based authorization model for digital libraries Ieee Transactions On Knowledge and Data Engineering. 14: 296-315. DOI: 10.1109/69.991718  0.446
2002 Bertino E, Trombetta A, Montesi D. Workflow Architecture for Interactive Video Management Systems Distributed and Parallel Databases. 11: 33-51. DOI: 10.1023/A:1013325522291  0.394
2002 Ferrari E, Adam NR, Atluri V, Bertino E, Capuozzo U. An authorization system for digital libraries Vldb Journal. 11: 58-67. DOI: 10.1007/s007780200063  0.301
2001 Bertino E, Catania B, Ferrari E. A nested transaction model for multilevel secure database management systems Acm Transactions On Information and System Security. 4: 321-370. DOI: 10.1145/503339.503340  0.429
2001 Bertino E, Bonatti PA, Ferrari E. TRBAC: A temporal role-based access control model Acm Transactions On Information and System Security. 4: 191-233. DOI: 10.1145/501978.501979  0.405
2001 Bertino E, Ferrari E. XML and data integration Ieee Internet Computing. 5: 75-76. DOI: 10.1109/4236.968835  0.346
2001 Bertino E, Catania B. Integrating XML and databases Ieee Internet Computing. 5: 84-88. DOI: 10.1109/4236.939454  0.416
2001 Bertino E, Castano S, Ferrari E. Securing XML documents with Author-X Ieee Internet Computing. 5: 21-31. DOI: 10.1109/4236.935172  0.446
2001 Bellettini C, Bertino E, Ferrari E. Role Based Access Control Models Information Security Technical Report. 6: 21-29. DOI: 10.1016/S1363-4127(01)00204-7  0.332
2001 Bertino E, Guerrini G, Merlo I. Exception Handling in Object-Oriented Databases Lecture Notes in Computer Science. 234-250. DOI: 10.1007/3-540-45407-1_15  0.386
2001 Bertino E, Ferrari E, Pitoura E. An access control mechanism for large scale data dissemination systems Proceedings of the International Workshop On Research Issues in Data Engineering - Distributed Object Management -Ride-Dom. 43-50.  0.362
2000 Bertino E, Bonatti PA, Ferrari E, Sapino ML. Temporal authorization bases: from specification to integration Journal of Computer Security. 8: 309-353. DOI: 10.3233/Jcs-2000-8404  0.401
2000 Bertino E, Buccafurri F, Ferrari E, Rullo P. A logic-based approach for enforcing access control[1]A preliminary version of this paper appears in the Proceedings of the 5th European Symposium on Research in Computer Security (ESORICS’98), Louvain-La-Neuve, Belgium, September 1998 under the title “An Authorization Model and its Formal Semantics”. Journal of Computer Security. 8: 109-139. DOI: 10.3233/Jcs-2000-82-303  0.409
2000 Atluri V, Huang W, Bertino E. A semantic-based execution model for multilevel secure workflows Journal of Computer Security. 8: 3-41. DOI: 10.3233/Jcs-2000-8102  0.393
2000 Bertino E, Pagani E, Rossi GP, Samarati P. Protecting information on the Web Communications of the Acm. 43: 3. DOI: 10.1145/352515.352518  0.424
2000 Ray I, Mancini LV, Jajodia S, Bertino E. ASEP: a secure and flexible commit protocol for MLS distributed database systems Ieee Transactions On Knowledge and Data Engineering. 12: 880-899. DOI: 10.1109/69.895800  0.411
2000 Bertino E, Guerrini G, Merlo I. Trigger inheritance and overriding in an active object database system Ieee Transactions On Knowledge and Data Engineering. 12: 588-608. DOI: 10.1109/69.868909  0.347
2000 Bertino E, Ferrari E, Stolf M. MPGS: an interactive tool for the specification and generation of multimedia presentations Ieee Transactions On Knowledge and Data Engineering. 12: 102-125. DOI: 10.1109/69.842254  0.376
2000 Bertino E, Castano S, Ferrari E, Mesiti M. Specifying and enforcing access control policies for XML document sources World Wide Web. 3: 139-151. DOI: 10.1023/A:1019289831564  0.488
2000 Mancini LV, Ray I, Jajodia S, Bertino E. Flexible Transaction Dependencies in Database Systems Distributed and Parallel Databases. 8: 399-446. DOI: 10.1023/A:1008738705440  0.419
1999 Bertino E, Ferrari E. Secure object deletion and garbage collection in multilevel object bases[1]A preliminary version of this paper appeared under the title “A principled approach to object deletion and garbage collection in multilevel secure object bases”, inc Proceedings of the 11th Annual IFIP Working Conference on Database Security, Lake Tahoe, CA, August 1997. Journal of Computer Security. 7: 257-285. DOI: 10.3233/Jcs-1999-7402  0.416
1999 Bertino E, Jajodia S, Samarati P. A flexible authorization mechanism for relational data management systems Acm Transactions On Information Systems. 17: 101-140. DOI: 10.1145/306686.306687  0.387
1999 Bertino E, Ferrari E, Atluri V. The specification and enforcement of authorization constraints in workflow management systems Acm Transactions On Information and System Security. 2: 65-104. DOI: 10.1145/300830.300837  0.467
1999 Bertino E, Ooi BC. The indispensability of dispensable indexes Ieee Transactions On Knowledge and Data Engineering. 11: 17-27. DOI: 10.1109/69.755611  0.321
1999 Bertino E, Catania B, Wong L. Finitely representable nested relations Information Processing Letters. 70: 165-173. DOI: 10.1016/S0020-0190(99)00062-9  0.343
1999 Bertino E, Guerrini G, Montesi D. Inheritance in a Deductive Object Database Language with Updates Lecture Notes in Computer Science. 67-90. DOI: 10.1007/3-540-46466-2_4  0.322
1998 Bertino E, Bettini C, Ferrari E, Samarati P. An access control model supporting periodicity constraints and temporal reasoning Acm Transactions On Database Systems. 23: 231-285. DOI: 10.1145/293910.293151  0.405
1998 Bertino E, Vimercati SDCD, Ferrari E, Samarati P. Exception-based information flow control in object-oriented systems Acm Transactions On Information and System Security. 1: 26-65. DOI: 10.1145/290163.290167  0.363
1998 Belussi A, Bertino E, Catania B. An extended algebra for constraint databases Ieee Transactions On Knowledge and Data Engineering. 10: 686-705. DOI: 10.1109/69.729722  0.322
1998 Bertino E, Ferrari E, Guerrini G. Navigational accesses in a temporal object model Ieee Transactions On Knowledge and Data Engineering. 10: 656-665. DOI: 10.1109/69.706062  0.378
1998 Bertino E, Ferrari E. Temporal synchronization models for multimedia data Ieee Transactions On Knowledge and Data Engineering. 10: 612-631. DOI: 10.1109/69.706060  0.377
1998 Bertino E, Jajodia S, Mancini L, Ray I. Advanced transaction processing in multilevel secure file stores Ieee Transactions On Knowledge and Data Engineering. 10: 120-135. DOI: 10.1109/69.667095  0.406
1998 Bertino E, Catania B, Chiesa L. Definition and analysis of index organizations for object-oriented database systems Information Systems. 23: 65-108. DOI: 10.1016/S0306-4379(98)00003-9  0.323
1998 Bertino E, Catania B. A constraint-based approach to shape management in multimedia databases Multimedia Systems. 6: 2-16. DOI: 10.1007/S005300050072  0.384
1998 Bertino E, Ferrari E, Samarati P. Mandatory security and object-oriented systems: a multilevel entity model and its mapping onto a single-level object model Theory and Practice of Object Systems. 4: 183-204. DOI: 10.1002/(Sici)1096-9942(1998)4:3<183::Aid-Tapo4>3.3.Co;2-6  0.374
1998 Bertino E. Data security Data and Knowledge Engineering. 25: 199-216.  0.354
1997 Bertino E, Samarati P, Rossi GP. Special issue on Security in the World Wide Web (WWW) Journal of Computer Security. 5: 189-190. DOI: 10.3233/Jcs-1997-5301  0.42
1997 Jajodia S, Samarati P, Subrahmanian VS, Bertino E. A unified framework for enforcing multiple access control policies Acm Sigmod Record. 26: 474-485. DOI: 10.1145/253262.253364  0.324
1997 Montesi D, Bertino E, Martelli M. Transactions and updates in deductive databases Ieee Transactions On Knowledge and Data Engineering. 9: 784-797. DOI: 10.1109/69.634755  0.398
1997 Atluri V, Jajodia S, Bertino E. Transaction processing in multilevel secure databases with kernelized architecture: Challenges and solutions Ieee Transactions On Knowledge and Data Engineering. 9: 697-708. DOI: 10.1109/69.634749  0.434
1997 Samarati P, Bertino E, Ciampichetti A, Jajodia S. Information flow control in object-oriented systems Ieee Transactions On Knowledge and Data Engineering. 9: 524-538. DOI: 10.1109/69.617048  0.333
1997 Bertino E, Foscoli P. On modeling cost functions for object-oriented databases Ieee Transactions On Knowledge and Data Engineering. 9: 500-508. DOI: 10.1109/69.599936  0.315
1997 Bertino E, Samarati P, Jajodia S. An extended authorization model for relational databases Ieee Transactions On Knowledge and Data Engineering. 9: 85-101. DOI: 10.1109/69.567051  0.399
1997 Bertino E, Bettini C, Ferrari E, Samarati P. Decentralized administration for a temporal access control model Information Systems. 22: 223-248. DOI: 10.1016/S0306-4379(97)00013-6  0.401
1997 Belussi A, Bertino E, Catania B. Manipulating Spatial Data in Constraint Databases Lecture Notes in Computer Science. 115-141. DOI: 10.1007/3-540-63238-7_27  0.345
1997 Bertino E, Ferrari E, Guerrini G. T_Chimera: a temporal object-oriented data model Theory and Practice of Object Systems. 3: 103-125. DOI: 10.1002/(Sici)1096-9942(1997)3:2<103::Aid-Tapo3>3.0.Co;2-W  0.317
1996 Atluri V, Jajodia S, Bertino E. Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases Ieee Transactions On Knowledge and Data Engineering. 8: 839-854. DOI: 10.1109/69.542034  0.46
1996 Samarati P, Bertino E, Jajodia S. An authorization model for a distributed hypertext system Ieee Transactions On Knowledge and Data Engineering. 8: 555-562. DOI: 10.1109/69.536249  0.401
1996 Bertino E, Bettini C, Ferrari E, Samarati P. A temporal access control mechanism for database systems Ieee Transactions On Knowledge and Data Engineering. 8: 67-80. DOI: 10.1109/69.485637  0.382
1995 Bertino E, Origgi F, Samarati P. An extended authorization model for object databases Journal of Computer Security. 3: 207-230. DOI: 10.3233/Jcs-1994/1995-32-305  0.397
1995 Bettini C, Wang XS, Bertino E, Jajodia S. Semantic Assumptions and Query Evaluation in Temporal Databases Acm Sigmod Record. 24: 257-268. DOI: 10.1145/568271.223843  0.318
1995 Bertino E, Foscoli P. Index Organizations for Object-Oriented Database Systems Ieee Transactions On Knowledge and Data Engineering. 7: 193-209. DOI: 10.1109/69.382292  0.335
1995 Bertino E, Jajodia S, Samarati P. Database security: Research and practice Information Systems. 20: 537-556. DOI: 10.1016/0306-4379(95)00029-4  0.459
1994 Paganini A, Bertino E, Damiani M. A View Mechanism for a Knowledge-Based Information System Integrated Computer-Aided Engineering. 1: 397-420. DOI: 10.3233/Ica-1994-1503  0.365
1994 Bertino E, Negri M, Pelagatti G, Sbattella L. Applications of object-oriented technology to the integration of heterogeneous database systems Distributed and Parallel Databases. 2: 343-370. DOI: 10.1007/Bf01265319  0.396
1993 Atluri V, Jajodia S, Bertino E. Achieving stricter correctness requirements in multilevel secure database management systems Journal of Computer Security. 2: 311-351. DOI: 10.3233/Jcs-1993-2404  0.458
1992 Bertino E, Negri M, Pelagatti G, Sbattella L. Object-oriented query languages: the notion and the issues Ieee Transactions On Knowledge and Data Engineering. 4: 223-237. DOI: 10.1109/69.142014  0.309
1991 Rabitti F, Bertino E, Kim W, Woelk D. A model of authorization for next-generation database systems Acm Transactions On Database Systems. 16: 88-131. DOI: 10.1145/103140.103144  0.367
1991 Bertino E, Martino L. Object-Oriented Database Management Systems: Concepts and Issues Computer. 24: 33-47. DOI: 10.1109/2.76261  0.315
1990 Bertino E, Negri M, Pelagatti G, Sbattella L. An object-oriented data model for distributed office applications Acm Sigois Bulletin. 11: 216-226. DOI: 10.1145/91478.91544  0.343
1989 Bertino E, Kim W. Indexing Techniques for Queries on Nested Objects Ieee Transactions On Knowledge and Data Engineering. 1: 196-214. DOI: 10.1109/69.87960  0.31
1988 Bertino E, Gibbs S, Rabitti F. DOCUMENT QUERY PROCESSING STRATEGIES: COST EVALUATION AND HEURISTICS . 169-181. DOI: 10.1145/966861.45428  0.375
1988 Bertino E, Rabitti F, Gibbs S. Query Processing in a Multimedia Document System Acm Transactions On Information Systems (Tois). 6: 1-41. DOI: 10.1145/42279.42281  0.397
Show low-probability matches.